Home/Blog/Industry Insight

Time-Limited Sessions: The Missing Control in OT Remote Access

Why auto-expiring sessions are the most underrated security control for building automation remote access.

May 11, 2026|9 min read|Industry Insight

Ask a building owner how many active remote access connections exist to their BAS network right now, and the honest answer is usually: "I have no idea." VPN tunnels established months ago may still be live. TeamViewer sessions opened for a one-hour troubleshooting call may still be available. SSH keys distributed to a contractor who left the company last year may still grant access.

Standing access — remote connections that remain active indefinitely — is the single most common security gap in building automation. And it is the easiest to fix. Time-limited sessions that auto-expire after a defined window (2 to 24 hours) eliminate standing access without adding friction to the technician's workflow.

The standing access problem

Standing access means a remote connection that exists whether or not anyone is actively using it. In building automation, this typically looks like:

Each standing connection is an open door. It does not require an attacker to breach a firewall or exploit a vulnerability. The door is already open. They just have to walk through it.

Why standing access is dangerous: the numbers

According to Dragos, 70% of OT security incidents involve third-party access. Not sophisticated zero-day exploits. Not nation-state attacks. Third-party access — the same VPN tunnels and remote desktop sessions that BAS integrators use every day.

The Gartner CPS Secure Remote Access Market Guide (2026) is explicit: "VPNs, jump servers, and IT-centric access tools create unacceptable risk because they lack asset-level, protocol-aware, and operational controls." Standing access is the operational control gap they are describing.

Consider the attack timeline. If a VPN credential is compromised, the attacker has access for as long as the VPN tunnel stays up — which is indefinitely. If a time-limited session credential is compromised, the attacker has access for the duration of the session window — hours, not months.

Time limits do not prevent every attack. But they constrain the window of exposure from unlimited to bounded. A 4-hour window is not zero risk, but it is dramatically less risk than a 4-month standing connection.

What time-limited sessions mean in practice

A time-limited session works like this:

Between sessions, there is zero standing access. No tunnel, no connection, no pathway from the internet to the building network. The next session requires fresh authentication and a new time window.

The compliance case

Session management is a specific requirement in every major OT security framework:

IEC 62443

IEC 62443-3-3 SR 2.6 requires "remote session termination after a period of inactivity" and SR 1.11 requires "session lock after a defined period." The standard explicitly addresses the risk of sessions that remain active beyond their intended purpose.

NIST 800-82

NIST SP 800-82 Rev. 3 recommends "time-based access control mechanisms" for OT remote access and warns against "persistent remote connections that provide continuous access to the OT network." The guidance is clear: OT remote access should not be always-on.

Cyber insurance

Insurers are increasingly asking specific questions about OT remote access controls in their underwriting questionnaires. "Do you require time-limited remote access sessions with automatic termination?" is appearing on renewal forms. If your answer is no, your premium goes up — or your coverage gets restricted.

Gartner CPS SRA

The 2026 Gartner CPS Secure Remote Access Market Guide identifies session management as a core capability. Vendors that provide only persistent connections — without time-limited, auto-expiring sessions — do not meet Gartner's framework for CPS secure remote access.

Do time limits slow technicians down?

The most common objection to time-limited sessions: "My technicians need access when they need it. Time limits will get in the way."

In practice, the vast majority of BAS maintenance sessions are short. Based on typical building automation service patterns:

An 8-hour session window covers the vast majority of maintenance tasks. A 24-hour window covers everything including commissioning. If a technician needs more time, they request a new session — which takes seconds, not hours.

The time-limited model adds one step (selecting a session duration) and removes one risk (standing access to the building network). For integrators managing multiple client sites, it also provides clear documentation of exactly when each technician accessed each building — a benefit for both the integrator and their clients.

What auto-expiry looks like from the technician's perspective

A well-designed time-limited session should be frictionless:

The technician's workflow is virtually identical to a persistent VPN — except the session has a defined end. There is no ongoing VPN management, no credential rotation anxiety, and no IT department involvement. The session lifecycle is handled automatically.

Beyond time limits: combining session expiry with protocol controls

Time-limited sessions are most effective when combined with other security controls:

Each control addresses a different risk. Time limits address standing access. Protocol firewalling addresses unauthorized protocol usage. Traffic monitoring addresses visibility. Bandwidth limiting addresses exfiltration. Together, they implement the defense-in-depth approach that every OT security framework recommends.


SiteConduit provides time-limited, auto-expiring remote access sessions for building automation. Sessions from 2 to 24 hours, with protocol firewalling, per-protocol traffic monitoring, and instant termination. No standing access. No forgotten VPN tunnels. No compliance gaps.

Join the waitlist for early access, or visit our FAQ for more details.

HB

Hayden Barker

Founder, SiteConduit — Idea Networks Inc.

Hayden has spent over a decade designing and deploying network infrastructure for building automation environments. He built SiteConduit after seeing firsthand how traditional VPNs and remote access tools fail to meet the security and operational needs of BAS integrators and building owners.

Eliminate Standing Access to Your Building Network

Auto-expiring sessions from 2 to 24 hours. Zero standing access between maintenance windows. Join the waitlist.

No spam. We'll only email you about SiteConduit access.