How to Prepare for the NCSC’s Post-Quantum Cryptography Migration Timelines

Post-quantum timeline

The arrival of post-quantum cryptography (PQC) is no longer a theoretical concern, it’s a strategic imperative for businesses across the globe. The UK’s National Cyber Security Centre (NCSC) recently issued updated guidance that underscores the urgency for all organisations, particularly those operating critical infrastructure or bespoke IT systems, to begin their migration to PQC today.

The timelines are clear:

  • 2028: You should have completed a full discovery of your cryptographic estate and defined your migration goals
  • 2035: The journey to post-quantum readiness should be complete.

At FullProxy, we believe this isn’t just about cryptography. It’s a catalyst to rethink and uplift your entire cyber security posture and certificate lifecycle management is a key component of this.

Quantum computers will eventually break many of the public key cryptographic algorithms we rely on today. That puts every encrypted connection (past, present, and future) at risk.

Post-Quantum Cryptography Migration: A Complex Challenge but A Strategic Opportunity

Quantum computers will eventually break many of the public key cryptographic algorithms we rely on today. That puts every encrypted connection (past, present, and future) at risk. However, while the technology to break encryption isn’t here yet, data theft is already happening. Bad actors are stealing encrypted data now to decrypt it later, once quantum capabilities emerge.

That’s why the NCSC’s phased approach to PQC migration is both welcome and pragmatic. It encourages early discovery and most importantly, incremental, manageable action. This mirrors what we see on the ground at FullProxy: the best security strategies are those that evolve with your infrastructure, not those that try to reinvent it overnight.

The Role of Certificate Lifecycle Management

A frequently overlooked but foundational component of PQC readiness is your approach to digital certificates. Most enterprises already rely on Public Key Infrastructure (PKI) to issue and manage certificates for users, devices, and applications. But PQC migration will require a new root of trust and the issuance of quantum-resistant certificates – potentially to every machine in your environment.

This shift demands automation.

Manual certificate management is already a source of risk – expired certificates cause outages, while weak or misconfigured certs can open doors to attackers. Now layer in the need to track which certificates are quantum-safe, and you have a situation that’s not just unsustainable, it’s dangerous.

That’s why FullProxy strongly advocates for automated certificate lifecycle management. Automation enables faster rotation, broader visibility, and more agile response to emerging threats. And in a post-quantum world, where certificate agility could determine whether a business stays secure or becomes vulnerable, shorter lifecycles and automated renewal processes won’t just be nice to have, they’ll be essential.

Read more about our Certificate Management Services

Automation enables faster rotation, broader visibility, and more agile response to emerging threats. And in a post-quantum world, where certificate agility could determine whether a business stays secure or becomes vulnerable, shorter lifecycles and automated renewal processes won’t just be nice to have, they’ll be essential.

Act Now, Not Later

The NCSC is clear; most of the work required to prepare for PQC overlaps with best practices in cyber resilience. That includes asset discovery, cryptographic analysis, and yes, certificate lifecycle management. These aren’t abstract compliance tasks, they’re proactive steps that reduce risk today, and future-proof your organisation for tomorrow’s challenges.

If you haven’t started planning your PQC migration yet, the time is now. And if you’re unsure where to begin, focus on certificates. They’re one of the most direct, actionable areas where you can begin strengthening your security posture while laying the groundwork for quantum resistance.

At FullProxy, we’re here to help organisations make that leap safely, efficiently, and strategically. Because in a world where quantum threats are on the horizon, the best defence starts with readiness today.

 

Chris Templeton
Chief Technology Officer
With cloud services becoming increasingly easy to procure, software developers have flocked to them quickly for a range of reasons. Whether this is to unlock productivity, access on-demand innovation, or accelerate releases, the benefits of shifting to cloud networking are quite clear. After this, developers discovered the additional capabilities of another cloud provider and started using that one, too. This rapidly resulted in: 
The recent CA/Browser Forum meeting revealed significant changes to Apple's certificate lifecycles, and they seem to be following Google’s lead. With a proposal to reduce TLS validity periods to just 45 days by 2027, this adjustment to Apple's certificate lifecycles has sparked even more anxious discussion among IT professionals – yes, it’s frustrating, but it’s also important. 
The debate has been raging for years. Which is the superior application delivery controller (ADC), F5 BIG-IP or Citrix NetScaler?
Certificate management has become a higher profile challenge recently thanks to Google’s well publicised intention to reduce certificate lifespans, acceptable for use in its popular browser Chrome, to a maximum of 90 days.

Want to be in the know?

We’ve got decades of experience installing. configuring and optimising advanced security solutions for private & public sector organisations with complex security & compliance needs.