SlideShare a Scribd company logo
1 of 63
NIST Special Publication 800-52
Revision 2
Guidelines for the Selection,
Configuration, and Use of Transport
Layer Security (TLS) Implementations
Kerry A. McKay
David A. Cooper
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-52r2
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-52
Revision 2
Guidelines for the Selection,
Configuration, and Use of Transport
Layer Security (TLS) Implementations
Kerry A. McKay
David A. Cooper
Computer Security Division
Information Technology Laboratory
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-52r2
August 2019
U.S. Department of Commerce
Wilbur L. Ross, Jr., Secretary
National Institute of Standards and Technology
Walter Copan, NIST Director and Under Secretary of Commerce
for Standards and Technology
Authority
This publication has been developed by NIST in accordance
with its statutory responsibilities under the
Federal Information Security Modernization Act (FISMA) of
2014, 44 U.S.C. § 3551 et seq., Public Law
(P.L.) 113-283. NIST is responsible for developing information
security standards and guidelines, including
minimum requirements for federal information systems, but
such standards and guidelines shall not apply
to national security systems without the express approval of
appropriate federal officials exercising policy
authority over such systems. This guideline is consistent with
the requirements of the Office of Management
and Budget (OMB) Circular A-130.
Nothing in this publication should be taken to contradict the
standards and guidelines made mandatory and
binding on federal agencies by the Secretary of Commerce
under statutory authority. Nor should these
guidelines be interpreted as altering or superseding the existing
authorities of the Secretary of Commerce,
Director of the OMB, or any other federal official. This
publication may be used by nongovernmental
organizations on a voluntary basis and is not subject to
copyright in the United States. Attribution would,
however, be appreciated by NIST.
National Institute of Standards and Technology Special
Publication 800-52 Revision 2
Natl. Inst. Stand. Technol. Spec. Publ. 800-52 Rev. 2, 72 pages
(August 2019)
CODEN: NSPUE2
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-52r2
Certain commercial entities, equipment, or materials may be
identified in this document in order to describe an
experimental procedure or concept adequately. Such
identification is not intended to imply recommendation or
endorsement by NIST, nor is it intended to imply that the
entities, materials, or equipment are necessarily the best
available for the purpose.
There may be references in this publication to other
publications currently under development by NIST in
accordance
with its assigned statutory responsibilities. The information in
this publication, including concepts and methodologies,
may be used by federal agencies even before the completion of
such companion publications. Thus, until each
publication is completed, current requirements, guidelines, and
procedures, where they exist, remain operative. For
planning and transition purposes, federal agencies may wish to
closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications
during public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications, other than the
ones noted above, are available at
https://csrc.nist.gov/publications.
Comments on this publication may be submitted to:
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology
Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-
8930
Email: [email protected]
All comments are subject to release under the Freedom of
Information Act (FOIA).
https://csrc.nist.gov/publications
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
ii
This publication is available free of charge from
: https://doi.org/10.6028/N
IS
T.S
P
.800-52r2
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National
Institute of Standards and
Technology (NIST) promotes the U.S. economy and public
welfare by providing technical
leadership for the Nation’s measurement and standards
infrastructure. ITL develops tests, test
methods, reference data, proof of concept implementations, and
technical analyses to advance
the development and productive use of information technology.
ITL’s responsibilities include the
development of management, administrative, technical, and
physical standards and guidelines for
the cost-effective security and privacy of other than national
security-related information in
federal information systems. The Special Publication 800-series
reports on ITL’s research,
guidelines, and outreach efforts in information system security,
and its collaborative activities
with industry, government, and academic organizations.
Abstract
Transport Layer Security (TLS) provides mechanisms to protect
data during electronic
dissemination across the Internet. This Special Publication
provides guidance to the selection and
configuration of TLS protocol implementations while making
effective use of Federal
Information Processing Standards (FIPS) and NIST-
recommended cryptographic algorithms. It
requires that TLS 1.2 configured with FIPS-based cipher suites
be supported by all government
TLS servers and clients and requires support for TLS 1.3 by
January 1, 2024. This Special
Publication also provides guidance on certificates and TLS
extensions that impact security.
Keywords
information security; network security; SSL; TLS; Transport
Layer Security
Acknowledgements
The authors, Kerry McKay and David Cooper of the National
Institute of Standards and
Technology (NIST), would like to thank the many people who
assisted with the development of
this document. In particular, we would like to acknowledge Tim
Polk of NIST and Santosh
Chokhani of CygnaCom
Solution
s, who were co-authors on the first revision of this document.
We would also like to acknowledge Matthew J. Fanto and C.
Michael Chernick of NIST and
Charles Edington III and Rob Rosenthal of Booz Allen
Hamilton who wrote the initial published
version of this document.
Audience
This document assumes that the reader of these guidelines is
familiar with TLS protocols and
public-key infrastructure concepts, including, for example,
X.509 certificates.
The guidelines in this document are specifically targeted
towards U.S. federal departments and
agencies. While these guidelines will generally be of use to
other readers, information about
recommended cryptographic algorithms may not apply to non-
federal readers if it is inconsistent
with the policies of the readers’ organizations.
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
iii
This publication is available free of charge from
: https://doi.org/10.6028/N
IS
T.S
P
.800-52r2
Executive Summary
Office of Management and Budget (OMB) Circular A-130,
Managing Information as a Strategic
Resource, requires managers of public-facing information
repositories or dissemination systems
that contain sensitive but unclassified data to ensure that
sensitive data is protected
commensurate with the risk and magnitude of the harm that
would result from the loss, misuse,
or unauthorized access to or modification of such data. Given
the nature of interconnected
networks and the use of the Internet to share information, the
protection of this sensitive data can
become difficult if proper mechanisms are not employed to
protect the data. Transport Layer
Security (TLS) provides such a mechanism to protect sensitive
data during electronic
dissemination across the Internet.
TLS is a protocol created to provide authentication,
confidentiality, and data integrity protection
between two communicating applications. TLS is based on a
precursor protocol called the Secure
Sockets Layer Version 3.0 (SSL 3.0) and is considered to be an
improvement to SSL 3.0. SSL
3.0 is specified in [32]. The Transport Layer Security version 1
(TLS 1.0) is specified in Request
for Comments (RFC) 2246 [23]. Each document specifies a
similar protocol that provides
security services over the Internet. TLS 1.0 has been revised to
version 1.1, as documented in
RFC 4346 [24], and TLS 1.1 has been further revised to version
1.2, as documented in RFC 5246
[25]. In addition, some extensions have been defined to mitigate
some of the known security
vulnerabilities in implementations using TLS versions 1.0, 1.1,
and 1.2. TLS 1.3, described in
RFC 8446 [57], is a significant update to previous versions that
includes protections against
security concerns that arose in previous versions of TLS.
This Special Publication provides guidance on the selection and
configuration of TLS protocol
implementations while making effective use of NIST-approved
cryptographic schemes and
algorithms. In particular, it requires that TLS 1.2 be configured
with cipher suites using NIST-
approved schemes and algorithms as the minimum appropriate
secure transport protocol and
requires support for TLS 1.3 by January 1, 2024.1 When
interoperability with non-government
systems is required, TLS 1.1 and TLS 1.0 may be supported.
This Special Publication also
identifies TLS extensions for which mandatory support must be
provided and also identifies
other recommended extensions.
The use of the recommendations provided in this Special
Publication are intended to promote:
• More consistent use of authentication, confidentiality, and
integrity mechanisms for the
protection of information transported across the Internet;
• Consistent use of the recommended cipher suites that
encompass NIST-approved
algorithms and open standards;
• Protection against known and anticipated attacks on the TLS
protocol; and
1 While SSL 3.0 is the most secure of the SSL protocol
versions, it is not approved for use in the protection of Federal
information because it relies in part on the use of cryptographic
algorithms that are not NIST-approved. TLS 1.2 is approved
for the protection of Federal information when properly
configured. TLS versions 1.1 and 1.0 are approved only when
they are
required for interoperability with non-government systems and
are configured according to these guidelines.
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
iv
This publication is available free of charge from
: https://doi.org/10.6028/N
IS
T.S
P
.800-52r2
• Informed decisions by system administrators and managers in
the integration of TLS
implementations.
While these guidelines are primarily designed for federal users
and system administrators to
adequately protect sensitive but unclassified U.S. Federal
Government data against serious
threats on the Internet, they may also be used within closed
network environments to segregate
data. (The client-server model and security services discussed
also apply in these situations).
This Special Publication supersedes NIST Special Publication
800-52 Revision 1. This Special
Publication should be used in conjunction with existing policies
and procedures.
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
v
This publication is available free of charge from
: https://doi.org/10.6028/N
IS
T.S
P
.800-52r2
Table of Contents
Executive Summary
...............................................................................................
...... iii
1 Introduction
...............................................................................................
............. 1
1.1 History of TLS
...............................................................................................
.. 1
1.2 Scope
...............................................................................................
............... 2
1.2.1 Alternative Configurations
.................................................................... 3
1.3 Document Conventions
................................................................................... 3
2 TLS Overview
...............................................................................................
.......... 4
2.1 TLS Subprotocols
........................................................................................... 4
2.2 Shared Secret Negotiation
.............................................................................. 5
2.3 Confidentiality
...............................................................................................
.. 5
2.4 Integrity
...............................................................................................
............ 6
2.5 Authentication
...............................................................................................
.. 6
2.6 Anti-Replay
...............................................................................................
...... 7
2.7 Key Management
............................................................................................ 7
3 Minimum Requirements for TLS Servers
............................................................. 8
3.1 Protocol Version Support
................................................................................ 8
3.2 Server Keys and Certificates
.......................................................................... 9
3.2.1 Server Certificate Profile
..................................................................... 10
3.2.2 Obtaining Revocation Status Information for the Client
Certificate ..... 12
3.2.3 Server Public-Key Certificate Assurance
............................................ 13
3.3 Cryptographic Support
.................................................................................. 14
3.3.1 Cipher Suites
...................................................................................... 14
3.3.2 Implementation Considerations
.......................................................... 20
3.3.3 Validated Cryptography
...................................................................... 20
3.4 TLS Extension Support
................................................................................. 21
3.4.1 Mandatory TLS Extensions
................................................................ 22
3.4.2 Conditional TLS Extensions
............................................................... 23
3.4.3 Discouraged TLS Extensions
............................................................. 28
3.5 Client Authentication
..................................................................................... 29
3.5.1 Path Validation
................................................................................... 29
3.5.2 Trust Anchor Store
............................................................................. 30
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
vi
This publication is available free of charge from
: https://doi.org/10.6028/N
IS
