Cloud 101CircleEventsBlog
Join us for Cybersecurity Awareness Month! Strengthen your cyber resilience with essential security tips and resources for everyone.

Download Publication

Quantum-Safe Security Governance with the Cloud Controls Matrix
Quantum-Safe Security Governance with the Cloud Controls Matrix
Who it's for:
  • All IT professionals
  • Executives and decision-makers

Quantum-Safe Security Governance with the Cloud Controls Matrix

Release Date: 07/30/2024

Working Group: Quantum-safe Security

For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT departments to prepare to integrate these tools into their organizations. 

This short document from the Quantum-Safe Security Working Group outlines controls from CSA’s Cloud Controls Matrix (CCM) that are relevant to quantum-safe security. The purpose is to provide a quick guide that can help organizations begin preparing today.

Key Takeaways:
  • What is the Cloud Controls Matrix
  • Relevant quantum technologies, including cryptographically relevant quantum computers (CRQC) and quantum key distribution (QKD)
  • The CCM controls relevant to quantum security
  • The CCM controls that will help organizations remain agile when post-quantum cryptography is standardized
Download this Resource

Bookmark
Share
Related resources
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Secure by Design: Implementing Zero Trust Principles in Cloud-Native Architectures
Secure by Design: Implementing Zero Trust Principles in Cloud-Nativ...
Published: 10/03/2024
Aligning Security Testing with IT Infrastructure Changes
Aligning Security Testing with IT Infrastructure Changes
Published: 10/03/2024
Elevating Application Security Beyond “AppSec in a Box”
Elevating Application Security Beyond “AppSec in a Box”
Published: 10/02/2024
When Walls Crumble: A CISO's Guide to Post-Breach Recovery
When Walls Crumble: A CISO's Guide to Post-Breach Recovery
Published: 09/30/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training