Important News:SafeLogic Announces General Availability of CryptoComply BoringCrypto! Read the announcement.



Cryptography Maturity Action Plan (CMAP)

 

 

A Framework for Post-Quantum Readiness

The advent of practical quantum computing poses a serious threat to classical cryptographic algorithms like RSA and ECC. Organizations must prepare to transition to post-quantum cryptography (PQC) to protect sensitive data and maintain trust.

Here we present a four-level Cryptography Maturity Action Plan that helps enterprises assess and improve their readiness for PQC across people, processes, and technology. The model draws inspiration from BSIMM’s structured approach to software security while aligning with relevant NIST Cybersecurity Framework (CSF) functions and NIST SP 800-53 controls where applicable.

Unlike BSIMM (which addresses overall software security), this maturity model focuses exclusively on enterprise cryptographic management and PQC transition, serving as a complementary resource rather than duplicating BSIMM content.

cryptography-maturity-action-plan-cmap

 

Intended Audience:

CISOs, cryptographic engineers, software and security architects, project managers, CTOs, and other stakeholders responsible for managing cryptographic risk and planning the migration to PQC.

Maturity Levels:

The model defines four maturity levels that reflect increasing organizational capability and integration of cryptographic best practices:

  • Level 1 – Ad Hoc: No structured activity. Cryptographic practices are reactive, undocumented, and siloed.
  • Level 2 – Developing / Repeatable: Initial artifacts and processes exist. Some repeatable practices are in place, though not organization-wide.
  • Level 3 – Defined / Proactive: Formal policies, inventories, and plans are published and maintained. The organization operates from documented standards with assigned ownership.
  • Level 4 – Optimized / Adaptive: Cryptographic risk management is continuously measured, reported, and adapted. Processes are integrated into enterprise operations and refined through feedback loops. The organization continuously adapts to new threats and standards (e.g., quickly adopting PQC algorithms as they emerge) and embeds crypto-agility into its architecture.

Governance and Strategy Practices

These practices cover organizational strategy, leadership involvement, and governance structures that set the foundation for a successful PQC transition. They align with NIST CSF Identify (ID.GV Governance) and Protect (PR.IP Policies/Processes) functions, and controls in NIST SP 800-53 such as PM- (Program Management) and PL- (Planning) families.

Practice 1: Strategy & Sponsorship

Objective: Ensure executive awareness of the quantum threat and integrate PQC migration into the organization’s strategic plans. This practice establishes leadership support, funding, and alignment of PQC efforts with business objectives.

Practice 2: Governance & Policy

Objective: Establish governance structures and policies for enterprise cryptography that guide the PQC transition. This includes formal roles (e.g. a crypto working group), policies/standards, and exception processes. Aligns with NIST CSF ID.GV (Governance) and PR.IP (Protect – Information Protection Processes) and SP 800-53 controls like PL-1 (Security Planning Policy) and PS- (Personnel Security roles).

Maturity Level Observable Activities (Governance & Policy)

Level 1 – Ad Hoc

No published cryptographic governance policy exists. No dedicated team or committee oversees cryptographic issues; decisions are project-specific. Any handling of quantum-related crypto issues is reactive (e.g., addressing a client’s question about PQC when it arises) rather than guided by policy.

Level 2 – Developing

A rudimentary governance framework starts taking shape. Management charters a cross-functional PQC working group or task force (including security architects, cryptographers, risk managers, etc.) . Basic cryptographic policies are documented – e.g., identification of approved cryptographic algorithms (still classical algorithms at this stage) and key length requirements. The organization has begun drafting a high-level policy statement acknowledging the need for crypto-agility and PQC, though detailed standards are still in development.

Level 3 – Defined

A comprehensive cryptography policy and standards are in place, updated to reflect PQC migration plans. For example, policies specify which algorithms (including approved PQC algorithms or hybrid schemes) are to be used for new systems, and outline deprecation timelines for quantum-vulnerable crypto. The PQC working group (or formal Cryptography Center of Excellence) meets regularly and drives coordination across business units. There are defined processes for cryptography exceptions or waivers – e.g. handling legacy systems that cannot yet be upgraded . Governance documents clearly map cryptographic requirements to compliance obligations (e.g., FIPS 140-3, relevant regulations).

Level 4 – Optimized

Cryptography governance is fully mature and integrated. The governance body has executive visibility and authority, ensuring enterprise-wide adherence. Cryptography policies are dynamically updated in response to new standards or threats (e.g., a newly discovered weakness in an algorithm triggers a policy update within days). Dependency mapping of all systems and data flows relying on vulnerable cryptography is maintained and regularly reviewed . The organization conducts regular policy compliance audits and can produce reports on cryptographic posture for regulators or auditors on demand. Governance extends to coordinating with external stakeholders (partners, industry consortia) to harmonize crypto standards and migration efforts.

