2019
DOI: 10.6028/nist.sp.800-52r2
|View full text |Cite
|
Sign up to set email alerts
|

Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations

Abstract: AuthorityThis publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal official… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 51 publications
0
19
0
2
Order By: Relevance
“…This practice guide implemented PR.DS-2 and PR.DS-P2 to ensure that data-in-transit are protected. HDOs connecting to cloud-hosted consoles used TLS 1.2 [26]. The telehealth platform provider assured implementation of PR.DS-3 and PR.DS-P3 for RPM biometric devices deployed to the patient home.…”
Section: Data Security (Prds and Prds-p)mentioning
confidence: 99%
“…This practice guide implemented PR.DS-2 and PR.DS-P2 to ensure that data-in-transit are protected. HDOs connecting to cloud-hosted consoles used TLS 1.2 [26]. The telehealth platform provider assured implementation of PR.DS-3 and PR.DS-P3 for RPM biometric devices deployed to the patient home.…”
Section: Data Security (Prds and Prds-p)mentioning
confidence: 99%
“…No caso deste trabalho houve o cuidado de se habilitar somente o protocolo TLS v1.2 ou acima (o protocolo TLS v1.3 ainda não é suportado pela maioria das bibliotecas disponíveis para o ESP32) e em não utilizar versões vulneráveis dos algoritmos de criptografia [24] [25].…”
Section: Conclus ãOunclassified
“…It is important that the secret is protected from interception by attackers. This can be done by a NIST-recommended authenticated protected channel, such as TLS [17].…”
Section: Memorized Secretsmentioning
confidence: 99%