Free Tool · Quantum Security

PQC Readiness Checklist Generator

Answer ten questions about your organisation and receive a personalised, prioritised checklist of post-quantum cryptography actions. Written for security and compliance leads who need a practical starting point, not a generic framework. Results appear on this page. No account required.

  • 10 questions · under 5 minutes
  • Covers governance, data, trust infrastructure, migration readiness
  • Download a prioritised action checklist as a PDF
Step 1 of 10
Question 1 of 10

What sector does your organisation operate in?

This helps tailor the checklist to the regulations and risks most relevant to your industry.

Organisation sector

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 2 of 10

How large is your organisation?

Size affects how many systems you are likely to have, and how complex a cryptographic inventory will be.

Organisation size

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 3 of 10

How long does the sensitive data your organisation holds need to remain confidential?

Think about the most sensitive data you hold — patient records, contracts, financial histories, proprietary research. How long must that data stay secret?

Data confidentiality lifetime

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 4 of 10

How sensitive is the data your organisation holds?

This is about the category of information, not just how much there is. Regulated data (medical records, financial data, personal identity data, classified information) is inherently more sensitive than general business data.

Data sensitivity level

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 5 of 10

How much does your organisation depend on digital certificates, code signing, or device trust?

Certificate authorities issue the digital credentials that prove websites and services are genuine. Code signing proves that software has not been tampered with. Device trust verifies that hardware is authentic. You may depend on these even if you do not run your own systems.

Trust, PKI, and signing dependence

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 6 of 10

Which best describes your IT environment?

This affects which systems need the most attention and how straightforward a migration is likely to be.

IT environment type

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 7 of 10

How heavily regulated is your organisation?

Some sectors have specific legal or contractual requirements to demonstrate quantum security readiness. This helps tailor the checklist to any compliance deadlines that apply to you.

Regulatory exposure

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 8 of 10

How much legacy IT does your organisation have?

Legacy systems are older systems that are difficult to update or replace — mainframes, hardware security modules purchased before 2020, embedded systems with limited update capability, or bespoke industrial platforms.

Legacy system complexity

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 9 of 10

How dependent is your organisation on third-party vendors for security-critical systems?

If key parts of your infrastructure are managed by suppliers — cloud providers, hardware vendors, software companies — your migration may depend on those suppliers acting first.

Vendor dependency

Your answers run entirely in your browser. Nothing is stored or transmitted.

Question 10 of 10

Where would you say your organisation currently is on PQC preparation?

Be honest — there is no wrong answer. The checklist will be most useful if it starts from where you actually are.

Existing readiness level

Your answers run entirely in your browser. Nothing is stored or transmitted.

About this tool

This checklist generator uses a rule-based engine: your answers trigger specific actions from a library of 28 items, each with a suggested owner and priority. Items are grouped by type of work: governance, cryptographic visibility, trust infrastructure, vendor management, migration planning, and compliance.

The library reflects the NIST post-quantum cryptography migration guidance (NIST SP 800-208 and the published FIPS 203, 204, 205 standards), the UK NCSC's quantum-safe migration guidance, and Steven Vaile's advisory experience across government, defence, and financial services organisations.

This tool produces a prioritised starting point, not a full engineering audit. For a comprehensive cryptographic inventory and migration roadmap, contact Steven.