A BMS remains essential, but is it secure?

1 May 2017 Surveillance, Integrated Solutions

Building management systems (BMS) have come a long way. They don’t just manage the physical environment of facilities, these platforms now enable the integration, and centralise the control of multiple building systems. Their role is becoming more, not less, important as these systems begin to converge with IT and enterprise systems. However, increased integration creates security loopholes. Is the BMS a weak link?

With more integration and distribution of information between systems, there is greater opportunity to hack into sensitive enterprise systems. It’s a very real risk. The challenge is that it’s difficult to share and keep systems secure, especially when the core functionality of systems is different. Security systems are built to protect people and assets. BMS functionality, because it is focused on managing an internal environment, is not usually security-oriented. Care thus needs to be taken with regard to how systems share information, as well as how much and what information they share.

For example, it may be effective to share basic occupancy information, such as how many people are working in which parts of the facility, to assist the BMS to make decisions about where lighting and ventilation may be switched off; it may be a security risk to also share detailed personal information about who these people are.

Security standards – let’s shake on it

The standards and the technology each system uses will also differ. BMS’s make use of open systems which make it easier to share non-critical information, such as temperatures within the facility, the performance of HVAC equipment and energy usage. Enterprise systems containing sensitive information generally require authentication before granting access.

To get around this, Johnson Controls has found that cybercriminals will make use of systems with low-level security to get into more critical enterprise systems – for a hacker, for instance, it may be just a hop and a skip to the company’s HR database via a controller that is part of a company’s access control system which is being fed information about which areas of a facility a card holder may access. And once inside the enterprise system, access to sensitive customer data is within reach.

To combat this, Johnson Controls has built additional Dark Node security into its Metasys BMS solution that ensures secure handshakes between devices. This capability makes it difficult for hackers to simulate different devices and hack into a system. It’s something that has become increasingly important to be aware of as the computing capacity and the intelligence of controllers – the basic hardware components that make access control systems work, opening and closing doors and turn on the sprinklers when the smoke alarms go off– continue to grow, opening security loopholes that heighten threat risks.

Secure BMS’s are here to stay

Will BMS’s be replaced by, or converge with other solutions like physical security information management (PSIM) software? The short answer is no, the functionality of the BMS is too advanced, too specific and valuable to be easily replaced. What users can expect is greater interoperability between BMS and other systems along with a stronger focus on what is shared, how it is shared, and what information is stored. In other words, security awareness and implementation of security measures within BMS systems will become non-negotiable.

The strategic roadmap for BMS platforms will see them continue to advance, becoming easier to install and operate. Users can expect more interoperability with a lot more plug-and-play integration and wireless information sharing. The winners, however, will be those platforms that put the right security and sharing processes in place to ensure the enterprise, its assets, people and customers are secure.

For more information contact Johnson Controls, +27 (0)11 921 7141, neil.cameron@jci.com, www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter investigations in Security Center SaaS
Genetec Surveillance
Genetec has announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Smarter security for real-world challenges
Secutel Technologies Surveillance
SecuVue connects existing CCTV cameras directly to the cloud, delivering exception-based alerts instead of endless footage. Visual Messenger ensures every alert and event reaches the control room securely and instantly.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.