Not yet. Oracle Cloud Infrastructure has not publicly announced production PQC support for its cloud services. OCI relies on classical TLS with RSA and ECDSA for service encryption.
Key Takeaway: Oracle Cloud is NOT quantum safe. Scan your OCI environment with QScout to identify cryptographic dependencies. Monitor Oracle's security advisories for PQC announcements. Consider application-level PQC encryption for sensitive data in transit.
Oracle Cloud Infrastructure is NOT quantum safe today. **Current State:** OCI uses TLS 1.2/1.3 with RSA and ECDSA certificates across its service endpoints, including OCI Vault (key management), OCI Load Balancer, and Oracle Autonomous Database connections. **PQC Progress:** Oracle has been less publicly vocal about PQC migration compared to AWS, Azure, and Google: - **Oracle Cloud Vault**: No announced PQC key type support. - **Oracle Database TDE**: Uses AES-256 for transparent data encryption (quantum-resistant for data at rest), but TLS connections to the database use classical key exchange. - **Java**: Oracle's JDK has added experimental PQC algorithm support, which will eventually benefit OCI services. **HNDL Risk:** All OCI service API calls, data transfers, and management plane operations use classical TLS, making intercepted traffic vulnerable to future quantum decryption. **What Organizations Should Do:** Inventory all OCI services and identify data flows with long-term confidentiality requirements. Evaluate hybrid cloud strategies that can leverage PQC-capable providers where available. Use QScout to discover your OCI cryptographic surface.
| Full Name | Oracle Cloud Infrastructure (OCI) |
| Category | cloud |
| Quantum Vulnerability | OCI TLS endpoints use classical key exchange (RSA/ECDH) vulnerable to quantum attack. AES-256 at-rest encryption is quantum-resistant. |
| NIST Status | Oracle has not publicly announced NIST PQC standard adoption timelines for OCI services. JDK PQC support is in progress. |
| Deprecation Timeline | Oracle has not published PQC migration timelines for OCI. Follow NIST and CNSA 2.0 guidance for planning. |
| Replaced By | OCI services will need to migrate to ML-KEM for key exchange and ML-DSA for signatures when Oracle deploys PQC support |
Scan your OCI environment with QScout to identify cryptographic dependencies. Monitor Oracle's security advisories for PQC announcements. Consider application-level PQC encryption for sensitive data in transit.
QScout discovers every instance of Oracle Cloud across your infrastructure in 7 days — with zero operational disruption. 72-hour time to first findings.