Europe’s Critical Entities Resilience (CER) Directive raises the bar for the resilience of transport infrastructure, rail, aviation, maritime/ports, road, bridges and tunnels, depots, intermodal terminals, and supporting energy/ICT sites. Operators must harden both physical and digital controls, prove supply-chain oversight, and demonstrate fast incident response.
Key2XS bridges Identity & Access Management (IAM) with electronic key systems (e.g., ASSA ABLOY CLIQ, iLOQ), turning physical keys and cylinders into policy-driven, auditable, and revocable entitlements. The result: fewer standing privileges, cleaner audits, and measurably better resilience all aligned with CER (and complementary to NIS2).
Risk-based resilience: Identify critical assets and dependencies; reduce single points of failure across sites, doors, cabinets, and OT enclosures.
Controls that actually work: Appropriate and proportionate physical protections, access governance, incident handling, business continuity, and supply-chain controls.
Evidence & reporting: Prove who had access, when, and why; show timely incident notification and corrective measures as required by national transposition.
Third-party oversight: Ensure contractors and vendors follow equivalent controls especially for time-bound, role-based physical access.
Standing keys and shared badges that are hard to revoke across regions, depots, and contractors.
Siloed systems: IAM governs apps; key systems govern doors and cabinets creating blind spots in audits.
Manual processes: Paper authorizations and key safes slow emergency response and complicate investigations.
OT exposure: Cabinets for SCADA, signaling, PIDS/CCTV, telecoms, and power distribution still rely on mechanical or locally programmed locks.
Fragmented vendors: Multiple key systems per geography or business unit.
Unify identities: Connect Microsoft Entra ID, Okta, SailPoint, One Identity to electronic key systems via Key2XS.
Role & zone-based policies: Grant access by role (e.g., “Rail Signaling Technician L2”) and zones (depots, signal boxes, trackside cabinets, sub-stations, airside doors, fuel farms, cranes, berth power).
Just-in-Time (JIT) keys: Keys activate only for the approved job window and locations; expire automatically.
Break-glass with guardrails: Emergency access that’s logged, geo/zone-constrained, and time-boxed.
Forensic audit trails: Who accessed which asset, when, with which key, and under which change ticket.
Offline tolerance: Keys and cylinders operate even with intermittent connectivity; sync when back online.
Contractor onboarding/off-boarding: Automate access windows per contract, task order, or permit-to-work.
Attestation flows: Require periodic re-approval of contractor access; auto-revoke if attestations lapse.
Unified logs: Send physical-access events to your SIEM/SOC alongside IT/OT telemetry to spot hybrid threats.
Risk signals: Flag anomalous patterns (e.g., repeated after-hours attempts on signaling cabinets).
Evidence packs on demand: Export audit-ready reports for inspections and post-incident reviews.
Policy verifiability: Show that physical keys obey the same IAM policies as digital entitlements.
Data protection: Key2XS uses pointer-based integrations so personal data can remain in your IAM; EU hosting and GDPR-aligned processing by design.
Rail
Trackside & interlocking cabinets, signal boxes, power/telecom huts, depot workshops, rolling-stock maintenance bays.
JIT access tied to work orders; automatic revocation at shift end; audit trail mapped to asset IDs.
Aviation (airports & ANSP sites)
Airside doors, comms rooms, fuel farms, navigation aids shelters.
Role-based zones (airside/landside/critical) with escorted-access rules and incident “hold & review” workflows.
Maritime & ports
Gatehouses, cranes, berth power cabinets, ICS/OT rooms, bonded warehouses.
Temporary vendor access for crane maintenance—valid only during berth slot time windows.
Road, bridges & tunnels
Control rooms, ventilation and pump cabinets, SCADA panels in shafts and lay-bys.
Emergency crews receive time-boxed keys for incident response; all actions logged to the SOC.
Northbound: IAM (Entra ID/Okta/SailPoint/One Identity) → Key2XS policy engine.
Southbound: Key2XS → Electronic key systems (CLIQ, iLOQ, etc.).
Sidecar: SIEM/SOC for event ingestion; ITSM/CMMS for work orders and approvals.
Edge reality: Keys/cylinders support offline operation; mobile app for on-site activation where required.
Weeks 0–2 – Foundations
Connect IAM; import org roles; inventory sites, zones, keys/cylinders; map contractors.
Weeks 3–6 – Pilot & JIT
Select a corridor/terminal/yard; enable JIT keys for maintenance & emergency crews; stream logs to SIEM.
Weeks 7–10 – Scale & automate
Add additional vendors/sites; switch on AI-assisted keyplan recommendations and SoD (segregation of duties).
Align SOC playbooks for hybrid incidents.
Weeks 11–13 – Prove & optimize
Demonstrate KPIs; finalize audit packs; tune policies and renewal/attestation cadences.
“No standing keys in critical zones; JIT only with ticket reference.”
“Contractor keys auto-expire at end-of-shift and on contract termination.”
“Dual-approval for airside critical cabinets; emergency override requires post-incident review.”
“SoD: no single role grants both signaling access and network core access within the same 24-hour window.”
Time to provision/revoke physical access.
% of JIT vs. standing physical entitlements.
Number of access exceptions and remediation time.
Contractor onboarding time and attestation compliance.
Mean time to correlate physical + cyber events in hybrid incidents.
Audit readiness: time to compile evidence for a site/zone.
Works with your IAM (Entra/Okta/SailPoint/One Identity).
Supports your key system vendors (CLIQ, iLOQ, etc.) and mixed estates.
JIT activation, offline operation, and emergency break-glass with full audit.
SIEM/SOC, ITSM/CMMS integrations and API coverage.
EU hosting & GDPR-aligned design (pointer-based identity).
Evidence exports for inspections and post-incident reporting.
Risk reduction: Fewer standing privileges; faster, safer incident response.
Operational efficiency: No couriered keys or manual safes; less admin churn.
Compliance confidence: Clear evidence for CER inspections and complementary NIS2 audits.
Scalability: One policy layer across multi-vendor, multi-site estates.
CER pushes transport operators to treat physical access like any other critical entitlement, least privilege, JIT, monitored, and revocable. Key2XS makes that practical at scale, unifying your IAM, your vendors, and your field reality into one policy-driven, auditable framework.