T.S
P
.800-52r2
3.5.3 Checking the Client Key Size
............................................................. 30
3.5.4 Server Hints List
................................................................................. 31
3.6 Session Resumption and Early Data
............................................................ 31
3.7 Compression Methods
.................................................................................. 32
3.8 Operational Considerations
.......................................................................... 32
4 Minimum Requirements for TLS Clients
............................................................ 33
4.1 Protocol Version Support
.............................................................................. 33
4.2 Client Keys and Certificates
.......................................................................... 33
4.2.1 Client Certificate Profile
...................................................................... 33
4.2.2 Obtaining Revocation Status Information for the Server
Certificate ... 35
4.2.3 Client Public-Key Certificate Assurance
............................................. 36
4.3 Cryptographic Support
.................................................................................. 36
4.3.1 Cipher Suites
...................................................................................... 36
4.3.2 Validated Cryptography
...................................................................... 37
4.4 TLS Extension Support
................................................................................. 37
4.4.1 Mandatory TLS Extensions
................................................................ 37
4.4.2 Conditional TLS Extensions
............................................................... 38
4.4.3 Discouraged TLS Extensions
............................................................. 42
4.5 Server Authentication
.................................................................................... 42
4.5.1 Path Validation
................................................................................... 42
4.5.2 Trust Anchor Store
............................................................................. 43
4.5.3 Checking the Server Key Size
............................................................ 43
4.5.4 User Interface
..................................................................................... 43
4.6 Session Resumption and Early Data
............................................................ 44
4.7 Compression Methods
.................................................................................. 44
4.8 Operational Considerations
.......................................................................... 44
List of Appendices
Appendix A— Acronyms
............................................................................................
45
Appendix B— Interpreting Cipher Suite Names
....................................................... 47
B.1 Interpreting Cipher Suites Names in TLS 1.0, 1.1, and 1.2
........................... 47
B.2 Interpreting Cipher Suites Names in TLS 1.3
................................................ 48
Appendix C— Pre-shared Keys
................................................................................. 49
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
vii
This publication is available free of charge from
: https://doi.org/10.6028/N
IS
T.S
P
.800-52r2
Appendix D— RSA Key Transport
............................................................................. 51
D.1 Transition Period
...........................................................................................
51
Appendix E— Future Capabilities
.............................................................................. 53
E.1 U.S. Federal Public Trust PKI
....................................................................... 53
E.2 DNS-based Authentication of Named Entities (DANE)
................................. 53
E.3 Encrypted Server Name Indication
............................................................... 54
Appendix F— Determining the Need for TLS 1.0 and 1.1
........................................ 55
Appendix G— References
.......................................................................................... 56
Appendix H— Revision History
................................................................................. 63
H.1 Original
...............................................................................................
.......... 63
H.2 Revision 1
...............................................................................................
...... 63
H.3 Revision 2
...............................................................................................
...... 63
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
1
1 Introduction
Transport Layer Security (TLS) protocols are used to secure
communications in a wide variety of
online transactions, such as financial transactions (e.g.,
banking, trading stocks, e-commerce),
healthcare transactions (e.g., viewing medical records or
scheduling medical appointments), and
social transactions (e.g., email or social networking). Any
network service that handles sensitive
or valuable data, whether it is personally identifiable
information (PII), financial data, or login
information, needs to adequately protect that data. TLS provides
a protected channel for sending
data between a server and a client. The client is often, but not
always, a web browser.
Memorandum M-15-132 requires that all publicly accessible
federal websites and web services
only provide service through a secure connection.3 The
initiative to secure connections will
enhance privacy and prevent modification of the data from
government sites in transit.
TLS is a layered protocol that runs on top of a reliable transport
protocol—typically the
Transmission Control Protocol (TCP). Application protocols,
such as the Hypertext Transfer
Protocol (HTTP) and the Internet Message Access Protocol
(IMAP), can run above TLS. TLS is
application-independent and used to provide security to any two
communicating applications that
transmit data over a network via an application protocol.
1.1 History of TLS
The Secure Sockets Layer (SSL) protocol was designed by the
Netscape Corporation to meet the
security needs of client and server applications. Version 1 of
SSL was never released. SSL 2.0
was released in 1995 but had well-known security
vulnerabilities, which were addressed by the
1996 release of SSL 3.0. During this timeframe, the Microsoft
Corporation released a protocol
known as Private Communications Technology (PCT) and later
released a higher-performance
protocol known as the Secure Transport Layer Protocol (STLP).
PCT and STLP never
commanded the market share that SSL 2.0 and SSL 3.0
commanded. The Internet Engineering
Task Force (IETF), a technical working group responsible for
developing Internet standards to
ensure communications compatibility across different
implementations, attempted to resolve
security engineering and protocol incompatibility issues
between the protocols as best it could.
The IETF standards track Transport Layer Security protocol
Version 1.0 (TLS 1.0) emerged and
was codified by the IETF as Request for Comments (RFC) 2246
[23]. While TLS 1.0 is based on
SSL 3.0, and the differences between them are not dramatic,
they are significant enough that
TLS 1.0 and SSL 3.0 do not interoperate.
TLS 1.1, specified in RFC 4346 [24], was developed to address
weaknesses discovered in TLS
1.0, primarily in the areas of initialization vector selection and
padding error processing.
Initialization vectors were made explicit4 to prevent a certain
class of attacks on the Cipher
2
https://obamawhitehouse.archives.gov/sites/default/files/omb/m
emoranda/2015/m-15-13.pdf
3 See https://https.cio.gov/ for more details on this initiative.
4 The initialization vector (IV) must be sent; it cannot be
derived from a state known by both parties, such as the previous
message.
https://obamawhitehouse.archives.gov/sites/default/files/omb/m
emoranda/2015/m-15-13.pdf
https://https.cio.gov/
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
2
Block Chaining (CBC) mode of operation used by TLS. The
handling of padding errors was
altered to treat a padding error as a bad message authentication
code rather than a decryption
failure. In addition, the TLS 1.1 RFC acknowledges attacks on
CBC mode that rely on the time
to compute the message authentication code (MAC). The TLS
1.1 specification states that to
defend against such attacks, an implementation must process
records in the same manner
regardless of whether padding errors exist. Further
implementation considerations for CBC
modes (which were not included in RFC 4346 [24]) are
discussed in Section 3.3.2.
TLS 1.2, specified in RFC 5246 [25], made several
cryptographic enhancements, particularly in
the area of hash functions, with the ability to use or specify the
SHA-2 family of algorithms for
hash, MAC, and Pseudorandom Function (PRF) computations.
TLS 1.2 also adds authenticated
encryption with associated data (AEAD) cipher suites.
TLS 1.3, specified in RFC 8446 [57], represents a significant
change to TLS that aims to address
threats that have arisen over the years. Among the changes are a
new handshake protocol, a new
key derivation process that uses the HMAC-based Extract-and-
Expand Key Derivation Function
(HKDF) [37], and the removal of cipher suites that use RSA key
transport or static Diffie-
Hellman (DH) key exchanges, the CBC mode of operation, or
SHA-1. Many extensions defined
for use with TLS 1.2 and previous versions cannot be used with
TLS 1.3.
1.2 Scope
Security is not a single property that is (or is not) possessed by
a protocol. Rather, security
includes a complex set of related properties that together
provide the required information
assurance characteristics and information protection services.
Security requirements are usually
derived from a risk assessment of the threats or attacks that an
adversary is likely to mount
against a system. The adversary is likely to take advantage of
implementation vulnerabilities
found in many system components, including computer
operating systems, application software
systems, and the computer networks that interconnect them.
Thus, in order to secure a system
against a myriad of threats, security must be judiciously placed
in the various systems and
network layers.
These guidelines focus only on network security, and they focus
directly on the small portion of
the network communications stack that is referred to as the
transport layer. Several other NIST
publications address security requirements in the other parts of
the system and network layers.
Adherence to these guidelines only protects the data in transit.
Other applicable NIST standards
and guidelines should be used to ensure protection of systems
and stored data.
These guidelines focus on the common use cases where clients
and servers must interoperate
with a wide variety of implementations, and authentication is
performed using public-key
certificates. To promote interoperability, implementations often
support a wide array of
cryptographic options. However, there are much more
constrained TLS implementations where
security is needed but broad interoperability is not required, and
the cost of implementing unused
features may be prohibitive. For example, minimal servers are
often implemented in embedded
controllers and network infrastructure devices, such as routers,
and then used with browsers to
remotely configure and manage the devices. There are also
cases where both the client and server
for an application’s TLS connection are under the control of the
same entity, and therefore
NIST SP 800-52 REV. 2 GUIDELINES FOR TLS
IMPLEMENTATIONS
3
allowing a variety of options for interoperability is not
necessary. The use of an appropriate
subset of the capabilities specified in these guidelines may be
acceptable in such cases.
The scope is further limited to TLS when used in conjunction
with TCP/IP. For example,
Datagram TLS (DTLS), which operates over datagram
protocols, is outside the scope of these
guidelines. NIST may issue separate guidelines for DTLS at a
later date.
1.2.1 Alternative Configurations
TLS may be used to secure the communications of a wide
variety of applications in a diverse set
of operating environments. As such, there is not a single
configuration that will work well for all
scenarios. These guidelines attempt to provide general-use
recommendations. However, the
needs of an agency or application may differ from general
needs. Deviations from these
guidelines are acceptable, provided that agencies and system
administrators assess and
accept the risks associated with alternative configurations in
terms of both security and
interoperability.
1.3 Document Conventions
Throughout this document, key words are used to identify
requirements. The key words “shall,”
“shall not,” “should,” and “should not” are used. These words
are a subset of the IETF Request
for Comments (RFC) 2119 key words, and have been chosen
based on convention in other
normative documents [15]. In addition to the key words, the
words “need,” “can,” and “may” are
used in this document but are not intended to be normative. The
key words “NIST-approved”
and “NIST-recommended” are used to indicate that a scheme or
algorithm is described in a
Federal Information Processing Standard (FIPS) or is
recommended by NIST in a Special
Publication (SP).
The recommendations in this document are grouped by server
recommendations and client
recommendations. Section 3 provides detailed guidance for the
selection and configuration of
TLS servers. Section 4 provides detailed guidance for the
selection, configuration, and use of
TLS clients.
NIST SP 800-52 REV. 2 …
Chapter 9: Patient Safety, Quality and Value
Harry Burke MD PhD
Learning Objectives
After reviewing the presentation, viewers should be able to:
Define safety, quality, near miss, and unsafe action
List the safety and quality factors that justified the clinical
implementation of electronic health record systems
Discuss three reasons why the electronic health record is central
to safety, quality, and value
List three issues that clinicians have with the current electronic
health record systems and discuss how these problems affect
safety and quality
Describe a specific electronic patient safety measurement
system and a specific electronic safety reporting system
Describe two integrated clinical decision support systems and
discuss how they may improve safety and quality
