Skip to content

The Cryptographic Maturity Model

Audience: CISOs, CIOs, Enterprise Architects, transformation leads

Reading time: 18 minutes

Prerequisites: The Cryptographic Control Plane recommended


Purpose

Organizations differ significantly in how cryptography is implemented, governed, and evolved across their technology environments. Some still rely on cryptographic mechanisms embedded directly within application code, while others have introduced centralized key management, policy governance, and lifecycle management capabilities.

The Cryptographic Maturity Model is a diagnostic framework that:

  1. Helps organizations understand their current position on the path toward governed cryptographic infrastructure
  2. Defines what capabilities are required to advance from one level to the next
  3. Provides a roadmap for cryptographic transformation that aligns with the post-quantum transition

Two principles underpin the model

Maturity is measured by capability, not by legacy migration progress. What matters is what the organization can do today in response to a vulnerability, a standard change, or an algorithm deprecation. A legacy estate in active migration does not reduce the maturity level — it represents work in progress, not a deficit of capability.

Post-quantum cryptography is not a separate level. It is a dimension that improves at every level, and that can begin to be adopted from the moment the organization deploys a Cryptographic Control Plane. Rather than representing discrete technical deployments, the levels provide a diagnostic frame that helps organizations understand where they stand and what capabilities they need to develop next.


The five levels

flowchart LR
    L1["Level 1<br/>Embedded<br/>Cryptography"]
    L2["Level 2<br/>Managed<br/>Cryptography"]
    L3["Level 3<br/>Cryptographic<br/>Control Plane"]
    L4["Level 4<br/>Cryptographic<br/>Agility"]
    L5["Level 5<br/>Optimized<br/>Cryptography"]

    L1 --> L2 --> L3 --> L4 --> L5

    style L1 fill:#fadbd8,stroke:#c0392b
    style L2 fill:#fdebd0,stroke:#d68910
    style L3 fill:#fcf3cf,stroke:#d4ac0d,stroke-width:3px
    style L4 fill:#d6eaf8,stroke:#2980b9
    style L5 fill:#d5f5e3,stroke:#1e8449,stroke-width:3px

Level 3 is the structural inflection point. Level 5 is the strategic target.

Level Name Capability
1 Embedded Cryptography Algorithms hardcoded in applications
2 Managed Cryptography Centralized key management; algorithms still hardcoded
3 Cryptographic Control Plane Algorithms governed by infrastructure, not code
4 Cryptographic Agility Control Plane covers critical applications and most of the brownfield estate
5 Optimized Cryptography All cryptography governed by policy; vulnerability response in hours

Level 1 — Embedded Cryptography

At this level, cryptographic logic is embedded directly within application code. Developers select algorithms, libraries, and parameters during implementation, and these decisions become tightly coupled with the application itself.

Common characteristics:

  • Algorithm selection embedded in code
  • Cryptographic libraries directly invoked by applications
  • Inconsistent implementations across systems
  • Limited visibility into where cryptography is used
  • Manual upgrades when vulnerabilities emerge

Why this perpetuates itself. New applications are built with the same embedded patterns as legacy systems, because there is no architectural discipline or policy requiring otherwise. The cryptographic debt grows with every new deployment.

PQC at this level. Absent or isolated. If a team adopts a PQC algorithm, it is hardcoded into that application just as any classical algorithm would be — solving nothing at the structural level.

The transition out of Level 1 begins with a decision, not a project. The organization must commit to stopping the accumulation of new debt, even before resolving the existing debt. That commitment is the greenfield policy — and it can be established immediately at any subsequent level.


Level 2 — Managed Cryptography

At this level, organizations introduce centralized components that improve the management of cryptographic assets. This typically includes hardware security modules (HSMs), key management systems (KMS), certificate management platforms, and centralized key lifecycle management.

These technologies significantly improve the protection and governance of cryptographic keys. However, the structural problem remains: cryptographic logic is still embedded within application code.

The defining limitation: the KMS governs where keys are stored. It does not govern which algorithms are used, how cryptographic policies are enforced, or how algorithm transitions are orchestrated. Cryptographic upgrades still require modifications across multiple systems.

