Post Quantum Cryptographic Governance Platform (Local) 4 Qubits · Decision Ledger

Dashboard

Overview Not authenticated
Ready — enter tenant and connect
Board Package Workspace
Executive artifacts for board review, package assembly, and presentation exports.
Component Bills
Presentation Reports
Briefing Bundle
Control-as-Code
Verification Artifacts
Verifiable evidence and chain exports for auditors, operators, and proof workflows.
Ledger Export
Evidence Archive
4 Qubits
Post-quantum cryptographic posture management.
Sign in or register to get started.
Run PQC Discovery Scan
Multi-dimensional scan: code analysis, TLS endpoints, cloud infrastructure, key management, algorithm inventory, CBOM generation. Aligns with NIST SP 800-131A, CNSA 2.0, and FIPS 140-3.
Stage 1
Discover
findings
Stage 2
Decide
in review
Stage 3
Record
approved
Stage 4
Act
action plans
Stage 5
Verify
passed
Stage 6
Attest
bundles
Loading…

Action Needed

Total Findings
Quantum Vulnerable
Quantum Safe
Compliance Mappings
Recommendations
Ledger Entries
Chain Integrity
Discovery Sources

Quantum Vulnerability Status

Algorithm Breakdown

Findings by Source

Details

Severity Distribution

Details

Effort vs Risk Reduction

Details

Recommendation States

Tracing:
Trace IDSourceAlgorithmKey SizeLocation Quantum StatusConfidenceRemediation
Trace IDSeveritySOC 2PCI DSS HIPAANIST TargetHNDL Risk
Trace IDsTitleTarget StateEffort Risk ↓Compliance ↑StateActions

Governance

CISO Action Center

--
Needs Triage
--
Awaiting Review
--
Pending Remediation
--
Remediation Active
--
Remediated
--
SLA Breached
--
Critical Unassigned
--
Chain Integrity
--
Total Decisions
--
Approved
--
Avg Days to Approve
PriorityAlgorithmLocationStatus AssigneeSLADue DateRemediationActions

Decision Detail

Select a decision to view details.

Scanner Comparison (MOE Analysis)

Scanner Coverage Radar

Confidence by Scanner

Findings Overlap (Multi-Scanner Detection)

AlgorithmLocationDetected ByScanner CountConfidence

What-If Sensitivity Simulator

Simulate algorithm migrations to predict compliance impact before making changes.

HNDL Risk
Harvest-now, decrypt-later exposure modeling with data-lifetime and CRQC timeline inputs for prioritized remediation.

HNDL Risk Distribution

Top At-Risk Algorithms

Per-Finding HNDL Scores

AlgorithmLocationSourceRisk ScoreRisk Level HNDL YearsCompromised?Action

Dimension Scores

Algorithm Diversity

PQC Readiness Breakdown

Improvement Actions

ML Readiness
Model-driven PQC readiness scoring with interpretable feature importance, roadmap guidance, and AI-assisted narrative analysis.

AI Interpretation

Click Generate Analysis to get an AI-powered interpretation of the ML readiness prediction, referencing NIST PQC standards and CNSA 2.0 migration requirements.

Feature Importance by Category

All 27 ML features grouped into 6 interpretable categories. SHAP importance is summed per category from the full ensemble model. Click any category to see individual feature contributions.

Feature Values Radar

Ensemble Model Comparison

Improvement Roadmap

Decision Ledger
Immutable event history with verifiable chain integrity, checkpointing, exportable proof bundles, and operational repair controls.
Chain Status: —
Entries: —
Merkle Root: —
Last Checkpoint: —
TimeActorEventEntity IDHash (first 16)Prev (first 16)SignatureProof
Merkle Tree
Checkpoint and inclusion-proof verification view for RFC 6962-style attestation, offline proof checks, and exportable trust artifacts.
Tree Status: —
FINRA 4511 SEC 17a-4(f) SOX §802 Dodd-Frank §619 RFC 6962

Executive Summary

AI-generated narrative assessment powered by local LLM. Vectors to NIST PQC, CNSA 2.0, and regulatory sources.