Patient Safety-Related Definitions
Safety: minimization of the risk and occurrence of patient harm
events
Harm: inappropriate or avoidable psychological or physical
injury to patient and/or family
Adverse Events: “an injury resulting from a medical
intervention”
Preventable Adverse Events: “errors that result in an adverse
event that are preventable”
Overuse: “the delivery of care of little or no value” e.g.
widespread use of antibiotics for viral infections
Underuse: “the failure to deliver appropriate care” e.g.
vaccines or cancer screening
Misuse: “the use of certain services in situations where they are
not clinically indicated” e.g. MRI for routine low back pain
Introduction
Medical errors are unfortunately common in healthcare, in spite
of sophisticated hospitals and well trained clinicians
Often it is breakdowns in protocol and communication, and not
individual errors
Technology has potential to reduce medical errors (particularly
medication errors) by:
Improving communication between physicians and patients
Improving clinical decision support
Decreasing diagnostic errors
Unfortunately, technology also has the potential to create
unique new errors that cause harm
Medical Errors
Errors can be related to diagnosis, treatment and preventive
care. Furthermore, medical errors can be errors of commission
or omission and fortunately not all errors result in an injury and
not all medical errors are preventable
Most common outpatient errors:
Prescribing medications
Getting the correct laboratory test for the correct patient at the
correct time
Filing system errors
Dispensing medications and responding to abnormal test results
5
While many would argue that treatment errors are the most
common category of medical errors, diagnostic errors accounted
for the largest percentage of malpractice claims, surpassing
treatment errors in one study
Diagnostic errors can result from missed, wrong or delayed
diagnoses and are more likely in the outpatient setting. This is
somewhat surprising given the fact that US physicians tend to
practice “defensive medicine”
Over-diagnosis may also cause medical errors but this has been
less well studied
Medical Errors
Unsafe healthcare lowers quality but safe medicine is not
always high quality
From the National Academy of Medicine’s perspective, quality
is a set of six aspirational goals: medical care should be safe,
effective, timely, efficient, patient-centered, and equitable
Value relates to how important something is to use
Cost-effective?
Necessary?
Affect morbidity, mortality or quality of life?
Quality, Safety and Value
Most adverse events result from unsafe actions or inactions by
anyone on the healthcare team, including the patient
Missed care is “any aspect of required care that is omitted either
in part or in whole or delayed”
Many of the above go unreported
Unsafe Actions
Most near-miss events are not reported. Many are not witnessed
The tendency is the blame the individual, but healthcare is
complex and there are often “system errors”
Most safety systems are retrospective; we need to move to be
proactive
We need good data, such as the ratio of detected unsafe actions
divided by the opportunity of an unsafe action, over a specified
time interval
Reporting Unsafe Actions
9
Patient Safety Reporting System: event is recorded and if it is a
sentinel event, it is investigated.
Most systems are not integrated with the EHR
Root Cause Analysis: common approach to determine the cause
of an adverse event. This has limitations
HEDIS measures can help track quality issues
Patient Safety Systems
Current reimbursement models mandate quality measures, e.g.
Medicare Patient Safety Monitoring System, now operated by
AHRQ. The new system is known as the Quality and Safety
Review System. Still labor intensive and manual
Global Trigger Tool: evaluates hospital safety. Said to detect
90% of adverse events. Select 10 discharge records and two
reviewers review the chart for any of the 53 “triggers”
Patient Safety Systems
Paper records have multiple disadvantages, as pointed out in the
EHR chapter
Expectations have been very high regarding the EHR’s impact
on safety, quality and value
Unfortunately, results have been mixed and there has not been a
prospective study conducted to prove the EHR’s benefit towards
safety and quality
Using the EHR to Improve Safety, Quality and Value
High expectations that CDS that is part of EHRs will improve
safety
As per multiple chapters in the textbook, CDS has mixed
reviews, in terms of safety and quality
Adverse events regarding CDS, includes ”alert fatigue”
The FDA will regulate software that is related to treatment and
decision making
Clinical Decision Support
Results in altered workflow and decreased efficiency.
Physicians are staying late to complete notes in the EHR
In an effort to save time physicians may “cut and paste” old
histories into the EHR, creating new problems
EHRs may create new safety issues “e-iatrogenesis”
Because of the multiple issues, it is very common to see offices
and hospitals change EHRs, not always solving the problem
Clinician’s Issues with EHRs
Roughly 2/3 of EHR data is unstructured (free text) so it is not
computable.
While natural language processing (NLP) may help solve this,
we are a long ways away from resolution
Multiple open source and commercial NLP programs exist but
they require a great deal of time and expertise to match the
results a manual chart review would produce
Clinician’s Issues with EHRs
Governmental Organizations Involved with Patient Safety
US Federal Agencies:
Department of Health and Human Services (HHS)
Agency for Healthcare Research and Quality (AHRQ)
Centers for Medicare and Medicaid Services (CMS)
Non-reimbursable complications: (3 examples)
Objects left in a patient during surgery and blood
incompatibility
Catheter-associated urinary tract infections
Pressure ulcers (bed sores)
Hospitals must assemble, analyze and trend clinical and
administrative data to capture baseline data and measure
improvement over time
Health IT-based interventions are expected to assist
Governmental Organizations
Office of the National Coordinator for HIT
Learn: “Increase the quantity and quality of data and knowledge
about health IT safety.”
Improve: “Target resources and corrective actions to improve
health IT safety and patient safety”
Safety goals will be aligned with meaningful use objectives.
Lead: “Promote a culture of safety related to health IT”
Governmental Organizations
The Food and Drug Administration
MedWatch: posts drug alerts and offers online reporting area
Center for Devices and Radiological Health (CDRH)
Plan to regulate mobile medical applications designed for use
on smartphones
State Patient Safety Programs: By 2010, 27 states and the
District of Columbia passed legislation or regulation related to
hospital reporting of adverse events to a state agency
Meaningful Use Objectives and Potential Impact on Patient
Safety
Objective: Use computerized provider order entry (CPOE) for
medication, laboratory, and radiology orders directly entered by
any licensed healthcare professional who can enter orders into
the medical record per state, local, and professional guidelines
Objective: Use clinical decision support to improve
performance on high-priority health conditions
Meaningful Use Objectives and Potential Impact on Patient
Safety
Objective: Automatically track medications from order to
administration using assistive technologies in conjunction with
an electronic medication administration record (eMAR)
Objective: Generate and transmit discharge prescriptions
electronically (eRx)
Non-Governmental Organizations and Patient Safety
National Patient Safety Foundation (NPSF) Goals:
Identifying and creating a core body of knowledge
Identifying pathways to apply the knowledge
Developing and enhancing the culture of receptivity to patient
safety
Raising public awareness and fostering communication around
patient safety
National Academy of Medicine (was the Institute of Medicine
or IOM)
Institute of Medicine (IOM) Recommendations
Congress should create a Center for Patient Safety within the
Agency for Healthcare Research and Quality
A nationwide reporting system for medical errors should be
established
Volunteer reporting should be encouraged
Congress should create legislation to protect internal peer
review of medical errors
Performance standards and expectations by healthcare
organizations should include patient safety
FDA should focus more attention on drug safety
Healthcare organizations and providers should make patient
safety a priority goal
Healthcare organizations should implement known medication
safety policies
IOM Report - 2003
Patient safety must be linked to medical quality
A new healthcare system must be developed that will prevent
medical errors in the first place
New methods must be developed to acquire, study and share
error prevention among physicians, particularly at the point of
care
The IOM recommended specific data standards so patient
safety-related information can be recorded, shared and analyzed
IOM Report - 2011
Report focused exclusively on health IT and patient safety and
quality
Publish an “action and surveillance plan”
Push health IT vendors to support the free exchange of
information about health IT experiences and issues
Public and private sectors should make comparative user
experiences public
Health IT Safety Council should assess and monitor safe use of
health IT
Specify quality and risk management processes health IT
vendors must adopt
Establish an independent federal entity to investigate patient
safety deaths, serious injuries, or potentially unsafe conditions
associated with health IT
Support cross-disciplinary research toward the use of health IT
as part of a learning system
Non-Governmental Organizations and Patient Safety
The National Quality Forum
The Joint Commission:
Published the 2018 National Patient Safety Goals
They also published an alert about the potential for HIT to
create new patient safety issues
LeapFrog Group
HealthGrades
Institute for Safe Medication Practice (IMSP)
HealthGrades 2017 Patient Safety
Excellence Awards
Award recognizes hospitals with the lowest occurrences of 14
preventable patient safety events, placing the hospitals in the
top 10% in the nation for patient safety
This organization reviews the data from inpatient Medicare and
Medicaid cases each year and rates hospitals, in terms of patient
safety
They estimate that the top ranking hospitals represent, on
average, a 43% lower risk of a patient safety adverse event
compared to the lowest ranking hospitals
Quality Care Finder
www.hospitalcompare.hhs.gov
Allows consumers to review quality metrics e.g. morbidity and
mortality making decisions
Technologies with Potential to Decrease Medication Errors
Computerized provider order entry (CPOE) Benefits:
Improved handwriting identification
Reduced time to arrive in the pharmacy
Fewer errors related to similar drug names
Easier to integrate with other IT systems
Easier to link to drug-drug interactions
More likely to identify the prescriber
Available for immediate analysis
Can link to clinical decision support to recommend drugs of
choice
Jury still out on actual reduction of serious ADEs
Technologies with Potential to Decrease Medication Errors
Health Information Exchange (HIE):
Improve patient safety by better communication between
disparate healthcare participants
Automated Dispensing Cabinets (ADCs): like ATM machines
for medications on a ward
Home Electronic Medication Management System: home
dispensing, particularly for the elderly or non-compliant patient
Pharmacy Dispensing Robots: bottles are filled automatically
Electronic Medication Administration Record (eMAR):
electronic record of medications that is integrated with the EHR
and pharmacy
Intravenous (IV) Infusion Pumps: regulate IV drug dosing
accurately
Bar Coding Medication Administration: the patient, drug and
nurse all have a barcoded identity
These must all match for the drug to be given without any alerts
Bar codes are inexpensive but the software and other
components are expensive
Some healthcare systems have shown a significant reduction in
medication administrative errors, but many of these were minor
and would not have resulted in serious harm
Technologies with Potential to Decrease Medication Errors
Technologies with Potential to Decrease Medication Errors
Medication Reconciliation
When patients transition from hospital-to-hospital, from
physician-to physician or from floor-to-floor, medication errors
are more likely to occur
Joint Commission mandated hospitals must reconcile a list of
patient medications on admission, transfer and discharge
Task may be facilitated with EHR but still confusion may exist
if there are multiple physicians, multiple pharmacies, poor
compliance or dementia
Barriers to Improving
Patient Safety through Technology
Organizational: health systems leadership must develop a strong
“culture of safety”
Financial: Cost for multiple sophisticated HIT systems is
considerable
Error reporting: is voluntary and inadequate and usually “after
the fact”
Unintended Consequences
Technology may reduce medical errors but create new ones:
Medical alarm fatigue
Infusion Pump errors
Distractions related to mobile devices
Electronic health records: data can be missing and/or incorrect,
there can be typographical entry errors, and older information is
sometimes copied and pasted into the current record
Patient safety continues to be an ongoing problem with too
many medical errors reported yearly
Multiple organizations are reporting patient safety data
transparently to hopefully support change
There is a great expectation that HIT will improve patient
quality which in turn will decrease medical errors
There is some evidence that clinical decision support reduces
errors, but studies overall are mixed
Leadership must establish a “culture of safety” to effectively
achieve improvement in patient safety
Conclusions
MIS 320 Networks and Security Dr. Al Hammoshi
Homework #3
1. All assignments must be submitted via Blackboard by the
deadlines in order to receive credits.
2. For homework assignments, you are allowed many
submissions before the deadlines.
The attached NIST SP 800-52r2.pdf file is Guidelines for the
Selection, Configuration, and Use of Transport Layer Security
(TLS) Implementations published by National Institute of
Standards and Technology.
You are asked by Your CSO to give a briefing on “TLS
Overview” (see the screenshot below) to all network engineers
of the company.
Please create a 1-page summary to be used in your briefing.