Level 2 is the earliest point at which the greenfield policy should be established. A formal commitment that all new applications developed from this point forward will not embed cryptographic logic directly, but will instead consume cryptographic services through an abstraction layer. This policy does not resolve existing technical debt — but it stops its accumulation.

PQC at this level. Can be introduced into the key management layer — PQC keys can be stored and rotated in the HSM or KMS — but algorithm governance remains per-application, making enterprise-wide PQC adoption uncoordinated and ungoverned.


Level 3 — Cryptographic Control Plane

Level 3 represents the structural inflection point of the maturity model. The organization deploys a Cryptographic Control Plane: a dedicated infrastructure layer that decouples cryptographic behavior from application code and centralizes its governance.

This is not an incremental improvement over Level 2. It is an architectural change that fundamentally alters the organization's capacity to govern, adapt, and respond.

The capability that defines Level 3 is not the existence of a cryptographic inventory — it is the ability to act on cryptographic policy without modifying or redeploying applications.

flowchart TB
    GREEN["🌱 New systems<br/>(greenfield)"]
    BROWN["🏗️ Legacy systems<br/>(brownfield)"]

    CCP["🏛️ Cryptographic<br/>Control Plane"]

    POL_GREEN["✅ Policy-governed<br/>from day one"]
    DISC["🔍 Discovery and<br/>phased migration"]

    GREEN --> CCP
    CCP --> POL_GREEN

    BROWN --> DISC
    DISC --> CCP

    style CCP fill:#fcf3cf,stroke:#d4ac0d,stroke-width:3px
    style GREEN fill:#d5f5e3,stroke:#1e8449
    style BROWN fill:#fdebd0,stroke:#d68910
    style POL_GREEN fill:#d5f5e3,stroke:#1e8449
    style DISC fill:#d6eaf8,stroke:#2980b9

From the moment the Control Plane is operational, all new systems are built without embedded cryptographic logic. They express cryptographic intent through a standardized service interface, and the Control Plane enforces the corresponding policy. Post-quantum algorithms become the default for all new applications immediately — not as an engineering project but as a policy decision.

For the existing legacy landscape, the Control Plane initiates a parallel process: discovery and phased migration. The brownfield estate is inventoried, systems are prioritized by PQC exposure and data sensitivity, and migration proceeds in structured phases.

The dual state at Level 3. Systems not yet migrated remain constrained by their embedded implementations — but they are no longer representative of the organization's current capability. The organization can already respond to a vulnerability in any governed system in hours. The legacy backlog is work in progress, not a measure of maturity.

Discovery is applied to the past. The Control Plane governs the future.


Level 4 — Cryptographic Agility

At Level 4, the Cryptographic Control Plane has been operational for a significant period and its coverage has expanded substantially across the enterprise landscape. The focus has shifted from deployment to depth of migration: the Control Plane now governs the most critical and most exposed systems, and the brownfield migration is in advanced stages.

Critical and high-risk systems — those with the greatest PQC exposure or the highest data sensitivity — have been migrated to the Control Plane and operate under centralized cryptographic governance. Algorithm transitions in these systems no longer require code changes; they are executed as policy updates that propagate in real time.

Hybrid coexistence of classical and post-quantum algorithms is managed centrally across the governed landscape. When a vulnerability is disclosed in an algorithm used by a critical system, the organization can respond in hours, not months.

The dual-track state

The defining characteristic of Level 4 is the dual-track state of the cryptographic environment.

flowchart LR
    subgraph GREENFIELD["🌱 Greenfield — fully governed"]
        G1["Every system since CCP adoption"]
        G2["PQC by default"]
        G3["Policy enforced centrally"]
        G4["Vulnerability response: hours"]
    end

    subgraph BROWNFIELD["🏗️ Brownfield — in advanced migration"]
        B1["Critical systems migrated"]
        B2["Lower-risk systems being onboarded"]
        B3["Vulnerability response varies"]
        B4["Gap closing systematically"]
    end

    style GREENFIELD fill:#d5f5e3,stroke:#1e8449
    style BROWNFIELD fill:#fdebd0,stroke:#d68910

The greenfield is fully governed: every system deployed since the adoption of the Control Plane operates under centralized policy, with PQC by default. The brownfield is in advanced migration: lower-risk and lower-priority systems are progressively being onboarded as planned maintenance windows allow.

