Strata Cloud Manager
Insights: Quantum-Safe Security
Table of Contents
Expand All
|
Collapse All
Strata Cloud Manager Docs
Insights: Quantum-Safe Security
Quantum-Safe Security eases the PQC transition through a live cryptographic
inventory, continuous risk assessment, and risk remediation guidance.
| Where Can I Use This? | What Do I Need? |
|---|---|
|
|
The Quantum-Safe Security app (InsightsQuantum-Safe Security) helps you plan, prepare for, and manage the post-quantum
cryptography (PQC) migration. The app provides comprehensive visibility into your
cryptographic posture, so you know where and how cryptography is used across the
enterprise, asset vulnerabilities, and quantum readiness. In addition to
actionable insights, the app provides remediation guidance. The app builds a real-time
inventory of your applications, user devices, infrastructure, and IoT devices assets and
their cryptographic materials, including protocols, keys, algorithms, and certificates).
The main view of the app is a dashboard that displays a prioritized view of current risk
and where remediation matters most, which enables you to analyze trends and monitor
quantum readiness and resilience at a glance.
The application discovers assets and cryptography in use, contextualizes the data, and
evaluates risk exposure and quantum readiness by analyzing decrypted and unencrypted
SSL/TLS sessions, VPN tunnels, and SSH sessions, and device telemetry observed by
Next-Generation Firewalls (NGFW), Prisma Access, and other telemetry sources.
To get started, review the app prerequisites and follow the steps in Enable Comprehensive Cryptographic
Visibility.
To launch the application, select InsightsQuantum-Safe Security or use the Strata Visions switcher (select
Quantum Resilience).
How It Works
The Quantum-Safe Security app processes telemetry from Next-Generation Firewalls
(NGFWs), Prisma Access, and other supported sources through the Strata Logging Service , the centralized
cloud-based repository for storing all the metadata collected by your sensors.
Primary sources of this data are SSL/TLS and SSH decryption logs, Traffic logs, and
Tunnel Inspection logs, which provide rich cryptographic metadata from decrypted and
undecrypted SSL/TLS sessions, SSH sessions, and VPN tunnels.
Your NGFWs and Prisma Access tenants act as distributed, agentless sensors across
your networks, inspecting traffic and extracting relevant cryptographic attributes
and context. Using the ingested data, the app discovers assets, identifies
cryptographic dependencies, and assesses quantum readiness and risk. This data
enables it to build a live cryptographic bill of materials (CBOM) with rich context
and provide actionable insights and specific recommendations.
Recommendations
Key Concepts
Cryptographic Risk
Quantum-Safe Security performs a risk assessment for each asset it discovers. By
analyzing cryptography usage from session, certificate, and tunnel telemetry in
aggregate, it categorizes each asset into one of three Cryptography Risk
categories:
- Data Exposure Risk—Identifies assets using legacy or deprecated algorithms that violate NIST and other compliance standards
- Harvest Now, Decrypt Later (HNDL) Risk—Identifies assets using classical algorithms that are vulnerable to future quantum computers, which may allow adversaries to harvest encrypted data today to decrypt later
- Quantum-Secure—Identifies assets already using NIST-approved PQC-compliant algorithms
This classification provides actionable intelligence to manage cryptographic risks
proactively and ensure business continuity. The Quantum-Safe Security app
continuously monitors cryptographic usage across the enterprise to ensure accuracy
of risk category and help you track effectiveness of mitigation actions.
The following table shows the fields that are checked to determine the
cryptography risk:
| Data Fields | Fields Checked |
|---|---|
| Sessions |
|
| Certificates |
|
| Tunnels |
|
Quantum Readiness
Quantum Readiness reflects the capability of an asset to support PQC, which depends
on its specific hardware and software attributes. An asset is Quantum
Ready when its underlying hardware or software
supports quantum-resistant algorithms, even if they are not in use. An asset is
Quantum Safe if its hardware or software actively uses PQC or hybrid PQC that
complies with NIST or other PQC standards.
While Quantum Readiness is a fixed attribute—an asset either has PQC capability or
not—your configuration plays a role in what state the asset is in. For example,
enabling PQC for SSL/TLS sessions ensures that quantum-ready assets use quantum-safe
sessions.
The following table shows which attributes Quantum-Safe Security checks to determine
Quantum Readiness for each asset class:
When asset context is lacking, it is not possible to give a
definite indication of Quantum Readiness. In that case, if a single PQC key exchange
is observed for that asset over the selected time period, it is inferred to be
Quantum Ready.
| Asset Class | Attributes Looked At |
|---|---|
| Application |
|
| User |
|
| Infrastructure |
|
| IoT Device |
|
If hardware is not PQC ready, then it will not be quantum-ready. The way to make it
quantum ready is to replace the hardware.