More Related Content

Similar to NIST Special Publication 800-52 Revision 2 Guidelines .docx

Glossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST VocabularyGlossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST VocabularyDavid Sweigert
 
NIST Special Publication 800-53 Revision 4 Securit.docx
NIST Special Publication 800-53 Revision 4 Securit.docxNIST Special Publication 800-53 Revision 4 Securit.docx
NIST Special Publication 800-53 Revision 4 Securit.docxvannagoforth
 
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcomEndpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcomapjk220
 
Contingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxContingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxmaxinesmith73660
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417James W. De Rienzo
 
NIST - определения для Интернета вещей
NIST - определения для Интернета вещейNIST - определения для Интернета вещей
NIST - определения для Интернета вещейVictor Gridnev
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83David Sweigert
 
NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1David Sweigert
 
NIST Definition for Cloud Computing
NIST Definition for Cloud ComputingNIST Definition for Cloud Computing
NIST Definition for Cloud ComputingAjay Ohri
 
NIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsNIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsi-SCOOP
 
NIST Special Publication 800-53 Revision 5
NIST Special Publication 800-53 Revision 5NIST Special Publication 800-53 Revision 5
NIST Special Publication 800-53 Revision 5VICTOR MAESTRE RAMIREZ
 
3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdfAdmin621695
 
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurityDavid Sweigert
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3David Sweigert
 
The United States National Institute of Standards and Technology (NIST) has p...
The United States National Institute of Standards and Technology (NIST) has p...The United States National Institute of Standards and Technology (NIST) has p...
The United States National Institute of Standards and Technology (NIST) has p...Michael Hudak
 
«Определение понятия «облачные вычисления» (от National Institute of Standard...
«Определение понятия «облачные вычисления» (от National Institute of Standard...«Определение понятия «облачные вычисления» (от National Institute of Standard...
«Определение понятия «облачные вычисления» (от National Institute of Standard...Victor Gridnev
 

Similar to NIST Special Publication 800-52 Revision 2 Guidelines .docx (20)

Glossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST VocabularyGlossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST Vocabulary
 
NIST Special Publication 800-53 Revision 4 Securit.docx
NIST Special Publication 800-53 Revision 4 Securit.docxNIST Special Publication 800-53 Revision 4 Securit.docx
NIST Special Publication 800-53 Revision 4 Securit.docx
 
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcomEndpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
 
Contingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxContingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docx
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
NIST - определения для Интернета вещей
NIST - определения для Интернета вещейNIST - определения для Интернета вещей
NIST - определения для Интернета вещей
 
NIST.SP.800-53r4
NIST.SP.800-53r4NIST.SP.800-53r4
NIST.SP.800-53r4
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1
 
oow
oowoow
oow
 
Nist.sp.800 53r4 (1)
Nist.sp.800 53r4 (1)Nist.sp.800 53r4 (1)
Nist.sp.800 53r4 (1)
 
NIST Definition for Cloud Computing
NIST Definition for Cloud ComputingNIST Definition for Cloud Computing
NIST Definition for Cloud Computing
 
NIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsNIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitions
 
Nist cloud comp
Nist cloud compNist cloud comp
Nist cloud comp
 
NIST Special Publication 800-53 Revision 5
NIST Special Publication 800-53 Revision 5NIST Special Publication 800-53 Revision 5
NIST Special Publication 800-53 Revision 5
 
3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf
 
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
 
The United States National Institute of Standards and Technology (NIST) has p...
The United States National Institute of Standards and Technology (NIST) has p...The United States National Institute of Standards and Technology (NIST) has p...
The United States National Institute of Standards and Technology (NIST) has p...
 
«Определение понятия «облачные вычисления» (от National Institute of Standard...
«Определение понятия «облачные вычисления» (от National Institute of Standard...«Определение понятия «облачные вычисления» (от National Institute of Standard...
«Определение понятия «облачные вычисления» (от National Institute of Standard...
 

More from gibbonshay

Nurse Staffing and Inpatient Hospital Mortality.Write a Memora.docx
Nurse Staffing and Inpatient Hospital Mortality.Write a Memora.docxNurse Staffing and Inpatient Hospital Mortality.Write a Memora.docx
Nurse Staffing and Inpatient Hospital Mortality.Write a Memora.docxgibbonshay
 
NR360 INFORMATION SYSTEMS IN HEALTHCARE Required Un.docx
NR360 INFORMATION SYSTEMS IN HEALTHCARE      Required Un.docxNR360 INFORMATION SYSTEMS IN HEALTHCARE      Required Un.docx
NR360 INFORMATION SYSTEMS IN HEALTHCARE Required Un.docxgibbonshay
 
NUR3020Assignment 1 Application of Law and Ethics Modules.docx
NUR3020Assignment 1 Application of Law and Ethics Modules.docxNUR3020Assignment 1 Application of Law and Ethics Modules.docx
NUR3020Assignment 1 Application of Law and Ethics Modules.docxgibbonshay
 
Numinous AlienatedBifurcateAnthropocentricEmbo.docx
Numinous AlienatedBifurcateAnthropocentricEmbo.docxNuminous AlienatedBifurcateAnthropocentricEmbo.docx
Numinous AlienatedBifurcateAnthropocentricEmbo.docxgibbonshay
 
nstructionsIn this assignment, you will use Microsoft Word o.docx
nstructionsIn this assignment, you will use Microsoft Word o.docxnstructionsIn this assignment, you will use Microsoft Word o.docx
nstructionsIn this assignment, you will use Microsoft Word o.docxgibbonshay
 
