Cybersecurity in Planning, Tendering, and Operation
Effective cybersecurity begins in the planning and tendering phases, even though tenants and end users may be unknown during construction. Proper documentation, network segmentation, and system design that keep functionality local help mitigate complexity and improve security. Monitoring strategies must be established to detect faults and breaches promptly. Role and authorization management systems should be implemented early to control user access and permissions, avoiding shared accounts and unauthorized entry.
IT and OT Network Considerations
BACS cybersecurity involves coordination between IT (Information Technology) and OT (Operational Technology) stakeholders, who often have differing priorities. IT networks focus on confidentiality, integrity, and availability of data, while OT networks prioritize availability, safety, and integrity of physical processes. Aligning these priorities and clearly assigning responsibilities is essential for effective cybersecurity management.
Assessment and Responsibilities
Clear assignment of responsibility and accountability among stakeholders, including system integrators and contractors, ensures effective risk management and decision-making throughout the system lifecycle.
Network Segmentation and Management
A robust OT security strategy must define architecture, network segmentation, patch and asset management, emergency management, and risk assessment. Network segmentation isolates BACS components into secure zones, controlling communication between segments via firewalls and access control lists. Micro-segmentation is recommended for isolating less secure devices or legacy systems.
Conclusion
A fault-resilient BACS with strong segmentation, distributed control, and local functionality not only ensures operational reliability but also provides robust defense against cybersecurity threats. Systems like ABB’s i-bus KNX exemplify this approach by minimizing vulnerabilities and enhancing overall security.