Practice 3: Awareness & Training

Objective: Build enterprise-wide awareness and skills for cryptography and PQC. This includes training programs for developers, architects, and administrators on cryptographic best practices and emerging PQC tools. Aligns with NIST CSF ID.AM (Identify – asset awareness) and PR.AT (Protect – Awareness and Training), and SP 800-53 controls such as AT-2 (Role-Based Training) and AT-3 (Training Feedback).

Maturity Level Observable Activities (Awareness & Training)

Level 1 – Ad Hoc

Cryptographic training is informal or absent. Development and operations teams may not understand the organization’s cryptography policies or the looming quantum threat. Any expertise in cryptography resides in a few individuals, and there is no program to share knowledge.

Level 2 – Developing

Basic training initiatives begin. The security team provides introductory sessions to developers and IT staff on secure use of encryption libraries and the basics of post-quantum concepts. Management circulates internal memos or briefs about the importance of preparing for PQC (often referencing external mandates like NIST’s PQC project). Training is still ad hoc (e.g., part of a broader security awareness program) but quantum risk is now mentioned. Some staff (especially in security roles) attend external webinars or conferences on PQC to build knowledge.

Level 3 – Defined

A formal cryptography training program is implemented. The organization conducts regular workshops or courses for relevant teams (engineering, architecture, risk) on cryptographic implementations, crypto-agility principles, and specific PQC algorithms. Training content is kept up-to-date with the latest NIST standards and includes hands-on labs (for example, using new PQC libraries in development). Specific role-based training is deployed (e.g., PKI administrators trained on new certificate formats, developers trained on using crypto-abstraction APIs for agility). The effectiveness of training is measured (quizzes, certification of completion) and tied into personnel development plans.

Level 4 – Optimized

Continuous education and community involvement. The organization not only trains its staff but also contributes to the wider community’s knowledge base (e.g., publishing learnings or open-source tools related to cryptographic migration, contributing to industry-specific working groups, or speaking at conferences). Internal cryptography experts mentor others and a culture of cryptographic awareness is ingrained (developers instinctively consider cryptographic impacts in design discussions). Training is continuously refined based on feedback and emerging threats – for instance, incorporating lessons learned from pilot PQC deployments or new attack techniques. The organization may host or sponsor cryptography competitions, hackathons, or advanced training for talent development. Additionally, the organization includes cryptographic learnings/knowledge into other functions, such as security assessments and architectural patterns.

Assessment and Risk Management Practices

These practices help the organization identify and prioritize cryptographic assets and risks, forming the basis for a risk-driven migration. They correspond to NIST CSF Identify functions (ID.AM Asset Management, ID.RA Risk Assessment, ID.SC Supply Chain) and SP 800-53 controls like CM-8 (Asset Inventory), RA-3/5 (Risk Assessment, Risk Responses), and SR-3/5 (Supply Chain risk management).

Practice 4: Inventory & Discovery

Objective: Maintain a comprehensive inventory of all cryptographic assets, usage, and dependencies in the organization. Sometimes called cryptographic discovery or portfolio management, this practice ensures you “know what and where” cryptography is used – a critical first step for PQC readiness.

(Source)

Maturity Level Observable Activities (Crypto Inventory)

Level 1 – Ad Hoc

The organization lacks a centralized cryptographic inventory. Knowledge of where encryption, digital signatures, certificates, and cryptographic libraries are used is patchy, often confined to individual system owners. There is no formal process to catalog cryptographic assets (e.g., algorithms, key lengths, libraries, certificates) across the IT environment. Quantum-vulnerable algorithms (RSA, ECC, SHA-1, etc.) may be present but not tracked.

Level 2 – Developing

An initial cryptography inventory effort is underway. The organization has started to identify and document cryptographic components in critical systems (e.g., an inventory of TLS, VPN, SSH key exchange algorithms or digitally signed documents algorithms exposed to public internet.). This may be a manual spreadsheet or part of broader asset management. Some automated discovery tools might be piloted on a limited scope (e.g., scanning code for usage of crypto APIs). The inventory is not complete yet, but there is awareness that having a full crypto portfolio is important.

Level 3 – Defined

A comprehensive cryptographic inventory is established and maintained as a living artifact. The inventory covers hardware, software, and services: it documents all places where cryptography is used (protocols, applications, databases, IoT devices, etc.), including details like algorithm types and key lengths in use. The inventory is kept up-to-date via automated discovery tools and periodic audits avoiding information from becoming stale and outdated. The inventory is formally recognized as a critical asset for risk management, feeding into decision-making for upgrades and PQC transition. For example, the team can quickly query which systems use RSA-2048 or which use elliptic curves, etc.