NUR204 Week 7 Assignment Page 1 ` Assi.docx
NUR204 Week 7 Assignment                  Page 1 ` Assi.docxNUR204 Week 7 Assignment                  Page 1 ` Assi.docx
NUR204 Week 7 Assignment Page 1 ` Assi.docxgibbonshay
 
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
NR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docxNR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docx
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docxgibbonshay
 
NURS 6003 Transition to Graduate Study for NursingAca.docx
NURS 6003 Transition to Graduate Study for NursingAca.docxNURS 6003 Transition to Graduate Study for NursingAca.docx
NURS 6003 Transition to Graduate Study for NursingAca.docxgibbonshay
 
NURS 6241 Strategic Planning in Healthcare Organizations.docx
NURS 6241 Strategic Planning in Healthcare Organizations.docxNURS 6241 Strategic Planning in Healthcare Organizations.docx
NURS 6241 Strategic Planning in Healthcare Organizations.docxgibbonshay
 
Now you should have started your actual work for the project. The wo.docx
Now you should have started your actual work for the project. The wo.docxNow you should have started your actual work for the project. The wo.docx
Now you should have started your actual work for the project. The wo.docxgibbonshay
 
NUR204 Week 9 Assignment Page 1 ` Assi.docx
NUR204 Week 9 Assignment                  Page 1 ` Assi.docxNUR204 Week 9 Assignment                  Page 1 ` Assi.docx
NUR204 Week 9 Assignment Page 1 ` Assi.docxgibbonshay
 
NSG3036 W2 ProjectResearch Template NameCite both articles r.docx
NSG3036 W2 ProjectResearch Template NameCite both articles r.docxNSG3036 W2 ProjectResearch Template NameCite both articles r.docx
NSG3036 W2 ProjectResearch Template NameCite both articles r.docxgibbonshay
 
Nur 6053. Mod2 Wk3 Assignment Developing Organizational Policies .docx
Nur 6053. Mod2 Wk3 Assignment Developing Organizational Policies .docxNur 6053. Mod2 Wk3 Assignment Developing Organizational Policies .docx
Nur 6053. Mod2 Wk3 Assignment Developing Organizational Policies .docxgibbonshay
 
NR103 Transition to the Nursing Profession 3-Minute ReflectionW.docx
NR103 Transition to the Nursing Profession 3-Minute ReflectionW.docxNR103 Transition to the Nursing Profession 3-Minute ReflectionW.docx
NR103 Transition to the Nursing Profession 3-Minute ReflectionW.docxgibbonshay
 
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docxNRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docxgibbonshay
 
NUR 48200 Nursing Leadership and Management Module 2 A.docx
NUR 48200 Nursing Leadership and Management Module 2 A.docxNUR 48200 Nursing Leadership and Management Module 2 A.docx
NUR 48200 Nursing Leadership and Management Module 2 A.docxgibbonshay
 
NRFThe National Response Framework (NRF) is a guide to how.docx
NRFThe National Response Framework (NRF) is a guide to how.docxNRFThe National Response Framework (NRF) is a guide to how.docx
NRFThe National Response Framework (NRF) is a guide to how.docxgibbonshay
 
Now that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docxNow that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docxgibbonshay
 
Now its time to dig deeper! Discover a different oral condition.docx
Now its time to dig deeper! Discover a different oral condition.docxNow its time to dig deeper! Discover a different oral condition.docx
Now its time to dig deeper! Discover a different oral condition.docxgibbonshay
 
Now that you have completed your project and are in the last week of.docx
Now that you have completed your project and are in the last week of.docxNow that you have completed your project and are in the last week of.docx
Now that you have completed your project and are in the last week of.docxgibbonshay
 

More from gibbonshay (20)

Nurse Staffing and Inpatient Hospital Mortality.Write a Memora.docx
Nurse Staffing and Inpatient Hospital Mortality.Write a Memora.docxNurse Staffing and Inpatient Hospital Mortality.Write a Memora.docx
Nurse Staffing and Inpatient Hospital Mortality.Write a Memora.docx
 
NR360 INFORMATION SYSTEMS IN HEALTHCARE Required Un.docx
NR360 INFORMATION SYSTEMS IN HEALTHCARE      Required Un.docxNR360 INFORMATION SYSTEMS IN HEALTHCARE      Required Un.docx
NR360 INFORMATION SYSTEMS IN HEALTHCARE Required Un.docx
 
NUR3020Assignment 1 Application of Law and Ethics Modules.docx
NUR3020Assignment 1 Application of Law and Ethics Modules.docxNUR3020Assignment 1 Application of Law and Ethics Modules.docx
NUR3020Assignment 1 Application of Law and Ethics Modules.docx
 
Numinous AlienatedBifurcateAnthropocentricEmbo.docx
Numinous AlienatedBifurcateAnthropocentricEmbo.docxNuminous AlienatedBifurcateAnthropocentricEmbo.docx
Numinous AlienatedBifurcateAnthropocentricEmbo.docx
 
nstructionsIn this assignment, you will use Microsoft Word o.docx
nstructionsIn this assignment, you will use Microsoft Word o.docxnstructionsIn this assignment, you will use Microsoft Word o.docx
nstructionsIn this assignment, you will use Microsoft Word o.docx
 
NUR204 Week 7 Assignment Page 1 ` Assi.docx
NUR204 Week 7 Assignment                  Page 1 ` Assi.docxNUR204 Week 7 Assignment                  Page 1 ` Assi.docx
NUR204 Week 7 Assignment Page 1 ` Assi.docx
 
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
NR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docxNR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docx
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
 
NURS 6003 Transition to Graduate Study for NursingAca.docx
NURS 6003 Transition to Graduate Study for NursingAca.docxNURS 6003 Transition to Graduate Study for NursingAca.docx
NURS 6003 Transition to Graduate Study for NursingAca.docx
 
NURS 6241 Strategic Planning in Healthcare Organizations.docx
NURS 6241 Strategic Planning in Healthcare Organizations.docxNURS 6241 Strategic Planning in Healthcare Organizations.docx
NURS 6241 Strategic Planning in Healthcare Organizations.docx
 
Now you should have started your actual work for the project. The wo.docx
Now you should have started your actual work for the project. The wo.docxNow you should have started your actual work for the project. The wo.docx
Now you should have started your actual work for the project. The wo.docx
 
NUR204 Week 9 Assignment Page 1 ` Assi.docx
NUR204 Week 9 Assignment                  Page 1 ` Assi.docxNUR204 Week 9 Assignment                  Page 1 ` Assi.docx
NUR204 Week 9 Assignment Page 1 ` Assi.docx
 
NSG3036 W2 ProjectResearch Template NameCite both articles r.docx
NSG3036 W2 ProjectResearch Template NameCite both articles r.docxNSG3036 W2 ProjectResearch Template NameCite both articles r.docx
NSG3036 W2 ProjectResearch Template NameCite both articles r.docx
 
Nur 6053. Mod2 Wk3 Assignment Developing Organizational Policies .docx
Nur 6053. Mod2 Wk3 Assignment Developing Organizational Policies .docxNur 6053. Mod2 Wk3 Assignment Developing Organizational Policies .docx
Nur 6053. Mod2 Wk3 Assignment Developing Organizational Policies .docx
 
NR103 Transition to the Nursing Profession 3-Minute ReflectionW.docx
NR103 Transition to the Nursing Profession 3-Minute ReflectionW.docxNR103 Transition to the Nursing Profession 3-Minute ReflectionW.docx
NR103 Transition to the Nursing Profession 3-Minute ReflectionW.docx
 
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docxNRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
 
NUR 48200 Nursing Leadership and Management Module 2 A.docx
NUR 48200 Nursing Leadership and Management Module 2 A.docxNUR 48200 Nursing Leadership and Management Module 2 A.docx
NUR 48200 Nursing Leadership and Management Module 2 A.docx
 
NRFThe National Response Framework (NRF) is a guide to how.docx
NRFThe National Response Framework (NRF) is a guide to how.docxNRFThe National Response Framework (NRF) is a guide to how.docx
NRFThe National Response Framework (NRF) is a guide to how.docx
 
Now that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docxNow that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docx
 
Now its time to dig deeper! Discover a different oral condition.docx
Now its time to dig deeper! Discover a different oral condition.docxNow its time to dig deeper! Discover a different oral condition.docx
Now its time to dig deeper! Discover a different oral condition.docx
 
Now that you have completed your project and are in the last week of.docx
Now that you have completed your project and are in the last week of.docxNow that you have completed your project and are in the last week of.docx
Now that you have completed your project and are in the last week of.docx
 

Recently uploaded

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 

Recently uploaded (20)

