Back to Home
ASSA Abloy Cliq

How the CER Directive Drives Critical Entities Towards Electronic Key Systems


How the CER Directive Drives Critical Entities Towards Electronic Key Systems

As European critical entities prepare to comply with the CER Directive (Directive on the Resilience of Critical Entities), a key shift is occurring in physical security: the move from traditional mechanical key systems to electronic key systems. This transition is not just a trend—it’s a necessity shaped by the directive’s core requirements.

 

Understanding the CER Directive

The CER Directive mandates that operators of critical infrastructure—such as energy grids, transportation hubs, water supply, and digital infrastructure—enhance their resilience against both physical and cyber threats. Resilience is no longer just about firewalls and fences; it also includes access control, incident response, and continuous risk assessments.

 

Mechanical Keys: A Growing Liability

Traditional mechanical key systems fall short in key areas of compliance:

  • No Audit Trail: Mechanical systems can’t log who used a key, when, and where.

  • No Revocation: Lost or stolen keys require rekeying, which is costly and operationally disruptive.

  • No Real-Time Response: There’s no way to remotely disable or reassign a physical key in real-time.

For critical infrastructure where availability, integrity, and control are paramount, these shortcomings present unacceptable risks.

 

Electronic Key Systems: A CER-Compliant Solution

Electronic key systems—like ASSA ABLOY’s CLIQ or iLOQ—enable fine-grained, centralized control over physical access. Here’s how they directly support CER compliance:

1. Traceability and Auditability

  • Every access event is logged and stored.

  • Security officers and CROs can generate detailed reports for compliance and post-incident reviews.

2. Real-Time Revocation

  • If a contractor’s access needs to be revoked due to policy violation or a detected threat, it can be done instantly.

  • This minimizes the risk window—key to resilience under the CER.

3. Integration with Identity Platforms

  • Modern electronic key systems integrate with IAM platforms like Microsoft Entra ID, SailPoint, and OKTA.

  • This enables unified access control, combining digital and physical identity into one lifecycle-managed entity.

4. Role-Based Access Control

  • Permissions can be set per role, department, or site—supporting the CER’s focus on proportional, risk-based access policies.

5. Remote Management

  • Electronic keys can be issued, updated, or revoked remotely, aligning with the CER’s emphasis on business continuity in crisis scenarios.

 

Cost vs. Risk: A Changing Equation

While mechanical systems have lower upfront costs, the long-term operational and compliance costs are much higher. In the context of CER, non-compliance or poor incident response can result in legal liability, reputational damage, and regulatory penalties. Electronic systems reduce these risks significantly, making them the smarter investment.

 

Conclusion: CER is the Catalyst for Modernization

The CER Directive accelerates the modernization of physical security. As threats grow more complex and compliance standards tighten, critical entities must abandon outdated key management practices. Electronic key systems not only meet the CER’s technical and organizational requirements—they future-proof operations in an increasingly interconnected and regulated environment.

For critical infrastructure operators, the question is no longer if they should upgrade, but how fast they can make the switch.

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.