IoT Smart Building Security
Your building systems are your largest unmanaged attack surface. BACnet controllers, Modbus devices, HVAC systems, access control panels, and CCTV networks create entry points that traditional IT security does not cover. Our CREST-accredited consultants assess the full building automation estate: protocol vulnerabilities, default credentials, physical-to-cyber pivots, and network segmentation.
Six Attack Surfaces.
One Assessment.
Smart building security spans BMS protocols, IoT devices, access control systems, CCTV infrastructure, and network segmentation. We assess the full building automation estate in a single engagement.
IoT Device Discovery & BMS Enumeration
Comprehensive identification of BMS components and IoT devices across property infrastructure. We discover BACnet devices (HVAC controllers, air handling units, chillers), Modbus TCP devices, access control panels (Paxton, Gallagher, Salto), CCTV, smart lighting (DALI, KNX), and environmental sensors using Shodan, Censys, and protocol-specific enumeration.
BACnet & Modbus Protocol Assessment
Testing of industrial protocol security for building automation. We assess BACnet vulnerabilities (unauthenticated read/write to HVAC setpoints, device discovery abuse), Modbus TCP security (unencrypted control commands, register manipulation), LonWorks, KNX, and DALI lighting protocol weaknesses enabling unauthorized environmental control.
Default Credential Testing & Config Review
Testing of default and weak credentials across BMS platforms: Johnson Controls Metasys, Schneider Electric EcoStruxure, Siemens Desigo, Honeywell EBI, and Tridium Niagara. Configuration review identifies unencrypted protocols, exposed admin interfaces, and weak credential policies.
Physical-to-Cyber Attack Paths
Assessment of physical security bypasses enabling cyber attacks: HVAC equipment cabinet access (unlocked BACnet controllers in basement plant rooms), network jack exploitation, and pivot paths from building systems to corporate IT. Testing validates data center environmental sabotage, physical access bypass via door controller manipulation, and corporate network compromise through poorly segmented building automation.
Access Control & CCTV Security Testing
Specialized testing of physical security systems: proximity card cloning, Wiegand protocol interception, Bluetooth relay attacks on smart locks, Z-Wave/Zigbee weaknesses, CCTV default credentials, RTSP stream interception, and GDPR compliance for surveillance systems.
Network Segmentation Validation
Assessment of network isolation between building automation and corporate IT: BMS VLAN segregation, firewall rules preventing IoT-to-corporate pivots, guest/tenant network isolation, and CCTV network boundaries. We validate that BMS compromise cannot cascade into tenant data or corporate systems.
Smart Building Risk Profile
Building Management Systems and IoT devices are among the most overlooked attack surfaces in commercial property. Legacy protocols and default credentials create systemic exposure.
Default Credentials
Of BMS platforms assessed retain factory default passwords on HVAC controllers, access panels, and admin interfaces.
BMS Devices Online
BACnet and Modbus devices directly accessible from the internet, discovered via Shodan and Censys scanning.
DC Sabotage Cost
Potential damage from HVAC sabotage in data centres: server overheating, cooling failure, and business interruption.
Controls
When Do Organisations Commission BMS Testing?
Smart building security assessments are typically triggered by one of these six scenarios. If any of these apply, you are in the right place.
New Smart Building Commissioning
A new smart building or BMS upgrade is approaching commissioning and you need to validate that IoT, HVAC, and access control systems are isolated from tenant and corporate networks.
Data Centre Environmental Risk
Your data centre relies on BMS-controlled cooling. You need assurance that HVAC manipulation cannot cause server overheating, cooling failure, or fire suppression triggers.
Access Control Bypass Concern
Proximity card cloning, smart lock Bluetooth relay attacks, or door controller default credentials have been identified as a risk. You need independent validation of physical security systems.
CCTV GDPR Compliance Audit
Your CCTV and surveillance systems need GDPR Article 32 validation: default credentials, encrypted streams, access controls, retention policies, and data protection impact assessment.
Tenant Network Segmentation
You manage multi-tenant buildings, co-working spaces, or managed offices and need to validate that building automation networks are isolated from tenant environments.
Building Safety Act Compliance
Building Safety Act 2022 mandates require evidence that BMS integration does not compromise fire safety systems, and that building control systems are secured against unauthorized manipulation.
Mapped directly to your compliance controls.
Our CREST-certified report includes compliance mapping for Building Safety Act requirements and IoT security frameworks relevant to smart building operators.
UK GDPR
Appropriate technical measures for CCTV and access control data
ETSI EN 303 645
Consumer and commercial IoT device security baseline
Building Safety Act
Control system security for high-rise and commercial buildings
PSTI Act
Product Security and Telecommunications Infrastructure Act
Cyber Essentials
Baseline certification covering IoT and building network controls
ISO 27001
ISMS standard covering OT and IoT asset management
Globally Accredited Consultants
All testing is conducted by CREST-certified professionals with IoT and OT expertise.