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 

NIST Special Publication 800-52 Revision 2 Guidelines .docx

  • 1. NIST Special Publication 800-52 Revision 2 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations Kerry A. McKay David A. Cooper This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-52r2 C O M P U T E R S E C U R I T Y NIST Special Publication 800-52 Revision 2
  • 2. Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations Kerry A. McKay David A. Cooper Computer Security Division Information Technology Laboratory This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-52r2 August 2019 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology
  • 3. Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. This publication may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States. Attribution would, however, be appreciated by NIST. National Institute of Standards and Technology Special Publication 800-52 Revision 2 Natl. Inst. Stand. Technol. Spec. Publ. 800-52 Rev. 2, 72 pages (August 2019) CODEN: NSPUE2 This publication is available free of charge from:
  • 4. https://doi.org/10.6028/NIST.SP.800-52r2 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at https://csrc.nist.gov/publications. Comments on this publication may be submitted to: National Institute of Standards and Technology Attn: Computer Security Division, Information Technology Laboratory
  • 5. 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899- 8930 Email: [email protected] All comments are subject to release under the Freedom of Information Act (FOIA). https://csrc.nist.gov/publications NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS ii This publication is available free of charge from : https://doi.org/10.6028/N IS T.S P .800-52r2 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public
  • 6. welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in federal information systems. The Special Publication 800-series reports on ITL’s research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations. Abstract Transport Layer Security (TLS) provides mechanisms to protect data during electronic dissemination across the Internet. This Special Publication provides guidance to the selection and configuration of TLS protocol implementations while making effective use of Federal Information Processing Standards (FIPS) and NIST- recommended cryptographic algorithms. It requires that TLS 1.2 configured with FIPS-based cipher suites be supported by all government TLS servers and clients and requires support for TLS 1.3 by January 1, 2024. This Special Publication also provides guidance on certificates and TLS extensions that impact security. Keywords
  • 7. information security; network security; SSL; TLS; Transport Layer Security Acknowledgements The authors, Kerry McKay and David Cooper of the National Institute of Standards and Technology (NIST), would like to thank the many people who assisted with the development of this document. In particular, we would like to acknowledge Tim Polk of NIST and Santosh Chokhani of CygnaCom Solution s, who were co-authors on the first revision of this document. We would also like to acknowledge Matthew J. Fanto and C. Michael Chernick of NIST and Charles Edington III and Rob Rosenthal of Booz Allen Hamilton who wrote the initial published version of this document. Audience This document assumes that the reader of these guidelines is familiar with TLS protocols and public-key infrastructure concepts, including, for example,
  • 8. X.509 certificates. The guidelines in this document are specifically targeted towards U.S. federal departments and agencies. While these guidelines will generally be of use to other readers, information about recommended cryptographic algorithms may not apply to non- federal readers if it is inconsistent with the policies of the readers’ organizations. NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS iii This publication is available free of charge from
  • 9. : https://doi.org/10.6028/N IS T.S P .800-52r2 Executive Summary Office of Management and Budget (OMB) Circular A-130, Managing Information as a Strategic Resource, requires managers of public-facing information repositories or dissemination systems that contain sensitive but unclassified data to ensure that sensitive data is protected commensurate with the risk and magnitude of the harm that would result from the loss, misuse, or unauthorized access to or modification of such data. Given the nature of interconnected networks and the use of the Internet to share information, the protection of this sensitive data can become difficult if proper mechanisms are not employed to protect the data. Transport Layer
  • 10. Security (TLS) provides such a mechanism to protect sensitive data during electronic dissemination across the Internet. TLS is a protocol created to provide authentication, confidentiality, and data integrity protection between two communicating applications. TLS is based on a precursor protocol called the Secure Sockets Layer Version 3.0 (SSL 3.0) and is considered to be an improvement to SSL 3.0. SSL 3.0 is specified in [32]. The Transport Layer Security version 1 (TLS 1.0) is specified in Request for Comments (RFC) 2246 [23]. Each document specifies a similar protocol that provides security services over the Internet. TLS 1.0 has been revised to version 1.1, as documented in RFC 4346 [24], and TLS 1.1 has been further revised to version 1.2, as documented in RFC 5246 [25]. In addition, some extensions have been defined to mitigate some of the known security vulnerabilities in implementations using TLS versions 1.0, 1.1, and 1.2. TLS 1.3, described in RFC 8446 [57], is a significant update to previous versions that includes protections against security concerns that arose in previous versions of TLS. This Special Publication provides guidance on the selection and
  • 11. configuration of TLS protocol implementations while making effective use of NIST-approved cryptographic schemes and algorithms. In particular, it requires that TLS 1.2 be configured with cipher suites using NIST- approved schemes and algorithms as the minimum appropriate secure transport protocol and requires support for TLS 1.3 by January 1, 2024.1 When interoperability with non-government systems is required, TLS 1.1 and TLS 1.0 may be supported. This Special Publication also identifies TLS extensions for which mandatory support must be provided and also identifies other recommended extensions. The use of the recommendations provided in this Special Publication are intended to promote: • More consistent use of authentication, confidentiality, and integrity mechanisms for the protection of information transported across the Internet; • Consistent use of the recommended cipher suites that encompass NIST-approved algorithms and open standards;
  • 12. • Protection against known and anticipated attacks on the TLS protocol; and 1 While SSL 3.0 is the most secure of the SSL protocol versions, it is not approved for use in the protection of Federal information because it relies in part on the use of cryptographic algorithms that are not NIST-approved. TLS 1.2 is approved for the protection of Federal information when properly configured. TLS versions 1.1 and 1.0 are approved only when they are required for interoperability with non-government systems and are configured according to these guidelines. NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS iv
  • 13. This publication is available free of charge from : https://doi.org/10.6028/N IS T.S P .800-52r2 • Informed decisions by system administrators and managers in the integration of TLS implementations. While these guidelines are primarily designed for federal users and system administrators to adequately protect sensitive but unclassified U.S. Federal Government data against serious threats on the Internet, they may also be used within closed network environments to segregate data. (The client-server model and security services discussed also apply in these situations).
  • 14. This Special Publication supersedes NIST Special Publication 800-52 Revision 1. This Special Publication should be used in conjunction with existing policies and procedures. NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS v This publication is available free of charge from : https://doi.org/10.6028/N IS
  • 15. T.S P .800-52r2 Table of Contents Executive Summary ............................................................................................... ...... iii 1 Introduction ............................................................................................... ............. 1 1.1 History of TLS ............................................................................................... .. 1 1.2 Scope ............................................................................................... ............... 2 1.2.1 Alternative Configurations .................................................................... 3
  • 16. 1.3 Document Conventions ................................................................................... 3 2 TLS Overview ............................................................................................... .......... 4 2.1 TLS Subprotocols ........................................................................................... 4 2.2 Shared Secret Negotiation .............................................................................. 5 2.3 Confidentiality ............................................................................................... .. 5 2.4 Integrity ............................................................................................... ............ 6 2.5 Authentication ............................................................................................... .. 6 2.6 Anti-Replay ............................................................................................... ...... 7 2.7 Key Management ............................................................................................ 7
  • 17. 3 Minimum Requirements for TLS Servers ............................................................. 8 3.1 Protocol Version Support ................................................................................ 8 3.2 Server Keys and Certificates .......................................................................... 9 3.2.1 Server Certificate Profile ..................................................................... 10 3.2.2 Obtaining Revocation Status Information for the Client Certificate ..... 12 3.2.3 Server Public-Key Certificate Assurance ............................................ 13 3.3 Cryptographic Support .................................................................................. 14 3.3.1 Cipher Suites ...................................................................................... 14 3.3.2 Implementation Considerations .......................................................... 20 3.3.3 Validated Cryptography ...................................................................... 20 3.4 TLS Extension Support ................................................................................. 21
  • 18. 3.4.1 Mandatory TLS Extensions ................................................................ 22 3.4.2 Conditional TLS Extensions ............................................................... 23 3.4.3 Discouraged TLS Extensions ............................................................. 28 3.5 Client Authentication ..................................................................................... 29 3.5.1 Path Validation ................................................................................... 29 3.5.2 Trust Anchor Store ............................................................................. 30 NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS vi
  • 19. This publication is available free of charge from : https://doi.org/10.6028/N IS T.S P .800-52r2 3.5.3 Checking the Client Key Size ............................................................. 30 3.5.4 Server Hints List ................................................................................. 31 3.6 Session Resumption and Early Data ............................................................ 31 3.7 Compression Methods .................................................................................. 32 3.8 Operational Considerations .......................................................................... 32
  • 20. 4 Minimum Requirements for TLS Clients ............................................................ 33 4.1 Protocol Version Support .............................................................................. 33 4.2 Client Keys and Certificates .......................................................................... 33 4.2.1 Client Certificate Profile ...................................................................... 33 4.2.2 Obtaining Revocation Status Information for the Server Certificate ... 35 4.2.3 Client Public-Key Certificate Assurance ............................................. 36 4.3 Cryptographic Support .................................................................................. 36 4.3.1 Cipher Suites ...................................................................................... 36 4.3.2 Validated Cryptography ...................................................................... 37 4.4 TLS Extension Support ................................................................................. 37 4.4.1 Mandatory TLS Extensions ................................................................ 37