(Source)

Level 4 – Optimized

Crypto inventory management is fully integrated into enterprise asset management and change management processes. Any new system or software introduced must be cataloged for cryptographic use. Inventory data is leveraged in real-time: e.g., dashboards show the organization’s current cryptographic posture (what percentage of systems use quantum-safe algorithms, etc.). The inventory is enriched with metadata like data sensitivity and system criticality. This allows mapping of crypto assets to business impact (for instance, identifying which encrypted data would be most sensitive in a quantum-compromised future). The inventory also extends to dependencies on third-party components, cloud services, or open-source libraries, noting their cryptographic use.

Practice 5: Threat Modeling & Prioritization

Objective: Evaluate and prioritize the risks associated with current cryptographic assets in light of quantum threats. This involves assessing the likelihood and impact of cryptographically relevant quantum computers (CRQCs) on the organization’s data and systems, and prioritizing which assets to remediate first. Aligns with NIST CSF ID.RA (Risk Assessment) and ID.RM (Risk Management Strategy), and SP 800-53 controls in the RA family.

Maturity Level Observable Activities (Risk Assessment)

Level 1 – Ad Hoc

No specific  quantum risk assessment-focused threat model is performed. The organization’s risk management processes do not account for the quantum computing threat. Cryptographic risks might be mentioned in generic terms (e.g., “encryption failure” in a risk register), but there is no analysis of how soon quantum advances could compromise specific systems, or which data is at most risk from long-term confidentiality exposure (like sensitive data with long shelf life).

Level 2 – Developing

Preliminary quantum risk assessments are conducted. The security or risk team has started to include the quantum threat in its horizon scanning. For example, they have identified which systems hold data that must remain confidential for many years (and thus are susceptible to “harvest-now, decrypt-later” attacks ). The organization might adopt a simple risk model or qualitative scoring to rate quantum vulnerability of various systems (e.g., factoring in algorithm strength, data sensitivity, system lifespan). However, this process is informal or infrequent and not yet integrated into enterprise risk management.

Level 3 – Defined

A formal quantum risk assessment framework is in place, integrated with overall risk management. The organization uses established frameworks or models (such as Michele Mosca’s Quantum Risk Assessment or the Crypto Agility Risk Management Framework (CARAF)) to measure quantum risk . Each cryptographic asset (from the inventory) is evaluated for quantum impact: likelihood timelines (using the latest expert projections for when certain algorithms might be broken) and impact severity are analyzed. Systems are categorized, e.g., Tier 1: must be quantum-safe ASAP (high sensitivity data, long-term need), Tier 2: moderate risk, etc. The output is a risk-based prioritization for PQC migration – a list of what to tackle first. This quantum risk perspective is updated regularly (e.g., annually or when significant advancements occur).

Level 4 – Optimized

Quantum risk is baked into standard, already-established assessments and workflows—not treated as a separate or one-off activity. Teams routinely evaluate quantum impact within existing processes such as threat modeling/architecture risk analysis, design reviews, change management, portfolio planning, vendor risk assessments, and control attestations. Continuous, tool-assisted analytics (e.g., crypto-health dashboards) quantify exposure and track reduction over time. The program ingests the latest research and government guidance on quantum timelines and automatically normalizes it into the enterprise risk model so assessments stay current without special projects. Results directly drive budgets and roadmaps (project charters reference quantum risk scores), and the organization periodically conducts cryptographic tabletop exercises (e.g., sudden algorithm break or accelerated CRQC arrival) to validate response playbooks. Outcome metrics—such as remaining high-risk crypto assets, remediation velocity, and control coverage—are first-class enterprise risk indicators reported alongside other cyber KPIs.

(Source)

Practice 6: Third-Party Risk

Objective: Extend cryptographic risk management and PQC readiness to third-party products, services, and supply chain partners. No organization operates in isolation – vendors (cloud providers, software suppliers, hardware devices, etc.) must also be quantum-ready for the enterprise to truly mitigate cryptographic risk. Aligns with NIST CSF ID.SC (Supply Chain Risk Management) and PR.AT-3 (Third-party awareness), and SP 800-53 controls like SR-5 (Supply Chain Protection) and SA-9 (External System Services).