The gap between these two tracks represents the remaining technical debt — and systematically closing it is the primary operational objective of Level 4. The organization's overall vulnerability response time reflects this dual state: hours for governed systems, days or weeks for those still in the migration queue.


Level 5 — Optimized Cryptography

Level 5 is the organizational equivalent of CMMI Level 5 — not a technology installed, but a mode of operation achieved.

At this stage, the cryptographic landscape is complete under the Control Plane. The brownfield migration is finished. No system in the organization has embedded cryptographic logic. Every cryptographic operation, across every system, is governed by centralized policy.

The defining capabilities

Capability What it means
Algorithm changes are executed as policy updates No engineering projects, no application redeployment
Vulnerability response in hours Across the full enterprise landscape — no exceptions
Post-quantum standards adopted by policy Not by modifying systems
Continuous posture validation Cryptographic posture continuously validated against current standards and regulatory requirements
Full cryptographic sovereignty Vendor changes, algorithm deprecations, and standard updates are governance decisions, not infrastructure disruptions

This is the level where cryptographic agility, posture visibility, and policy enforcement converge into a unified operational capability. The organization no longer manages cryptography as a series of engineering projects — it governs it as infrastructure policy.

When NIST publishes an update to a post-quantum standard, the organization adopts it in weeks, not years. When a vulnerability is disclosed, the response is measured in hours.

This is the strategic target that enterprises should aim to reach before regulatory PQC mandates arrive.


The greenfield and brownfield tracks

The maturity model is not a rigid progression in which organizations must complete one stage before entering the next. Many enterprises operate across multiple maturity levels simultaneously — some systems may still be at Level 1 while others have reached Level 3 or 4. This is not a failure of implementation; it is the expected reality of any enterprise transformation.

The model interprets this multi-level coexistence through the greenfield / brownfield distinction.

flowchart TB
    subgraph ORG["The organization at any point in time"]
        direction LR
        GREEN["🌱 Greenfield<br/><br/>All new systems and applications<br/>being developed today"]
        BROWN["🏗️ Brownfield<br/><br/>Existing landscape with<br/>embedded cryptographic logic"]
    end

    GREEN -->|"can adopt decoupled<br/>architecture immediately"| L5_FAST["May reach Level 5<br/>within months"]
    BROWN -->|"requires structured,<br/>phased migration"| L_GRADUAL["Progresses through<br/>Levels 2, 3, 4 over years"]

    style GREEN fill:#d5f5e3,stroke:#1e8449,stroke-width:2px
    style BROWN fill:#fdebd0,stroke:#d68910,stroke-width:2px
    style L5_FAST fill:#d5f5e3,stroke:#1e8449
    style L_GRADUAL fill:#fdebd0,stroke:#d68910

The greenfield represents all new systems and applications being developed today. These can — and should — adopt decoupled cryptographic architecture immediately, regardless of where the organization sits on the maturity model. The greenfield can reach Level 5 capability within months of initial deployment.

The brownfield represents the existing landscape of systems with embedded cryptographic logic. These require a structured, phased migration prioritized by risk and operational feasibility. The brownfield works through Levels 2, 3, and 4 over a period of years.

An organization may simultaneously operate a greenfield at Level 5 and a brownfield at Level 2. The maturity level of the overall organization reflects the weighted state of both tracks. The strategic objective is to progressively close the gap between them.


How a CAPA-enabled platform supports each level

The CAPA framework defines the operational capabilities required for organizations to move toward the highest level of cryptographic maturity. Platforms that operationalize CAPA — such as ANKASecure© — are not the destination that organizations reach when they arrive at Level 5. They are the instrument that organizations use to advance from wherever they currently stand.

