Back to Home
ASSA Abloy Cliq

Why IGA-Controlled Electronic Key Systems Are Essential Under the CER Directive


Why IGA-Controlled Electronic Key Systems Are Essential Under the CER Directive

The EU’s CER Directive (Directive on the Resilience of Critical Entities) has brought a significant shift in how critical infrastructure sectors—such as energy, transport, water, and health—must approach security and operational resilience. As the directive emphasizes organizational, physical, and cybersecurity measures, Identity Governance & Administration (IGA) systems integrated with electronic key systems emerge as a non-negotiable component of compliance and risk mitigation.

 

The Weak Link: Traditional Key Management

Critical infrastructure still relies heavily on mechanical key systems. These systems lack auditability, are prone to human error, and offer little protection against insider threats or unauthorized access. Lost or unreturned keys can expose physical systems to sabotage, theft, or cascading disruptions—risks the CER Directive aims to eliminate.

Moreover, traditional key control is siloed from digital access governance. That disconnect leads to poor visibility, fragmented incident response, and a lack of accountability—issues explicitly addressed in the CER’s demand for end-to-end security governance.

 

CER Requirements That Demand a New Approach

The CER Directive compels operators of essential services to:

  • Map all critical assets and their dependencies, both physical and digital.

  • Ensure only authorized personnel have access to critical infrastructure.

  • Implement continuous access control, monitoring, and auditing.

  • Respond to incidents and revoke access quickly.

  • Prove compliance through evidence-based reporting.

These requirements make manual key management systems insufficient and highlight the need for integration between physical security and digital identity governance.

 

The Role of IGA in Physical Access Management

IGA platforms like SailPoint, One Identity, or Microsoft Entra ID are already standard for digital identity control. When integrated with electronic key systems such as ASSA ABLOY’s CLIQ or iLOQ, these platforms extend identity governance into the physical realm:

  • Centralized access provisioning: Grant or revoke both digital and physical access in a single workflow.

  • Time-based and role-based key activation: Ensure keys are only active when and where they are needed.

  • Automated de-provisioning: No risk of ex-employees or contractors retaining physical access.

  • Audit trails and reporting: Complete visibility of who accessed what, when, and why—essential for incident response and regulatory compliance.

 

IGA + Electronic Keys = Full-Spectrum Access Governance

By connecting IGA systems with electronic key platforms, critical entities achieve holistic access governance. This alignment creates a seamless link between organizational roles and physical access rights, ensuring that changes in employment status, role, or contract instantly cascade into physical key permissions.

This also dramatically improves incident response capabilities. For example, in the event of a breach or security risk, keys can be remotely revoked or deactivated within seconds—something impossible with mechanical keys.

 

Aligning with CER and NIS2 Synergy

While the CER focuses on physical resilience and organizational security, its sister directive NIS2 zeroes in on cybersecurity. Integrating IGA with electronic key systems ensures dual compliance, creating a unified security fabric that satisfies both directives’ demands for:

  • Zero-trust access

  • Identity verification

  • Asset protection

  • Evidence-based security governance

 

Conclusion: A Strategic Necessity, Not a Technical Nice-to-Have

Under the CER Directive, electronic key systems controlled by IGA platforms are no longer optional—they’re a critical foundation for compliance, accountability, and operational resilience.

Organizations that embrace this integration will not only protect their infrastructure from evolving threats but also position themselves for regulatory approval, reduced liability, and greater trust from public authorities and partners.

Those who fail to modernize risk non-compliance, penalties, and worst of all—vulnerabilities that could have been prevented.

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.