Maturity Level Observable Activities (Third-Party Engagement)

Level 1 – Ad Hoc

Little consideration is given to vendors or partners in terms of PQC. Contracts and security questionnaires do not address cryptography updates or quantum resistance. The organization is essentially blind to whether critical third-party products (e.g., VPN appliances, cloud platforms, IoT devices, CAs issuing certificates) are using strong cryptography or have plans for PQC. This poses a hidden risk – if a vendor’s product is not agile, the organization may be stuck with quantum-vulnerable tech.

Level 2 – Developing

The organization begins inquiring about vendor PQC posture. For key suppliers, they may ask questions about PQC roadmaps or include PQC-related criteria in RFPs and vendor assessments (often based on guidance like the DHS PQC roadmap or industry questionnaires). Some contracts for new procurements start to include language about cryptographic agility or requirements to support NIST-approved PQC algorithms once available. However, this is not yet consistent across all vendors or built into procurement processes enterprise-wide.

(Source)

Level 3 – Defined

Supply chain cryptography criteria are integrated into vendor management and procurement. Standard contract clauses or SLAs require vendors to disclose their cryptographic mechanisms (i.e. Cryptographic Bill of Materials) and commit to providing PQC-compatible solutions within defined timelines. As part of the cryptographic asset inventory, the organization maintains a register of critical suppliers and their PQC readiness status (e.g., which vendors’ products support larger key sizes, which have announced support for NIST PQC algorithms). Regular vendor risk assessments include cryptography-specific checks. Third-party PQC readiness questionnaires or audits are conducted for high-risk partners.

Level 4 – Optimized

The enterprise is a leader in driving crypto-agility across its ecosystem. It works closely with vendors, sometimes in joint pilot projects, to test PQC integrations (e.g., testing a vendor’s beta PQC-enabled firmware in the enterprise environment). Supplier risk management is dynamic – if a critical vendor lags in quantum readiness, the organization has contingency plans (such as alternate suppliers or compensating controls). The organization might even influence standards by participating in supply chain security initiatives or working groups to develop best practices for vendor PQC migration. All new technology acquisitions undergo a strict cryptography review to ensure compatibility with current and anticipated standards. In essence, third-party crypto risk is managed with the same rigor as internal risk.

Technology and Architecture Practices

These practices focus on the technical capabilities and architectural changes needed for crypto-agility and PQC integration. They align with NIST CSF Protect (PR.DS Data Security, PR.IP Information Protection Processes) and Detect (DE.CM security monitoring for cryptographic components), as well as SP 800-53 controls in SC (System & Communications Protection) and SI (System & Info Integrity) families (e.g., SC-3, SC-12 for cryptographic mechanisms, SI-4 for monitoring).

Practice 7: Cryptographic Agility

Objective: Design and evolve systems to be cryptographically agile – able to swap cryptographic algorithms with minimal disruption. This practice involves architectural patterns (modularity, abstraction layers, support for multiple algorithms) and integration of crypto-agility into the SDLC (Software Development Lifecycle).

Definition: NIST defines crypto-agility as the capability to “replace and adapt cryptographic algorithms in protocols, applications, software, hardware, and infrastructures without interrupting the flow of a running system”. Achieving this requires thoughtful design. At high maturity, organizations implement agility-aware design and modular interfaces to swap out algorithms easily.
Maturity Level Observable Activities (Crypto-Agility Architecture)

Level 1 – Ad Hoc

Systems are largely crypto-rigid: cryptographic algorithms might be hard-coded, and there is no consideration for future change. Applications directly call crypto libraries without abstraction, making it hard to update algorithms. The concept of crypto-agility is not understood by development teams – designs do not account for potential algorithm changes or dual algorithms.

Level 2 – Developing

Awareness of crypto-agile design principles grows. New systems start adopting modular cryptography approaches – for example, using configuration files or centralized services to specify which algorithms to use, rather than hard-coding them. The enterprise has begun inventorying where crypto libraries are used and ensures new projects use approved libraries that support multiple algorithms. Some pilot efforts test dual-stack solutions (e.g., implementing both a classical and a PQC algorithm in a protocol in anticipation of future switch). However, older systems remain inflexible. Documentation of cryptographic components in software architecture diagrams becomes more common, hinting at integration of crypto-agility considerations in design reviews.

Level 3 – Defined

The organization has established crypto-agility standards for architecture and coding. There are documented guidelines (for architects and developers) on how to achieve crypto-agility: e.g., “use interface X from our crypto library to call encryption functions, so that algorithms can be changed under the hood”. Security protocols and applications are designed to be algorithm-neutral, supporting multiple cipher suites or algorithm identifiers as needed. Crypto-abstraction layers or APIs are widely used – for instance, developers use a company-approved crypto API that can dynamically select between RSA or a PQC algorithm. The enterprise may have refactored some critical systems to remove hard-coded crypto and instead rely on central cryptographic services or libraries. Design reviews and threat modeling now include a check for crypto-agility (ensuring no new system is built with an immutable dependency on a single algorithm).

