All resources
Third-Party and Ecosystem Post-Quantum Risk
Types of third-party post-quantum dependencies
Exposure types: data processing (external store/transmit/process encrypted data), cryptographic services (encryption, key management), product-embedded crypto (hardware/software not directly configurable), interconnection (secure channels between organizations). Each creates different visibility and control constraints.