How to Run a BAS Cybersecurity Audit

Network & SecuritycybersecurityauditcomplianceNIST
May 2, 2026|10 min read

A BAS cybersecurity audit evaluates network segmentation, access controls, firmware patch status, protocol security, and physical access across every controller, server, and workstation in the building automation system. Start with a complete asset inventory, review network architecture against a segmented VLAN design, verify that every device has had default credentials changed, confirm firmware is current against vendor advisories, and document all findings in a repeatable checklist. This process is designed to support NIST 800-82 guidelines for operational technology security.

Why Audit BAS Cybersecurity

Building automation systems were designed for reliability and comfort, not cybersecurity. Most BAS installations use protocols like BACnet and Modbus that transmit data in cleartext with no built-in authentication. This was acceptable when these networks were physically isolated, but modern BAS deployments now connect to enterprise IT networks, cloud analytics platforms, and remote access gateways—dramatically expanding the attack surface.

Cyber insurance underwriters increasingly require evidence of OT network segmentation and access controls before issuing or renewing policies. Regulations such as the EU's NIS2 directive and US state data protection laws now explicitly cover building systems connected to enterprise networks. NIST SP 800-82 (Guide to Operational Technology Security) identifies building automation as OT infrastructure that demands the same security rigor as industrial control systems.

Beyond compliance, the operational risk is real. A compromised BAS can disable HVAC in a data center, unlock access-controlled doors, or serve as a lateral-movement pathway into the corporate network. The 2013 Target breach—which originated through an HVAC vendor's network credentials—remains the most cited example, but less publicized BAS compromises occur routinely across commercial real estate and healthcare facilities.

Pre-Audit Preparation

A successful BAS cybersecurity audit requires preparation before anyone touches a controller or opens a network scanner. Skipping this phase leads to incomplete audits that miss entire subsystems.

Build a Complete Asset Inventory

Document every device on the BAS network. This includes supervisory controllers, field controllers (VAV, AHU, plant controllers), network-level controllers, operator workstations, BAS servers, IP-to-MS/TP routers, gateways, and any IoT sensors or actuators with network connectivity. For each device, record:

If no asset inventory exists, treat creating one as the first audit deliverable. You cannot audit what you have not identified. BACnet device discovery tools can help enumerate BACnet/IP and MS/TP devices, but manual inspection is required for Modbus and proprietary devices that do not respond to broadcast discovery.

Gather Documentation

Collect network diagrams, controller programming backups, user account lists, remote access configurations, vendor maintenance contracts, and any previous audit reports. Request the original sequence of operations and compare it to the current running configuration—undocumented changes are a security indicator that access controls may be weak.

Define Scope and Boundaries

Clarify which systems are included. Does the scope cover fire alarm panels connected via BACnet? Lighting control systems on the same VLAN? Access control panels sharing infrastructure? Document the scope boundary before starting so findings are attributable to specific systems.

Network Segmentation Review

Network segmentation is the single most effective cybersecurity measure for building automation systems. The goal is to isolate BAS traffic from enterprise IT traffic and from the internet, limiting the blast radius of any compromise.

What to Verify

Common Finding

The most frequent segmentation failure is a "flat network"—every BAS device, IT workstation, and printer sharing a single subnet with no access restrictions. This means any compromised device can directly communicate with every controller. Even partial segmentation (BAS on its own VLAN with basic firewall rules) is a significant improvement.

Access Control Audit

Access control failures are the most exploitable vulnerabilities in building automation. Unlike protocol-level attacks, exploiting weak access controls requires no specialized tools—just a web browser and a default password list.

Credential Review

Role-Based Access

Modern BAS platforms support role-based access control (RBAC). Verify that operator accounts cannot modify controller programming, that read-only accounts are available for monitoring dashboards, and that administrative functions (user management, network configuration, firmware updates) are restricted to named administrator accounts. Document which roles exist and who holds each role.

Remote Access Controls

Document every method of remote access: VPN connections, web portals, vendor cloud platforms, cellular gateways, and direct port forwards. For each, verify that multi-factor authentication (MFA) is enforced, sessions time out after inactivity, and access logs are retained. Any remote access pathway without authentication is a critical finding.

Firmware and Patch Status

BAS controllers are embedded devices that run firmware, and that firmware contains vulnerabilities just like any other software. Unlike IT systems that receive automatic updates, BAS firmware must be updated manually—and in practice, it rarely is.

Audit Steps

Practical Reality

Most commercial buildings have controllers ranging from 2 to 20 years old from multiple manufacturers. Expecting every device to run the latest firmware is unrealistic. The audit should categorize findings by risk: devices accessible from the enterprise network with known CVEs are critical, while isolated field controllers on a segmented MS/TP bus are lower priority.

