Step 1 for Post-Quantum Cryptography Transition is Inventory: The Five Pillars of Cryptographic Discovery & Inventory.
Asset Encryption Scanning
Asset Encryption Scanning
The third pillar involves discovering how encryption is applied across IT Assets, including endpoints, IoT (Internet of Things) devices, and servers.
These assets often handle vast amounts of sensitive data, making it crucial to understand the encryption mechanisms protecting them.
Ensure that encryption is applied to protect sensitive data stored on devices, such as employee laptops or mobile devices.
Outdated protocols like SSL and older versions of TLS should be flagged and replaced with quantum-resistant alternatives.
Critical data stored on servers should be encrypted both at rest and in transit. Outdated algorithms such as AES-128 should be upgraded to stronger quantum-safe standards, such as AES-256.
Solution Architecture: External (either Software As A Service, Private Cloud, Customer Provided environment), internally hosted as a docker image or consultant managed.
The problem won’t get easier with time. The first step is both the simplest and easiest. Put your foot on the path and start walking to the post quantum future.