Back to Home
ASSA Abloy Cliq

Coordinated Break-In at Power Plant Thwarted by Rapid CRO and CISO Response


Coordinated Break-In at Power Plant Thwarted by Rapid CRO and CISO Response

A cyber-physical attack meets a well-prepared CER strategy

 

A Coordinated Attack

At exactly 3:17 AM on a Tuesday morning, the Security Operations Center (SOC) of a regional power plant detects a sequence of anomalous log-ins across internal systems. Simultaneously, the physical access control system reports multiple unauthorized door openings in the facility’s high-voltage control area despite no scheduled maintenance or personnel on site.

Within minutes, it becomes clear: this is a coordinated attack, targeting both IT infrastructure and physical security layers. The attackers are attempting to force a controlled blackout by manipulating power distribution systems while bypassing on-site access control.

 

Crisis Response: CRO and CISO in Sync

The Chief Information Security Officer (CISO) is alerted through the SIEM system. At the same time, the Chief Resilience Officer (CRO) receives an alert via the critical asset protection system, which monitors physical perimeter and access events. Thanks to procedures established under the Critical Entities Resilience (CER) directive, both officers know exactly how to respond, swiftly, decisively, and in coordination.

Within 10 minutes, the CISO initiates the cyber incident response plan, isolating network segments to prevent lateral movement by the attackers. In parallel, the CRO activates physical lockdown procedures: mechanical locks are engaged in critical areas, and on-site security teams are deployed in accordance with emergency protocols.

 

Containing the Threat

Investigation reveals that the attackers used cloned access badges and tampered surveillance cameras. On the cyber side, they leveraged stolen credentials combined with a zero-day exploit. However, audit logs from the access control system and anomaly detection within the Identity & Access Management (IAM) layer are triggered in time, allowing the response team to isolate the breach and cut off access before any damage can be done.

Within 45 minutes, the threat is contained. No systems are compromised, power distribution remains stable, and the public is unaware of how close they came to a blackout.

 

Attack Contained, But Not Without Consequences

The attackers, who used cloned access cards and advanced intrusion techniques, are blocked within 45 minutes. No actual damage is done, no blackout, no safety risks, no public fallout.

However, under CER and NIS2 regulations, the story doesn’t end there.

 

Mandatory Reporting Obligations

Both directives impose strict incident notification rules:

  • Under CER, incidents that significantly disrupt operations or pose a threat to public safety or security must be reported to the national competent authority without undue delay.

  • Under NIS2, incidents affecting network and information systems, even if no damage occurred, must be reported within 24 hours to the CSIRT (Computer Security Incident Response Team) and the supervisory authority.

In this case, although the impact was mitigated, the attempt itself meets the threshold of both directives: it targeted essential services and exploited system vulnerabilities.

 

Failure to Report = Legal Risk

Non-compliance with CER or NIS2 can result in:

  • Regulatory fines or sanctions

  • Increased scrutiny from national authorities

  • Damage to the company’s license to operate

  • Potential criminal liability if negligence is involved

Thanks to their proactive coordination and clear documentation trail, the CRO and CISO are able to submit a complete post-incident report within hours — meeting compliance standards and avoiding further consequences.

 

Lessons Learned

This attempted breach highlights the growing reality of hybrid threats — where physical and digital vectors are used together. It also demonstrates the value of joint governance: without clear responsibility, aligned crisis playbooks, and real-time coordination between the CISO and CRO, this incident could have led to significant infrastructure failure, public disruption, and reputational harm.

This case highlights three critical lessons:

  1. Hybrid threats are the new normal — requiring integrated digital + physical response.

  2. CER and NIS2 are not just red tape — they create real incentives to be ready.

  3. Preparedness pays off — not just in security, but in compliance and continuity.

 

“Security is no longer just an IT issue or a facilities matter. With CER and NIS2 in effect, it’s a board-level responsibility.”
— CRO, Regional Power Plant

 

 

About Key2XS bluckey

Key2XS connects physical key systems (like ASSA ABLOY CLIQ and iLOQ) to digital IAM platforms (Microsoft Entra ID, OKTA, SailPoint, One Identity), automating access, enhancing auditing, and enabling instant response.

By helping organizations align with CER and NIS2 from day one, Key2XS empowers both CROs and CISOs to protect, respond, and report all from a single pane of glass.

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.