Learning Library

← Back to Library

Achieving Crypto‑Agility for Quantum‑Safe Enterprises

Key Points

  • Quantum computing will soon jeopardize current encryption, so enterprises must start building quantum‑safe security today.
  • Achieving “crypto‑agility” – the ability to swiftly adopt new cryptographic algorithms as threats evolve – requires a structured framework.
  • The framework consists of three pillars: governance (defining standards, policies, and algorithm adaptability), supply‑chain security, and technology implementation.
  • Within governance, maintaining algorithm adaptability, complying with recognized standards, and using an open Cryptography Bill of Materials (CBOM) ensure consistent, auditable crypto inventories and rapid response to emerging vulnerabilities.

Full Transcript

# Achieving Crypto‑Agility for Quantum‑Safe Enterprises **Source:** [https://www.youtube.com/watch?v=5jPvRs96Kx4](https://www.youtube.com/watch?v=5jPvRs96Kx4) **Duration:** 00:08:33 ## Summary - Quantum computing will soon jeopardize current encryption, so enterprises must start building quantum‑safe security today. - Achieving “crypto‑agility” – the ability to swiftly adopt new cryptographic algorithms as threats evolve – requires a structured framework. - The framework consists of three pillars: governance (defining standards, policies, and algorithm adaptability), supply‑chain security, and technology implementation. - Within governance, maintaining algorithm adaptability, complying with recognized standards, and using an open Cryptography Bill of Materials (CBOM) ensure consistent, auditable crypto inventories and rapid response to emerging vulnerabilities. ## Sections - [00:00:00](https://www.youtube.com/watch?v=5jPvRs96Kx4&t=0s) **Quantum‑Ready Crypto‑Agility Framework** - Enterprises must adopt a crypto‑agility framework—governance, supply‑chain, and technology—to swiftly replace vulnerable encryption and achieve quantum‑safe security. - [00:03:20](https://www.youtube.com/watch?v=5jPvRs96Kx4&t=200s) **CBOM and Crypto‑Agility Supply Chain** - The speaker describes how a Cryptography Bill of Materials (CBOM) creates a single, open‑standard inventory for enterprises to enforce compliance and governance, and emphasizes mapping cryptographic implementations across all supply‑chain assets to understand and mitigate risk. - [00:06:31](https://www.youtube.com/watch?v=5jPvRs96Kx4&t=391s) **Centralized Cryptography Abstraction & Automation** - The speaker stresses that organizations must abstract cryptographic functions into a single, centrally managed layer and automate their configuration and lifecycle to stay agile and avoid widespread code changes. ## Full Transcript
0:00Enterprise organizations must prepare today for the cybersecurity threat of the future. 0:07It won't be long before quantum computers 0:11are able to break the encryption schemes that protect our most valuable data today. 0:17And now even we see the threats are emerging every day. 0:23So how do enterprises protect themselves and build a secure, quantum safe future? 0:31It starts with a foundational capability, what we call crypto-agility. 0:35Crypto-agility refers to an ability for an organization, an application or a system, or even a platform, 0:46to quickly adopt the cryptography mechanisms, 0:49cryptography algorithms in response to changing threats technological advances, but also the vulnerabilities. 0:59Of course, this raises your question How do you, as a cybersecurity leader and practitioner, achieve the crypto agility? 1:09Honestly, in order to achieve the crypto-agility, you need a framework, 1:14a framework that can help you understand the capabilities that are most critical 1:19to ensure the long term security, privacy and compliance for your enterprise. 1:25And this framework is made up of the three components. 1:29The first one is governance, 1:35and the second one is the supply chain, 1:42and the third one is technology. 1:51Let's review each of these three components, starting first with the governance. 1:58When we talk about the governance, it's actually an ability for an organization to 2:04understand the standards policies related to an organization's cryptography. 2:11That means an industry related standards, best practices, selecting the right algorithms based on their security needs, 2:20ensuring the algorithms are complying to the regulatory requirements, 2:25and cryptography governance also defines the guidelines. 2:29That algorithm selections standardization and periodic reviews 2:34of incorporating the new standards and deciding when the old standards are outdated. 2:40And this capability that is most essential to a good governance should have what we call first thing as algorithm's adaptability. 