Level 4 – Optimized

Seamless cryptographic adaptability is achieved. Systems and infrastructure can undergo cryptographic transitions without code change, and this capability is regularly tested. For example, the organization can perform a live switch from one algorithm to another (perhaps using feature flags or toggling library settings) in a controlled manner. Protocols in use support algorithm agility to the extent that even urgent deprecations (like a sudden break of an algorithm) could be handled quickly by switching to alternatives. The architecture supports hybrid cryptographic modes (combining classical and PQC algorithms) where necessary to ensure security during transition. The organization keeps track of cryptographic versioning and compatibility – e.g., it can detect which endpoints have upgraded to new algorithms and which haven’t. This ensures interoperability during migrations. Cryptography is treated as a configurable aspect of systems, and engineers routinely practice “exchanging” cryptographic components in test environments to verify agility.

Practice 8: Enterprise Architecture

Objective: Systematically evaluate, select, and adopt post-quantum cryptographic algorithms (and interim hybrid solutions) in line with emerging standards. This practice ensures the organization stays current with NIST and industry cryptographic standards, choosing appropriate algorithms and key sizes for different use cases. Aligns with NIST CSF PR.DS (Protect – Data Security, e.g., PR.DS-2 data-in-transit protection) and SP 800-53 controls like SC-13 (Cryptographic Protection) and CM-6 (Configuration settings for crypto modules).

Maturity Level Observable Activities (Algorithm Selection)

Level 1 – Ad Hoc

No specific attention is given to PQC algorithms. The organization continues using legacy algorithms (RSA, ECC, AES, SHA-256, etc.) as per historical practice or compliance requirements, without tracking the progress of PQC standardization. There may be an assumption that “NIST will tell us when to change” but little to no internal analysis or experimentation with new algorithms.

Level 2 – Developing

The organization starts researching PQC options. Technical teams follow NIST PQC standardization results and begin experimenting in labs with the selected algorithms (e.g., testing basic operations of ML-DSA for digital signatures or ML-KEM for key exchange). At this stage, the focus is on education and observation: understanding the performance and integration challenges of PQC algorithms. The organization might also consider hybrid cryptography (combining classical + PQC algorithms in protocols for backward compatibility and added safety). A list of candidate algorithms for future use is drafted, aligning with published standards or drafts.

Level 3 – Defined

The enterprise has a PQC algorithm selection policy. It formally identifies which NIST-approved post-quantum algorithms will be adopted for various purposes (e.g., ML-KEM for VPN and TLS key establishment, SLH-DSA for code signing, etc.), potentially alongside classical algorithms in a hybrid approach. This decision is based on trials, industry guidance, and interoperability needs. Cryptographic standards tracking is institutionalized: a team monitors NIST SP 800- series updates, FIPS guidelines, RFCs from IETF on PQC, etc., ensuring the organization’s choices remain compliant and up-to-date. The organization may also contribute feedback during standards development. By this level, pilot projects might be actively using a hybrid mode (e.g., TLS with both an RSA and a PQC key exchange) to validate chosen algorithms in real conditions.

Level 4 – Optimized

PQC algorithms are fully integrated and regularly updated as standards evolve. The organization not only adopts the first-generation NIST PQC standards but has a roadmap for future transitions (e.g., if new algorithms are standardized or if weaknesses are found in current choices). Systems support multiple cryptographic modes and can smoothly transition from hybrid to full PQC when appropriate. There is also a deprecation plan for legacy algorithms with firm timelines (aligned to regulatory deadlines or internal risk appetite – e.g., “RSA 2048 completely phased out by 2030”). Crypto architecture reviews ensure every new system uses the approved algorithms set; deviations require high-level approval. At this level, the enterprise is effectively future-proofing – continuously aligning with cryptographic research. The organization has a testing environment that quickly evaluates any new PQC candidates or versions (for example, if NIST updates parameters or issues new guidance, the team can rapidly test those changes).

Practice 9: Cryptographic Infrastructure & Key Management

Objective: Upgrade and adapt the organization’s cryptographic infrastructure – including key management systems, hardware security modules (HSMs), public key infrastructure (PKI), and key lifecycle processes – to support PQC algorithms and larger cryptographic artifacts (keys, signatures, certificates). This practice aligns with NIST CSF PR.DS-6 (Integrity of stored cryptographic material) and (Protect – Protective Technology), and SP 800-53 controls such as SC-12 (Cryptographic Key Establishment & Management) and KM-1 (Key Management Policy).

