Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
This publication provides guidance for selecting and configuring TLS protocol implementations while making effective use of Federal Information Processing Standards (FIPS) and NIST-recommended cryptographic algorithms.