Cryptography Sources and Enterprise Context
Configure data collection from cryptographic assets and business systems
Upload Data Files
Upload data files from your cryptographic data sources for analysis
How Data Sources Are Used
CBOM (CycloneDX)
Cryptographic Bill of Materials providing certificate and algorithm inventory
Identifies quantum-vulnerable algorithms (RSA, ECDSA), expiring certificates, and weak key sizes
Enables queries about certificate inventory, algorithm usage, and cryptographic asset relationships
Maps certificates to applications and shows TLS configurations in architecture diagrams
Identifies assets requiring post-quantum migration and prioritizes by algorithm type
Qualys Scan
TLS/SSL configuration assessment with vulnerability detection
Detects weak ciphers (RC4, 3DES), outdated protocols (TLS 1.0/1.1), and SSL vulnerabilities
Answers questions about TLS configurations, cipher suites, and protocol versions across services
Shows TLS termination points and protocol versions in application architecture flows
Flags services requiring immediate remediation before PQC migration can begin
AWS S3 Inventory
Cloud storage encryption status and configuration data
Identifies unencrypted buckets, weak encryption algorithms, and data-at-rest vulnerabilities
Enables queries about storage encryption status, KMS key usage, and bucket security posture
Displays storage encryption in application data flows and highlights unencrypted data stores
Includes storage encryption upgrades in PQC migration timeline and cost estimates
CMDB (ServiceNow)
Business context including ownership, criticality, and data classification
Correlates technical risks with business impact using service tier, data classification, and ownership
Provides business context for AI responses including asset owners, criticality, and compliance requirements
Annotates architecture diagrams with business owners, service tiers, and data classifications
Prioritizes migration phases by service tier, data retention, and TNFL threat assessment
Risk Assessment Dashboard
Discovered Relationships (0)
No correlations found yet. Click "Run Correlation Engine" to discover relationships between your crypto assets.
AI-Powered Analysis
Uses OpenAI LLM with RAG for intelligent analysis
Cryptographic Architecture
Applications & Services
Click on an application to view its detailed cryptographic architecture
Payment Gateway
Tier 1 — Payment Processing
Customer Portal
Tier 1 — Customer Data
Healthcare Records
Tier 1 — Protected Health Info
API Gateway
Tier 1 — Platform Engineering
Development Environment
Dev/Test — Engineering
Post-Quantum Cryptography Migration Plan
Crypto Assets
View and filter ingested crypto assets from all sources
| Type | Details | Source | Risk | Ingested |
|---|
Applications
View applications from CMDB data with business context
| Name | Owner | Business Unit | Service Tier | Data Classification | Hostnames |
|---|