Skip to main content
Enterprise Framework

Post-Quantum Cryptography
Readiness Checklist

12-step framework for quantum-safe migration aligned with NIST FIPS 203/204/205, NSA CNSA 2.0, and sector-specific compliance mandates.

1,095
Days to Q-Day 2028
100%
Enterprises with PQC Gaps
3-5 Yrs
Typical Migration

Executive Summary

Quantum computers capable of breaking RSA, ECC, and Diffie-Hellman encryption are projected to emerge between 2028 and 2035. The threat is not theoretical. Adversaries are executing Harvest Now, Decrypt Later (HNDL) attacks today, capturing encrypted data for future quantum decryption.

NIST finalized the first three post-quantum cryptography standards in August 2024: FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA). The standards are done. Implementation must begin now.

This checklist synthesizes guidance from NIST, NSA, CISA, and sector-specific regulators into an actionable framework with timeline pressure, algorithm decision criteria, and maturity measurement.

The Mosca Inequality

Why 2026 is already late for many organizations:

If X + Y > Z, you must act now.
X = shelf life of your data
Y = time to migrate
Z = time until quantum threat
Example: Healthcare
Patient records (X = 50 years) + typical migration (Y = 5 years) = 55 years. If Z = 10 years, you are 45 years behind.

Regulatory Timeline

Multiple regulators have issued quantum cryptography requirements. These hard dates should anchor your roadmap.

DateAuthorityRequirement
Aug 2024NISTFIPS 203, 204, 205 finalized. PQC standards official.
2025OCC / FFIECBanks must inventory quantum-vulnerable cryptography.
2025PCI DSS 4.0Crypto-agility requirements for payment card data.
2027OMB M-23-02Federal agencies must complete crypto inventory.
2030NSA CNSA 2.0NSS software must use PQC algorithms.
2033NSA CNSA 2.0NSS firmware/hardware must use PQC algorithms.
2035NSA CNSA 2.0Full quantum resistance required for all NSS.

Financial Services

OCC Bulletin 2024-18, FFIEC crypto-agility, SOX audit committees

Healthcare

HIPAA Security Rule, lifetime PHI retention, OCR enforcement

Government/Defense

FedRAMP PQC tracking, CMMC 2.0, CNSA 2.0 timelines

Critical Infrastructure

NERC CIP evolution, ICS/SCADA long upgrade cycles

Algorithm Selection Guide

NIST has standardized three algorithms. Each serves different use cases with distinct tradeoffs.

ML-KEM (Kyber)

FIPS 203
Key encapsulation

Default for TLS, VPN, encrypted communications. Smaller ciphertext than alternatives. Best general-purpose choice.

ML-DSA (Dilithium)

FIPS 204
Digital signatures

Default for code signing, certificates, authentication. Fast signing/verification. Larger keys than classical.

SLH-DSA (SPHINCS+)

FIPS 205
Digital signatures

Conservative choice when lattice assumptions concern you. Hash-based security well understood. Large signatures but proven foundation.

FN-DSA (Falcon)

Draft 2025
Digital signatures

Smallest signatures of lattice schemes. Requires careful implementation to avoid side-channel attacks. Wait for NIST finalization.

Implementation Note: Most organizations should start with ML-KEM for key exchange and ML-DSA for signatures. SLH-DSA serves as a fallback if future cryptanalysis weakens lattice-based schemes. Hybrid deployments (classical + PQC in parallel) provide defense-in-depth during transition.

The 12-Step PQC Readiness Checklist

A phased approach from foundation through sustainment, with clear deliverables and maturity indicators.

Phase 1: Foundation

Months 1-3
1

Establish Governance and Executive Sponsorship

Form a cross-functional quantum readiness team with C-suite sponsorship. Assign board-level or CISO ownership. Integrate quantum risk into existing enterprise risk management frameworks.

Deliverable

Quantum Risk Governance Charter with named accountable executive

Maturity Indicator

Executive receives quarterly quantum risk briefings

2

Conduct Cryptographic Discovery and Inventory

Deploy automated scanning tools to identify all cryptographic implementations across applications, infrastructure, and third-party dependencies. Build a Cryptographic Bill of Materials (CBOM).

Deliverable

Complete CBOM with quantum vulnerability classification

Maturity Indicator

95%+ coverage of enterprise systems in inventory

3

Assess HNDL Exposure and Data Classification

Calculate your Mosca Inequality for each data category. Identify data with secrecy requirements exceeding the quantum threat timeline. Prioritize M&A records, litigation holds, healthcare PHI, financial archives.

Deliverable

HNDL exposure matrix with risk-ranked data categories

Maturity Indicator

Board-approved prioritization of crown jewel data

Phase 2: Planning

Months 4-9
4

Develop Migration Roadmap with Regulatory Alignment

Create a phased migration plan working backward from regulatory deadlines. Map CNSA 2.0 dates for government work. Align with sector-specific requirements (OCC, PCI, HIPAA).

