Skip to content
arrow_back
search
ISM-2073 policy ASD Information Security Manual (ISM)

Develop a Post-Quantum Cryptography Transition Plan

Create and maintain a plan to move to cryptographic methods that are secure against quantum computing threats.

record_voice_over

Plain language

This control is about preparing your organisation to handle future threats from super-powerful computers called quantum computers. Right now, the way we scramble sensitive information might become vulnerable to these new computers, so we need a plan to start using stronger methods. If we don't do this, confidential information like customer data or trade secrets could be at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A post-quantum cryptography transition plan is developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-2073
priority_high

Why it matters

Without a post-quantum transition plan, systems may retain vulnerable crypto and allow harvest-now-decrypt-later exposure, causing breaches and loss of trust.

settings

Operational notes

Maintain a PQC transition plan by inventorying crypto, prioritising high-value/long-life data, tracking standards, and scheduling migration milestones and owners.

Mapping detail

Mapping

Direction

Controls