Three doors, one solution
Audience: CIOs, CTOs, CISOs, Enterprise Architects, decision makers evaluating ANKASecure©
Reading time: 12 minutes
The thesis
Three different concerns lead enterprises to ANKASecure©. They look like three different problems. They resolve to the same architectural shift.
flowchart TB
P1["🎯 Door A<br/>Enterprise crypto control"]
P2["⚛️ Door B<br/>Post-quantum readiness"]
P3["🛡️ Door C<br/>Cryptographic sovereignty"]
SOL["🏛️ ANKASecure©<br/>Cryptographic Control Plane"]
BENEFITS["✅ All three buyers receive all three benefits"]
P1 --> SOL
P2 --> SOL
P3 --> SOL
SOL --> BENEFITS
style P1 fill:#d6eaf8,stroke:#1a5276,stroke-width:2px
style P2 fill:#d5f5e3,stroke:#1e8449,stroke-width:2px
style P3 fill:#fdebd0,stroke:#d68910,stroke-width:2px
style SOL fill:#85c1e9,stroke:#1a5276,stroke-width:3px
style BENEFITS fill:#abebc6,stroke:#1e8449,stroke-width:2px This page walks each buyer through their entry concern, the structural problem behind it, and how the platform resolves it. Each path culminates in the same architectural decision: moving cryptography from embedded code to governed infrastructure.
Door A — The enterprise crypto control buyer
"How do I govern cryptography across my entire enterprise without modifying every application?"
The buyer
CIOs, CTOs, and Enterprise Architects responsible for hundreds or thousands of services across their organization. They have visibility into the cost of cryptographic change.
The pain
Their cryptographic environment looks like this:
- Crypto sprawl. Each team chose its own algorithms, libraries, key sizes
- Hardcoded everywhere. Algorithms live in Java, Go, Python, .NET, Node — embedded in code
- No central inventory. No one can answer "how many systems use RSA-2048?"
- Audit is impractical. Demonstrating cryptographic posture requires inspecting every application
- Changes are projects. A vulnerability in an algorithm triggers months of coordinated engineering
- Governance is aspirational. Policies exist on paper; enforcement happens application by application
The cost of cryptographic change is so high that the organization rarely changes anything proactively. Cryptographic decisions made years ago persist by inertia.
The structural problem
This is not a discipline problem. It is an architectural problem. When cryptographic logic lives inside application code, every cryptographic transition becomes a distributed engineering effort. There is no infrastructure layer that can govern the behavior centrally.
Other infrastructure capabilities have already abstracted away from applications:
| Capability | Was | Became |
|---|---|---|
| Identity | Embedded credentials in apps | Identity providers (Okta, Auth0, Ping) |
| Networking | Per-device configuration | Software-defined networking |
| Secrets | Configuration files | Vault platforms (HashiCorp Vault, AWS Secrets Manager) |
| Cryptography | Embedded library calls | Cryptographic Control Plane |
The historical pattern is clear. Cryptography is the next infrastructure capability to abstract.
What ANKASecure© provides
Applications stop selecting algorithms. They reference cryptographic intent through a stable identifier (a Key ID) and the control plane resolves the actual algorithm based on policy. When the policy changes, every application reflects the change immediately — without redeployment.
flowchart LR
subgraph BEFORE["Before — embedded cryptography"]
APP1["App<br/>RSA-2048"]
APP2["App<br/>RSA-3072"]
APP3["App<br/>ECDSA-P256"]
APP4["App<br/>RSA-2048"]
end
subgraph AFTER["With ANKASecure©"]
APPS["Applications<br/>express intent only"]
CCP["Cryptographic<br/>Control Plane"]
POL["Active policy"]
ENG["Cryptographic<br/>execution"]
APPS --> CCP
POL --> CCP
CCP --> ENG
end
BEFORE -.->|"architectural shift"| AFTER
style BEFORE fill:#fadbd8,stroke:#c0392b
style AFTER fill:#d5f5e3,stroke:#1e8449 The bonuses they receive
- PQC readiness arrives by default. New algorithms are introduced through policy. ML-KEM, ML-DSA, hybrid schemes — all available without rewriting applications.
- Sovereign third-party exchange becomes possible. The same control plane that governs internal cryptography can mediate cryptographic operations with third parties — keys never leave the owner's domain.
The deeper architectural treatment is in The Cryptographic Control Plane. The maturity progression is in The Cryptographic Maturity Model.
Door B — The post-quantum readiness buyer
"How do I migrate to post-quantum cryptography without rebuilding every application?"
The buyer
CISOs, security architects, and compliance leads. They have read the NIST FIPS 203/204/205 standards. They understand the harvest now, decrypt later threat. They have regulatory pressure (CNSA 2.0, EU mandates, sector guidance) that gives them a deadline.