2:54Algorithm's adaptability means an organizational ability to accommodate the wide range of cryptography algorithms, 3:01symmetric encryption, asymmetric encryption, the classical or 3:07the new quantum safe algorithms, or even including hashing and digital signatures as well, 3:12a nd the other important capability that's most important from governance perspective is what we call standard compliance. 3:23What do we mean by that? 3:24Is enabling enterprises to make sure they support recognized cryptography standards 3:30and the way that is enabling the single source of truth for their enterprises to 3:37keep that cryptography inventory in a common format. 3:41And that format usually is called cryptography bill of material or CBOM. 3:50CBOM is a cryptography standard that communicates all the information that you need to be agile and it fulfills 3:58The automating risk management enabling the compliance, 4:02but also challenging the enterprises or government agencies to enforce their governance framework of their own. 4:09CBOM is an open standard and making it convenient tool for organizations who can point. 4:17Then increasing the vendors to their supply chain 4:20that provides the software, hardware and other technologies and ensuring the right justification for their governance needs. 4:30Let's talk about the second component of the crypto-agility framework, which is supply chain. 4:36What do we mean by supply chain is honestly understanding the enterprise 4:41infrastructure landscape, which means knowing about the applications, 4:47the network, 4:49and the systems. 4:51This is important to know that what cryptography is being implemented in 4:55each of these assets that you are acquiring from multiple different vendors 4:59because it creates a risk that you must understand. 5:05While you are trying to understand the cryptography implementation will meet 5:10your requirements of cryptography compliance regulation that you need to abide by. 5:16This is very important because quantum safe cryptography will just be another source of vulnerability. 5:22We know that. 5:23And it is also important to find that how these components have dependencies to each other. 5:30That means there are different cybersecurity regulations that point the understanding the supply chain. 5:38This includes the frameworks like NIST DORA NIST2. 5:42All view supply chain management as a key cybersecurity measure. 5:47Without the information and availability from the supply chain. 5:51It is not possible to plan a successful cybersecurity migration. 5:56Let's talk about the last component of this framework, which is technology. 6:02Cryptography functions should be separated from the hard coding 6:08into each of the organization's network applications and the systems that you have. 6:14This is one of the key requirements, what we call modularity. 6:19What we mean by modularity is, is that every time you need to replace a cryptography scheme or an algorithm, 6:27you should not be requiring to shut down your entire organization. 6:32Rather, you should be able to quickly adopt the new algorithms and should be running seamlessly. 6:38The other important capability you must have in the organization, what we call abstraction. 6:45What we mean by abstraction is obviously that how can you detached the hard coding 6:50of the cryptography implementations from your applications, but also in your network 6:56and the systems so that every time you are making a change in a cryptography, you don't make the change 7:02at the thousand different places, you are making in a single place, 7:06a centralized place, and replicating those changes across the other places. 7:10So this can only be possible if you have abstracted the cryptography implementations within your applications. 7:17And this is very important in order to have you really be agile. 7:24The next important thing is about what we call automation. 7:28What we mean by automation here is that you must have dynamic capabilities to configure, manage your cryptography, 7:37so that any time you need to have a management of cryptography parameters, 7:41the encryption techniques, the type of the certificate management 7:45or the other key management capability across the infrastructure, 7:49we should be able to dynamically change, configure and 7:56required them to be updated as needed, and the automation tools and scripts can help 8:03handle these tasks like examinations, rotations. 8:07Updating the cryptography settings based on the predefined policies and events. 8:13Together these three components. 8:19Governance, supply chain, and technology will enable your enterprise to develop the true crypto-agility. 8:26They will allow you to create a secure environment that is flexible, compliant and ready for the quantum safe future.