  • 21. 4.4.2 Conditional TLS Extensions ............................................................... 38 4.4.3 Discouraged TLS Extensions ............................................................. 42 4.5 Server Authentication .................................................................................... 42 4.5.1 Path Validation ................................................................................... 42 4.5.2 Trust Anchor Store ............................................................................. 43 4.5.3 Checking the Server Key Size ............................................................ 43 4.5.4 User Interface ..................................................................................... 43 4.6 Session Resumption and Early Data ............................................................ 44 4.7 Compression Methods .................................................................................. 44 4.8 Operational Considerations .......................................................................... 44 List of Appendices
  • 22. Appendix A— Acronyms ............................................................................................ 45 Appendix B— Interpreting Cipher Suite Names ....................................................... 47 B.1 Interpreting Cipher Suites Names in TLS 1.0, 1.1, and 1.2 ........................... 47 B.2 Interpreting Cipher Suites Names in TLS 1.3 ................................................ 48 Appendix C— Pre-shared Keys ................................................................................. 49 NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS vii
  • 23. This publication is available free of charge from : https://doi.org/10.6028/N IS T.S P .800-52r2 Appendix D— RSA Key Transport ............................................................................. 51 D.1 Transition Period ........................................................................................... 51 Appendix E— Future Capabilities .............................................................................. 53 E.1 U.S. Federal Public Trust PKI ....................................................................... 53 E.2 DNS-based Authentication of Named Entities (DANE)
  • 24. ................................. 53 E.3 Encrypted Server Name Indication ............................................................... 54 Appendix F— Determining the Need for TLS 1.0 and 1.1 ........................................ 55 Appendix G— References .......................................................................................... 56 Appendix H— Revision History ................................................................................. 63 H.1 Original ............................................................................................... .......... 63 H.2 Revision 1 ............................................................................................... ...... 63 H.3 Revision 2 ............................................................................................... ...... 63
  • 25. NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS 1 1 Introduction Transport Layer Security (TLS) protocols are used to secure communications in a wide variety of online transactions, such as financial transactions (e.g., banking, trading stocks, e-commerce), healthcare transactions (e.g., viewing medical records or scheduling medical appointments), and social transactions (e.g., email or social networking). Any network service that handles sensitive or valuable data, whether it is personally identifiable information (PII), financial data, or login information, needs to adequately protect that data. TLS provides a protected channel for sending data between a server and a client. The client is often, but not always, a web browser. Memorandum M-15-132 requires that all publicly accessible federal websites and web services only provide service through a secure connection.3 The
  • 26. initiative to secure connections will enhance privacy and prevent modification of the data from government sites in transit. TLS is a layered protocol that runs on top of a reliable transport protocol—typically the Transmission Control Protocol (TCP). Application protocols, such as the Hypertext Transfer Protocol (HTTP) and the Internet Message Access Protocol (IMAP), can run above TLS. TLS is application-independent and used to provide security to any two communicating applications that transmit data over a network via an application protocol. 1.1 History of TLS The Secure Sockets Layer (SSL) protocol was designed by the Netscape Corporation to meet the security needs of client and server applications. Version 1 of SSL was never released. SSL 2.0 was released in 1995 but had well-known security vulnerabilities, which were addressed by the 1996 release of SSL 3.0. During this timeframe, the Microsoft Corporation released a protocol known as Private Communications Technology (PCT) and later
  • 27. released a higher-performance protocol known as the Secure Transport Layer Protocol (STLP). PCT and STLP never commanded the market share that SSL 2.0 and SSL 3.0 commanded. The Internet Engineering Task Force (IETF), a technical working group responsible for developing Internet standards to ensure communications compatibility across different implementations, attempted to resolve security engineering and protocol incompatibility issues between the protocols as best it could. The IETF standards track Transport Layer Security protocol Version 1.0 (TLS 1.0) emerged and was codified by the IETF as Request for Comments (RFC) 2246 [23]. While TLS 1.0 is based on SSL 3.0, and the differences between them are not dramatic, they are significant enough that TLS 1.0 and SSL 3.0 do not interoperate. TLS 1.1, specified in RFC 4346 [24], was developed to address weaknesses discovered in TLS 1.0, primarily in the areas of initialization vector selection and padding error processing. Initialization vectors were made explicit4 to prevent a certain class of attacks on the Cipher
  • 28. 2 https://obamawhitehouse.archives.gov/sites/default/files/omb/m emoranda/2015/m-15-13.pdf 3 See https://https.cio.gov/ for more details on this initiative. 4 The initialization vector (IV) must be sent; it cannot be derived from a state known by both parties, such as the previous message. https://obamawhitehouse.archives.gov/sites/default/files/omb/m emoranda/2015/m-15-13.pdf https://https.cio.gov/ NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS 2 Block Chaining (CBC) mode of operation used by TLS. The handling of padding errors was
  • 29. altered to treat a padding error as a bad message authentication code rather than a decryption failure. In addition, the TLS 1.1 RFC acknowledges attacks on CBC mode that rely on the time to compute the message authentication code (MAC). The TLS 1.1 specification states that to defend against such attacks, an implementation must process records in the same manner regardless of whether padding errors exist. Further implementation considerations for CBC modes (which were not included in RFC 4346 [24]) are discussed in Section 3.3.2. TLS 1.2, specified in RFC 5246 [25], made several cryptographic enhancements, particularly in the area of hash functions, with the ability to use or specify the SHA-2 family of algorithms for hash, MAC, and Pseudorandom Function (PRF) computations. TLS 1.2 also adds authenticated encryption with associated data (AEAD) cipher suites. TLS 1.3, specified in RFC 8446 [57], represents a significant change to TLS that aims to address threats that have arisen over the years. Among the changes are a new handshake protocol, a new
  • 30. key derivation process that uses the HMAC-based Extract-and- Expand Key Derivation Function (HKDF) [37], and the removal of cipher suites that use RSA key transport or static Diffie- Hellman (DH) key exchanges, the CBC mode of operation, or SHA-1. Many extensions defined for use with TLS 1.2 and previous versions cannot be used with TLS 1.3. 1.2 Scope Security is not a single property that is (or is not) possessed by a protocol. Rather, security includes a complex set of related properties that together provide the required information assurance characteristics and information protection services. Security requirements are usually derived from a risk assessment of the threats or attacks that an adversary is likely to mount against a system. The adversary is likely to take advantage of implementation vulnerabilities found in many system components, including computer operating systems, application software systems, and the computer networks that interconnect them. Thus, in order to secure a system
  • 31. against a myriad of threats, security must be judiciously placed in the various systems and network layers. These guidelines focus only on network security, and they focus directly on the small portion of the network communications stack that is referred to as the transport layer. Several other NIST publications address security requirements in the other parts of the system and network layers. Adherence to these guidelines only protects the data in transit. Other applicable NIST standards and guidelines should be used to ensure protection of systems and stored data. These guidelines focus on the common use cases where clients and servers must interoperate with a wide variety of implementations, and authentication is performed using public-key certificates. To promote interoperability, implementations often support a wide array of cryptographic options. However, there are much more constrained TLS implementations where security is needed but broad interoperability is not required, and the cost of implementing unused
  • 32. features may be prohibitive. For example, minimal servers are often implemented in embedded controllers and network infrastructure devices, such as routers, and then used with browsers to remotely configure and manage the devices. There are also cases where both the client and server for an application’s TLS connection are under the control of the same entity, and therefore NIST SP 800-52 REV. 2 GUIDELINES FOR TLS IMPLEMENTATIONS 3 allowing a variety of options for interoperability is not necessary. The use of an appropriate subset of the capabilities specified in these guidelines may be acceptable in such cases. The scope is further limited to TLS when used in conjunction with TCP/IP. For example, Datagram TLS (DTLS), which operates over datagram
  • 33. protocols, is outside the scope of these guidelines. NIST may issue separate guidelines for DTLS at a later date. 1.2.1 Alternative Configurations TLS may be used to secure the communications of a wide variety of applications in a diverse set of operating environments. As such, there is not a single configuration that will work well for all scenarios. These guidelines attempt to provide general-use recommendations. However, the needs of an agency or application may differ from general needs. Deviations from these guidelines are acceptable, provided that agencies and system administrators assess and accept the risks associated with alternative configurations in terms of both security and interoperability. 1.3 Document Conventions Throughout this document, key words are used to identify requirements. The key words “shall,” “shall not,” “should,” and “should not” are used. These words
  • 34. are a subset of the IETF Request for Comments (RFC) 2119 key words, and have been chosen based on convention in other normative documents [15]. In addition to the key words, the words “need,” “can,” and “may” are used in this document but are not intended to be normative. The key words “NIST-approved” and “NIST-recommended” are used to indicate that a scheme or algorithm is described in a Federal Information Processing Standard (FIPS) or is recommended by NIST in a Special Publication (SP). The recommendations in this document are grouped by server recommendations and client recommendations. Section 3 provides detailed guidance for the selection and configuration of TLS servers. Section 4 provides detailed guidance for the selection, configuration, and use of TLS clients. NIST SP 800-52 REV. 2 …
  • 35. Chapter 9: Patient Safety, Quality and Value Harry Burke MD PhD Learning Objectives After reviewing the presentation, viewers should be able to: Define safety, quality, near miss, and unsafe action List the safety and quality factors that justified the clinical implementation of electronic health record systems
  • 36. Discuss three reasons why the electronic health record is central to safety, quality, and value List three issues that clinicians have with the current electronic health record systems and discuss how these problems affect safety and quality Describe a specific electronic patient safety measurement system and a specific electronic safety reporting system Describe two integrated clinical decision support systems and discuss how they may improve safety and quality Patient Safety-Related Definitions Safety: minimization of the risk and occurrence of patient harm events Harm: inappropriate or avoidable psychological or physical injury to patient and/or family
  • 37. Adverse Events: “an injury resulting from a medical intervention” Preventable Adverse Events: “errors that result in an adverse event that are preventable” Overuse: “the delivery of care of little or no value” e.g. widespread use of antibiotics for viral infections Underuse: “the failure to deliver appropriate care” e.g. vaccines or cancer screening Misuse: “the use of certain services in situations where they are not clinically indicated” e.g. MRI for routine low back pain Introduction Medical errors are unfortunately common in healthcare, in spite of sophisticated hospitals and well trained clinicians Often it is breakdowns in protocol and communication, and not individual errors
