Problem solve Get help with specific problems with your technologies, process and projects.

The challenge of securing building management systems

Before we dive into it, a building management system (BMS) — or smart building technology — is an intelligent microprocessor-based controller network installed to monitor and control a building’s technical systems and services, such as air conditioning, heating, video surveillance and elevators. These services are essential for managing industrial operations. BMS and centralized building management systems enhance the management of industrial infrastructures and a building’s mechanical and electrical equipment.

The BMS system also controls energy consumption, boiler controls, lighting controls, the fire alarm system and plumbing water monitoring among other functions, with cost containment as the main focus.

The different systems used in a smart building. Source: SCADAfence

The rise of smart building technology

The use of BMS is growing at approximately 15% to 34% annually, according to ASIS International. By 2022, the BMS industry is expected to be worth around $104 billion.

BMSes are being implemented for an increasingly wide range of applications. While initial BMS systems were for heating, cooling and primarily used to reduce costs, today a huge range of smart devices are being used to increase worker productivity, reduce operational costs and secure businesses. While the headlines only catch the high-profile new smart buildings, the truth is that new BMS technologies are making their way into just about every type of structure. BMS systems are used to monitor and secure hospitals, datacenters, airports and hotels.

Security risks of smart building technology

Although BMS systems were never designed to be connected to the internet, it’s unrealistic to think they would remain as closed systems. In fact, the increasing number of interconnected smart devices opens them up to so many access points that it’s impossible to keep them isolated. Therefore, alongside the tremendous operational benefits of smart building technology, all these new devices and their interconnectivity introduce new cybersecurity risks.

With hundreds or thousands of devices in a building, the potential attack surfaces from unsecured devices are enormous, and the implications of the attacks can be more dramatic. There have been a few high-profile cyberattacks on businesses via a BMS. One instance was the BMS cyberattack against Target. Cyberattackers gained access to Target’s point-of-sale (POS) system software to obtain the credit and debit card data associated with over 110 million accounts.

The hackers did not directly attack the POS system. Instead, they began stealing login credentials used by Target’s heating, ventilation and air conditioning vendor when they connected to the Target web applications. It was through this attack vector that the hackers gained access to Target’s Active Directory and, ultimately, the Target POS system where they could collect credit card numbers and other sensitive data.

Other recent examples of how BMS systems can be attacked

BMS systems are considered operational technology (OT), and they differ from standard IT systems primarily because of the variety of devices, protocols and functionalities of the networks. BMS systems include embedded technologies that generate data, perform physical functions, and communicate using industry-specific OT protocols such as BACNet and LonWork. Given the BMS-specific protocols and the variety and multitudes of devices involved, the challenges of smart building security need to be addressed directly with security solutions designed specifically for those challenges. Below are a few examples of malicious attacks on BMS systems:

  •   Ransomware attacks can take control of critical systems, such as in the case of an hotel in Austria, where hotel residents were locked out of bedrooms.
  • Denial of service attacks can overload smart building systems and disrupt critical systems, such as heating during cold winter days.
  • Smart devices can be hacked to get access to the main IT systems of the entire company.

The unique challenges of smart building technology

The main distinction between BMS networks and other OT networks, such as those found in factories, is that smart buildings do not have a well-defined physical perimeter. Environments with BMS networks are characterized by a large number of visitors inside the physical perimeter. In an office building, hotel, apartment complex or even a hospital, hundreds or even thousands of guests might visit daily.

The definition of the access permissions constantly changes, increasing the possibility for breaches. It becomes overwhelmingly difficult to identify anomalous behavior. OT systems are generally spread all across a facility with many networking and access points, enabling various interfaces with the BMS network.

Another difficulty is comparing BMS networks to industrial control systems (ICS), and believing that smart building security can be controlled like ICS security. Quite the contrary: BMS networks are much more interconnected than ICS networks. Additionally, IoT devices are an important component of smart buildings and are less likely to be found in ICS systems.

Increasing control and visibility in BMS networks

To meet the security challenges of BMS networks, it is essential to have security systems that can discover every single device on a network, detect any rogue devices and detect activities that can endanger the operational stability of these critical devices.

By monitoring OT network traffic, behavior, and analyzing proprietary BMS protocols, such as LonWorks and BACNet, the idyllic solution quickly identifies and monitors every single device in any network. The solution also provides 100% monitoring of all traffic from all devices.

Security teams for BMS networks need to integrate a proven BMS security solution into each subsystem, such as access control and elevators on each floor of a building. Once they’re connected to the BMS network, the platform provides the visibility and monitoring capabilities required to gain control over their large-scale complex environments.

The network diagram for the OT security solution. Source: SCADAfence.

The core benefits of an ideal, scalable BMS network security solution should include:

  • Discovery and inventory management of all the devices throughout the building or campus.
  • A full, deep packet inspection support for proprietary protocols such as LonWorks and BACNet.
  • A non-intrusive monitoring system with zero influence on the performance of the smart devices in the network.
  • An adaptive, dynamic baseline that will learn about normative behavior and automatically detect any anomalies.
  • As BMS architecture develops, the ability to adapt immediately to new configurations and devices should be automated.
  • Should contain secure critical systems such as HVAC, elevators, surveillance and access control.
  • Easy to use and operate for both OT staff and IT staff.
  • Ability to seamlessly integrate BMS OT security into existing security controls.

All IoT Agenda network contributors are responsible for the content and accuracy of their posts. Opinions are of the writers and do not necessarily convey the thoughts of IoT Agenda.

CIO
Security
Networking
Data Center
Data Management
Close