The Critical Entities Resilience (CER) Directive is a new initiative in the EU that aims to ensure that critical entities providing essential services are effectively managing their network and information security. The CER Directive is part of the EU’s latest effort to build stronger cyber resilience across Europe, alongside NIS2 and the EU Cyber Resilience Act.
This article will provide an overview of the CER Directive, focus on its key objectives, how organizations can achieve compliance with the directive, and who it applies to.
See how UpGuard helps businesses become more cyber resilient >
The Critical Entities Resilience Directive was first proposed by the European Commission in 2020, which highlighted the need for EU nations to significantly upgrade the cyber resilience of their network and information systems, especially for critical infrastructure sectors.
The CER Directive entered into force on 16 January 2023, which effectively replaces the 2008 ECI Directive (European Critical Infrastructure Directive), one of the key initiatives in the European Programme for Critical Infrastructure Protection (EPCIP). The Directive aims to build upon the foundations set by its predecessor, which originally only addressed protection for the transportation and energy sectors.
The CER Directive represents a significant step in the European Union's efforts to enhance the security and resilience of entities that are important for maintaining the provision of essential services. The Directive acknowledges that previously existing measures were insufficient in preventing disruptions due to measures only protecting individual assets and not the service providers as a whole.
Part of the initial proposal for the CER Directive identified the growing rate of vulnerabilities that critical infrastructures face, ranging from natural disasters to cyber attacks, and the growing need for cross-border collaboration and information sharing. The EU Cyber Solidarity Act addresses this and aims to increase cross-border information sharing between Member States.
The primary objectives of the CER Directive are centered around three key areas:
The CER Directive outlines key obligations that each critical entity must subject to ensure cyber resiliency and a high level of cybersecurity across all sectors. Here are some of the main obligations that require action from each Member State:
Each Member State must adopt a strategy or resilience plan to enhance cyber resilience, which must include the following elements:
Risk assessments must cover all relevant risks, whether inherent or residual, natural or man-made, that could cause potential security incidents and operational disruptions. Risk assessments must be performed every four years at minimum, in which Member States must report all findings to the Commission.
Identification of critical entities must follow this criteria:
Member States must also update their list of critical entities at least once every four years.
Member States are required to support the critical entities in their territory, which includes providing guidance materials and methodology, assistance in strategy implementation, supporting testing of resiliency, and training for all critical entity personnel. Additionally, Member States must maintain good communication with representatives of each critical entity to exchange information and share good practices.
To carry out the objectives of the Directive, Member States must consult with other Member States, whenever appropriate, regarding critical entities, especially when:
In addition to Article 5, in which risk assessments are carried out by Member States, Article 12 mandates that critical entities must carry out their own risk assessments, in regards to all relevant risks. Risk assessment findings must be reviewed by a competent authority, in which the competent authority can declare compliance with relevant obligations in the Directive.
Critical entities that suffer a security incident must notify the competent authorities of the Member State within 24 hours after becoming aware of the incident. Details surrounding the incident that must be included are:
If a Member State requests an advisory mission from the Commission, the Commission must organize a team of experts from the Member State to assess the measures put forth by the critical entity. The advisory mission is tasked with providing guidance to the critical entity for improving resilience and assessing the success of established measures. The Commission bears all the costs for organizing the advisory mission, as part of the CER Directive.
Competent authorities established by each Member State must maintain the authority and responsibility to:
The power for the Commission to adopt delegated acts begins on 16 January 2023, for a period of five years. Delegated acts are actions taken upon consultation with experts in each Member State, which can vary with each state. However, delegated acts cannot change the nature of the Directive and must include the objectives laid out by the Directive. Delegated acts must also be submitted and approved by the Commission and Council before they can come into force.
The CER Directive requires that each EU Member State must publish measures that comply with the CER Directive into their respective national laws or national legislations by 17 October 2024. Enforcement of those measures must be applied beginning 18 October 2024.
Additionally, all Member States must adopt a full strategy for enhancing the cyber resilience of critical entities, as laid out by the CER Directive, by 17 January 2026. Additionally, Member States must establish a non-exhaustive list of critical entities by 23 November 2023 and perform a risk assessment, which must be completed by 17 January 2026. Identification of critical entities across all critical sectors and subsectors must be completed by each Member State by 17 July 2026.
By 17 January 2027, the Commission must submit a summary of actions taken by each Member State to the Critical Entities Resilience Group (CERG), which must be completed every four years hereafter. By 17 July 2027, the European Commission must also submit an evaluation and report to the European Parliament and European Council detailing the extent to which each Member State has implemented the measures that comply with the CER Directive.
Regulatory enforcement of the CER Directive will be the responsibility of competent authorities designated by each Member State. These authorities will oversee the implementation of measures and compliance with the CER Directive, and determine the penalties for non-compliance.
The CER Directive also establishes the Critical Entities Resilience Group (CERG), which will assist in facilitating cooperation between Member States and the Commission. The Commission will be in charge of CERG and establishing best practices for information sharing in relation to critical infrastructure entities.
Article 18 also requires designated competent authorities to inform the competent authorities under the NIS2 Directive of each critical entity’s CER Directive compliance and may request a cybersecurity evaluation of the critical entity under NIS2 obligations.
The CER Directive covers all critical entities that provide services deemed essential for societal and economic well-being. Article 14 of the Directive states that critical entities are identified as “entities that provide critical services to or in more than one-third of Member States.” These entities operate across eleven main sectors, including:
To comply with the CER Directive, critical entities can take several key steps:
Both the CER Directive and NIS2 are major initiatives that aim to improve the overall cybersecurity posture in the EU. The CER Directive directly complements NIS2 objectives by aiming to enhance the security and resilience of critical infrastructures and essential services by establishing an operational framework for critical entities to adhere to.
The CER Directive also extends the scope of resilience measures to include a broader range of entities. This comprehensive approach continues upon a unified resilience strategy across the EU while future-proofing against emerging threats and changing threat landscapes.