Better Safe Than Sorry: Preparing for Crypto-Agility

Foundational Refreshed: 12 April 2018 | Published: 30 March 2017 ID: G00323350

Analyst(s): |

Purchase this Document

Price: $195.00 USD (PAGES: 9)

To purchase this document, you will need to register or sign in above.


Sudden and unpredictable algorithmic and cryptographic compromises can leave application security at risk. Security and risk management leaders must prepare for these events by crafting agile response plans.

Table of Contents

  • Introduction
  • Analysis
    • Build Crypto-Agility Into Application Development or Application Procurement Workflow
    • Inventory the Applications That Use Cryptography, and Identify and Evaluate Your Dependence on Algorithms
    • Include Cryptographic Alternatives and an Algorithm Swap-Out Procedure in Your Existing Incident Response Plans
  • Gartner Recommended Reading
© 2017 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more

Call +1 855-515-4486 or contact us

to become a Gartner client.