The White House has issued a new Executive Order (E.O.) designed to sustain and accelerate the U.S. government's transition to quantum-resistant cryptography. The E.O. amends previous directives and establishes a firm deadline of December 1, 2025, for federal agencies to complete several foundational steps in their migration to Post-Quantum Cryptography (PQC). Key mandates include the creation of a list of PQC-ready products by CISA and the NSA, new requirements for TLS 1.3 adoption, and an update to the NIST Secure Software Development Framework (SSDF). This order signals a clear and urgent push to protect federal systems and data from the future threat of decryption by quantum computers.
The new Executive Order, "Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity," amends E.O. 13694 and E.O. 14144. It focuses on operationalizing the transition to PQC, moving from policy to concrete action with a clear timeline.
This Executive Order directly affects all U.S. Federal Civilian Executive Branch (FCEB) agencies. However, its influence will extend much further:
The issuance of this E.O. has several significant impacts:
Federal agencies must take immediate steps to prepare for the December 1, 2025 deadline:
The entire PQC transition is a strategic mitigation to ensure that encrypted information remains confidential against future quantum threats.
Mapped D3FEND Techniques:
Mandating TLS 1.3 is a specific software configuration mitigation to strengthen cryptographic protocols in preparation for PQC.
Mapped D3FEND Techniques:
The core challenge of the PQC transition is replacing deeply embedded cryptographic algorithms. Organizations should adopt the principle of 'crypto-agility' in their software development and infrastructure management. This means designing systems where cryptographic algorithms can be swapped out easily through configuration changes, rather than requiring a full code rewrite and recompilation. For new projects, use libraries that abstract the cryptography and support algorithm negotiation. For legacy systems, identify those with hardcoded algorithms (e.g., an old application using a specific RSA library) and prioritize them for modernization or replacement. This approach ensures that as NIST finalizes PQC standards and potentially introduces new ones in the future, your organization can adapt quickly without massive engineering efforts, making the transition manageable and sustainable.
In response to this Executive Order, federal agencies and proactive private sector organizations must begin a phased migration. The first step, mandated by the EO, is migrating to TLS 1.3. This protocol removes static RSA key exchange, a major vulnerability to quantum attacks. Your migration plan should inventory all public and internal-facing servers, identify those running TLS 1.2 or older, and create a project plan to upgrade their configurations or underlying software. Use tools like SSL Labs to test public servers and internal scanners to audit the internal network. This migration not only improves current security but is a critical enabling step for the future integration of hybrid PQC schemes (e.g., combining a classical algorithm with a quantum-resistant one) within the TLS handshake.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats