Advise

Defense in Depth for Building Automation Systems

By May 19, 2026No Comments

Why Defense in Depth for Building Automation Can’t Wait

Building automation systems (BAS) control HVAC, lighting, and access across facilities ranging from manufacturing plants to smart buildings—yet they’re routinely left out of OT cybersecurity strategies. With hybrid threats targeting both IT and operational technology, that gap is no longer acceptable. Defense in depth for building automation isn’t a compliance exercise; it’s how you keep operations running when attackers come looking.

Asset Inventory: The Foundation of Defense in Depth

Every cybersecurity strategy starts with knowing what you’re protecting. In OT environments, that means a thorough asset inventory—mapping every device, from Modbus-enabled controllers to DNP3-based sensors, and understanding each device’s role in the network. Without that visibility, even advanced threat detection tools can’t distinguish normal operations from malicious activity.

The stakes are real. During an inventory audit, one facility discovered a rogue device mimicking an HVAC controller. That device turned out to be a pivot point attackers were using to reach the plant’s SCADA system. Asset inventory isn’t a compliance checkbox—it’s what makes every downstream security control work.

IEC 62443-compliant asset management platforms can automate much of this process, integrating with protocols like OPC UA for real-time visibility. But automated scans alone aren’t enough. True inventory requires correlating device data with operational workflows and actual risk profiles—something no scanner does on its own.

Bridging OT and IT Without Sacrificing Uptime

Aligning OT and IT security strategies is one of the most persistent challenges in industrial cybersecurity. IT playbooks routinely fail in OT because they prioritize data confidentiality over operational availability. For building automation systems, that means approaches like frequent patching or aggressive network segmentation can’t be lifted directly from the IT world without risking downtime.

Defense in depth for BAS requires a tailored approach. Network segmentation should isolate critical subsystems—HVAC from lighting controls, for example—using IEC 62443-aligned policies. That isolation limits lateral movement in a breach. In a 2022 incident, a facility contained a ransomware attack precisely because segmentation was already in place.

Access control is equally important and equally complicated. Legacy protocols like Modbus lack built-in authentication, making IT-standard MFA difficult to apply directly. Hardware-based security modules from vendors like Honeywell and ABB now enforce role-based access without disrupting real-time operations—a practical middle ground that respects both security requirements and operational realities.

Incident Response Designed for OT, Not Copied from IT

Even a well-layered defense can be undone by an incident response plan that wasn’t built for OT. IT-style IR plans prioritize data recovery; in OT, that focus can be catastrophic. For building automation systems, a failed containment step could mean a disabled HVAC control causing equipment to overheat—a cybersecurity decision with physical consequences.

One facility learned this through a tabletop exercise. During the simulation, they found that their IT-style cloud backup approach would have caused a 48-hour outage if ransomware had hit their BAS controllers. Switching to a hybrid model—local, air-gapped backups for critical systems—brought projected recovery time under four hours.

OT-specific incident response planning for BAS should include:

  • Predefined containment steps that avoid disrupting physical processes
  • Cross-functional teams with OT engineers, plant managers, and cybersecurity leads
  • Regular tabletop exercises that test scenarios like unauthorized changes to BAS configurations

Those exercises aren’t optional. They’re how you find the gaps before an attacker does.

Defense in Depth Assessments That Go Beyond Vulnerability Scans

A real assessment of building automation security starts long before a scanner runs. It starts with questions:

  • What are the critical assets and their interdependencies?
  • How are protocols like DNP3 and OPC UA configured for security?
  • Are there documented procedures for incident response and patch management?

For BAS environments, the answers often surface risks that IT-style vulnerability scans miss entirely. Unencrypted Modbus communications, for example, can pose a higher operational risk than a theoretical software vulnerability. Addressing that gap means implementing IEC 62443-compliant encryption—not simply patching a CVE.

Documentation matters here too. It’s not just a compliance requirement; it’s a security control. Up-to-date network topology diagrams, device configurations, and patching schedules give security tools the context they need to function effectively. Without that documentation, even the best monitoring platform is operating blind.

Building a Resilient OT Security Posture

Defense in depth for building automation isn’t a one-time project—it’s an ongoing posture. Asset inventory creates the foundation. OT-aware segmentation limits blast radius. Incident response plans built for operational continuity reduce recovery time. Assessments that start with operational context find the risks that scanners miss.

Each layer depends on the others. That’s what defense in depth actually means.

If your organization is ready to evaluate where the gaps are, Red Trident’s team can help. Book a free OT security assessment consultation and get actionable recommendations built around your operational environment—not a generic IT checklist.

author avatar
Emmett Moore