Precursor Security
BMS & Building Automation Penetration Testing

IoT Smart Building Security

Your building systems are your largest unmanaged attack surface. BACnet controllers, Modbus devices, HVAC systems, access control panels, and CCTV networks create entry points that traditional IT security does not cover. Our CREST-accredited consultants assess the full building automation estate: protocol vulnerabilities, default credentials, physical-to-cyber pivots, and network segmentation.

BACnet/Modbus Testing
BMS Penetration Testing
Access Control Bypass
Scroll
Testing Methodology

Six Attack Surfaces.
One Assessment.

Smart building security spans BMS protocols, IoT devices, access control systems, CCTV infrastructure, and network segmentation. We assess the full building automation estate in a single engagement.

BMS Discovery

IoT Device Discovery & BMS Enumeration

Comprehensive identification of BMS components and IoT devices across property infrastructure. We discover BACnet devices (HVAC controllers, air handling units, chillers), Modbus TCP devices, access control panels (Paxton, Gallagher, Salto), CCTV, smart lighting (DALI, KNX), and environmental sensors using Shodan, Censys, and protocol-specific enumeration.

Protocol Security

BACnet & Modbus Protocol Assessment

Testing of industrial protocol security for building automation. We assess BACnet vulnerabilities (unauthenticated read/write to HVAC setpoints, device discovery abuse), Modbus TCP security (unencrypted control commands, register manipulation), LonWorks, KNX, and DALI lighting protocol weaknesses enabling unauthorized environmental control.

Credentials

Default Credential Testing & Config Review

Testing of default and weak credentials across BMS platforms: Johnson Controls Metasys, Schneider Electric EcoStruxure, Siemens Desigo, Honeywell EBI, and Tridium Niagara. Configuration review identifies unencrypted protocols, exposed admin interfaces, and weak credential policies.

Physical-Cyber

Physical-to-Cyber Attack Paths

Assessment of physical security bypasses enabling cyber attacks: HVAC equipment cabinet access (unlocked BACnet controllers in basement plant rooms), network jack exploitation, and pivot paths from building systems to corporate IT. Testing validates data center environmental sabotage, physical access bypass via door controller manipulation, and corporate network compromise through poorly segmented building automation.

Access Control

Access Control & CCTV Security Testing

Specialized testing of physical security systems: proximity card cloning, Wiegand protocol interception, Bluetooth relay attacks on smart locks, Z-Wave/Zigbee weaknesses, CCTV default credentials, RTSP stream interception, and GDPR compliance for surveillance systems.

Segmentation

Network Segmentation Validation

Assessment of network isolation between building automation and corporate IT: BMS VLAN segregation, firewall rules preventing IoT-to-corporate pivots, guest/tenant network isolation, and CCTV network boundaries. We validate that BMS compromise cannot cascade into tenant data or corporate systems.

Risk Telemetry

Smart Building Risk Profile

Building Management Systems and IoT devices are among the most overlooked attack surfaces in commercial property. Legacy protocols and default credentials create systemic exposure.

Critical
85%

Default Credentials

Of BMS platforms assessed retain factory default passwords on HVAC controllers, access panels, and admin interfaces.

Shodan Exposed
40K+

BMS Devices Online

BACnet and Modbus devices directly accessible from the internet, discovered via Shodan and Censys scanning.

Max Impact
£5M+

DC Sabotage Cost

Potential damage from HVAC sabotage in data centres: server overheating, cooling failure, and business interruption.

Mapped
Controls
UK GDPRArticle 32
ETSI 303 645IoT Security
Building SafetyAct 2022
PSTI ActProduct Security
Common Triggers

When Do Organisations Commission BMS Testing?

Smart building security assessments are typically triggered by one of these six scenarios. If any of these apply, you are in the right place.

New Smart Building Commissioning

A new smart building or BMS upgrade is approaching commissioning and you need to validate that IoT, HVAC, and access control systems are isolated from tenant and corporate networks.

Data Centre Environmental Risk

Your data centre relies on BMS-controlled cooling. You need assurance that HVAC manipulation cannot cause server overheating, cooling failure, or fire suppression triggers.

Access Control Bypass Concern

Proximity card cloning, smart lock Bluetooth relay attacks, or door controller default credentials have been identified as a risk. You need independent validation of physical security systems.

CCTV GDPR Compliance Audit

Your CCTV and surveillance systems need GDPR Article 32 validation: default credentials, encrypted streams, access controls, retention policies, and data protection impact assessment.

Tenant Network Segmentation

You manage multi-tenant buildings, co-working spaces, or managed offices and need to validate that building automation networks are isolated from tenant environments.

Building Safety Act Compliance

Building Safety Act 2022 mandates require evidence that BMS integration does not compromise fire safety systems, and that building control systems are secured against unauthorized manipulation.

Auditor Ready

Mapped directly to your compliance controls.

Our CREST-certified report includes compliance mapping for Building Safety Act requirements and IoT security frameworks relevant to smart building operators.