Cipher Translation Proxy
To secure legacy systems or IoT devices that cannot be upgraded, the app recommends
that you enable cipher translation. Cipher translation is
the process of intercepting network traffic secured with classical encryption (like
RSA or ECDHE) and re-encrypting it in real-time using quantum-safe algorithms (like
ML-KEM) at the network edge. Hybrid post-quantum (PQ) key exchange enables this
process.
NGFWs running PAN-OS 12.1 or later versions act as the inline proxy, upgrading the
security of sessions. Communications between the parties is secure as long as at
least one of the two mechanisms—classical or PQC—remains uncompromised. Cipher
translation protects against the Harvest Now, Decrypt Later threat, does not require
upgrades or other changes to the endpoint, and facilitates a gradual transition to
PQC without disrupting business operations.
Hybrid post-quantum (PQ) key exchange enables cipher translation. During a hybrid PQC
key exchange, parties (for example, a browser and an application) simultaneously
execute a traditional key exchange and a PQ key encapsulation mechanism (KEM). The
shared key resulting from the two exchanges combines to create a final session
key.
General Cipher Translation Workflow
The cipher translation process is as follows:
- Classical Negotiation—The client and server negotiate a standard classical TLS cipher suite.
- PAN-OS Intervention– An NGFW running PAN-OS 12.1 or later intercepts the communication through SSL Forward Proxy or SSL Inbound Inspection. Based on the settings in the decryption profiles and decryption policy rules, the NGFW injects PQC-based key material into the TLS handshake process to the client-side, server-side or both sessions
- Key Establishment—The final session key is derived from a combination of the classical key exchange and the quantum-safe key exchange.
- Secure Communication—The resulting TLS session is secured by a hybrid key that defends against both classical and quantum attacks.
Components
Overview
A dashboard summarizing the cryptographic health of your network for the
selected time duration. It provides a consolidated view of discovered assets and the
volume of data in transit, segmented by cryptographic risk and quantum readiness
status. You can also view the number of available recommendations for the
quantum-readiness status.
Dashboard Components
- Central Pie Chart—Shows the distribution of total volume of data in motion across each cryptographic risk.
- Left Arc— Shows the total number of assets detected in the time duration and the distribution across each type of asset.
- Right Arc—Shows the number of quantum-ready and quantum-safe assets and the number of recommendations available to move an asset to quantum safe or quantum ready. The right arc provides a shortcut to the specific recommendations in the inventory's recommendation panel.
- Weekly Impact Summary—Shows trends in the number of quantum-ready browsers, sessions with deprecated algorithms, cipher translation usage, and more.
Inventory
The inventory is your dynamic cryptographic bill of materials (CBOM). It provides a
complete view of your organization's cryptographic posture and compliance even as
your environment evolves. It catalogs applications, user devices, infrastructure,
and IoT devices across your organization along with their cryptographic dependencies
(such as keys, certificates, libraries, cipher suites, protocols) and enriches
assets with context such as hardware models, operating system, cryptographic library
versions, and browser versions, and telemetry, such as device owner. It also shows
cryptographic risk, quantum readiness, whether cipher translation is in use, and
other identifying details.
The Show Recommendations panel provides targeted
recommendations (for example, upgrade pathways) for specific asset types, risks, and
readiness. It also reports the number of impacted assets
The following sections outline how to customize your dashboard and inventory
views.
How To Use the Dashboard
Set the Time Range
Adjust the time range to identify newly discovered assets or analyze trends and
your cryptographic posture over different durations. historical auditing?
Available options include: Past 24 Hours, Past
7 Days, or Past 30 Days.
Filter by Asset Class
The dashboard transform itself shows data, insights and recommendations specific
to that asset class.
In the left arc, select All Assets,
Applications, User Devices,
Infrastructure, or IoT
Devices.
Investigate Cryptographic Risk
When viewing All Assets, click View
Details on a specific risk category. The pie chart becomes a
container with deeper insights such as the top contributors to that risk.
If you select a different asset class, then the dashboard transform to itself
shows data, insights and recommendations specific to that asset.
If you select a specific asset class (for example, IoT
Devices) and there is only one risk category represented, the dashboard shows
details such as number of tunnels detected.
Access Recommendations
In the right arc, under the Quantum Ready or Quantum Safe headers, select a
recommendation category (for example, Hardware
Recommendations). This directs you to the specific
recommendations in the recommendations panel in the inventory.