Maturity Level Observable Activities (Key Mgmt. & Infrastructure)

Level 1 – Ad Hoc

Existing cryptographic infrastructure is unchanged and may not support future requirements. For example, HSMs in use might only support RSA/ECC and not be firmware-upgradable to PQC algorithms; certificate authorities issue certificates with fixed (classical) algorithms. Key management policies are legacy (e.g., focusing on 2048-bit RSA keys and traditional lifecycles). There is no consideration of new PQC key sizes (which may be much larger) or how they might impact storage and transmission.

Level 2 – Developing

The organization reviews its cryptographic infrastructure for PQC compatibility. An assessment is done to identify gaps: Which HSMs or cloud key management services can support or be patched for PQC? Can the current PKI handle larger certificate sizes? The team might test issuing a prototype certificate with a PQC algorithm to see if internal systems (identity management, SSL inspection tools, etc.) can parse it. As issues are found (e.g., a legacy hardware module that can’t handle large keys), plans are made to update or replace those components. Key management and CA vendors are engaged for their roadmaps . At this level, updates to key management policy begin – for example, stating that cryptographic keys and certificates should be created in a manner agile enough to upgrade algorithms or key sizes. Some procedural changes are trialed: maybe using slightly larger RSA keys or new hash functions as interim steps to test systems’ flexibility.

Level 3 – Defined

Upgrades and integrations are executed to make the infrastructure PQC-ready. The enterprise’s Key Management Policy is fully updated to include PQC requirements. This might include, for instance, guidelines on acceptable PQC key algorithms, updated key lengths, and new key rotation frequencies appropriate for those algorithms. HSMs and key vaults are upgraded or replaced to support PQC keys and cryptographic operations. The PKI (Certificate Authorities and tooling) is extended to handle hybrid certificates or larger signature sizes. For example, certificate templates for X.509 are adjusted to include PQC algorithm OIDs and longer public keys. Key lifecycle processes are adjusted – e.g., backup procedures account for larger key files, key escrow or recovery processes are updated to handle new formats. By this stage, the organization can generate, store, distribute, and revoke PQC keys and certificates in at least a pilot environment, if not broadly. Documentation and runbooks for cryptographic operations are updated accordingly.

Level 4 – Optimized

The cryptographic infrastructure is fully operational with PQC, and the organization has built-in crypto-agility into infrastructure management. All enterprise encryption systems (VPNs, database encryption, application-layer encryption, etc.) have been configured or are ready to switch to PQC algorithms. The key management systems seamlessly handle both classical and PQC keys, and possibly multiple generations of them. Compliance and audit trails have been updated to reflect new cryptographic items (for instance, logging and monitoring capture the use of PQC algorithms for audit purposes ). The enterprise continuously monitors the performance and capacity of its crypto infrastructure, since PQC algorithms can be more resource-intensive (e.g., larger keys might impact network bandwidth or HSM transaction rates). It proactively scales and fine-tunes the infrastructure (adding acceleration hardware, optimizing key storage, etc.) to mitigate performance hits. Additionally, integration of cryptographic tech is forward-looking: the organization can rapidly integrate new cryptographic modules (like a new library version) into its systems through automated deployment pipelines, reflecting true agility in operations.

Implementation and Operations Practices

Finally, these practices cover the execution of the migration (pilot projects, testing, rollout) and the ongoing operational monitoring and response. They align with NIST CSF Protect (PR.IP – change management, PR.MA – maintenance), Detect (DE.CM – continuous security monitoring), Respond (RS.MI – Improvements), and Recover (RC.IM – Improvements), as well as SP 800-53 controls like SA-11 (Developer testing), CA-2/7 (Continuous Monitoring), IR-4 (Incident Response), and MA-6 (Cryptographic Module Maintenance).

Practice 10: PQC Transition & Deployment Execution

Objective: Develop detailed migration plans and conduct pilot deployments as steps toward full PQC roll-out. This practice ensures the organization approaches the transition methodically – starting small, learning, and scaling up – rather than a big-bang switch. It includes project planning, phased deployments, and migration playbooks.

Maturity Level Observable Activities (Transition Execution)

Level 1 – Ad Hoc

No concrete migration plan exists. The organization has not yet thought through how it would actually replace or upgrade cryptographic algorithms in practice. There may be an assumption that when PQC is needed, normal project management processes will handle it, but nothing specific is prepared.

Level 2 – Developing

Initial planning begins for the PQC migration. A high-level roadmap or strategy document is drafted, identifying broad phases of the effort (e.g., inventory → pilots → full deployment). The organization identifies some candidate areas for pilot projects – for instance, a non-critical internal application where a PQC algorithm could be trialed with minimal impact if issues arise. Timelines are still rough, but there is an understanding that migration will be a multi-year effort. The plan might include milestones aligned with external events (e.g., “When NIST announces draft standards, we will begin phase X”). However, detailed resourcing and playbooks are not fleshed out yet.

