A structured five-stage model aligned to ASD's LATICE guidance, adapted into plain consulting language for enterprise discovery, quantum risk assessment and transition planning.
Find and document where traditional asymmetric cryptography is used across cloud services, applications, APIs, certificates, hardware and supplier dependencies.
Understand the value and sensitivity of systems and data protected by current cryptography, along with legal, regulatory and operational exposure.
Prioritise systems for transition by balancing sensitivity, external exposure, complexity, lifecycle and business importance.
Plan and support transition activities, including vendor coordination, software updates, architecture decisions, testing and staged change.
Equip leaders, architects, cyber teams and product teams with the awareness and guidance needed for a sustainable post-quantum transition programme.
Australian Signals Directorate (ASD) recommended target milestones for becoming post-quantum cryptography safe:
Refine the transition plan, confirm scope, prioritisation and governance, and prepare for execution.
Transition critical and high-priority systems that carry the greatest data sensitivity or exposure.
Complete the wider transition away from traditional asymmetric cryptography where feasible.