/Assessment
Phase 1 — Discovery

Cryptographic Assessment

Comprehensive inventory and risk-based prioritization of all cryptographic assets across your organization, following Mosca's Theorem for threat timeline analysis.

PriorityAsset NameDomainCurrent AlgorithmRisk LevelStatus
P1Production PostgreSQL ClusterData at RestAES-256-CBCHigh
pending
P3S3 Backup ArchivesData at RestAES-256-GCMMedium
pending
P1Primary TLS Load BalancerData in TransitECDHE-RSA-AES256Critical
in-progress
P2Internal API GatewayData in TransitTLS 1.2 RSAHigh
in-progress
P1VPN Concentrator (IKEv2)Data in TransitRSA-2048Critical
pending
P1Corporate PKI Root CAAuthenticationRSA-4096 SHA-256Critical
planning
P2SAML Federation (Okta)AuthenticationRSA-2048High
pending
P2Code Signing PipelineDigital SignaturesRSA-2048 SHA-256High
pending
P3Document Signing ServiceDigital SignaturesECDSA P-256Medium
pending
P1Thales Luna HSM ClusterKey ManagementRSA-2048Critical
planning
P3AWS KMS IntegrationKey ManagementAES-256Medium
pending
P3Email Transport (SMTP TLS)Data in TransitTLS 1.2 RSAMedium
pending