This year, I had a great privilege to attend RedHat Summit in Boston, Massachusetts. As a Quantum and security enthusiast, I attended all the sessions related to Quantum especially Post Quantum Cryptography(PQC). I did publish an article on Post Quantum cryptography and how PQC will be the next frontier in Cybersecurity. In this article, let’s explore how enterprises are preparing for quantum threats from compliance checkboxes to strategic governance.
At Red Hat Summit 2025, the conversations went far beyond technical implementations. While the integration of post-quantum cryptography in RHEL 10 was certainly impressive, what struck me most were the governance discussions happening in breakout sessions and hallway conversations. CISOs, compliance officers, and enterprise architects weren't just asking how to implement quantum-resistant algorithms. They were asking harder questions: Who owns this transition? How do we measure progress? What does quantum readiness mean for our risk posture?
These questions reveal a fundamental truth about the quantum threat. This isn't just another security upgrade. It's a complete rethinking of how we govern cryptographic assets, manage cybersecurity risk, and maintain compliance in an era where the rules are changing faster than most organizations can adapt.
The convergence of quantum computing advancements and evolving cybersecurity regulations is reshaping how organizations approach security governance. Unlike post-quantum cryptography, which focuses on algorithm-level resistance to quantum attacks, quantum security encompasses the broader governance, compliance, and strategic frameworks needed to protect enterprises in a quantum-capable world. For security leaders, IT architects, and compliance officers, understanding this landscape is no longer optional.
Most organizations have security policies that were written when RSA-2048 was considered unbreakable. They have asset inventories that don't include cryptographic details. They have risk registers that don't account for quantum computing as a threat vector. And perhaps most critically, they have governance structures that weren't designed to manage a multi-year cryptographic migration.
The shift to quantum-resistant cryptography requires governance frameworks that can handle three simultaneous challenges:
Traditional security governance wasn't built for this level of complexity.
Quantum security governance is about more than just updating policies. It's about creating a structured approach to managing cryptographic risk in an environment where the threat landscape is evolving faster than our ability to respond.
Here's what effective quantum governance looks like in practice:
Cryptographic Asset Management: You can't protect what you don't know exists. Organizations need comprehensive inventories that identify every place cryptographic algorithms are used, from TLS certificates to application-level encryption to embedded systems. This goes beyond traditional asset management because cryptography is often invisible at the infrastructure level.
Risk-Based Prioritization: Not all cryptographic assets need to be migrated at the same time. Data that only needs to remain confidential for a few years poses a different risk than data that must stay secure for decades. Governance frameworks need clear criteria for prioritizing migration efforts based on data sensitivity, retention requirements, and exposure to quantum threats.
Cross-Functional Coordination: The quantum transition touches every part of the organization. Security teams need to work with application owners, infrastructure teams, vendors, compliance officers, and business leaders. This requires governance structures that can coordinate across silos and resolve conflicts when priorities don't align.
Continuous Monitoring and Adaptation: NIST's standards are evolving. New quantum-resistant algorithms are being developed. Regulatory requirements are changing. Governance frameworks need mechanisms for staying current and adapting migration strategies as the landscape shifts.
The compliance picture is getting more complex by the quarter. Federal agencies are operating under directives that require quantum-resistant cryptography by specific deadlines. The financial services industry is facing its own set of requirements. Healthcare has HIPAA considerations. Critical infrastructure has sector-specific mandates.
And here's the challenge: these requirements aren't always aligned. FIPS 203, 204, and 205 provide clear standards for specific algorithms, but they don't answer every question about implementation, key management, or hybrid approaches that mix classical and quantum-resistant cryptography during the transition period.
Compliance officers are wrestling with practical questions. If we implement hybrid TLS that uses both RSA and CRYSTALS-Kyber, does that meet the standard? When regulations say "quantum-resistant," do they mean pure post-quantum or are hybrid approaches acceptable? How do we document our transition in a way that satisfies auditors who may not understand the technical nuances?
The answer isn't to wait for perfect clarity. The answer is to build governance frameworks that are flexible enough to adapt as standards mature while still maintaining a defensible compliance posture today.
The cybersecurity implications of quantum computing extend far beyond choosing the right algorithms. The transition to post-quantum cryptography creates new attack surfaces and operational risks that security teams need to manage.
Key Management Complexity: Post-quantum algorithms often use larger keys than their classical counterparts. CRYSTALS-Kyber keys are larger than RSA keys. This affects storage, transmission, and performance. More importantly, it affects key management systems that may have been designed with assumptions about key sizes that no longer hold.
Performance Trade-offs: Quantum-resistant algorithms have different performance characteristics. Some are faster, some are slower. Some use more memory. Organizations need to test these algorithms in their specific environments and understand the impact on application performance, user experience, and infrastructure costs.
Interoperability Challenges: Not everyone will migrate at the same pace. Organizations need to maintain compatibility with partners, customers, and systems that haven't yet adopted post-quantum cryptography. This means running dual cryptographic stacks during the transition, which increases complexity and creates new opportunities for misconfiguration.
Supply Chain Security: Cryptography isn't just in your data center. It's in your vendors' systems, your cloud providers' infrastructure, your IoT devices, your mobile apps. Quantum security governance needs to extend to the entire supply chain, with clear expectations for vendors and mechanisms for verifying their quantum readiness.
\
Based on conversations with organizations that are already deep into their quantum transitions, here's what effective quantum governance looks like:
1. Establish Executive Sponsorship: This can't be owned by IT alone. The quantum transition needs board-level visibility and C-suite support. Organizations that are succeeding have executive sponsors who understand the strategic importance and can allocate resources accordingly.
