PATTERN Cited by 1 source
PQC migration ladder¶
Shape¶
Structure a multi-year PQC migration programme as a laddered set of reachable milestones rather than a single "migrated yes / no" binary. Each rung is a committable engineering scope with a clear deliverable, and each rung permanently reduces the organisation's time to react to a relevant quantum event.
Meta's five-rung ladder (PQC Migration Levels):
PQ-Unaware → PQ-Aware → PQ-Ready → PQ-Hardened → PQ-Enabled
no awareness assessed implemented all available fully
not enabled protections protected
deployed
(Source: sources/2026-04-16-meta-post-quantum-cryptography-migration-at-meta-framework-lesson)
The pattern's core commitment¶
Organisations planning a PQC migration encounter the same project-management problem: the full end state is multi-year, depends on external actors, and requires cross-org engineering. Committing to "fully PQ-Enabled by date X" is often unrealistic; committing to "no change until we can do it all" leaves the organisation at PQ-Unaware indefinitely. The ladder pattern resolves this:
- Each rung has a scoped engineering commitment that can be budgeted independently.
- Each rung reduces reaction time by a known amount, providing a concrete security benefit at that commitment level.
- The ladder has no intrinsic end-state coupling — different use cases can be at different rungs simultaneously.
Why laddered structure wins¶
1. Budget alignment¶
"Companies that may not have budgeted for near-term enablement can feel motivated (and rewarded) for building the necessary building blocks to complete risk mitigation in the future." (Source: this post)
The ladder lets budget conversations happen at each rung:
- "We can commit $X to reach PQ-Ready this budget cycle" delivers tangible risk reduction even without full enablement.
- "PQ-Enabled requires Y more spend over Z years" is the follow-on conversation, not a one-shot yes-or-no.
2. Reachable intermediate milestones¶
PQ-Aware (initial assessment) is a scoped research project, not an engineering project. Moving from PQ-Unaware to PQ-Aware is typically weeks of work for a small security/cryptography team.
PQ-Ready (implemented but not enabled) is a coding project with testing — but no service-disrupting deployment. Suitable for teams who can't commit to the user-facing-risk of enablement.
PQ-Hardened (all available protections enabled) is a deployment project — requires coordination with SRE, user-facing rollout, monitoring.
PQ-Enabled (full protection) requires the external dependencies to land.
3. External-dependency handling¶
Some use cases cannot reach PQ-Enabled until external actors deliver (NIST standards, HSM support, library implementations — see patterns/third-party-dependency-quantum-assessment). The ladder handles this gracefully: such use cases can reach PQ-Hardened or PQ-Ready and sit there until the dependency lands. No "stuck" state; the migration programme still makes progress.
4. Portfolio view¶
Large organisations have thousands of use cases at different risk tiers. The ladder allows a portfolio roadmap:
| Priority × Level matrix | PQ-Unaware | PQ-Aware | PQ-Ready | PQ-Hardened | PQ-Enabled |
|---|---|---|---|---|---|
| High (HNDL-vulnerable) | STOP | Drive up | Drive up | Drive up | ✓ |
| Medium (online signatures) | Drive up | Drive up | Drive up | Drive up | ✓ |
| Low (Grover-only) | Acceptable near-term | Track | Track | Track | ✓ |
Combined with PQC prioritisation framework, this is the full programme roadmap artefact.
Implementation playbook¶
- Establish crypto inventory — needed to identify use cases and their primitive usage. PQ-Aware is defined as "completed an initial assessment" which is structurally an inventory operation.
- Classify use cases by the prioritisation framework (High / Medium / Low + dependency / patching status).
- Assign each use case a target rung for the current budget cycle.
- Commit engineering resources to rung-crossing work.
- Track external dependencies for use cases blocked below the full PQ-Enabled target.
- Re-assess regularly — standards publications, cryptanalytic advances, and CRQC-capability news all shift the landscape. Each "relevant quantum event" triggers a re-plan.
- Maintain dashboards of use-case rung distribution. A programme that has zero use cases at PQ-Unaware and most at PQ-Hardened is meaningfully defensible even before full PQ-Enabled rollout.
What it's not¶
- Not a substitute for PQ-Enabled. The ladder is a path, not an end state. PQ-Hardened and below are acknowledgements that organisations can't enable everywhere simultaneously, not statements that they shouldn't try.
- Not an excuse to stop at PQ-Ready. "This is not a desirable end goal given the fact it is not yet protecting the use case against quantum attacks." (Source: this post)
- Not purely defensive. Moving up rungs has a positive operational effect (reaction time, attacker cost) beyond the compliance framing.
Seen in¶
- sources/2026-04-16-meta-post-quantum-cryptography-migration-at-meta-framework-lesson — canonical introduction of the laddered framework. Meta proposes it as transferable practical guidance: "We're proposing the idea of PQC Migration Levels to help teams within organizations manage the complexity of PQC migration for their various use cases."
Related¶
- concepts/pqc-migration-levels — the five-rung ladder itself.
- concepts/time-to-react-to-quantum-event — the metric organising the ladder.
- concepts/pqc-prioritization-framework — the complementary sequencing framework.
- concepts/post-quantum-cryptography — the umbrella concept.
- companies/meta — the pattern originator.