Aksel CichockiQuantum Security Lab
QSL
Compliance

Aligning with Emerging Global Standards

Quantum security is not just a technical challenge — it is increasingly a compliance consideration. Organizations should understand the standards that are already taking shape.

Why It Matters
Quantum compliance is an emerging consideration across multiple frameworks. Organizations benefit from aligning with developing standards proactively rather than reactively.
Who Should Care
Compliance teams, CISOs, and security architects responsible for meeting NIST, CNSA 2.0, SOC 2, ISO 27001, and PCI DSS requirements.
What To Do Now
Map current cryptographic usage against CNSA 2.0 milestones. Enable audit logging. Build a migration plan. See the Defense Checklist.

NIST Post-Quantum Cryptography Readiness

NIST's PQC Standardization

A quantum-resilient architecture should implement the algorithms selected through NIST's rigorous multi-year evaluation process, ensuring alignment with the definitive global standard for post-quantum cryptography:

  • ML-KEM / FIPS 203 — the key encapsulation mechanism built on the CRYSTALS-Kyber algorithm family. Supports all security levels (ML-KEM-512, ML-KEM-768, ML-KEM-1024).
  • ML-DSA / FIPS 204 — the digital signature scheme built on CRYSTALS-Dilithium. Used for authentication, integrity verification, and code signing.
  • SLH-DSA / FIPS 205 — the hash-based signature scheme built on SPHINCS+, providing security under different mathematical assumptions as a diversified backup.
FIPS 203 FIPS 204 FIPS 205 CNSA 2.0

NSA CNSA 2.0 Migration Guidance

The NSA's Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) provides migration guidance for national security systems (NSS). These timelines apply specifically to NSS and vendors supplying them — they are not direct mandates for commercial organizations, but they signal the direction of future compliance expectations.

Key dates from published CNSA 2.0 guidance (subject to revision):

  • 2025 — target for software and firmware signing to prefer quantum-resistant algorithms for NSS.
  • 2027 — target for web servers, cloud services, and networking equipment supporting NSS to support PQC.
  • 2030 — target for full transition of national security systems. Crypto-agility supports incremental migration toward this goal.

Important distinction: NIST FIPS 203/204/205 are finalized federal standards (August 2024). CNSA 2.0 provides NSA policy guidance with target dates. CSfC (Commercial Solutions for Classified) addenda provide implementation guidance that is explicitly subject to change. These are related but separate frameworks.

CNSA 2.0 NSS Guidance

Crypto-Agility Framework

Swap Algorithms Without Rebuilding

Crypto-agility is the ability to replace cryptographic algorithms and parameters without modifying application code or disrupting operations. This should be a core architectural property of any quantum-ready system:

  • Algorithm abstraction layer — applications interact with cryptographic services through a stable API. The underlying algorithms are configured via policy, not code.
  • Hot-swappable primitives — when a new algorithm is approved (or an existing one deprecated), the change is applied through the policy engine with zero application changes.
  • Version-tagged ciphertext — all encrypted data carries metadata identifying the algorithm and parameters used, enabling automatic re-encryption during migration.
  • Graceful deprecation — deprecated algorithms remain available for decryption of historical data while blocked for new encryption operations.
Algorithm Abstraction Hot-Swap Version-Tagged Graceful Deprecation

Why Crypto-Agility Matters for Compliance

Regulatory bodies are increasingly encouraging crypto-agility as a recommended capability, not just a theoretical best practice:

  • NIST SP 800-131A establishes guidance for transitioning away from deprecated algorithms on defined timelines.
  • The EU Cybersecurity Act and European Cybersecurity Certification Scheme are developing crypto-agility requirements.
  • Financial regulators (PCI DSS, SOX) are likely to incorporate PQC readiness into future audit frameworks, though specific requirements have not yet been finalized.

Audit-Ready Logging

Every Cryptographic Operation Must Be Recorded

A compliant architecture maintains comprehensive, tamper-evident logs of all cryptographic operations, providing the audit trail that compliance regimes demand:

  • Key lifecycle events — generation, distribution, rotation, usage, and destruction of every key is logged with timestamps, actors, and justification.
  • Algorithm usage tracking — every encryption and decryption operation logs the algorithm, key identifier, and security level used.
  • Policy enforcement logs — every policy decision (approve, deny, warn) is recorded, including the rule that triggered it and the context of the request.
  • Tamper-evident storage — audit logs are stored with cryptographic integrity protection (hash chains), making unauthorized modification detectable.
Key Lifecycle Algorithm Tracking Policy Logs Tamper-Evident

Compliance Report Generation

Audit logs should feed directly into compliance reporting, reducing the manual effort required for security assessments:

  • Automated compliance dashboards showing PQC migration status across the infrastructure.
  • Exportable audit reports formatted for common compliance frameworks (SOC 2, ISO 27001, NIST CSF).
  • Real-time alerting when cryptographic operations fall outside of policy parameters.
SOC 2 ISO 27001 NIST CSF PCI DSS

Compliance Readiness Starts with Architecture

Quantum compliance cannot be bolted on after the fact. It needs to be embedded in the architecture from the ground up.

Standards & Sources
  • NIST FIPS 203 — ML-KEM (Module-Lattice-Based Key Encapsulation Mechanism)
  • NIST FIPS 204 — ML-DSA (Module-Lattice-Based Digital Signature Algorithm)
  • NIST FIPS 205 — SLH-DSA (Stateless Hash-Based Digital Signature Algorithm)
  • NSA CNSA 2.0 — Commercial National Security Algorithm Suite, quantum migration timeline
  • NIST SP 800-131A — Transitioning the Use of Cryptographic Algorithms and Key Lengths
  • ETSI QSC — Quantum Safe Cryptography technical specifications
  • PCI DSS v4.0 — Payment Card Industry Data Security Standard