2. Create a Quantum Transition Team: This isn't a working group. It's a dedicated team with clear authority, budget, and accountability. The team should include security architects, compliance experts, application owners, and infrastructure specialists. Their job is to drive the transition, not just advise on it.
3. Conduct a Cryptographic Inventory: Use automated tools to discover where cryptographic algorithms are used. Don't rely on documentation or assumptions. The inventory should identify algorithms, key sizes, certificate chains, encryption at rest, encryption in transit, and digital signatures across all environments.
4. Develop a Risk-Based Migration Roadmap: Prioritize based on data sensitivity, regulatory requirements, and technical feasibility. Start with high-value assets that are exposed to harvest-now-decrypt-later attacks. Create clear milestones and success criteria.
5. Implement Hybrid Solutions as a Bridge: Don't wait for a perfect end state. Hybrid cryptography lets you gain quantum resistance while maintaining backward compatibility. RHEL 10's support for hybrid TLS is a good example of how to manage the transition pragmatically.
6. Build Continuous Monitoring into the Process: Track adoption rates, identify bottlenecks, measure performance impacts, and monitor for new vulnerabilities. The transition will take years. You need visibility into progress and problems throughout.
7. Invest in Training and Awareness: Your security team needs to understand post-quantum cryptography. Your developers need to know how to implement it correctly. Your executives need to understand the business implications. Budget for training and make it a priority.
Organizations can establish quantum security governance through structured approaches:
Cryptographic Inventory and Assessment: Conduct comprehensive audits of cryptographic implementations across the entire technology estate. This includes operating systems, applications, databases, APIs, IoT devices, and embedded systems. Map dependencies and identify which systems protect long-lived, sensitive data. This forms the foundation for prioritization.
Hybrid Cryptography Implementation: Transition through hybrid phases where classical and post-quantum algorithms work together. This approach maintains backward compatibility while building quantum resistance. Organizations should standardize on NIST-approved algorithms (CRYSTALS-Kyber for key encapsulation, CRYSTALS-Dilithium for digital signatures) as the primary post-quantum components.
Cryptographic Agility Architecture: Redesign systems to support algorithm changes without major overhauls. This means abstracting cryptographic operations, using pluggable cryptographic modules, and implementing strong key management practices. Cloud-native approaches with containerization facilitate faster updates than monolithic legacy systems.
Risk-Based Prioritization: Not all systems require immediate quantum-resistant cryptography. Data with short lifespans or low sensitivity can transition later. Systems protecting long-term secrets, critical infrastructure, or regulated data should be prioritized. This creates manageable migration waves.
Integration with IAM and PKI: Quantum security governance must extend through identity and access management systems and public key infrastructure. Certificate authorities need quantum-ready capabilities. Directory services, authentication systems, and authorization mechanisms all require assessment and updates.
Effective quantum security programs leverage specialized tools and frameworks:
Quantum Key Distribution (QKD): While not a complete quantum security solution, QKD provides theoretically information-theoretic secure key exchange. Organizations in high-security sectors use QKD for critical infrastructure protection, though widespread commercial adoption remains limited due to cost and operational complexity.
Post-Quantum Cryptography Libraries: Open-source libraries like liboqs (Open Quantum Safe) and XMSS implementations provide vetted post-quantum algorithm implementations. These libraries support integration into existing applications without requiring cryptographic expertise from developers.
HSM and Key Management Updates: Hardware security modules from Thales, Fortanix, and others now support post-quantum algorithms. Organizations using HSMs for key management and digital signature operations should upgrade to quantum-capable solutions as part of their governance roadmap.
Software Bill of Materials (SBOM) Tools: Tools like SPDX and CycloneDX help organizations track cryptographic dependencies in their software. This transparency enables rapid identification of systems requiring updates when vulnerabilities or compliance requirements emerge.
Cryptographic Lifecycle Management Frameworks: Solutions like HashiCorp Vault and cloud provider key management services now support hybrid cryptographic scenarios, enabling organizations to manage classical and post-quantum algorithms within unified frameworks. These provide audit trails, compliance reporting, and standardized access controls.
Governance and Compliance Frameworks: Organizations should adopt frameworks like NIST's Cybersecurity Framework extensions for quantum readiness, developed in collaboration with the quantum security community. These provide structured approaches to assessing, planning, and executing quantum security programs.
Quantum security governance requires engagement across multiple organizational functions. Security teams need budget and staffing for crypto-agility improvements. Compliance teams must reinterpret standards through a quantum lens. Development teams need training on post-quantum algorithm integration. Infrastructure teams must plan for hardware and software upgrades.
Enterprise architects should view quantum security governance as an opportunity to modernize security architectures. The forced examination of cryptographic dependencies often reveals other architectural improvements needed for security and operational efficiency. Organizations that treat quantum readiness as a compliance checkbox will struggle; those viewing it as a strategic modernization initiative typically emerge more secure overall.
Quantum security governance is not primarily about technology; it's about establishing frameworks, processes, and accountability structures that guide organizations through a fundamental shift in cryptographic capabilities. The compliance landscape will continue tightening. Organizations that establish quantum security governance now will navigate the transition with minimal disruption and strong competitive advantage.
The path forward requires assessing current cryptographic landscapes, establishing risk-based migration roadmaps, implementing hybrid solutions, and building organizational capabilities around quantum-ready architectures. With NIST standards providing technical guidance and regulatory mandates creating deadline pressure, the time to build quantum security governance is now. Organizations that move decisively on this front will be better positioned for the quantum era than those waiting for threats to fully materialize.
The future of enterprise security depends not just on quantum-resistant algorithms, but on the governance structures that ensure these algorithms are properly deployed, maintained, and evolved as threats and standards evolve.