How To Use the Inventory
Set the
Time Range
Adjust the time range to identify newly discovered
assets or analyze trends and your cryptographic posture over different
durations. historical auditing? Available options include:
Past 24 Hours, Past 7 Days, or
Past 30 Days.
Filter Assets
Filter the inventory by
Type (for example, type of application),
Quantum Readiness, Cryptography
Risk, Cipher Translation or a combination
of filters. Available filters differ between asset types. For example, you might
filter assets by quantum readiness and cryptographic risk to prioritize them for
PQC migration. For example, to identify web applications ready for migration,
apply both the Type (select
Internet) and Quantum
Readiness (select Ready) filters.
- To apply filters:
- Click Add Filter.
- Select a filter, such as Quantum Readiness.
- Select filter values, such as Ready or Not Ready.
- (Optional) Add more filters.
- To clear filters, click Reset Filters.
- To find assets more readily, you can use the Search.
Customize your view and navigate between
pages of the inventory using the pagination and navigation settings
below.
- Assets per Page. To adjust the number of assets displayed on a single page of the screen, select a Page Size. Available options are: 10, 20, 50, 100.
- Navigation: Jump to a specific page by entering a Page number in the range or using the directional arrows.
Drill-down into Individual Assets
To open a detailed view of a
specific asset, click the Asset Name.
Explore Recommendations
- To view recommendations, click Show Recommendations, and then click Quantum Ready or Quantum Safe. Recommendations targeted to the goals of quantum readiness or quantum safety display.
- Hide Recommendations
- Search within recommendations using terms like "hardware" or "software".
What does the app show you?
In general, the Overview and Inventory show you cryptography is in use across your
enterprise, where vulnerabilities exist, and what actions to take. The app displays
the following information at both individual asset and aggregate levels.
- The cryptographic risk of assets
- Volume of data in transit that is vulnerable to data exposure and Harvest Now, Decrypt Later attacks
- Volume of quantum-secure data, protected against current and quantum threats
- Number of discovered applications, user devices, infrastructure, IoT devices
- Number of quantum-ready or quantum-safe assets
- Asset context and cryptographic dependencies, including operating system, detailed device attributes such as specific hardware models, cryptographic libraries in use (for example, deprecated OpenSSL versions), and browser versions
- Top risk contributors (for example, use of a specific TLS version)
- Weekly impact summary showing trends in the number of:
- Quantum-ready browsers
- Sessions with deprecated algorithms
- Cipher translation usage
- Remediation recommendations for upgrading or migrating assets in the following categories:
- Hardware
- Software
- Certificate compliance
- Data configuration
- Cipher translation
- Certificate validity
How can you use the data in the app?
Use the data from the Quantum-Safe Security app to strategically plan and execute the
transition to PQC. Here is a non-exhaustive list of ways to use app data:
- Assess your cryptographic posture
- Quickly identify and quantify vulnerability of architecture
- Identity assets/cryptography vulnerable to data exposure and Harvest Now, Decrypt Later (HDNL) risks
- Identify quantum-ready and quantum-safe assets
- Quantify assets that need remediation
- Identify weaknesses such as the use of outdated cipher suites or
- Identify top risk contributors such as deprecated cryptography and number of impacted assets
- How quantum ready is your cryptographic landscape
- Prioritize and remediate
- Identify how, if necessary, assets and cryptography can be updated or replaced
- Mitigate risk of future data exposure
- Prioritize mitigation based on risk assessment (For example, assets with long-lived, sensitive data have HNDL risk classification and can be moved to top of the migration queue)
- Develop a comprehensive remediation roadmap
- Identify specific policy rules or profiles that make sessions vulnerable.
- Identify infrastructure, applications, and other assets that can be upgraded to be cryptoagile, support PQC, etc.
- Identify invalid certificates
- Make action plan based on recommendations
- Set migration priorities based on risk assessment, criticality of asset, and other criteria
- (Coming soon) Automated cipher translation proxy and other remediation workflows
- Track compliance and progressThe inventory serves as the authoritative source for cryptographic governance, enabling continuous crypto-hygiene monitoring and compliance tracking as your environment evolves.
- Monitor quantum-ready and quantum-safe assets and risks
- Validate and track quantum-safe assets
- Demonstrate measurable progress toward Security Requirements for Cryptographic Modules (FIPS 140-3), Digital Operational Resilience Act (DORA), and other regulations and standards
- Build reports for stakeholders
- Help you establish and enforce quantum governance, for example policies, etc.
- Dedicate resources, set action plans for different teams
- Track effectiveness of mitigation actions