TLS Server Certificate Management

Download the Practice Guide

The NCCoE has released the final version of NIST Cybersecurity Practice Guide SP 1800-16, TLS Server Certificate Management. Use the button below to view this publication in its entirety or scroll down for links to a specific section.

Download PDF » Open Web Version »

Current Status

The National Cybersecurity Center of Excellence (NCCoE) has released the final version of National Institute of Standards and Technology (NIST) Cybersecurity Practice Guide Special Publication 1800-16, Securing Web Transactions: Transport Layer Security (TLS) Server Certificate Management. See the two-page fact sheet for an overview of the project.

This practice guide can benefit executives, chief Information security officers, system administrators, or anyone who has a stake in protecting his or her organization's data, privacy, and overall operational security.

For ease of use, the final guide is available to download or read in volumes:

  • SP 1800-16A: Executive Summary (pdf) (web page)  
  • SP 1800-16B: Security Risks and Recommended Best Practices (pdf) (web page)  
  • SP 1800-16C: Approach, Architecture, and Security Characteristics (pdf) (web page)  
  • SP 1800-16D: How-To-Guides (pdf) (web page)  

Or download the complete guide (PDF).

If you adopted all or parts of the practice guide, share your experiences with us.

If you have questions, please send an email to



The NCCoE at NIST recognizes the vital importance of securing web transactions and other communications between clients and servers for organizations. This project uses commercially available technologies to demonstrate how medium and large enterprises that rely on Transport Layer Security (TLS) can secure both customer-facing and internal applications can better manage TLS server certificates by:

  • Defining operational and security policies; identifying roles and responsibilities
  • Establishing comprehensive certificate inventories and ownership tracking
  • Conducting continuous monitoring of certificate operational and security status
  • Automating certificate management to minimize human error and maximize efficiency on a large scale
  • Enabling rapid migration to new certificates and keys when cryptographic mechanisms are found to be weak, compromised or vulnerable

 In December 2018, the NCCoE released Volumes A and B of this guide to provide enterprises actionable guidance to help them establish and implement a formal TLS server certificate management program. The received comments were adjudicated and integrated into the updated draft versions of Volume A and B. With the release of the full guide, organizations can advance their TLS management efforts by reading Volume C which explains our approach, architecture, and security characteristics, and Volume D which contains the how-to-guides to build the example solutions.

Although client certificates may optionally be used in TLS to perform mutual authentication, managing client certificates is outside this project's scope.

Questions? Contact us at

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

f5 logo
Venafi logo