In this digital age, what risks are posed to your tenants, staff, visitors and assets from vulnerabilities in Internet connected smart building systems and devices? This article aims to help you understand the cyber security issues associated with ‘smart’ building systems and Internet of Things (IoT) connected devices and why they are important – NB you can find out more at the Secure IoT
Buildings are becoming increasingly connected and ‘Smart’ with the deployment of sensors, IoT networks, analytics and their integration with building management systems (BMS), building automation systems (BAS) and other systems (e.g. security, fire detection and alarms, occupancy, environmental, parking.
Smart Buildings can generate a deluge of data however, predictive analytics, machine learning and other branches of artificial intelligence (AI) allow managers and Smart Buildings Systems to ‘intelligently’ optimise the use of assets, operations and the consumption of resources. This optimisation offers potential benefits to users, owners and managers of buildings including:
- Savings in energy and water usage and the resulting reduction in costs and carbon footprint
- Improved working conditions, safety and security for occupants
- Improved customer service levels
- Visibility and management of occupancy levels
- Optimisation of resources (physical, space and human)
- Reduced maintenance costs
As well as the benefits, it is important to consider the risks of introducing new technology and devices. IT Cyber Security risks are not new, however, the proliferation of connected IoT devices introduces new system elements and components that can be exposed to possible attacks (attack surface) and mechanisms by which the attack can take place (attack vectors).
The risk to an organisation or individual through poor security practice could impact:
- Share price
- Costs (operational, replacement, sales, legal, fines etc.)
- Health & Safety
Threats to Smart Buildings
Threats to Smart Buildings can come from a number of difference sources or ‘actors’ including financially motivated cyber criminals, states and state-sponsored groups, hacktivists and malicious insiders (employees).
In 2012, Hackers exploited vulnerabilities in industrial heating systems [ref 1
] which were connected to the internet, and then changed the temperature inside the buildings. They utilised a flaw in the building management software.
Security research company, Pen Test Partners, have demonstrated [ref 2
] how poor installation by electricians and HVAC engineers who don’t understand security can lead to BMS controllers being exposed on the public internet and vulnerable to attacks that, for instance, could sabotage: HVAC devices to close offices or cause life threatening issues at healthcare facilities. A simple search on Shodan [ref 3]
, the search engine for Internet-connected devices can reveal thousands of insecure BMS systems across the globe.
Bring your own IoT Device or Network or Shadow IoT – the use of unauthorised Internet of Things devices and networks poses a new level of threats for enterprises. A 2018 Infoblox report
[ref 4] found that:
- A third of enterprise companies have more than 1,000 shadow-IoT devices connected to their networks on a typical day
- A quarter of US employees are unclear as to whether their organization has an IoT security policy
- 20 percent of UK employees rarely or never follow security policy for personal and IoT devices
In 2017, it was revealed that criminals had managed to steal 10GB of data from a North American casino high-roller database via an internet connected thermometer in a lobby aquarium [ref 5
]. The internet connected fish tank allowed it to be remotely monitored, automatically adjust temperature and salinity, and automate feedings.
Your building could become part of Botnet to launch Distributed Denial of Service (DDoS) attacks. In 2016, Mirai malware infected CCTV video cameras and digital video recorders and was used to launch a DDoS attack [ref 6
] that caused a massive Internet outage affecting Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix. Mirai scours the Web for IoT devices protected by little more than factory-default usernames and passwords, and then enlists the devices in attacks that hurl junk traffic at an online target until it can no longer accommodate legitimate visitors or users
Cybersecurity Best Practice
It is not feasible to eliminate all risks from Smart Buildings. Protecting your investments requires a structured approach to implementing and maintaining security best practice, policies and procedures. This approach is well illustrated and documented by the US National Institute of Standards and Technology (NIST), “Framework for Improving Critical Infrastructure Cybersecurity
” [ref 7] which:
“Provides a common language for understanding, managing, and expressing cybersecurity risk to internal and external stakeholders. It can be used to help identify and prioritize actions for reducing cybersecurity risk, and it is a tool for aligning policy, business, and technological approaches to managing that risk. It can be used to manage cybersecurity risk across entire organizations, or it can be focused on the delivery of critical services within an organization.”
