Migration Checklist

Use this checklist alongside [Migration Journey to QNSP](/migration/journey). The checklist is execution-oriented; the journey document explains the target operating model and the logic behind each stage.

Migration Checklist

Use this checklist alongside Migration Journey to QNSP. The checklist is execution-oriented; the journey document explains the target operating model and the logic behind each stage.

1. Connect

  • Set up the QNSP tenant, roles, and credentials
  • Decide which discovery path is required per source: cloud/API connector, agent, or both
  • Connect managed providers such as AWS, Azure, GCP, HashiCorp Vault, or CDN/TLS sources
  • Install QNSP agents where sources are private, self-hosted, or only reachable from inside the environment
  • Confirm the connected source list reflects the intended migration scope

2. Discover

  • Run an initial discovery scan
  • Verify assets appear in Asset Inventory
  • Confirm certificates, keys, secrets, and cryptographic dependencies are being normalized
  • Identify sources returning incomplete evidence or zero assets
  • Re-run or fix source connectivity before using the inventory as a cutover baseline

3. Analyze

  • Review Quantum Exposure
  • Review Policy Violations
  • Review the Migration Plan produced from discovered assets
  • Separate platform-native assets from external assets still outside QNSP
  • Mark unknown, deprecated, or insufficiently evidenced cryptographic usage for follow-up

4. Govern

  • Define the target crypto policy tier
  • Set algorithm, HSM, lifecycle, and transition requirements
  • Decide which controls run in audit mode vs enforce mode
  • Define exceptions and transition rules for systems that cannot cut over immediately
  • Align certificate lifecycle and rotation policy with the QNSP target state

5. Migrate

  • Create or import keys into QNSP KMS
  • Migrate secrets into QNSP Vault
  • Move certificate lifecycle management under QNSP policy
  • Reconfigure workloads to call QNSP SDKs, APIs, or platform services
  • Batch migration work into controllable cutover groups
  • Use migration automation or managed agents where available in the tenant plan

6. Validate

  • Verify production workloads are consuming QNSP trust services
  • Confirm legacy providers are no longer serving production trust decisions
  • Generate and review readiness evidence
  • Generate and review CBOM, QBOM, and SBOM as separate evidence products
  • Validate policy enforcement, audit evidence, and source freshness
  • Confirm cutover with application owners before retiring fallback paths

7. Operate

  • Enable continuous monitoring and drift/control validation
  • Review agility score, monitoring, and lifecycle pages on an operating cadence
  • Rotate migrated secrets and keys under the new policy
  • Decommission legacy systems only after sustained stable operation
  • Document the final cutover state and residual exceptions

Migration success rule

  • Production trust dependencies are consumed from QNSP and continuously validated, not merely mirrored into QNSP