The pain
The migration from RSA and ECC to ML-KEM and ML-DSA is not a single algorithm swap. It is a sustained, multi-year transition that must:
- Support hybrid coexistence. Classical and post-quantum algorithms operate side by side during transition
- Cover heterogeneous environments. Different applications, languages, and frameworks all need to migrate
- Preserve operational continuity. No outages, no compatibility breaks
- Meet regulatory deadlines. Mandates are firming up, not relaxing
- Address long-retention data. Data encrypted today may need re-encryption before quantum capabilities mature
- Adapt to evolving standards. PQC standards themselves are still maturing
Without an abstraction layer, every application that touches cryptography becomes a migration project of its own. With dozens or hundreds of such applications, the timeline becomes unworkable.
The structural problem
A migration of this magnitude cannot be executed application by application. The organization needs an architectural layer that:
- Resolves cryptographic intent into algorithm execution
- Supports multiple algorithm families simultaneously
- Allows hybrid (classical + PQC) deployment
- Lets policy decisions propagate without code change
- Re-encrypts large data stores without application participation
This is exactly the cryptographic control plane.
What ANKASecure© provides
PQC adoption becomes a policy decision, not an engineering project:
- The platform supports ML-KEM, ML-DSA, SLH-DSA, Falcon, and hybrid composite schemes
- Hybrid (classical + PQC) coexistence is the default deployment mode
- Algorithm activation and deactivation happen through policy updates
- Streaming re-encryption migrates large data stores without application participation
- New PQC standards integrate into the platform's algorithm catalog without affecting consumers
flowchart TB
subgraph TRADITIONAL["❌ Without abstraction"]
T1["Identify all RSA usage"]
T2["Modify each application"]
T3["Coordinate redeployment"]
T4["Validate compatibility"]
T5["Migrate encrypted data manually"]
T6["Repeat per application"]
T1 --> T2 --> T3 --> T4 --> T5 --> T6
end
T6 -.->|"architectural shift"| C1
subgraph CCP["✅ With ANKASecure©"]
C1["Update algorithm policy"]
C2["Policy propagates to all consumers"]
C3["New algorithm active enterprise-wide"]
C4["Streaming re-encryption migrates data"]
C1 --> C2 --> C3 --> C4
end
style TRADITIONAL fill:#fadbd8,stroke:#c0392b,stroke-width:2px
style CCP fill:#d5f5e3,stroke:#1e8449,stroke-width:2px The bonuses they receive
- Enterprise-wide cryptographic governance. The control plane that enables PQC migration is the same one that governs all enterprise cryptography. Crypto sprawl resolves alongside the PQC transition.
- Sovereign third-party exchange. Post-quantum-protected exchanges with third parties operate under the same governance model — without surrendering keys to counterparties.
For deeper treatment of the PQC narrative, see The Cryptographic Control Plane. For the operational framework, see The CAPA framework, particularly Pillar 1 — Crypto-Agility.
Door C — The cryptographic sovereignty buyer
"How do I share data with third parties without losing control of my keys?"
The buyer
CISOs and risk leaders in industries with intense third-party dependencies: financial services with BPOs and embossing providers, telecommunications with roaming partners, healthcare with labs and insurers, government with contractors and binational programs.
The pain
Sharing data with a third party currently means surrendering cryptographic control:
flowchart LR
A["🏢 Your organization<br/>(data owner)"] -->|"key delivery /<br/>cleartext data"| B["🤝 Third party<br/>(full control over your data)"]
B --> R1["❌ No visibility into when<br/>or how data is used"]
B --> R2["❌ Cannot revoke access<br/>in real time"]
B --> R3["❌ No auditable evidence<br/>of usage"]
B --> R4["❌ Key lives outside<br/>your domain"]
style A fill:#d6eaf8,stroke:#1a5276,stroke-width:2px
style B fill:#fadbd8,stroke:#c0392b,stroke-width:2px
style R1 fill:#fef9e7,stroke:#c0392b
style R2 fill:#fef9e7,stroke:#c0392b
style R3 fill:#fef9e7,stroke:#c0392b
style R4 fill:#fef9e7,stroke:#c0392b Once a key (or cleartext data) leaves the owner's domain, the following become impossible without bilateral coordination:
- Real-time revocation of access
- Knowing the exact scope of data consumption
- Producing forensic evidence of individual operations
- Limiting use to specific batches, time windows, or operation counts
The risk is structural, not procedural. Diligent third parties may follow agreements scrupulously — but the architecture itself does not enforce them.
