https://www.digicert.com/blog/mitigating-risk-considering-your-certificate-practices
This blog post is for developers and manufacturers working with private-trust client or device certificates, such as those used in a software application or IoT device.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175Br1.pdf
This NIST Special Publication is one part in a series of documents intended to provide guidance to the Federal Government for using cryptography to protect its sensitive, but unclassified digitized information during transmission and while in storage.
NIST SP 800-52 Rev 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
3.13 3.13.15 System and Communications Protection
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf
This Special Publication provides guidance to the selection and configuration of TLS protocol implementations while making effective use of Approved cryptographic schemes and algorithms.
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_0/home?element=SC-23
This special publication from NIST provides an overview of session authenticity.
https://www.sans.org/white-papers/34445
This SANS whitepaper discusses the use of Public Key Infrastructure (PKI) to meet business, regulatory, and compliance requirements.
https://www.infosecinstitute.com/resources/securityplus/security-implementing-a-public-key-infrastructure/
This article describes the basic concepts and components of Public Key Infrastructure (PKI)