Level 3 – Defined

A comprehensive migration plan (“quantum-ready roadmap”) is formalized. This includes: detailed project plans with owners, timelines, and resources for executing migration across different systems; identification of dependencies and sequencing (for example, update supporting libraries and infrastructure before application changes); and defined entry/exit criteria for each phase. The plan follows a phased deployment approach – possibly starting with hybrid solutions and gradually moving to full PQC. Pilot programs are executed at this stage: observable evidence includes one or more pilot implementations of PQC in controlled environments. For example, a small-scale pilot where an internal service uses PQC algorithms for its communications has been run, and compatibility or performance data gathered . The plan is regularly updated based on pilot feedback. Additionally, communication plans are defined (how to communicate changes to stakeholders, customers, auditors, etc., during the migration).

Level 4 – Optimized

The organization demonstrates smooth, ongoing execution of the transition and is in late phases or has completed most migrations. PQC deployment has expanded from pilots to critical systems and eventually enterprise-wide, following the planned phases (e.g., internal apps → customer-facing apps → widespread infrastructure). Transition is managed with minimal disruption due to careful scheduling and testing. The organization likely has a detailed playbook for migration (sometimes called a runbook or cookbook), covering steps to switch algorithms, rollback plans if issues occur, and coordination steps among multiple teams . For any remaining systems that are not yet migrated (perhaps due to external constraints), there are clear compensating controls or timelines. At this maturity, the enterprise treats cryptographic migration as an ongoing capability – e.g., the team that handled this transition can handle future ones (it’s not a one-off project but a repeatable process in the organization’s muscle memory). The success of the migration is validated and documented, and the organization shares lessons learned internally (or even externally to help others).

Practice 11: Testing & Validation

Objective: Rigorously test and validate new cryptographic implementations and integrations throughout the PQC migration. This ensures that security isn’t weakened by misconfiguration or performance issues, and that PQC solutions are reliable and safe. This practice covers security testing (like penetration testing, code review focusing on crypto), interoperability and performance testing, and validation against standards (e.g., FIPS 140-3 certification for crypto modules).

Maturity Level Observable Activities (Testing and Validation)

Level 1 – Ad Hoc

Cryptographic components are not specifically tested beyond normal QA. There is no particular testing for algorithm strength (aside from relying on standard libraries) and no scenario-based testing for quantum-safe operations. The concept of testing a new algorithm or its integration is not on the team’s radar.

Level 2 – Developing

The need for specialized crypto testing is recognized. The organization begins to include cryptographic considerations in its testing plans. For instance, test cases might be added for ensuring systems can handle larger keys or dual algorithm handshake. If a pilot PQC implementation is underway, the team conducts basic tests for correctness (does data still decrypt properly with new algorithms?) and performance (what is the latency of a PQC handshake?). At this stage, the testing is still mostly internal and functional. Security testing like code review or penetration testing might start to include checks on whether crypto algorithms are implemented and configured correctly (e.g., no usage of weak ciphers, but now also checking if PQC libraries are properly used in pilot code).

Level 3 – Defined

A comprehensive cryptographic testing regimen is established. This includes: Security testing – the organization integrates PQC scenarios into penetration testing and red-team exercises, looking for vulnerabilities like downgrade attacks (could an attacker force the system back to a weak algorithm?), side-channel leaks in PQC implementations, or misuse of APIs. Code analysis and fuzzing are employed on cryptographic code paths, given that PQC algorithms are new and might have undiscovered implementation bugs. Interoperability testing is done if hybrid or multi-vendor systems are in play (e.g., ensuring a PQC-encrypted message by System A can be understood by System B). Performance and stress testing are also crucial: the organization tests how PQC algorithms perform under load, and ensures that any system performance degradation is within acceptable limits. Additionally, the enterprise pursues validation of crypto implementations – for example, getting new cryptographic modules FIPS 140 validated, or using test vectors to verify algorithm correctness. External third-party audits or assessments of the cryptographic implementation might be conducted (engaging crypto experts to review code and configurations).