Engagement Workflow
Structured to minimise operational friction and maximise the value of the testing window.
Asset Discovery & BMS Mapping
Comprehensive enumeration of BMS components, IoT devices, access control panels, and CCTV infrastructure. Internet exposure analysis via Shodan and internal network scanning from tenant/guest networks.
Protocol & Credential Testing
BACnet/Modbus vulnerability assessment, default credential testing across all BMS platforms, configuration review identifying unencrypted protocols and exposed administrative interfaces.
Segmentation & Pivot Validation
Network isolation testing between building automation, tenant, and corporate networks. Attempted lateral movement from compromised IoT devices to corporate domains and tenant data.
Reporting & Hardening Guidance
Encrypted delivery of technical and executive reports, followed by debrief call, BMS hardening roadmap, and free 90-day retest of remediated critical and high-severity findings.
What You Get
Every smart building security engagement includes the following deliverables, formatted for both technical teams and facilities management.
Reports are delivered via encrypted portal with role-based access. Includes free 90-day retest of remediated critical and high-severity findings.
Close the Loop.
After the Assessment.
Your BMS assessment identifies what is exploitable today. We feed those exact findings into our 24/7 Managed SOC and continuous vulnerability management, building custom detection rules for your building automation systems, IoT devices, and access control infrastructure.
Explore Defensive Services24/7 SOC Monitoring
Custom detection rules for BMS networks, IoT devices, and building automation protocols.
Managed Detection & Response
Continuous monitoring across building management platforms and smart building infrastructure.
IoT & OT Assessment
Dedicated industrial control system and operational technology security assessment.
Incident Response
Retainer-based response for BMS compromise, physical security breaches, and data center incidents.
Full Penetration Testing Catalogue
Comprehensive penetration testing services tailored to your environment.
Internal Testing
Post-perimeter assessments targeting Active Directory, lateral movement, privilege escalation, and segmentation validation from inside your network.
The best time to test your defences is now.
Join the high-growth companies relying on Precursor for continuous offensive and defensive security.
Frequently Asked Questions
Common questions about this service, methodologies, and deliverables.
A Building Management System (BMS) is a centralized control platform managing HVAC (heating, ventilation, air conditioning), lighting, access control, fire alarms, and environmental monitoring across commercial buildings, data centers, hospitals, and smart residential developments. BMS platforms (Johnson Controls Metasys, Schneider Electric EcoStruxure, Siemens Desigo, Honeywell EBI, Tridium Niagara) use industrial protocols like BACnet and Modbus to control thousands of IoT devices including HVAC controllers, air handling units, chillers, boilers, and environmental sensors. Security is critical because: unauthorized BMS access enables environmental sabotage (data center cooling failure causing server damage, hospital HVAC manipulation affecting patient care), physical access bypass (manipulating access control systems to unlock doors), privacy violations (accessing CCTV feeds without authorization), and corporate network compromise (poorly segmented BMS networks providing pivot paths to business systems). Data centers are particularly vulnerable: HVAC sabotage can cause multi-million pound damage within hours.
BMS platforms suffer pervasive security weaknesses due to legacy industrial control system design priorities (availability over security) and long deployment lifecycles (10 to 30 year system lifespans): default credentials are endemic across major vendors (Johnson Controls Metasys 'sysagent:sysagent', Schneider Electric TAC Vista 'Admin:Admin', Siemens Desigo 'admin:admin', Tridium Niagara 'admin:admin'), unencrypted protocols expose building control traffic (BACnet and Modbus lack authentication and encryption by design), internet-exposed BMS interfaces discovered via Shodan (tens of thousands of HVAC controllers directly accessible from internet), weak authentication on administrative interfaces (no multi-factor authentication, password complexity not enforced), and poor network segmentation allowing pivots from BMS compromise to corporate IT networks. Real-world impacts include unauthorized temperature manipulation in data centers causing cooling failures and hardware damage, access control bypass unlocking secure areas, and CCTV access violating tenant privacy.
BACnet (Building Automation and Control Network) and Modbus TCP are industrial protocols controlling HVAC, lighting, and environmental systems, both designed without security controls in the 1970s to 1990s predating modern cyber threats. BACnet vulnerabilities include: no authentication for read/write operations (anyone on BMS network can manipulate HVAC setpoints, override temperature controls, disable ventilation), device discovery abuse (unauthenticated enumeration revealing building automation infrastructure), broadcast manipulation (spoofing Who-Is requests to map entire BACnet networks), and object property writes (changing values controlling temperature, airflow, pressure). Modbus TCP weaknesses: no authentication mechanism (any client can read/write registers controlling industrial equipment), unencrypted communications (credentials and control commands transmitted in plaintext), register manipulation (directly altering values controlling motors, valves, setpoints), and no integrity checking (attackers can modify commands without detection). Exploitation scenarios: data center HVAC manipulation causing overheating and multi-million pound equipment damage, hospital environmental control sabotage affecting patient safety, and unauthorized building access via access control manipulation.
