Back to Home
ASSA Abloy Cliq

CER Compliance Reporting: Best Practices for Supply Chain Resilience


CER Compliance Reporting: Best Practices for Supply Chain Resilience

The Critical Entities Resilience (CER) Directive places strict demands on critical infrastructure operators across the EU. One of the core requirements is the ability to report on compliance, both internally and to supervisory authorities. The supply chain is explicitly identified as a key area of risk. In this article, we explore how critical entities can build compliant reporting practices and which best practices to apply for managing third-party risks.

 

Reporting Obligations under the CER Directive

Critical entities must:

  • Conduct risk assessments, including supply chain risks,

  • Develop and maintain a resilience plan,

  • Report significant incidents to national authorities,

  • Demonstrate the implementation of appropriate technical and organizational measures – including those applied to suppliers and contractors.

In practice, this means organizations need a systematic, verifiable approach to monitoring, logging, auditing, and documentation.

 

Best Practice 1: Map and Classify Your Supply Chain

Start by identifying which suppliers and subcontractors have a direct or indirect impact on your critical operations. Classify them based on:

  • Criticality to your services,

  • Geographic exposure (e.g., non-EU entities),

  • Security posture (e.g., IAM maturity, certifications).

Use frameworks like NIST Cyber Supply Chain Risk Management or ISO/IEC 28000 to guide your classification process.

 

Best Practice 2: Enforce and Verify Security Clauses

Integrate CER-specific requirements into your procurement contracts, such as:

  • Mandatory incident reporting within 24 hours,

  • Periodic security audits,

  • Access to audit logs or security assessments.

Actively verify compliance through vendor security assessments, penetration testing, or automated compliance scanning tools.

 

Best Practice 3: Centralize Physical and Digital Access

Third-party access to physical infrastructure or digital systems should be managed centrally through Identity & Access Management (IAM). Recommended measures include:

  • Time-bound access based on job role or contract duration,

  • Logging of physical access using smart key systems like ASSA ABLOY CLIQ or iLOQ,

  • Automated provisioning and deprovisioning via platforms like Key2XS.

This significantly reduces the risk of unauthorized access and supports full traceability for compliance reporting.

 

Best Practice 4: Standardize Your Reporting Format

Ensure you can produce CER-aligned reports quickly and accurately. These reports should include:

  • Incident logs (who, what, when, resolution),

  • Access logs (employees and contractors),

  • Audit results,

  • Evidence of applied controls per vendor.

Use tooling that aggregates, timestamps, and structures these logs automatically – ideally integrated with your GRC or IAM platform.

 

Continuous Improvement: Beyond Compliance

CER compliance is not a one-off exercise but a continuous process of risk mitigation and improvement. Establish an annual review cycle where audit results and incident reports are used to refine internal policies and supply chain controls.

 

Conclusion

Robust CER compliance reporting starts with transparency – across your organization and throughout your supply chain. By actively managing third-party risks, automating access controls, and standardizing your reporting practices, you’ll build a resilient infrastructure that meets the directive and withstands modern threats.

 

About Key2XS
Key2XS provides a unique SaaS platform for managing both physical and digital access within a single IAM-governed environment. With native integrations for ASSA ABLOY CLIQ, Microsoft Entra ID, and SailPoint, we help critical entities achieve full CER compliance – including logging, auditing, and supply chain control.

Learn more about Key2XS & CER/NIS2 at www.key2xs.com/whitepaper

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.