Free Tool · Quantum Security
PQC Readiness Checklist Generator
Answer ten questions about your organisation and receive a personalised, prioritised checklist of post-quantum cryptography actions. Written for security and compliance leads who need a practical starting point, not a generic framework. Results appear on this page. No account required.
- 10 questions · under 5 minutes
- Covers governance, data, trust infrastructure, migration readiness
- Download a prioritised action checklist as a PDF
Your answers are used only to calculate your score. No email address, company name, or IP address is collected as part of this assessment. Anonymised scores are pooled with other responses to produce sector-level benchmarks, for example average scores across financial services organisations. Any PDF report you download is generated in your browser and is not stored on any server. You can choose to download the PDF report after the tool is completed. If you choose to enter your email address, that information is stored separately and only used to send you the updates you asked for.
What this tool collects
This tool collects your assessment answers and calculates a score. All of this happens in your browser. Your answers are not sent to a server for processing.
Anonymised benchmarking
The anonymised score from your assessment may be used to build sector-level benchmarks. For example: organisations in the financial services sector score an average of 54. No personal information, company name, or IP address is attached to this data. You cannot be identified from it.
What is not collected
Your IP address is not collected or stored. Your company name is not collected unless you choose to enter it when downloading a PDF report. Your email address is not collected unless you choose to provide it to receive updates.
PDF reports
If you choose to download a PDF report, it is generated entirely within your browser using your answers. The report is not sent to or stored on any server. Once you download it, the data stays with you.
Email addresses
An email address is only stored if you voluntarily opt in to receive notifications or updates. Providing your email address is never required to use this tool or to view your results. Your email address is not shared with third parties or used for advertising.
Third parties
Your data is not sold to third parties. Your data is not shared with advertising networks. Your data is not used for any purpose other than those described here.
What sector does your organisation operate in?
This helps tailor the checklist to the regulations and risks most relevant to your industry.
Your answers run entirely in your browser. Nothing is stored or transmitted.
How large is your organisation?
Size affects how many systems you are likely to have, and how complex a cryptographic inventory will be.
Your answers run entirely in your browser. Nothing is stored or transmitted.
How long does the sensitive data your organisation holds need to remain confidential?
Think about the most sensitive data you hold — patient records, contracts, financial histories, proprietary research. How long must that data stay secret?
Your answers run entirely in your browser. Nothing is stored or transmitted.
How sensitive is the data your organisation holds?
This is about the category of information, not just how much there is. Regulated data (medical records, financial data, personal identity data, classified information) is inherently more sensitive than general business data.
Your answers run entirely in your browser. Nothing is stored or transmitted.
How much does your organisation depend on digital certificates, code signing, or device trust?
Certificate authorities issue the digital credentials that prove websites and services are genuine. Code signing proves that software has not been tampered with. Device trust verifies that hardware is authentic. You may depend on these even if you do not run your own systems.
Your answers run entirely in your browser. Nothing is stored or transmitted.
Which best describes your IT environment?
This affects which systems need the most attention and how straightforward a migration is likely to be.
Your answers run entirely in your browser. Nothing is stored or transmitted.
How heavily regulated is your organisation?
Some sectors have specific legal or contractual requirements to demonstrate quantum security readiness. This helps tailor the checklist to any compliance deadlines that apply to you.
Your answers run entirely in your browser. Nothing is stored or transmitted.
How much legacy IT does your organisation have?
Legacy systems are older systems that are difficult to update or replace — mainframes, hardware security modules purchased before 2020, embedded systems with limited update capability, or bespoke industrial platforms.
Your answers run entirely in your browser. Nothing is stored or transmitted.
How dependent is your organisation on third-party vendors for security-critical systems?
If key parts of your infrastructure are managed by suppliers — cloud providers, hardware vendors, software companies — your migration may depend on those suppliers acting first.
Your answers run entirely in your browser. Nothing is stored or transmitted.
Where would you say your organisation currently is on PQC preparation?
Be honest — there is no wrong answer. The checklist will be most useful if it starts from where you actually are.
Your answers run entirely in your browser. Nothing is stored or transmitted.
About this tool
This checklist generator uses a rule-based engine: your answers trigger specific actions from a library of 28 items, each with a suggested owner and priority. Items are grouped by type of work: governance, cryptographic visibility, trust infrastructure, vendor management, migration planning, and compliance.
The library reflects the NIST post-quantum cryptography migration guidance (NIST SP 800-208 and the published FIPS 203, 204, 205 standards), the UK NCSC's quantum-safe migration guidance, and Steven Vaile's advisory experience across government, defence, and financial services organisations.
This tool produces a prioritised starting point, not a full engineering audit. For a comprehensive cryptographic inventory and migration roadmap, contact Steven.