Data center Building Management Systems present catastrophic cyber-physical attack surfaces because environmental control is essential for server operation. Servers generate immense heat requiring precise cooling (21 to 27°C operating range, humidity 40 to 60% RH). BMS compromise enables: HVAC manipulation causing cooling failure (attackers disable chillers or close cooling vents causing server overheating and automatic shutdowns to prevent hardware damage), temperature setpoint manipulation (gradual temperature increases degrading server performance before triggering alarms), humidity control sabotage (excessive humidity causing condensation and short circuits, low humidity increasing electrostatic discharge risks), fire suppression system manipulation (false alarm triggering causing data center evacuation and inert gas discharge destroying servers), and power monitoring system attacks (disabling UPS alerts or manipulating power distribution). Real-world financial impacts: server damage from overheating (£500K to £5M+ depending on data center tier and redundancy), business interruption (£50K to £500K per hour for critical services), regulatory fines (GDPR for data unavailability), and reputational damage to data center operators. BMS segmentation is essential: isolate environmental controls from corporate IT and implement monitoring detecting unauthorized setpoint changes.
Network segmentation is the most effective control protecting Building Management Systems and IoT devices from cyber attacks by isolating building automation networks from corporate IT and guest/tenant networks. Effective segmentation requires: dedicated VLANs for building automation (separate BACnet/Modbus traffic from corporate networks), firewall rules preventing lateral movement (block IoT device access to corporate domains, restrict BMS management to dedicated admin workstations), access control network isolation (separate badge readers and door controllers from business networks preventing physical access bypass), CCTV network segregation (isolate surveillance infrastructure protecting privacy and preventing unauthorized camera access), and management interface restrictions (BMS administrative portals accessible only from dedicated admin VLANs, not corporate networks or internet). Without segmentation, BMS compromise enables corporate network pivot attacks: attackers gain access to building controller with default credentials, move laterally to corporate network due to flat network architecture, and compromise business systems stealing tenant data or deploying ransomware. Data centers require highest segmentation rigor: environmental sabotage causing cooling failure can destroy servers within hours.
Smart locks and electronic access control systems suffer multiple vulnerability classes enabling physical access bypass: proximity card cloning (125 kHz HID Prox cards cloned using £20 devices within seconds, 13.56 MHz Mifare Classic cards cracked using known cryptographic weaknesses), wiegand protocol interception (unencrypted badge data transmitted between readers and controllers allowing man-in-the-middle capture and replay), Bluetooth relay attacks (attackers extend smartphone-based credential range unlocking doors remotely without authorization), mobile app API flaws (RESTful APIs controlling cloud-connected locks often lack proper authentication enabling unauthorized unlock commands), default credentials on door controllers (Paxton, Gallagher, Salto panels frequently deployed with factory passwords), and network-based attacks (poorly segmented access control networks allowing manipulation from corporate IT or guest networks). Real-world scenarios: luxury residential buildings with smartphone locks vulnerable to Bluetooth relay enabling property entry without authorization, commercial offices with cloned proximity cards providing unrestricted building access bypassing visitor logs, and data centers with compromised access control APIs allowing attackers to unlock equipment cages remotely. GDPR implications: unauthorized CCTV access via access control integration exposes surveillance footage violating data protection requirements.
Smart building operators face multiple regulatory obligations: GDPR (General Data Protection Regulation) applies to CCTV surveillance, access control logs, and environmental monitoring capturing personal data requiring: lawful basis for processing (legitimate interests for security, consent for employee monitoring in private areas like bathrooms/changing rooms), privacy notices informing building occupants of surveillance, data minimization (cameras only in necessary locations, not private spaces), retention limits (typically 30 days for CCTV, access logs retained for security investigations), security controls (encrypted video streams, authentication on camera management systems, access controls preventing unauthorized viewing), and breach notification to ICO within 72 hours if surveillance footage is compromised. Building Safety Act 2022 mandates for high-rise residential (18m+ or 7 storeys+): fire alarm system integrity (BMS integration must not compromise fire safety systems), building control system security (prevent unauthorized manipulation of safety-critical systems), and accountable person responsibilities for building system safety. Property sector liabilities: GDPR fines up to £17.5M or 4% turnover for surveillance data breaches, Building Safety Act enforcement actions for control system failures affecting fire safety, and civil liability for inadequate access control enabling unauthorized entry and subsequent criminal offenses on property.



