Back to Home
ASSA Abloy Cliq

The Overlap Between NIS2 and CER: What Critical Entities Need to Know


 

The Overlap Between NIS2 and CER: What Critical Entities Need to Know

In the evolving landscape of European cybersecurity and infrastructure protection, two major regulations stand out: the NIS2 Directive (Network and Information Security) and the CER Directive (Critical Entities Resilience). While they originate from different policy domains — cybersecurity versus infrastructure resilience — they are closely interlinked in both intent and impact.

Understanding their overlap is essential for critical entities aiming to stay compliant, avoid duplication, and build a unified resilience strategy.

 

Shared Objectives

Both NIS2 and CER aim to strengthen the resilience of entities that provide essential services across the EU, such as:

  • Energy

  • Water

  • Transport

  • Digital infrastructure

  • Health

  • Public administration

Key shared goals include:

  • Preventing and mitigating the impact of disruptions, whether digital (cyberattacks) or physical (sabotage, natural disasters),

  • Promoting risk-based approaches to security,

  • Ensuring incident reporting and response readiness,

  • Encouraging a coordinated European approach to critical infrastructure protection.

Key Differences

KeyDifNIS2CER

Despite these differences, NIS2 and CER converge in several operational areas.

 

Points of Convergence

1. Risk Management and Governance

Both directives require a structured approach to risk management:

  • Under NIS2, this includes cybersecurity controls like access management, encryption, and patching.

  • Under CER, entities must assess risks to operational continuity, including supply chain dependencies, natural hazards, and malicious attacks.

Unified approach: Organizations should adopt an integrated risk framework that accounts for both digital and physical threats.

 

2. Incident Reporting

Both directives enforce mandatory incident reporting:

  • NIS2: Notify the competent authority/CSIRT within 24 hours after a cyber incident.

  • CER: Report any significant disruption (including physical sabotage, natural disasters, or third-party failure) as soon as possible.

Unified approach: Implement centralized incident response procedures and ensure legal, cybersecurity, and operations teams are aligned on what qualifies as reportable.

 

3. Supply Chain Security

Both frameworks recognize third-party risk as a key vulnerability:

  • NIS2 demands measures for managing digital supply chain risk (e.g. software providers, MSPs).

  • CER emphasizes supplier dependencies for physical infrastructure and operations.

Unified approach: Use vendor risk assessments, contracts with security clauses, and access management systems (such as IAM and electronic key management) to manage supplier access.

 

4. Resilience Planning

  • NIS2 entities must ensure the availability, integrity, authenticity and confidentiality of systems.

  • CER requires a formal resilience plan covering contingency, continuity, and recovery in case of disruptions.

Unified approach: Integrate business continuity planning (BCP) and disaster recovery (DR) into both cybersecurity and physical operations, with regular testing and audits.

 

Strategic Alignment Tips

  • Appoint a single accountable function (CISO, CRO, or Resilience Officer) to coordinate NIS2 and CER efforts.

  • Centralize asset, access, and risk data in a shared platform.

  • Invest in tools that bridge cybersecurity and physical security, such as:

    • IAM platforms (e.g. Microsoft Entra, SailPoint),

    • Smart key systems (e.g. ASSA ABLOY CLIQ or iLOQ),

    • Logging and auditing solutions (e.g. Key2XS).

     

Conclusion

The NIS2 and CER directives are two sides of the same coin: resilient, secure, and protected critical infrastructure. By understanding their overlap and aligning efforts, organizations can reduce complexity, avoid duplicated effort, and strengthen their defenses against both digital and physical threats.

 

About Key2XS

Key2XS helps critical entities unify their physical and digital access strategies by integrating CLIQ smart keys into IAM platforms like Entra ID and SailPoint. Our platform supports full compliance with NIS2 and CER, providing automated provisioning, incident logging, and real-time auditing across your infrastructure and supply chain.

Learn more on how Key2XS can help your organization to become CER & NIS2 compliant at https://key2xs.com/whitepaper-nis2-cer

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.