The NIST Framework Core provides a set of activities to achieve specific cybersecurity outcomes, and references examples of guidance to achieve those outcomes. The main Core Functions are Identify, Protect, Detect, Respond, and Recover. The Functions should be performed concurrently and continuously to form an operational culture that addresses dynamic cybersecurity risk. Core activities include:
- Management Governance
- Risk Assessment
- Threat Modelling
- Security by Design (throughout the enterprise and system of systems) and leveraging Defence in Depth
- Procurement (specifying security requirements for products)
- Supply Chain processes (ensuring security is maintained throughout and at source)
- Secure Implementation processes
- Testing and Validation
- Secure Maintenance and Lifecycle Management (including security software updates)
- Training for system administrators and an enterprise monitoring plan to watch for suspicious events within the building network
- Detection of Anomalies and Events
- Continuous Security Monitoring
- Incident response plan to effectively respond to cyber security incidents as they occur
- Vulnerability disclosure
- Recovery and Resilience processes and plans to restore services in the event of a security event
- Physical access controls to provide wider visibility across the physical and electronic space
Security investments should be balanced against the effect of undesirable outcomes. Balancing should be grounded in a realistic assessment of the threats, the risks they pose and how they might prevent the system from fulfilling its intended functions. Costs should be evaluated, and a rational selection of implementation choices made to deliver an acceptable return on investment. In preparing for your risk assessment you might like to consider e.g.:
- Have you identified your critical digital assets? Not all systems and data are created equal.
- Have you identified which systems are critical for health and safety reasons and therefore must be fail-safe?
- Do you have and maintain lists of all your assets (devices, software, and any sensitive information/data)? If so, do you know who has access to them and where the data resides?
- Are you able to detect unusual behaviour/activity on your network/do you use real time monitoring solutions?
- Would you know if a rogue device came on to the system?
- If the building systems are attacked do you have processes and policies in place and are your staff familiar with these?
These and other questions are important for a Smart Building’s stakeholders to carefully weigh up throughout its lifecycle from design to decommissioning especially given the legal and health and safety requirements which relate to data protection and duty of care.
IoT SF Smart Buildings Working Group
The IoT Security Foundation
[ref 8] recently published a White Paper ‘Can you Trust your Smart Building?
’ [ref 9] and is seeking to encourage people from Smart Building stakeholder groups to engage with their Smart Buildings Work Group and provide input as they develop best practice security guidance in this area. To find out how you can be involved with the Smart Buildings Working Group, please contact:
Secure IoT 2019, Internet of Things Cybersecurity Conference
If you would like to:
- Learn about the security issues, risks, threats and vulnerabilities associated with IoT systems and connected devices
- Gain an understanding IoT security best practice
- Meet leading cyber security experts and companies offering security products, solutions and services
I encourage you to come along to Secure IoT 2019
, Internet of Things Cybersecurity conference, on 7th November at the Green Park Conference Centre, Reading, RG2 6GP, UK.
The following organisations, publications and/or standards have been used for the source of references in this document:
1. Fast Company, April 2013, “Cybercriminals Hack Into Factory”
2. Pen Test Partners, “Too cold to work? School closed? Sure your BMS hasn’t been hacked?”
3. Shodan, “search engine for Internet-connected devices”
4. Infoblox, May 2018, “Infoblox research finds explosion of personal and IoT devices on enterprise networks introduces immense security risk”
5. Forbes, July, 2017, ” Criminals Hacked A Fish Tank To Steal Data From A Casino
6. KrebsonSecurity, October 2016 “Hacked cameras, DVRs Powered Todays Massive Internet Outage:
7. National Institute of Standards and Technology, “Framework for Improving Critical Infrastructure Cybersecurity”
8. Internet of Things Security Foundation
9 Internet of Things Security Foundation, June 2019, “Can you trust your Smart Building?”