ISACA’s Quantum Readiness guidance supports organizations in integrating quantum risk considerations into their GRC framework. It focuses on governance alignment, identifying cryptographic vulnerabilities, and preparing mitigation strategies to ensure long-term resilience against quantum threats.
Ensuring that IT risk management; including quantum risk; is integrated with enterprise risk management and that risk decisions are aligned with business objectives.
Define the organization's quantum risk culture; vision; and mandate for IT risk management; ensuring alignment with overall enterprise strategy and PQC transition goals.
Ensure that quantum-specific IT risk management processes are fully integrated with the organization's broader Enterprise Risk Management (ERM) framework.
Establish and communicate clear risk appetite and tolerance levels for quantum-related IT risks; approved by relevant stakeholders and aligned with 'Q-Day' timelines.
Clearly define and assign roles; responsibilities; and authorities for quantum IT risk management activities; including a quantum readiness task force and quantum risk lead.
Implement effective communication and reporting mechanisms to ensure relevant quantum risk information is shared with stakeholders; including executive briefings and staff training.
The systematic process of identifying; analyzing; and prioritizing quantum-related IT risks; including assessing the likelihood and impact of post-quantum cryptographic (PQC) threats.
Gather relevant and sufficient data to support comprehensive quantum IT risk identification and assessment activities.
Catalog all systems and applications using cryptography (e.g.; RSA; ECC); classify data by sensitivity; and assign retention periods.
Collect and analyze current and emerging threat intelligence related to quantum computing capabilities and cryptographic breakthroughs.
Identify internal and external vulnerabilities in existing cryptographic implementations susceptible to quantum attacks.
Analyze past cryptographic incidents; weaknesses; and near-misses to identify patterns and lessons learned relevant to quantum resilience.
Conduct thorough analysis of identified quantum risks to determine their potential likelihood and impact on business objectives and data confidentiality.
Assess the qualitative likelihood of quantum risk events occurring based on quantum computing advancement forecasts and expert judgment.
Estimate the qualitative impact of potential quantum attacks (e.g.; 'harvest now; decrypt later') on confidentiality; integrity; availability; and business operations.
Where feasible; quantify the potential financial impact (e.g.; revenue loss; regulatory fines; reputational damage; recovery costs) of high-priority quantum risk scenarios.
For quantitative assessments; determine or model probability distributions for 'Q-Day' (when quantum computers can break current encryption) and related attack scenarios.
Utilize Monte Carlo simulations or other quantitative techniques to model aggregated quantum risk exposure and potential losses over time.
Analyze interdependencies between different IT systems and their cryptographic components; and their cascading effects in a post-quantum world.
Calculate data sensitivity (x); migration time (y); and collapse time (z - Q-Day forecast) to prioritize assets where x+y>z.
Develop and maintain a current IT risk profile that consolidates all identified and assessed quantum-related risks.
Prioritize quantum risks based on their assessed likelihood; impact; and alignment with quantum risk appetite.
Maintain a comprehensive and up-to-date quantum risk register that documents all relevant risk information; including asset; scenario; x; y; z; SLE; ARO; and ALE.
Regularly review and update the quantum IT risk profile to reflect changes in quantum computing advancements; threats; vulnerabilities; and NIST PQC standards.
Implementing appropriate actions to address quantum IT risks; including post-quantum cryptography (PQC) migration; acceptance; transfer; or avoidance.
Clearly and concisely communicate identified quantum IT risks and their potential implications to relevant stakeholders; emphasizing urgency and strategic importance.
Develop and implement appropriate quantum risk response plans to mitigate; accept; transfer; or avoid quantum-related IT risks.
Evaluate and select the most appropriate quantum risk response options (e.g.; PQC migration; hybrid encryption; quantum-safe solutions) based on risk assessment results and cost-benefit analysis.
Develop and implement detailed plans for treating identified quantum risks; including PQC algorithm integration; cryptographic agility; and secure key management.
Continuously monitor the effectiveness of implemented quantum-safe controls and PQC migration plans; including cryptographic agility assessments.
Establish processes for timely reaction to quantum IT risk events and incidents; including response to cryptographic breaches and post-incident review for quantum preparedness.