ChaptersCircleEventsBlog
Share how your organization manages AI securely. Take the CSA and Google enterprise AI Survey today!

Download Publication

Quantum-Safe Security Governance with the Cloud Controls Matrix
Quantum-Safe Security Governance with the Cloud Controls Matrix
Who it's for:
  • All IT professionals
  • Executives and decision-makers

Quantum-Safe Security Governance with the Cloud Controls Matrix

Release Date: 07/30/2024

Working Group: Quantum-safe Security

For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT departments to prepare to integrate these tools into their organizations. 

This short document from the Quantum-Safe Security Working Group outlines controls from CSA’s Cloud Controls Matrix (CCM) that are relevant to quantum-safe security. The purpose is to provide a quick guide that can help organizations begin preparing today.

Key Takeaways:
  • What is the Cloud Controls Matrix
  • Relevant quantum technologies, including cryptographically relevant quantum computers (CRQC) and quantum key distribution (QKD)
  • The CCM controls relevant to quantum security
  • The CCM controls that will help organizations remain agile when post-quantum cryptography is standardized
Download this Resource

Bookmark
Share
Related resources
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Why Identity Automation Fails at 96% of Organizations
Why Identity Automation Fails at 96% of Organizations
Published: 07/07/2025
How Mature is Your NHI Security Program?
How Mature is Your NHI Security Program?
Published: 07/07/2025
AI in Cybersecurity: 5 Practical Use Cases for Stronger Defense
AI in Cybersecurity: 5 Practical Use Cases for Stronger Defense
Published: 07/01/2025
Strengthening Cybersecurity with Real-Time Vulnerability Analysis and Anomaly Detection
Strengthening Cybersecurity with Real-Time Vulnerability Analysis a...
Published: 07/01/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training