PQC READINESS / MODULE 01

Inventory & Risk Mapping

You cannot secure what you cannot see. The first step is to establish a complete inventory of your current cryptographic estate and analyse exposure.

The Assessment Scope

Cryptographic Asset Discovery

Comprehensive discovery of all cryptographic assets, including algorithms, key lengths, digital certificates, key management programmes, and protocols (e.g., TLS, VPNs).

Risk Categorisation

Mapping the cryptographic inventory against data classification and data lifetime requirements. We prioritise systems where data confidentiality must be preserved for decades.

Supply Chain Vulnerability

Assessing third-party dependencies (cloud providers, software libraries, hardware) that rely on legacy cryptography, which will soon become unpatched liabilities.

Assessment Outputs

DELIVERABLE 01

The Estate Register

A unified dashboard view of every certificate, key, and library instance across your cloud and on-premise environments.
DELIVERABLE 02

Priority Heatmap

A prioritized remediation list focusing on “Harvest Now, Decrypt Later” targets first.
INDUSTRY STANDARD

The CBOM

We generate a Cryptography Bill of Materials.

Just as an SBOM tracks software components, the CBOM creates a machine-readable record of your cryptography, essential for future audits and regulatory reporting.

Uncover Your Exposure.

Get a clear view of your quantum risk profile in weeks, not months.