Cryptographic Inventory Template

Interactive Tool: Use this online template to inventory your organization's cryptographic assets. You can add, edit, and remove entries directly in the browser. Your data is stored locally on your device and is not transmitted to our servers.

Cryptographic Asset Inventory

A comprehensive inventory of cryptographic assets is the first critical step in preparing your organization for the quantum computing era. This interactive template helps you catalog all systems, applications, and data that rely on cryptographic protection.

Instructions

  1. Use the form below to add cryptographic assets to your inventory
  2. For each asset, provide details about the algorithms used, data sensitivity, and other relevant information
  3. Prioritize assets based on quantum risk factors
  4. Export your completed inventory for use in your quantum readiness planning
Add New Cryptographic Asset
Cryptographic Asset Inventory
Asset Name Type Crypto Use Algorithm Data Lifespan Sensitivity Update Difficulty Quantum Risk Actions

Your inventory is empty. Add assets using the form above.

Important: This is a client-side tool that stores data in your browser's local storage. For a more comprehensive solution with cloud storage, data sharing, and advanced analytics, please contact us about our enterprise cryptographic inventory management system.

Risk Assessment Guidelines

Use these guidelines to help determine the quantum risk level for each asset:

Risk Level Criteria Recommended Action
Low
  • Uses quantum-resistant algorithms (e.g., AES-256, SHA-3)
  • Short data lifespan (< 1 year)
  • Low data sensitivity
Monitor developments in PQC standards
Medium
  • Uses vulnerable algorithms but with medium data lifespan (1-5 years)
  • Medium data sensitivity
  • Moderate update difficulty
Plan for migration within 1-2 years
High
  • Uses vulnerable algorithms (RSA, ECC, etc.)
  • Long data lifespan (5-10 years)
  • High data sensitivity
Begin migration planning immediately
Critical
  • Uses vulnerable algorithms
  • Very long data lifespan (10+ years)
  • Critical data sensitivity
  • Difficult to update
Immediate action required; implement hybrid solutions