Assessment At-a-Glance
Overall Risk
--
PQC Readiness
--
Compliance
--
HNDL Exposure
--

Cryptographic Posture

Click "Generate Summary" to create AI-powered executive narrative.

Quantum Threat Landscape

HNDL exposure analysis and CRQC timeline assessment.

Compliance & Regulatory

SOC 2, PCI DSS, HIPAA, NIST, CNSA 2.0 coverage analysis.

Migration Recommendation

Phased PQC migration plan with effort estimates.

Compliance Framework Coverage

Visual pass/fail status per compliance framework. Thresholds based on industry standards and regulatory requirements.

Control-Level Detail

FrameworkControlStatusFinding CountAction

PQC Migration Roadmap

Phased migration visualization aligned to NIST SP 1800-38 and CNSA 2.0 timelines.

Phase Breakdown

Algorithm Migration Matrix

Current AlgorithmCountTarget PQCCNSA 2.0 DeadlineStatus
Checking reasoning engine...

Vector Search (RAG)

PQC Chat

--
--
Composite

Platform Security Posture

NIST SP 800-53 / 800-207 self-assessment with CISA ZTMM zero trust maturity and continuous crypto monitoring.
--
Platform
--
Crypto
--
Checks Passed
--
Critical Fails
--
Alerts

CISA Zero Trust Maturity Model

🔑
Identity
--
Loading...
💻
Devices
--
Loading...
🌐
Networks
--
Loading...
📱
Applications
--
Loading...
🗄️
Data
--
Loading...

NIST CSF 2.0 Alignment

Load data to view CSF alignment

NIST SP 800-53 Compliance

Load data to view compliance status

Security Self-Assessment Checks

StatusCheckCategoryNIST ControlsZT PillarDetail

Cryptographic Monitoring Alerts

SeverityCategoryTitleAlgorithmNIST RefRemediationCount

Algorithm Health Status

AlgorithmCountVulnerableDeprecatedCNSA 2.0Crypto Period

Monitoring Coverage

Load data to view coverage

Cross-Cutting Capabilities

Load data to view capabilities
Intelligence Hub
Board-facing intelligence for CNSA deadlines, PQC maturity, and supply-chain cryptographic risk concentrated into one analysis surface.

CNSA 2.0 Migration Countdown

Algorithm Deadline Detail
AlgorithmDeadlineDaysRisk TierMigration TargetFindings

PQC Maturity Model (PQCMM)

--
Loading...

PQCMM Improvement Roadmap

#DimensionCurrentActionImpact

Supply Chain Crypto Risk

--
--
Vuln Deps
--
Total Deps
--
Vuln Images
--
Inheritance
LibraryVersionRiskVulnSafeAlgorithms
Risk Inheritance
LibraryVersionVuln AlgosLocationsScore
--
Frameworks
--
Controls
--
Met
--
Gaps
Trust & Signing
Operational signing coverage, PQC signature visibility, blockchain anchoring, and latest-verification actions in one trust control surface.
Active Signing Algorithm
--
Signed: 0 · Unsigned: 0 · Anchors: 0 · TSA Verified: 0
Signing Coverage
--

PQC Signatures

SignatureCheckpointAlgorithmSigned AtCompliance

Blockchain Anchors

AnchorCheckpointHashCreatedStatusNetwork
Hardware Trust Attestation
Cross-validated hardware-root-of-trust posture: TPM, PKCS#11, HSM/KMS metadata, secure-element evidence, and SEALSQ migration recommendations. Disagreements between scanners surface as evidence, not silent overrides.
--
Assets Assessed
--
Hardware-Backed
--
Software-Only
--
Unknown
--
Conflicting Evidence
--
Regressed
--
SEALSQ Candidates

Enrolled Agent Devices

Each row is one installed agent. Status, last-seen timestamp, and key prefix let you match a row to a specific machine. Revoking a device immediately invalidates its api_key — the next sync attempt 401s. Re-enrolling the same machine requires generating a new install script.