The regulatory amplifier
Regulatory frameworks make the data owner accountable for what third parties do with their data:
| Regulation | What it requires |
|---|---|
| DORA (EU) | Third-party ICT risk management with evidence of controls |
| PCI-DSS 4.0 | Key custody and segregation; control over service providers |
| SOX (USA) | Controls over financial systems with complete traceability |
| GDPR | Controller accountability over processors |
| CNSA 2.0 (USA NSA) | Transition to quantum-resistant algorithms |
The legal responsibility cannot be delegated to the third party. Yet the architectural model — surrendering keys — places control with the third party. The mismatch is the source of risk.
The structural problem
The traditional model shares keys. ANKASecure© inverts this: it shares capabilities. The third party is no longer given the means to perform cryptographic operations; it is given the right to invoke them, mediated and audited.
flowchart TB
subgraph TRADITIONAL["❌ Sharing a key"]
direction LR
T1["Data owner"] -->|"delivers key"| T2["Third party"]
T2 --> T3["Possesses cryptographic material"]
T2 --> T4["Uses it whenever and<br/>however they want"]
T2 --> T5["Revocation requires<br/>bilateral coordination"]
end
subgraph ANKASECURE["✅ Sharing a capability"]
direction LR
A1["Data owner"] -->|"grants capability"| A2["Control Plane"]
A2 -->|"mediated invocation"| A3["Third party"]
A3 --> A4["Only what was authorized,<br/>when it was authorized"]
A2 --> A5["Immediate revocation<br/>without coordination"]
A2 --> A6["Every execution logged<br/>in owner's domain"]
end
TRADITIONAL -.->|"paradigm shift"| ANKASECURE
style TRADITIONAL fill:#fadbd8,stroke:#c0392b,stroke-width:2px
style ANKASECURE fill:#d5f5e3,stroke:#1e8449,stroke-width:2px What ANKASecure© provides
| Dimension | Traditional model | With ANKASecure© |
|---|---|---|
| What is shared | The key | A controlled capability |
| Who holds key material | The third party | Always the data owner |
| Revocation | Bilateral coordination | Immediate from the control plane |
| Audit | Depends on third-party reporting | Complete evidence in owner's domain |
| Usage scope | Unrestricted | Policy-bounded per invocation |
Concrete scenarios showing how this materializes — card issuance with multiple providers, BPO collections without bulk file transfer — are in Reference scenarios.
The bonuses they receive
- PQC readiness. Sovereign exchange runs over the same control plane that supports post-quantum algorithms. Third-party exchanges can adopt PQC by policy.
- Enterprise crypto governance. The control plane that mediates third-party operations is the same one that governs internal cryptography. Crypto sprawl is resolved.
For the detailed treatment of this principle, see Cryptographic sovereignty.
Why all three doors lead to the same place
The three concerns appear different, but they share a structural root.
| Concern | Underlying need |
|---|---|
| Enterprise crypto control | An infrastructure layer that governs cryptography across many systems |
| Post-quantum readiness | An infrastructure layer that abstracts algorithm selection from application code |
| Cryptographic sovereignty | An infrastructure layer that mediates cryptographic operations without surrendering keys |
The "infrastructure layer that governs cryptography" is the Cryptographic Control Plane. Each buyer is describing a different facet of the same architectural object.
flowchart TB
NEED["The shared architectural need:<br/>cryptography as governed infrastructure,<br/>not embedded code"]
F1["Facet 1<br/>Enterprise governance"]
F2["Facet 2<br/>Algorithm abstraction"]
F3["Facet 3<br/>Mediated capabilities"]
NEED --> F1
NEED --> F2
NEED --> F3
F1 -.-> CCP["Cryptographic Control Plane"]
F2 -.-> CCP
F3 -.-> CCP
style NEED fill:#85c1e9,stroke:#1a5276,stroke-width:2px
style CCP fill:#d5f5e3,stroke:#1e8449,stroke-width:3px The compound benefit
A buyer entering through any one door receives the capabilities the other two doors describe. This is not a marketing claim — it is a consequence of the architecture.
| Buyer enters through | They explicitly need | They also receive |
|---|---|---|
| Door A — control | Enterprise governance | + PQC readiness + sovereign exchange |
| Door B — PQC | Algorithm abstraction | + enterprise governance + sovereign exchange |
| Door C — sovereignty | Mediated capabilities | + enterprise governance + PQC readiness |
The control plane is the same in all three cases. The framework that operationalizes it (CAPA) is the same. The deployment organization model (the twelve entities) is the same.
Where to read next
Whatever door brought you here, the next step depends on what you want to understand:
| If you want to… | Read… |
|---|---|
| Understand the architectural shift in depth | The Cryptographic Control Plane |
| Learn the operational framework | The CAPA framework |
| Map your current state and target state | The Cryptographic Maturity Model |
| Explore the third-party sovereignty principle | Cryptographic sovereignty |
| See concrete enterprise scenarios | Reference scenarios |
| Understand the deployment organization model | Deployment organization model |