All, Per the discussion on the call last night, the following NIST Special Publications discuss the server and client policies as it relates to cryptographic usage masks. A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS)
https://csrc.nist.gov/publications/detail/sp/800-152/final See Chapter 6 for metadata descriptions and requirements. A Framework for Designing Cryptographic Key Management Systems
https://csrc.nist.gov/publications/detail/sp/800-130/final Recommendation for Key Management, Part 1: General
https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-4/final Recommendation for Key Management, Part 2: Best Practices for Key Management Organization
https://csrc.nist.gov/publications/detail/sp/800-57-part-2/rev-1/draft [Draft]
https://csrc.nist.gov/publications/detail/sp/800-57-part-2/final [2005 guidance] Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance
https://csrc.nist.gov/publications/detail/sp/800-57-part-3/rev-1/final Regards, Joseph Brand President Semper Fortis Solutions, LLC Desk: 703-544-5264 Fax: 276-378-7264 Mobile: 304-433-1424 Email:
jbrand@semper-fortis.com Web:
http://www.semper-fortis.com This e-mail and any files transmitted with it may contain privileged or confidential information from Semper Fortis Solutions. It is solely for use by the individual for whom it is intended, even if addressed incorrectly. If you receive this e-mail in error, please notify the sender; do not disclose, copy, distribute, or take any action in reliance on the contents of this information; and delete it from your system. Any other use of this e-mail is prohibited. Thank you.