How to Prepare for the NCSC’s Post-Quantum Cryptography Migration Timelines

The arrival of post-quantum cryptography (PQC) is no longer a theoretical concern, it’s a strategic imperative for businesses across the globe.

Post-quantum timeline

The UK’s National Cyber Security Centre (NCSC) recently issued updated guidance that underscores the urgency for all organisations, particularly those operating critical infrastructure or bespoke IT systems, to begin their migration to PQC today.

The timelines are clear:

  • 2028: You should have completed a full discovery of your cryptographic estate and defined your migration goals
  • 2035: The journey to post-quantum readiness should be complete.

At FullProxy, we believe this isn’t just about cryptography. It’s a catalyst to rethink and uplift your entire cyber security posture and certificate lifecycle management is a key component of this.

Quantum computers will eventually break many of the public key cryptographic algorithms we rely on today. That puts every encrypted connection (past, present, and future) at risk.

Post-Quantum Cryptography Migration: A Complex Challenge but a Strategic Opportunity

Quantum computers will eventually break many of the public key cryptographic algorithms we rely on today. That puts every encrypted connection (past, present, and future) at risk. However, while the technology to break encryption isn’t here yet, data theft is already happening. Bad actors are stealing encrypted data now to decrypt it later, once quantum capabilities emerge.

That’s why the NCSC’s phased approach to PQC migration is both welcome and pragmatic. It encourages early discovery and most importantly, incremental, manageable action. This mirrors what we see on the ground at FullProxy: the best security strategies are those that evolve with your infrastructure, not those that try to reinvent it overnight.

 

The Role of Certificate Lifecycle Management

A frequently overlooked but foundational component of PQC readiness is your approach to digital certificates. Most enterprises already rely on Public Key Infrastructure (PKI) to issue and manage certificates for users, devices, and applications. But PQC migration will require a new root of trust and the issuance of quantum-resistant certificates – potentially to every machine in your environment.

This shift demands automation.

Manual certificate management is already a source of risk – expired certificates cause outages, while weak or misconfigured certs can open doors to attackers. Now layer in the need to track which certificates are quantum-safe, and you have a situation that’s not just unsustainable, it’s dangerous.

That’s why FullProxy strongly advocates for automated certificate lifecycle management. Automation enables faster rotation, broader visibility, and more agile response to emerging threats. And in a post-quantum world, where certificate agility could determine whether a business stays secure or becomes vulnerable, shorter lifecycles and automated renewal processes won’t just be nice to have, they’ll be essential.

Read more about our Certificate Management Services

Automation enables faster rotation, broader visibility, and more agile response to emerging threats. And in a post-quantum world, where certificate agility could determine whether a business stays secure or becomes vulnerable, shorter lifecycles and automated renewal processes won’t just be nice to have, they’ll be essential.

Act Now, Not Later

The NCSC is clear; most of the work required to prepare for PQC overlaps with best practices in cyber resilience. That includes asset discovery, cryptographic analysis, and yes, certificate lifecycle management. These aren’t abstract compliance tasks, they’re proactive steps that reduce risk today, and future-proof your organisation for tomorrow’s challenges.

If you haven’t started planning your PQC migration yet, the time is now. And if you’re unsure where to begin, focus on certificates. They’re one of the most direct, actionable areas where you can begin strengthening your security posture while laying the groundwork for quantum resistance.

At FullProxy, we’re here to help organisations make that leap safely, efficiently, and strategically. Because in a world where quantum threats are on the horizon, the best defence starts with readiness today.

About the Author

Chris Templeton
Chief Technology Officer
Chris drives FullProxy’s technical strategy, applying vast infrastructure expertise to engineer secure, resilient systems with clarity, precision, and energy.
When sufficiently powerful machines arrive, today’s encryption standards - RSA, ECC, and others - will be rendered obsolete. The UK’s National Cyber Security Centre (NCSC) has already set a 2028 milestone for all of us to complete cryptographic inventories and prepare for post-quantum migration. For many, one of the most strategic steps towards quantum resilience is already on the roadmap for F5 customers: upgrading from iSeries to rSeries.
Crypto-agility is your organisation’s ability to quickly adapt to new cryptographic standards without disrupting business operations. Today, most organisations rely on fixed algorithms like RSA or ECC.
The threat posed by future quantum computers is no longer theoretical. When these machines arrive (or sooner) today’s encryption systems will be at risk, as quantum algorithms such as Shor’s could break widely used public-key schemes. Experts speak of a looming “Q-Day”, and the UK’s National Cyber Security Centre (NCSC) has set out a clear, phased PQC roadmap we should all act on now.

Want to be in the know?

We’ve got decades of experience installing. configuring and optimising advanced security solutions for private & public sector organisations with complex security & compliance needs.