Level 4 – Optimized

Continuous validation and improvement. At this maturity, the organization has a feedback loop from testing into development: results from cryptographic testing (like a discovered vulnerability or a performance bottleneck) are promptly used to improve systems. Testing for cryptographic issues is automated where possible – e.g., integrated into CI/CD pipelines (every build runs unit tests and static analysis on crypto functions). The company might participate in cryptographic resilience exercises beyond itself – for instance, cross-industry drills to ensure that, say, if algorithm X is deprecated overnight, all participants can switch to Y without issue. The organization maintains a vulnerability response process specifically for cryptography : if a new weakness in a PQC algorithm or library is announced, there’s a practiced procedure to swiftly assess impact and deploy patches or changes (much like emergency patch management, but for crypto). Ultimately, cryptographic assurance is treated as an ongoing requirement, with periodic re-testing (including re-certification of modules) and adaptation as new threats or findings emerge.

Practice 12: Monitoring & Audit

Objective: Monitor the organization’s cryptographic posture and external developments, ensure compliance through audits, and adapt the cryptographic strategy in response to new information. This practice combines operational monitoring of crypto usage with the ability to respond (adapt) to incidents or changes (e.g., a broken algorithm or new standard), thus closing the loop of the maturity model with continuous improvement. Aligns with NIST CSF Detect (DE.CM – continuous monitoring), Respond (RS.AN – analysis, RS.MI – improvements), and Recover (RC.IM – improvements). Also touches on SP 800-53 controls like CA-7 (Continuous Monitoring), AU-13 (Monitoring for Information Disclosure), IR-8 (Incident Response Plan), and SI-4 (System Monitoring).

Maturity Level Observable Activities (Monitoring & Audit)

Level 1 – Ad Hoc

There is no active monitoring of cryptographic usage beyond basic security operations. The organization does not track which algorithms are being used in real time or if any systems fall out of compliance with crypto policies. Cryptographic incidents (like a certificate expiration or a library vulnerability) might catch the organization by surprise. The incident response plan does not specifically address cryptographic emergencies (e.g., a scenario where a critical algorithm is suddenly found vulnerable).

Level 2 – Developing

Basic monitoring and metrics are introduced for cryptography. The security team sets up some key indicators to watch, such as tracking SSL/TLS configurations across servers (to see if any are using deprecated ciphers) or scanning logs for cryptographic errors. The organization starts incorporating cryptography checks in regular audits – for example, verifying that systems use only approved algorithms during periodic compliance reviews. If a major external event occurs (like NIST announcing SHA-1 deprecation deadlines or an emergency vulnerability in a library), the organization reacts in an ad hoc but somewhat timely manner, perhaps issuing a directive to update configurations. An outline of a cryptographic incident response plan might be drafted, adding to the IR plan scenarios like “what if our primary encryption algorithm is broken?”.

Level 3 – Defined

Active monitoring and formal audit processes cover cryptographic posture. Dashboards or reports provide visibility into cryptographic deployments – e.g., percentage of traffic using hybrid/PQC algorithms, versions of cryptographic libraries in use, expiration dates of certificates – as part of security operations metrics. The organization’s internal audit or compliance function includes cryptographic controls in its scope, ensuring policies (from Practice 2) are followed in practice and that the PQC transition progress is on track. The enterprise stays closely tuned to external updates: there’s a defined process to track standards evolution and threat intelligence around cryptography. For instance, a team subscribes to NIST announcements, academic crypto research feeds, and industry alerts; they evaluate each update for relevance to the organization. Importantly, an incident response playbook for cryptographic events is in place. If tomorrow a flaw in the chosen PQC algorithm is discovered, the team has contingency plans (perhaps switch to an alternate algorithm, enable a fallback mechanism as a short-term patch, etc.). Regular drills or simulations might be conducted to ensure the team is ready to execute these plans.

Level 4 – Optimized

Continuous cryptographic posture management and agile adaptation define this level. Real-time monitoring is in place – for example, systems might automatically alert if an unapproved algorithm is used, or if a new device joins the network using legacy encryption. Cryptography-related metrics are integrated into enterprise risk scoring and trigger automated workflows (like creating a ticket if a weak cipher is detected on a server). The organization undergoes independent audits or certifications of its cryptographic controls as part of wider compliance (demonstrating to customers/regulators its PQC readiness). Moreover, the enterprise exhibits a capability to rapidly adapt: when changes occur (new standards, new threats), it updates its cryptographic implementations on short notice. A practical sign of this could be how quickly the organization applied a patch or config change during the latest crypto vulnerability compared to peers. Finally, lessons learned from monitoring and incidents feed back into strategy – completing the loop. For example, if monitoring shows slow adoption of a new algorithm in one division, that information is used to adjust training or planning (thus improving subsequent cycles). The organization strives for a state where cryptographic risk is continually managed to be as low as possible through vigilant oversight and nimble response.

Want to Know More About SafeLogic Cryptography Products?

Call us at 844-436-2797 or complete the form to talk with the SafeLogic team.