Deliverable

Board-approved PQC migration roadmap with budget

Maturity Indicator

Roadmap milestones incorporated into IT strategic plan

5

Evaluate and Select PQC Algorithms

Assess NIST-standardized algorithms against your use cases. Test ML-KEM for key exchange, ML-DSA for signatures. Evaluate performance impact on latency-sensitive applications.

Deliverable

Algorithm selection matrix with performance benchmarks

Maturity Indicator

Lab testing completed on candidate algorithms

6

Design Crypto-Agility Architecture

Architect systems for algorithm flexibility. Implement abstraction layers that allow cryptographic modules to be swapped without application changes. Design for negotiable cipher suites.

Deliverable

Crypto-agility architecture specification

Maturity Indicator

Reference implementation in development environment

7

Engage Vendors and Supply Chain

Survey all vendors on their PQC roadmaps. Obtain written timelines for when products will support NIST standards. Update procurement requirements to mandate PQC readiness.

Deliverable

Vendor PQC readiness assessment with risk ratings

Maturity Indicator

PQC requirements in new contract language

Phase 3: Implementation

Months 10-36
8

Execute Pilot Deployments

Deploy PQC in non-production environments first. Test hybrid TLS configurations. Validate certificate chain handling with PQC signatures. Measure performance overhead.

Deliverable

Pilot deployment report with performance metrics

Maturity Indicator

Successful hybrid TLS handshakes in test environment

9

Migrate Data-in-Transit

Upgrade TLS implementations to support ML-KEM key exchange. Deploy hybrid cipher suites that combine classical and post-quantum algorithms. Prioritize external-facing endpoints.

Deliverable

Production TLS upgrade completion report

Maturity Indicator

100% of external endpoints support PQC cipher suites

10

Migrate Data-at-Rest and Re-encrypt Archives

Address the HNDL backlog. Re-encrypt high-value archived data with quantum-resistant algorithms. Update key management systems. Rotate certificates to PQC-signed versions.

Deliverable

Data-at-rest migration completion with exceptions documented

Maturity Indicator

Crown jewel data protected with PQC algorithms

Phase 4: Sustainment

Ongoing
11

Validate and Audit Completion

Conduct post-migration audit to verify all identified vulnerabilities addressed. Perform penetration testing against PQC implementations. Validate compliance with applicable regulations.

Deliverable

Independent audit report confirming PQC implementation

Maturity Indicator

Clean audit findings on cryptographic controls

12

Establish Continuous Monitoring and Evolution

Institute continuous monitoring of NIST announcements, cryptanalysis research, and quantum computing progress. Keep CBOM current. Drill crypto-agility procedures annually.

Deliverable

Crypto monitoring program with defined triggers for action

Maturity Indicator

Annual crypto-agility drill completed successfully

PQC Readiness Maturity Model

Score each dimension 1-5 to assess your current state and track progress.

Dimension1 - Initial2 - Aware3 - Planned4 - Active5 - Optimized
GovernanceNo ownershipCISO awareCharter approvedBoard reportingIntegrated ERM
InventoryNonePartial manualAutomated scanFull CBOMContinuous update
Risk AssessmentNot startedAd hoc reviewHNDL mappedPrioritized planQuantified risk
Crypto-AgilityHardcodedSome flexibilityArchitecture specImplementedTested annually
Vendor MgmtNot addressedSome inquiriesAll surveyedContract termsOngoing validation
ImplementationNo PQCLab testingPilot deployedProduction liveFull migration
6-12
Critical gaps
Immediate action required
13-18
Developing
Accelerate planning
19-24
Active migration
Maintain momentum
25-30
Mature posture
Focus on optimization

Ready to Assess Your Quantum Risk?

Qscout26 delivers first findings in 7 days with board-ready reporting. Qstrike26 provides comprehensive 4-month testing with proof-of-concept demonstrations.

Qscout26
7-day rapid assessment
Qstrike26
4-month comprehensive testing
$2M Quantum Challenge
Zero vulnerabilities found = $2M wire transfer

References

1. NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism. Aug 2024.
2. NIST. FIPS 204: Module-Lattice-Based Digital Signature Standard. Aug 2024.
3. NIST. FIPS 205: Stateless Hash-Based Digital Signature Standard. Aug 2024.
4. NSA. Commercial National Security Algorithm Suite 2.0 (CNSA 2.0). Sep 2022.
5. CISA, NSA, NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. Aug 2023.
6. OMB. M-23-02: Migrating to Post-Quantum Cryptography. Nov 2022.
7. OCC. Bulletin 2024-18: Cryptographic Risk Management. 2024.
8. PCI Security Standards Council. PCI DSS v4.0. Mar 2022.
9. IBM. The CISO's Guide to Quantum-Safe Readiness. 2024.
10. Deloitte, WEF. Quantum Readiness Toolkit. 2023.
11. CyberArk. A CISO's Guide to Post-Quantum Readiness. 2024.
12. Mosca, M. Cybersecurity in an Era with Quantum Computers. GRI. 2015.