Making the Case for Cryptographic Agility and Orchestration

Making the Case for Cryptographic Agility and Orchestration

October 12, 2023 at 06:39PM

In summary, the text highlights the quantum threat to cybersecurity and the need for post-quantum cryptography (PQC) to protect against it. It discusses the importance of cryptographic agility and orchestration in managing and adapting to changing cryptographic algorithms. The text also emphasizes the ongoing PQC standardization process and the need for organizations to prepare for the migration to PQC to ensure security and compliance at scale.

Based on the meeting notes, the main points discussed can be summarized as follows:

1. The quantum threat to cybersecurity: The power of quantum computing can break current public-key cryptography systems, necessitating the need for post-quantum cryptography (PQC) to protect against quantum computing threats.

2. Cryptographic agility: It is important for organizations to have the ability to easily change cryptographic algorithms or implementations in response to novel attacks or vulnerabilities. This agility allows systems to quickly adapt and upgrade vulnerable cryptography.

3. Importance of cryptographic orchestration: Similar to software-defined networking, cryptographic orchestration provides a centralized system interface to track and manage the cryptography used throughout an enterprise. It enables organizations to meet regulatory and compliance requirements at scale, particularly in the migration to post-quantum cryptography.

4. Lessons for enterprise security: The migration to post-quantum cryptography emphasizes the need for cryptographic agility and highlights that cryptographic algorithms have a life cycle. It is essential to engineer systems that can respond to new developments and ensure security, regulatory compliance, and scalability.

Overall, the discussion focused on the quantum threat, the need for post-quantum cryptography, the importance of cryptographic agility and orchestration, and the opportunities presented by the migration to a more agile and orchestrated cryptography paradigm.

Full Article