New: NIST PQC standards finalized — your transition clock is ticking. Read what this means for your enterprise →
NIST PQCML-KEMML-DSAcomplianceenterprise transitionregulated industries

NIST PQC Standards Finalized: What Regulated Enterprises Must Do Now

NIST's ML-KEM, ML-DSA, and SLH-DSA are now final. Here's what banking, healthcare, and critical infrastructure organizations must do to meet the 2030 compliance deadline — and why waiting is no longer an option.

Quantizant Team · · 10 min read

NIST Has Spoken. Now What?

In August 2024, NIST published FIPS 203, 204, and 205 — the first final post-quantum cryptographic standards. After an eight-year standardization process, the algorithms are no longer experimental. They are the new baseline for federal information security, and regulated industries are expected to follow.

For most enterprise security teams, this creates an immediate problem: they don’t know their cryptographic attack surface. You cannot transition what you cannot find.

This post is a practical guide for CISO teams in regulated sectors — banking, healthcare, defense contractors, and critical infrastructure operators — on what the standards mean, what the regulators are saying, and what to do in the next 90 days.


The Three Final Algorithms

ML-KEM (FIPS 203) — Your New Key Exchange Mechanism

Replace RSA-OAEP and ECDH (including X25519 and P-256) with ML-KEM for key encapsulation. This is the highest-priority transition because TLS key exchange is where HNDL (Harvest Now, Decrypt Later) exposure is greatest.

Immediate action: Enable hybrid X25519MLKEM768 on all public-facing TLS endpoints. This is supported in:

  • Chrome 124+ / Firefox 128+ (already enabled by default)
  • OpenSSL 3.3+ (with OQS provider)
  • BoringSSL (Google’s TLS library — used in Android, Chromium)
  • AWS, GCP, and Cloudflare load balancers (now in GA)

ML-DSA (FIPS 204) — Your New Signing Algorithm

Replace RSA-PSS and ECDSA with ML-DSA for digital signatures. This affects:

  • Code signing and software supply chain integrity
  • Document and contract signing
  • JWT / JOSE tokens (where signature algorithm matters)
  • Certificate issuance (your internal CA)
  • SSH host keys

SLH-DSA (FIPS 205) — Long-Term Signature Assurance

SLH-DSA is the conservative, hash-based option. Its security relies only on the collision-resistance of the underlying hash function — not on lattice problems. Choose SLH-DSA where you need:

  • Very long-term signature verifiability (10+ years)
  • Post-quantum security without lattice assumptions (defense-in-depth)
  • Firmware signing for embedded systems and HSMs

What Regulators Are Saying

United States

The NSA’s Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) sets hard timelines for defense contractors and national security systems:

  • 2025: New systems should support PQC algorithms
  • 2030: Legacy classical-only algorithms must be disabled

CISA has issued joint advisories with NSA and NIST urging critical infrastructure operators to begin transition immediately.

The OMB has required all federal agencies to complete PQC transition inventories and submit plans.

Banking & Financial Services

MAS TRM 2024 (Monetary Authority of Singapore Technology Risk Management guidelines) explicitly references post-quantum cryptography readiness under Section 6 (Cryptography Controls). MAS-regulated financial institutions are expected to:

  • Maintain a cryptographic asset inventory
  • Document exposure to quantum-vulnerable algorithms
  • Have a documented transition roadmap

DORA (EU Digital Operational Resilience Act, enforced January 2025) requires financial entities to maintain ICT risk management frameworks that include cryptographic controls — and the EBA/ESA joint committee has flagged PQC as an emerging systemic risk.

PCI DSS v4.0 has added requirements for cryptographic agility — the ability to swap algorithms without application redesign.

Healthcare

HIPAA requires “reasonable and appropriate” safeguards. Given published HNDL guidance from HHS and CISA, any organization that hasn’t initiated a PQC review may be unable to demonstrate reasonable safeguards by 2027.


The Inventory Problem: Why Most Enterprises Are Blind

Ask any enterprise security team how many cryptographic assets they have. Very few can answer.