Organization at level Uses ANKASecure© to…
Level 1 Begin the discovery process and establish the greenfield policy commitment
Level 2 Enforce the greenfield policy and establish cryptographic visibility before full Control Plane deployment
Level 3 Deploy the Control Plane and govern all new systems immediately while orchestrating the phased migration of the legacy landscape
Level 4 Extend governance across the critical brownfield estate, progressively closing the gap until the full landscape is covered
Level 5 Operate continuous cryptographic evolution as standard practice; respond to vulnerabilities, standards, and regulations as governance events

The platform meets the organization where it is and enables progression at the pace the organization can sustain.


Quick self-assessment

Use this assessment to locate your organization. Be honest — overstating the level does not help.

flowchart TD
    Q1{"Can you change a cryptographic<br/>algorithm without redeploying<br/>application code?"}
    Q1 -->|"No"| Q1A{"Are keys centrally managed<br/>via HSM or KMS?"}
    Q1A -->|"No"| L1A["You are at Level 1<br/>Embedded Cryptography"]
    Q1A -->|"Yes"| L2A["You are at Level 2<br/>Managed Cryptography"]
    Q1 -->|"Yes, for some systems"| Q2{"Are critical and high-risk<br/>systems all governed by<br/>the Control Plane?"}
    Q2 -->|"No"| L3A["You are at Level 3<br/>Cryptographic Control Plane"]
    Q2 -->|"Yes"| Q3{"Is the entire landscape<br/>governed? No system has<br/>embedded cryptographic logic?"}
    Q3 -->|"No"| L4A["You are at Level 4<br/>Cryptographic Agility"]
    Q3 -->|"Yes"| L5A["You are at Level 5<br/>Optimized Cryptography"]

    style L1A fill:#fadbd8,stroke:#c0392b
    style L2A fill:#fdebd0,stroke:#d68910
    style L3A fill:#fcf3cf,stroke:#d4ac0d,stroke-width:3px
    style L4A fill:#d6eaf8,stroke:#2980b9
    style L5A fill:#d5f5e3,stroke:#1e8449,stroke-width:3px

Validation questions

To confirm the level you reached:

Level Validation question
1 Can you produce a complete inventory of cryptographic algorithms in use? Most organizations at Level 1 cannot — the inventory does not exist
2 Are key rotation operations driven by KMS lifecycle policies? Or do applications still control rotation?
3 When a new application is created today, does it embed cryptographic logic — or does it consume the Control Plane?
4 When a vulnerability is disclosed in an algorithm used by a critical system, what is your response time? Hours, days, or months?
5 When NIST publishes a new standard, how long until your organization adopts it? Weeks, months, or years?

What this means for the post-quantum transition

The emergence of post-quantum cryptography and increasing regulatory expectations will accelerate movement toward higher maturity levels. Organizations that develop the ability to govern cryptographic behavior through infrastructure will be significantly better positioned to adapt to future cryptographic transitions.

The question is not whether the post-quantum transition will require these capabilities. The question is whether organizations will arrive prepared, or under regulatory pressure with operational urgency.

The Cryptographic Maturity Model provides the diagnostic. The CAPA framework provides the capabilities. The deployment organization model provides the structural foundation. The Cryptographic Control Plane provides the architecture. Together, they make the transition manageable.


If you want to… Read…
Understand the architectural shift The Cryptographic Control Plane
Learn the operational framework The CAPA framework
Plan a migration approach The CAPA framework, particularly Pillar 3 — Frictionless Modernization
Implement governance from day one Pillar 4 — Policy-Driven Governance
Design the deployment Deployment organization model

Summary

Maturity is measured by what the organization can do today, not by how much legacy migration remains pending. Post-quantum cryptography is a dimension that improves at every level. The greenfield can reach Level 5 within months while the brownfield works through earlier levels for years.

Five levels mark the path from embedded cryptography to optimized cryptography. Level 3 — the Cryptographic Control Plane — is the structural inflection point. Level 5 — Optimized Cryptography — is the strategic target organizations should aim to reach before regulatory PQC mandates arrive.