0xA4F2
0x3C8B
0xDE1F

Security Teams · Free Tool

PQC Migration
Decision Tree

Six questions. An instant assessment of which post-quantum cryptography concern is most relevant to your organisation. No account required. Results appear on this page.

Executive
About this tool

The PQC Migration Decision Tree routes your organisation to the post-quantum cryptography concern most relevant to your situation. It is not a risk score. There is no numerical output. The design is intentional: many organisations at the awareness stage need a clear statement of which problem is theirs, not a weighted aggregate they cannot yet interpret.

Questions branch based on your answers. If you indicate no long-lived sensitive data, you will not see the follow-up questions about certificates and devices. The shortest path is three questions; the longest is eight. Most paths complete in under two minutes.

Six outcomes cover the primary PQC concern categories: low immediate relevance, long-lived data exposure, trust infrastructure, regulatory obligation, migration complexity, and broad readiness required. Each outcome maps to the most appropriate next step.

Important Information About How We Use This Data

Quantum Security and Defence does not collect, associate, or retain your name or your company name when you use these tools. All information is stored only for the duration of the browser session.

We collect only country, industry, and results data. This information is anonymised and cannot be associated with you or your company. Such anonymised data may be used for industry-level reporting, shared with members, incorporated into our research, and provided to government departments to support lobbying activity and the communication of industry readiness.

By using this tool, you consent to the provision of results data on a strictly anonymised basis. No personal name, email address, or company name is stored.

Complete the Assessment
STEP-BY-STEP  ·  RESULTS ON THIS PAGE  ·  NO ACCOUNT REQUIRED
Step 1 of 9 11% complete
Context. Step 1 of 9

Your Country

Country is recorded anonymously for industry-level reporting only.

Context. Step 2 of 9

Your Industry

Required to calculate your score, recorded anonymously.

Industry selection is required and recorded anonymously. It does not affect the outcome routing.

About You. Step 3 of 9

About You

Not recorded. Only used to create your PDF report in the browser session.

Not recorded. Only used to create your PDF report in the browser session.

Name and company are used only within your browser session. They are not stored or transmitted.

Question 1 of up to 8. Step 4 of 9

Does your organisation hold or transmit sensitive data that needs to remain confidential for a significant period of time?

Think about your most important records. Contracts, personnel files, health records, financial transaction histories, intellectual property, legal documents, classified information. The key question is: if someone captured encrypted copies of this data today and could read it in 10 years, would that cause material harm?

Your answer is used to calculate your score. Results data is recorded anonymously for benchmarking. No email, name, or company details are transmitted or stored.

Question 2 of up to 8. Step 5 of 9

Does your organisation issue, manage, or depend on digital certificates, code signing, firmware signing, or device identities in significant ways?

This covers TLS certificates for websites and APIs, code signing certificates for software releases, firmware signing for devices, certificate authorities (CA) you operate or rely on, and identity certificates in access management systems. The question is about how central these are to your operations, not just whether they exist.

Your answer is used to calculate your score. Results data is recorded anonymously for benchmarking. No email, name, or company details are transmitted or stored.

Question 3 of up to 8. Step 6 of 9

Does your organisation build, operate, or maintain devices, firmware, embedded systems, or industrial control systems?

This includes IoT devices, medical devices, industrial control systems, operational technology (OT), network equipment, and any hardware that uses certificates or cryptographic keys baked in at manufacture and is difficult to update remotely. The concern is about the cryptographic lifetime of the device: a device in service for 10 years will outlast the safety window for current asymmetric algorithms.

Your answer is used to calculate your score. Results data is recorded anonymously for benchmarking. No email, name, or company details are transmitted or stored.

Question 4 of up to 8. Step 7 of 9

Does your organisation operate in a regulated industry or under contracts that include cybersecurity or cryptography requirements?

This covers financial services regulation (PCI DSS, DORA), healthcare regulation (HIPAA, NHS Digital standards), government and defence standards (NCSC Cyber Essentials Plus, ISO 27001 in regulated contexts, government procurement frameworks), critical infrastructure requirements, and any contracts with quantum-readiness or cryptographic standard clauses. If your organisation is subject to external audit of your cryptographic practices, answer Yes.

Your answer is used to calculate your score. Results data is recorded anonymously for benchmarking. No email, name, or company details are transmitted or stored.

Question 5 of up to 8. Step 8 of 9

How dependent is your organisation on external vendors for the cryptographic services that protect your most sensitive systems?

This means cloud key management services (AWS KMS, Azure Key Vault, Google Cloud KMS), hardware security modules (HSMs) provided or managed by third parties, SaaS platforms whose encryption capabilities you cannot directly configure, or telecommunications providers whose network encryption you rely on. If your organisation's ability to migrate cryptography depends on decisions made by your vendors, that dependency is relevant here.

Your answer is used to calculate your score. Results data is recorded anonymously for benchmarking. No email, name, or company details are transmitted or stored.

Question 6 of up to 8. Step 9 of 9

Does your organisation operate legacy systems or systems that are difficult to update?

This means systems that run outdated operating systems or software, embedded systems with fixed cryptographic libraries, industrial control systems with long refresh cycles, or any critical infrastructure that cannot be updated without significant downtime or capital expenditure. If your organisation is running systems that were deployed 10 or more years ago and are still in production, consider them legacy for this purpose.

Your answer is used to calculate your score. Results data is recorded anonymously for benchmarking. No email, name, or company details are transmitted or stored.

Professional Advisory

Need a structured PQC assessment?

The Decision Tree identifies your primary concern. The Quantum Threat Exposure Assessment scores your organisation across all risk domains and produces an evidence base for leadership decision-making.

Explore the Quantum Threat Exposure Assessment