A 2025 Ponemon Institute study found:

  • 47% of security teams have no cryptographic asset inventory
  • 68% rely on manual processes (spreadsheets, ad-hoc audits)
  • The average enterprise has over 10,000 cryptographic assets spread across code, infrastructure, and cloud

Manual crypto discovery doesn’t scale. You need automated tooling that can:

  • Scan source code across multiple languages for crypto API usage patterns
  • Analyze dependency trees for embedded crypto libraries
  • Query cloud KMS for key algorithm metadata
  • Probe TLS/SSH endpoints for cipher suite and key exchange support
  • Scan IaC files for crypto misconfigurations

This is exactly what qtz-discovery-cli does — and it outputs a CycloneDX CBOM (Cryptographic Bill of Materials) that gives you an auditable, machine-readable record of every cryptographic asset.


A 90-Day Action Plan

Here is a concrete starting point for any regulated enterprise:

Days 1–30: Discover

# 1. Install the CLI
brew install quantizant/tap/qtz-discovery-cli

# 2. Scan your primary codebase
qtz-discovery-cli scan source ./src \
  --format cbom \
  --output cbom-initial.json \
  --show-score

# 3. Scan public-facing TLS endpoints
qtz-discovery-cli scan network \
  api.yourcompany.com:443 \
  auth.yourcompany.com:443 \
  vpn.yourcompany.com:443

# 4. Inventory AWS KMS
qtz-discovery-cli scan infra --provider aws --region us-east-1

# 5. Scan IaC
qtz-discovery-cli scan iac ./terraform

Output: A complete CBOM and a transition readiness score. This is your baseline for compliance reporting.

Days 31–60: Prioritize

Feed the CBOM into the Quantizant portal for AI risk scoring. The portal generates a prioritized transition roadmap based on:

  • HNDL exposure (internet-facing endpoints using RSA/ECDH key exchange)
  • Data sensitivity (which systems handle PHI, PII, financial data)
  • Remediation complexity (library upgrade vs. algorithmic redesign)
  • Regulatory deadline alignment

Days 61–90: Begin Hybrid Transition

Start with the highest-HNDL-exposure endpoints:

  1. Enable X25519MLKEM768 hybrid key exchange on all TLS termination points (nginx, Cloudflare, AWS ALB)
  2. Upgrade to OpenSSL 3.3+ or BoringSSL with PQC support
  3. Rotate the highest-risk KMS keys to PQC-capable algorithms where your provider supports it

Cryptographic Agility: The Right Architecture

The organizations that will transition smoothly are those that designed for cryptographic agility — the ability to swap algorithms without touching application code. Key principles:

  1. Abstract crypto operations — Never hardcode algorithm names. Use configuration-driven crypto selection.
  2. Centralize key management — If every service manages its own keys, you have a transition nightmare. Use a central KMS.
  3. Negotiate algorithms at runtime — TLS already does this; apply the same principle to application-level crypto.
  4. Audit logging — Every cryptographic operation should be logged with algorithm metadata. You cannot report compliance on what you cannot observe.

The Quantizant sidecar proxy implements cryptographic agility as infrastructure — a zero-code-change transition path for TLS and application-level crypto.


The Compliance Timeline

DateMilestone
2024NIST FIPS 203/204/205 published
2025NSA CNSA 2.0 adoption deadline for new systems
2025DORA enforcement begins for EU financial entities
2026MAS TRM audit cycle includes PQC maturity questions
2027Expected browser/OS deprecation of classical-only TLS
2028NIST recommends completing transition of highest-risk systems
2030NIST deadline: all classical-vulnerable algorithms must be disabled

What To Do Today

  1. Download qtz-discovery-cli and run your first crypto scan — it takes under 10 minutes to get a CBOM and readiness score.
  2. Brief your CISO and board — frame this as a compliance initiative with a hard 2030 regulatory deadline and a live HNDL threat.
  3. Assign a crypto transition owner — this cannot live in a backlog. It needs a named DRI with budget authority.
  4. Get your baseline CBOM into version control — treat it like your SBOMs. Every release should update it.

The organizations that will meet the 2030 deadline without panic are the ones that started their inventory in 2025 and 2026. That window is now.


Start your cryptographic inventory in minutes with qtz-discovery-cli. For enterprise-scale transition planning, sign in to the Quantizant portal.