Back to Home
ASSA Abloy Cliq

Adapting to the CER Directive: Organizational Changes in Facility Management and ICT


Adapting to the CER Directive: Organizational Changes in Facility Management and ICT
(Part 2 of our CER Series)

 

 

With the enforcement of the Critical Entities Resilience (CER) Directive across the European Union, critical infrastructure operators are facing not just a compliance challenge, but a strategic shift in how their organizations are structured and managed — particularly within Facility Management and Information & Communication Technology (ICT) departments.

 

The CER Directive, which aims to ensure the resilience of critical entities against a broad spectrum of risks, requires far-reaching changes that affect operational protocols, governance models, and internal collaboration frameworks.

 


 

 

1. Facility Management: From Maintenance to Mission-Critical Security

 

Historically viewed as operational support, Facility Management (FM) is now elevated to a frontline security role under CER:

  • Access Control Becomes Strategic: FM must now manage access systems in accordance with risk-based criteria. This includes implementing electronic access control, auditable key management, and integration with identity systems.

  • Redefinition of Critical Zones: Facilities must be zoned based on risk profiles. FM departments are responsible for conducting risk assessments, labeling high-risk areas, and ensuring that access to these areas is monitored and controlled.

  • Emergency Preparedness Planning: CER mandates robust continuity planning. FM must now play a key role in scenario planning, managing evacuation protocols, physical redundancies, and emergency communication infrastructure.

  • Collaboration with Security and ICT: FM teams must now work closely with ICT and security departments to unify physical and digital safeguards — a departure from siloed facility operations.

 


 

2. ICT: From Support System to Integrated Risk Engine

 

The CER Directive expands the role of ICT beyond traditional cybersecurity, placing it at the heart of resilience planning and real-time risk management:

  • Convergence of Physical and Logical Access: ICT must integrate facility access controls (e.g., smart locks, badge systems) with digital identity platforms like Microsoft Entra ID or SailPoint to enforce role-based access policies that span both physical and digital realms.

  • Compliance and Reporting Architecture: ICT is now responsible for ensuring that systems generate compliant audit logs, access reports, and anomaly alerts — data that is essential for CER audits and incident response.

  • Resilience by Design: Infrastructure must be re-engineered for fault tolerance and disaster recovery. This includes redundant network paths, cloud failovers, and secure remote access solutions for key staff.

  • Cyber-Physical Risk Models: ICT departments are required to participate in joint risk assessments with FM, modeling hybrid threat scenarios where cyber-attacks have physical consequences (e.g., disabling HVAC in a data center).

 


 

3. Cross-Functional Governance and New Roles

 

The CER Directive fosters a convergence of responsibilities, requiring organizations to rethink governance structures:

  • Creation of a Chief Resilience Officer (CRO): Many organizations are introducing this new role to bridge the gap between security, operations, FM, and ICT.

  • Resilience Committees: Cross-functional committees including FM, ICT, HR, legal, and security are being formed to monitor compliance and guide policy.

  • Training & Awareness: Both FM and ICT staff require upskilling in risk analysis, regulatory frameworks, and incident coordination.

 


 

Conclusion

The CER Directive is more than a compliance requirement — it is a transformation trigger. Facility Management and ICT are no longer peripheral services; they are now central to an organization’s resilience posture. For critical entities, the challenge lies not only in updating systems, but in aligning people, processes, and technology around a shared mission: the protection of Europe’s most vital infrastructure.

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.