  • 38. Technology has potential to reduce medical errors (particularly medication errors) by: Improving communication between physicians and patients Improving clinical decision support Decreasing diagnostic errors Unfortunately, technology also has the potential to create unique new errors that cause harm Medical Errors Errors can be related to diagnosis, treatment and preventive care. Furthermore, medical errors can be errors of commission or omission and fortunately not all errors result in an injury and not all medical errors are preventable Most common outpatient errors: Prescribing medications Getting the correct laboratory test for the correct patient at the
  • 39. correct time Filing system errors Dispensing medications and responding to abnormal test results 5 While many would argue that treatment errors are the most common category of medical errors, diagnostic errors accounted for the largest percentage of malpractice claims, surpassing treatment errors in one study Diagnostic errors can result from missed, wrong or delayed diagnoses and are more likely in the outpatient setting. This is somewhat surprising given the fact that US physicians tend to practice “defensive medicine” Over-diagnosis may also cause medical errors but this has been less well studied Medical Errors
  • 40. Unsafe healthcare lowers quality but safe medicine is not always high quality From the National Academy of Medicine’s perspective, quality is a set of six aspirational goals: medical care should be safe, effective, timely, efficient, patient-centered, and equitable Value relates to how important something is to use Cost-effective? Necessary? Affect morbidity, mortality or quality of life? Quality, Safety and Value
  • 41. Most adverse events result from unsafe actions or inactions by anyone on the healthcare team, including the patient Missed care is “any aspect of required care that is omitted either in part or in whole or delayed” Many of the above go unreported Unsafe Actions Most near-miss events are not reported. Many are not witnessed The tendency is the blame the individual, but healthcare is complex and there are often “system errors” Most safety systems are retrospective; we need to move to be
  • 42. proactive We need good data, such as the ratio of detected unsafe actions divided by the opportunity of an unsafe action, over a specified time interval Reporting Unsafe Actions 9 Patient Safety Reporting System: event is recorded and if it is a sentinel event, it is investigated. Most systems are not integrated with the EHR Root Cause Analysis: common approach to determine the cause of an adverse event. This has limitations HEDIS measures can help track quality issues Patient Safety Systems
  • 43. Current reimbursement models mandate quality measures, e.g. Medicare Patient Safety Monitoring System, now operated by AHRQ. The new system is known as the Quality and Safety Review System. Still labor intensive and manual Global Trigger Tool: evaluates hospital safety. Said to detect 90% of adverse events. Select 10 discharge records and two reviewers review the chart for any of the 53 “triggers” Patient Safety Systems
  • 44. Paper records have multiple disadvantages, as pointed out in the EHR chapter Expectations have been very high regarding the EHR’s impact on safety, quality and value Unfortunately, results have been mixed and there has not been a prospective study conducted to prove the EHR’s benefit towards safety and quality Using the EHR to Improve Safety, Quality and Value High expectations that CDS that is part of EHRs will improve safety As per multiple chapters in the textbook, CDS has mixed reviews, in terms of safety and quality
  • 45. Adverse events regarding CDS, includes ”alert fatigue” The FDA will regulate software that is related to treatment and decision making Clinical Decision Support Results in altered workflow and decreased efficiency. Physicians are staying late to complete notes in the EHR In an effort to save time physicians may “cut and paste” old histories into the EHR, creating new problems EHRs may create new safety issues “e-iatrogenesis” Because of the multiple issues, it is very common to see offices and hospitals change EHRs, not always solving the problem Clinician’s Issues with EHRs
  • 46. Roughly 2/3 of EHR data is unstructured (free text) so it is not computable. While natural language processing (NLP) may help solve this, we are a long ways away from resolution Multiple open source and commercial NLP programs exist but they require a great deal of time and expertise to match the results a manual chart review would produce Clinician’s Issues with EHRs
  • 47. Governmental Organizations Involved with Patient Safety US Federal Agencies: Department of Health and Human Services (HHS) Agency for Healthcare Research and Quality (AHRQ) Centers for Medicare and Medicaid Services (CMS) Non-reimbursable complications: (3 examples) Objects left in a patient during surgery and blood incompatibility Catheter-associated urinary tract infections Pressure ulcers (bed sores) Hospitals must assemble, analyze and trend clinical and administrative data to capture baseline data and measure improvement over time Health IT-based interventions are expected to assist Governmental Organizations
  • 48. Office of the National Coordinator for HIT Learn: “Increase the quantity and quality of data and knowledge about health IT safety.” Improve: “Target resources and corrective actions to improve health IT safety and patient safety” Safety goals will be aligned with meaningful use objectives. Lead: “Promote a culture of safety related to health IT” Governmental Organizations The Food and Drug Administration MedWatch: posts drug alerts and offers online reporting area Center for Devices and Radiological Health (CDRH) Plan to regulate mobile medical applications designed for use on smartphones State Patient Safety Programs: By 2010, 27 states and the District of Columbia passed legislation or regulation related to
  • 49. hospital reporting of adverse events to a state agency Meaningful Use Objectives and Potential Impact on Patient Safety Objective: Use computerized provider order entry (CPOE) for medication, laboratory, and radiology orders directly entered by any licensed healthcare professional who can enter orders into the medical record per state, local, and professional guidelines Objective: Use clinical decision support to improve performance on high-priority health conditions
  • 50. Meaningful Use Objectives and Potential Impact on Patient Safety Objective: Automatically track medications from order to administration using assistive technologies in conjunction with an electronic medication administration record (eMAR) Objective: Generate and transmit discharge prescriptions electronically (eRx) Non-Governmental Organizations and Patient Safety National Patient Safety Foundation (NPSF) Goals: Identifying and creating a core body of knowledge Identifying pathways to apply the knowledge
  • 51. Developing and enhancing the culture of receptivity to patient safety Raising public awareness and fostering communication around patient safety National Academy of Medicine (was the Institute of Medicine or IOM) Institute of Medicine (IOM) Recommendations Congress should create a Center for Patient Safety within the Agency for Healthcare Research and Quality A nationwide reporting system for medical errors should be established Volunteer reporting should be encouraged Congress should create legislation to protect internal peer review of medical errors Performance standards and expectations by healthcare
  • 52. organizations should include patient safety FDA should focus more attention on drug safety Healthcare organizations and providers should make patient safety a priority goal Healthcare organizations should implement known medication safety policies IOM Report - 2003 Patient safety must be linked to medical quality A new healthcare system must be developed that will prevent medical errors in the first place New methods must be developed to acquire, study and share error prevention among physicians, particularly at the point of care The IOM recommended specific data standards so patient safety-related information can be recorded, shared and analyzed
  • 53. IOM Report - 2011 Report focused exclusively on health IT and patient safety and quality Publish an “action and surveillance plan” Push health IT vendors to support the free exchange of information about health IT experiences and issues Public and private sectors should make comparative user experiences public Health IT Safety Council should assess and monitor safe use of health IT Specify quality and risk management processes health IT vendors must adopt Establish an independent federal entity to investigate patient safety deaths, serious injuries, or potentially unsafe conditions associated with health IT
  • 54. Support cross-disciplinary research toward the use of health IT as part of a learning system Non-Governmental Organizations and Patient Safety The National Quality Forum The Joint Commission: Published the 2018 National Patient Safety Goals They also published an alert about the potential for HIT to create new patient safety issues LeapFrog Group HealthGrades Institute for Safe Medication Practice (IMSP)
  • 55. HealthGrades 2017 Patient Safety Excellence Awards Award recognizes hospitals with the lowest occurrences of 14 preventable patient safety events, placing the hospitals in the top 10% in the nation for patient safety This organization reviews the data from inpatient Medicare and Medicaid cases each year and rates hospitals, in terms of patient safety They estimate that the top ranking hospitals represent, on average, a 43% lower risk of a patient safety adverse event compared to the lowest ranking hospitals
  • 56. Quality Care Finder www.hospitalcompare.hhs.gov Allows consumers to review quality metrics e.g. morbidity and mortality making decisions Technologies with Potential to Decrease Medication Errors Computerized provider order entry (CPOE) Benefits: Improved handwriting identification Reduced time to arrive in the pharmacy Fewer errors related to similar drug names Easier to integrate with other IT systems Easier to link to drug-drug interactions
  • 57. More likely to identify the prescriber Available for immediate analysis Can link to clinical decision support to recommend drugs of choice Jury still out on actual reduction of serious ADEs Technologies with Potential to Decrease Medication Errors Health Information Exchange (HIE): Improve patient safety by better communication between disparate healthcare participants Automated Dispensing Cabinets (ADCs): like ATM machines for medications on a ward Home Electronic Medication Management System: home dispensing, particularly for the elderly or non-compliant patient Pharmacy Dispensing Robots: bottles are filled automatically Electronic Medication Administration Record (eMAR):
  • 58. electronic record of medications that is integrated with the EHR and pharmacy Intravenous (IV) Infusion Pumps: regulate IV drug dosing accurately Bar Coding Medication Administration: the patient, drug and nurse all have a barcoded identity These must all match for the drug to be given without any alerts Bar codes are inexpensive but the software and other components are expensive Some healthcare systems have shown a significant reduction in medication administrative errors, but many of these were minor and would not have resulted in serious harm Technologies with Potential to Decrease Medication Errors
  • 59. Technologies with Potential to Decrease Medication Errors Medication Reconciliation When patients transition from hospital-to-hospital, from physician-to physician or from floor-to-floor, medication errors are more likely to occur Joint Commission mandated hospitals must reconcile a list of patient medications on admission, transfer and discharge Task may be facilitated with EHR but still confusion may exist if there are multiple physicians, multiple pharmacies, poor compliance or dementia
  • 60. Barriers to Improving Patient Safety through Technology Organizational: health systems leadership must develop a strong “culture of safety” Financial: Cost for multiple sophisticated HIT systems is considerable Error reporting: is voluntary and inadequate and usually “after the fact” Unintended Consequences Technology may reduce medical errors but create new ones: Medical alarm fatigue Infusion Pump errors
  • 61. Distractions related to mobile devices Electronic health records: data can be missing and/or incorrect, there can be typographical entry errors, and older information is sometimes copied and pasted into the current record Patient safety continues to be an ongoing problem with too many medical errors reported yearly Multiple organizations are reporting patient safety data transparently to hopefully support change There is a great expectation that HIT will improve patient quality which in turn will decrease medical errors There is some evidence that clinical decision support reduces errors, but studies overall are mixed Leadership must establish a “culture of safety” to effectively achieve improvement in patient safety
  • 62. Conclusions MIS 320 Networks and Security Dr. Al Hammoshi Homework #3 1. All assignments must be submitted via Blackboard by the deadlines in order to receive credits. 2. For homework assignments, you are allowed many submissions before the deadlines. The attached NIST SP 800-52r2.pdf file is Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations published by National Institute of Standards and Technology.
  • 63. You are asked by Your CSO to give a briefing on “TLS Overview” (see the screenshot below) to all network engineers of the company. Please create a 1-page summary to be used in your briefing.