⚡ Quick Start: Scan This Computer's TPM

Foreground mode — downloads connect-tpm.ps1; you double-click it; a PowerShell window stays open showing live scan logs. Best for spot-checks, demos, BreachLock prep.

Tray mode — installs the silent background agent. A small 4Q icon lives in your system tray with a posture status dot. Optionally starts at sign-in. Best for continuous monitoring.

Hardware Connections — How to Connect & Scan

① Local hardware (this host)
For TPM 2.0 chips on the machine running this container or a 4Qubits agent. The agent probes /dev/tpm* (Linux) or Windows TBS / Get-Tpm directly — no URL or token needed. Pick TPM (local) and a name; the scan will auto-detect presence, EK certificate, secure-boot state, and boot PCRs.
② On-prem HSM / smartcard / token
Pick PKCS#11. Provide the path to the vendor library on the scan host (Luna: libCryptoki2_64.so · nShield: libcknfast.so · YubiHSM: yubihsm_pkcs11.so · CloudHSM: libcloudhsm_pkcs11.so · SoftHSM2: libsofthsm2.so). The PIN is encrypted at rest with the connector vault.
③ Remote SEALSQ chip / device fleet
Pick the SEALSQ family that matches your hardware (QVault TPM, QS7001, or VaultIC) and paste the SEALSQ provisioning endpoint URL plus a bearer token issued by your SEALSQ admin portal. The scanner pulls the device inventory over HTTPS and maps each device into the MoE expert as Tier 1 hardware-attested evidence.
Workflow: ① fill in the form below → ② click Add Connection → ③ click Test in the table to verify reachability → ④ once green, click Run Scan below to enumerate every active hardware connection and feed evidence to the cross-validation expert. Findings appear in the assessment tables; conflicts and regressions emit signed ledger events automatically.
Type Name Status Created Actions

Hardware Resilience Score

Before / After SEALSQ migration
--
Today
--
Post-migration
--
Δ

Control Tier Distribution

SEALSQ Migration Candidates

Priority Asset Algorithm Tier Status Recommended Product Before After Reason

Cross-Validated Asset Posture

Asset Algorithm Provider Tier Status Confidence Supporting Conflicting

Migration Velocity

-- --
0%
-- --

Auto-Migration Patches

0 patches for 0 findings

Container Crypto Scan

Scan a container image for cryptographic libraries and algorithms using Syft + Trivy.

Certificate Transparency Monitor

Monitor CT logs to discover certificates issued for your domains.

Dempster-Shafer Evidence Fusion

Select multiple scan runs to cross-validate findings using evidential reasoning. Reduces false positives by combining independent scanner evidence.

Scan Runs

IDTargetSource TypeStatusCreated
--
Total Scanners
--
Available
--
Critical OK
--
Mode

User Management

Hold Ctrl/Cmd to select multiple
Hold Ctrl/Cmd to select multiple
User IDNameRolesScopesStatusLast LoginActions

Security Actions

Change Password

MFA Setup (TOTP)

Token Revocation

RAG Vector Index

Index all findings into ChromaDB for semantic search.

Tenant Management (Master Admin Only)

View, approve, or reject tenant registrations.

Integrations Center

0
Total
0
Connected
0
Scannable
0
Services
Action Layer Discover → Decide → Record → ActVerifyAttest

Execution Contexts

Gateway credentials the Action Layer uses to open PRs (GitHub / GitLab) or to call cloud APIs in DIRECT mode (AWS / Azure / GCP / HSM). Static creds are encrypted at rest. STS / WIF / managed identity / Vault strategies issue short-lived creds at execution time.

Loading…
Edit User: ×
Hold Ctrl/Cmd to select multiple
Hold Ctrl/Cmd to select multiple