With the enforcement of the Critical Entities Resilience (CER) Directive across the European Union, critical infrastructure operators are facing not just a compliance challenge, but a strategic shift in how their organizations are structured and managed — particularly within Facility Management and Information & Communication Technology (ICT) departments.
The CER Directive, which aims to ensure the resilience of critical entities against a broad spectrum of risks, requires far-reaching changes that affect operational protocols, governance models, and internal collaboration frameworks.
Historically viewed as operational support, Facility Management (FM) is now elevated to a frontline security role under CER:
Access Control Becomes Strategic: FM must now manage access systems in accordance with risk-based criteria. This includes implementing electronic access control, auditable key management, and integration with identity systems.
Redefinition of Critical Zones: Facilities must be zoned based on risk profiles. FM departments are responsible for conducting risk assessments, labeling high-risk areas, and ensuring that access to these areas is monitored and controlled.
Emergency Preparedness Planning: CER mandates robust continuity planning. FM must now play a key role in scenario planning, managing evacuation protocols, physical redundancies, and emergency communication infrastructure.
Collaboration with Security and ICT: FM teams must now work closely with ICT and security departments to unify physical and digital safeguards — a departure from siloed facility operations.
The CER Directive expands the role of ICT beyond traditional cybersecurity, placing it at the heart of resilience planning and real-time risk management:
Convergence of Physical and Logical Access: ICT must integrate facility access controls (e.g., smart locks, badge systems) with digital identity platforms like Microsoft Entra ID or SailPoint to enforce role-based access policies that span both physical and digital realms.
Compliance and Reporting Architecture: ICT is now responsible for ensuring that systems generate compliant audit logs, access reports, and anomaly alerts — data that is essential for CER audits and incident response.
Resilience by Design: Infrastructure must be re-engineered for fault tolerance and disaster recovery. This includes redundant network paths, cloud failovers, and secure remote access solutions for key staff.
Cyber-Physical Risk Models: ICT departments are required to participate in joint risk assessments with FM, modeling hybrid threat scenarios where cyber-attacks have physical consequences (e.g., disabling HVAC in a data center).
The CER Directive fosters a convergence of responsibilities, requiring organizations to rethink governance structures:
Creation of a Chief Resilience Officer (CRO): Many organizations are introducing this new role to bridge the gap between security, operations, FM, and ICT.
Resilience Committees: Cross-functional committees including FM, ICT, HR, legal, and security are being formed to monitor compliance and guide policy.
Training & Awareness: Both FM and ICT staff require upskilling in risk analysis, regulatory frameworks, and incident coordination.
The CER Directive is more than a compliance requirement — it is a transformation trigger. Facility Management and ICT are no longer peripheral services; they are now central to an organization’s resilience posture. For critical entities, the challenge lies not only in updating systems, but in aligning people, processes, and technology around a shared mission: the protection of Europe’s most vital infrastructure.