Back to Home
ASSA Abloy Cliq

Why Revoking Access Instantly is a Non-Negotiable in a Digital Key System


 

Why Revoking Access Instantly is a Non-Negotiable in a Digital Key System

In an era of heightened cyber-physical threats and growing regulatory pressure, the ability to instantly revoke access is no longer a luxury — it’s a critical requirement. For organizations managing critical infrastructure, remote personnel, or contractor ecosystems, traditional key systems fall dangerously short. Physical keys, once distributed, are almost impossible to track, let alone retract. This creates a gaping security vulnerability.

 

The Risk of Irreversible Access

In conventional mechanical systems, losing a key means replacing locks, re-issuing new keys, and often, compromising operations while doing so. More dangerously, there’s no way of knowing who has access, who used a key, or when. In critical sectors such as energy, telecom, water, and transportation, that’s a compliance and operational disaster waiting to happen.

 

Electronic Keys: Secure, Smart, and Revocable

Electronic key systems — such as ASSA ABLOY CLIQ or iLOQ — change the game. When paired with an identity access management (IAM) system like Microsoft Entra ID or SailPoint, organizations can:

  • Revoke access rights in real-time

  • Reprogram keys remotely

  • Log every use with full audit trails

  • Enforce time- and location-bound access

This means that if an employee leaves the company or a contractor’s assignment ends, their key access can be deactivated immediately, without physically retrieving anything.

 

Regulatory Pressure: CER, NIS2 and Beyond

European directives such as the CER Directive and NIS2 demand end-to-end access control — including for physical assets. This implies more than just assigning roles; it means proving that access can be revoked the moment a threat emerges. Electronic key systems with centralized access management are the only viable solution for compliance.

 

Real-World Scenarios Where Revocation is Critical

  1. Contractor Overstay: A subcontractor finishes work but still has an active key — a potential insider threat.

  2. Urgent Dismissal: A staff member is terminated immediately, yet their key provides lingering access.

  3. Lost or Stolen Key: A key goes missing at a high-security site, requiring instant revocation to prevent unauthorized entry.

  4. Access Escalation Detection: Anomalous behavior triggers the automatic deactivation of physical keys via AI rules.

 

The Key2XS Advantage

Key2XS integrates digital key systems with your IAM — enabling automated revocation based on IAM triggers, AI detection, or scheduled expiry. Access is no longer something you hope is under control — it’s provable, auditable, and immediately retractable.

 

Conclusion: No More Blind Trust

Relying on physical keys without the ability to revoke them is akin to leaving your server room door unlocked. In today’s hybrid threat landscape, real-time revocation is the new baseline for responsible access control — and Key2XS makes it not only possible, but automatic.

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.