UK GDPR

Article 32

Appropriate technical measures for CCTV and access control data

ETSI EN 303 645

IoT Security

Consumer and commercial IoT device security baseline

Building Safety Act

2022

Control system security for high-rise and commercial buildings

PSTI Act

Product Security

Product Security and Telecommunications Infrastructure Act

Cyber Essentials

CE+ Certification

Baseline certification covering IoT and building network controls

ISO 27001

Annex A.8.8

ISMS standard covering OT and IoT asset management

CREST

Globally Accredited Consultants

All testing is conducted by CREST-certified professionals with IoT and OT expertise.

Verify Accreditation
Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction and maximise the value of the testing window.

Step 01

Asset Discovery & BMS Mapping

Comprehensive enumeration of BMS components, IoT devices, access control panels, and CCTV infrastructure. Internet exposure analysis via Shodan and internal network scanning from tenant/guest networks.

Step 02

Protocol & Credential Testing

BACnet/Modbus vulnerability assessment, default credential testing across all BMS platforms, configuration review identifying unencrypted protocols and exposed administrative interfaces.

Step 03

Segmentation & Pivot Validation

Network isolation testing between building automation, tenant, and corporate networks. Attempted lateral movement from compromised IoT devices to corporate domains and tenant data.

Step 04

Reporting & Hardening Guidance

Encrypted delivery of technical and executive reports, followed by debrief call, BMS hardening roadmap, and free 90-day retest of remediated critical and high-severity findings.

Deliverables

What You Get

Every smart building security engagement includes the following deliverables, formatted for both technical teams and facilities management.

BMS & IoT Security Assessment Report with device inventory, protocol vulnerabilities, and lateral movement analysis across building automation infrastructure
BACnet/Modbus Protocol Assessment with unauthenticated control validation, device enumeration findings, and setpoint manipulation evidence
Access Control Security Report covering proximity card cloning, smart lock vulnerabilities, Wiegand interception, and door controller exploitation
Network Segmentation Validation confirming BMS, tenant, and corporate network isolation with attempted pivot findings
CCTV & Surveillance GDPR Assessment covering default credentials, stream encryption, retention compliance, and data protection measures
CVSS v3.1 scored technical findings with proof-of-concept evidence and developer-ready remediation guidance
Executive Summary formatted for board presentation, facilities management, and Building Safety Act compliance evidence

Reports are delivered via encrypted portal with role-based access. Includes free 90-day retest of remediated critical and high-severity findings.

After Testing

Close the Loop.
After the Assessment.

Your BMS assessment identifies what is exploitable today. We feed those exact findings into our 24/7 Managed SOC and continuous vulnerability management, building custom detection rules for your building automation systems, IoT devices, and access control infrastructure.

Explore Defensive Services
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

A Building Management System (BMS) is a centralized control platform managing HVAC (heating, ventilation, air conditioning), lighting, access control, fire alarms, and environmental monitoring across commercial buildings, data centers, hospitals, and smart residential developments. BMS platforms (Johnson Controls Metasys, Schneider Electric EcoStruxure, Siemens Desigo, Honeywell EBI, Tridium Niagara) use industrial protocols like BACnet and Modbus to control thousands of IoT devices including HVAC controllers, air handling units, chillers, boilers, and environmental sensors. Security is critical because: unauthorized BMS access enables environmental sabotage (data center cooling failure causing server damage, hospital HVAC manipulation affecting patient care), physical access bypass (manipulating access control systems to unlock doors), privacy violations (accessing CCTV feeds without authorization), and corporate network compromise (poorly segmented BMS networks providing pivot paths to business systems). Data centers are particularly vulnerable: HVAC sabotage can cause multi-million pound damage within hours.

BMS platforms suffer pervasive security weaknesses due to legacy industrial control system design priorities (availability over security) and long deployment lifecycles (10 to 30 year system lifespans): default credentials are endemic across major vendors (Johnson Controls Metasys 'sysagent:sysagent', Schneider Electric TAC Vista 'Admin:Admin', Siemens Desigo 'admin:admin', Tridium Niagara 'admin:admin'), unencrypted protocols expose building control traffic (BACnet and Modbus lack authentication and encryption by design), internet-exposed BMS interfaces discovered via Shodan (tens of thousands of HVAC controllers directly accessible from internet), weak authentication on administrative interfaces (no multi-factor authentication, password complexity not enforced), and poor network segmentation allowing pivots from BMS compromise to corporate IT networks. Real-world impacts include unauthorized temperature manipulation in data centers causing cooling failures and hardware damage, access control bypass unlocking secure areas, and CCTV access violating tenant privacy.

