4.1 IBM Z cryptographic components overview4.1.1 IBM Z cryptographic hardware components4.1.2 IBM Z cryptographic software components4.1.3 Minimum hardware and software for quantum-safe cryptography support4.2 Steps towards quantum protection4.2.1 Discovering and classifying the data4.2.2 Establishing a cryptographic inventory4.2.3 Considering cryptographic agility4.2.4 Adopting quantum-safe cryptography4.2.5 Where to find help at IBM4.3 Best practices, mitigation options, and tools4.3.1 ICSF best practices4.3.2 Mitigation options4.3.3 Key management tools