BACnet (Building Automation and Control Network) and Modbus TCP are industrial protocols controlling HVAC, lighting, and environmental systems, both designed without security controls in the 1970s to 1990s predating modern cyber threats. BACnet vulnerabilities include: no authentication for read/write operations (anyone on BMS network can manipulate HVAC setpoints, override temperature controls, disable ventilation), device discovery abuse (unauthenticated enumeration revealing building automation infrastructure), broadcast manipulation (spoofing Who-Is requests to map entire BACnet networks), and object property writes (changing values controlling temperature, airflow, pressure). Modbus TCP weaknesses: no authentication mechanism (any client can read/write registers controlling industrial equipment), unencrypted communications (credentials and control commands transmitted in plaintext), register manipulation (directly altering values controlling motors, valves, setpoints), and no integrity checking (attackers can modify commands without detection). Exploitation scenarios: data center HVAC manipulation causing overheating and multi-million pound equipment damage, hospital environmental control sabotage affecting patient safety, and unauthorized building access via access control manipulation.

Data center Building Management Systems present catastrophic cyber-physical attack surfaces because environmental control is essential for server operation. Servers generate immense heat requiring precise cooling (21 to 27°C operating range, humidity 40 to 60% RH). BMS compromise enables: HVAC manipulation causing cooling failure (attackers disable chillers or close cooling vents causing server overheating and automatic shutdowns to prevent hardware damage), temperature setpoint manipulation (gradual temperature increases degrading server performance before triggering alarms), humidity control sabotage (excessive humidity causing condensation and short circuits, low humidity increasing electrostatic discharge risks), fire suppression system manipulation (false alarm triggering causing data center evacuation and inert gas discharge destroying servers), and power monitoring system attacks (disabling UPS alerts or manipulating power distribution). Real-world financial impacts: server damage from overheating (£500K to £5M+ depending on data center tier and redundancy), business interruption (£50K to £500K per hour for critical services), regulatory fines (GDPR for data unavailability), and reputational damage to data center operators. BMS segmentation is essential: isolate environmental controls from corporate IT and implement monitoring detecting unauthorized setpoint changes.

Network segmentation is the most effective control protecting Building Management Systems and IoT devices from cyber attacks by isolating building automation networks from corporate IT and guest/tenant networks. Effective segmentation requires: dedicated VLANs for building automation (separate BACnet/Modbus traffic from corporate networks), firewall rules preventing lateral movement (block IoT device access to corporate domains, restrict BMS management to dedicated admin workstations), access control network isolation (separate badge readers and door controllers from business networks preventing physical access bypass), CCTV network segregation (isolate surveillance infrastructure protecting privacy and preventing unauthorized camera access), and management interface restrictions (BMS administrative portals accessible only from dedicated admin VLANs, not corporate networks or internet). Without segmentation, BMS compromise enables corporate network pivot attacks: attackers gain access to building controller with default credentials, move laterally to corporate network due to flat network architecture, and compromise business systems stealing tenant data or deploying ransomware. Data centers require highest segmentation rigor: environmental sabotage causing cooling failure can destroy servers within hours.

Smart locks and electronic access control systems suffer multiple vulnerability classes enabling physical access bypass: proximity card cloning (125 kHz HID Prox cards cloned using £20 devices within seconds, 13.56 MHz Mifare Classic cards cracked using known cryptographic weaknesses), wiegand protocol interception (unencrypted badge data transmitted between readers and controllers allowing man-in-the-middle capture and replay), Bluetooth relay attacks (attackers extend smartphone-based credential range unlocking doors remotely without authorization), mobile app API flaws (RESTful APIs controlling cloud-connected locks often lack proper authentication enabling unauthorized unlock commands), default credentials on door controllers (Paxton, Gallagher, Salto panels frequently deployed with factory passwords), and network-based attacks (poorly segmented access control networks allowing manipulation from corporate IT or guest networks). Real-world scenarios: luxury residential buildings with smartphone locks vulnerable to Bluetooth relay enabling property entry without authorization, commercial offices with cloned proximity cards providing unrestricted building access bypassing visitor logs, and data centers with compromised access control APIs allowing attackers to unlock equipment cages remotely. GDPR implications: unauthorized CCTV access via access control integration exposes surveillance footage violating data protection requirements.

Smart building operators face multiple regulatory obligations: GDPR (General Data Protection Regulation) applies to CCTV surveillance, access control logs, and environmental monitoring capturing personal data requiring: lawful basis for processing (legitimate interests for security, consent for employee monitoring in private areas like bathrooms/changing rooms), privacy notices informing building occupants of surveillance, data minimization (cameras only in necessary locations, not private spaces), retention limits (typically 30 days for CCTV, access logs retained for security investigations), security controls (encrypted video streams, authentication on camera management systems, access controls preventing unauthorized viewing), and breach notification to ICO within 72 hours if surveillance footage is compromised. Building Safety Act 2022 mandates for high-rise residential (18m+ or 7 storeys+): fire alarm system integrity (BMS integration must not compromise fire safety systems), building control system security (prevent unauthorized manipulation of safety-critical systems), and accountable person responsibilities for building system safety. Property sector liabilities: GDPR fines up to £17.5M or 4% turnover for surveillance data breaches, Building Safety Act enforcement actions for control system failures affecting fire safety, and civil liability for inadequate access control enabling unauthorized entry and subsequent criminal offenses on property.