Protocol Security Review

The protocols used in building automation were designed for interoperability, not security. Understanding their limitations is essential for an accurate audit.

BACnet

Standard BACnet/IP (ASHRAE 135, Annex J) transmits all data—including point values, schedules, trend data, and device configurations—as unencrypted UDP on port 47808. There is no authentication at the protocol level. Any device on the same network segment can read from or write to any BACnet object on any controller. The audit should verify that network segmentation compensates for this protocol-level weakness, and document whether BACnet Secure Connect (BACnet/SC), which adds TLS encryption and certificate-based authentication, is available on installed equipment and whether migration has been planned.

Modbus

Modbus TCP and Modbus RTU provide no authentication, encryption, or access control whatsoever. Any device that can reach a Modbus slave on TCP port 502 (or the serial bus) can read and write registers without restriction. For Modbus devices, network segmentation and physical access control are the only available defenses. The audit should confirm that Modbus TCP devices are not reachable from untrusted network segments.

Web Interfaces and APIs

Many modern controllers expose web-based configuration interfaces and REST APIs. The audit should verify: Are these interfaces served over HTTPS with valid TLS certificates, or unencrypted HTTP? Do API endpoints require authentication tokens, or are they open? Are management interfaces accessible only from the BAS management VLAN, or from any network? Controllers serving HTTP on port 80 with no authentication from any reachable network segment represent a critical finding.

Physical Security

Cybersecurity audits often overlook physical access, but in building automation, physical access frequently equals network access. A BACnet MS/TP trunk cable in an unlocked electrical closet provides direct, unauthenticated access to every controller on that bus segment.

What to Inspect

BAS Cybersecurity Audit Checklist

Use this checklist as a repeatable framework for BAS cybersecurity audits. It is designed to support NIST 800-82 guidelines for operational technology security. Adapt the scope to your facility's size and risk profile.

CategoryAudit ItemStatus
Asset InventoryComplete inventory of all BAS devices with IP/MAC addresses, firmware versions, and physical locations
Asset InventoryEnd-of-life devices identified with replacement timeline
Network SegmentationBAS devices on dedicated VLAN(s) separate from enterprise IT
Network SegmentationFirewall or ACL rules enforce traffic restrictions at VLAN boundaries
Network SegmentationNo direct internet access from BAS VLANs (verified by testing outbound connections)
Network SegmentationRemote access restricted to monitored VPN or jump host
Access ControlNo devices using factory-default credentials
Access ControlIndividual user accounts (no shared credentials)
Access ControlOrphaned accounts from former employees/contractors removed
Access ControlRole-based access control configured (operator, admin, read-only roles)
Access ControlMulti-factor authentication enabled for all remote access
Firmware & PatchingAll firmware versions documented and compared against vendor security advisories
Firmware & PatchingDevices with known CVEs identified and remediation plan documented
Firmware & PatchingFirmware update process documented (who, how, testing procedure)
Firmware & PatchingController configuration backups stored securely offline
Protocol SecurityBACnet/IP restricted to dedicated VLAN (compensating for lack of protocol-level auth)
Protocol SecurityModbus TCP devices not reachable from untrusted segments
Protocol SecurityWeb interfaces using HTTPS with valid certificates (no HTTP-only management)
Protocol SecurityBACnet/SC migration feasibility assessed for internet-facing or high-risk segments
Physical SecurityMechanical rooms and network closets locked with logged access
Physical SecurityUnused switch ports disabled
Physical SecurityUSB ports on BAS workstations restricted or disabled
Physical SecurityController enclosures locked where physically accessible
MonitoringNetwork traffic monitoring or anomaly detection in place on BAS VLAN
MonitoringAccess logs retained for remote sessions and administrative actions
DocumentationNetwork diagrams current and accurately reflect physical topology
DocumentationIncident response plan includes BAS-specific scenarios

Common Audit Mistakes

Source Attribution

This guide draws on technical documentation and guidance from the following sources:

cybersecurityauditcomplianceNISTinsurance

Was this article helpful?

Related Articles

Need to do this remotely? SiteConduit connects remote technicians directly to the BAS VLAN without exposing corporate IT networks. Join the waitlist.

SC

SiteConduit Technical Team

Idea Networks Inc.

SiteConduit builds managed remote access for building automation. Our knowledge base is maintained by BAS professionals with hands-on experience deploying and troubleshooting BACnet, Niagara, Modbus, and Facility Explorer systems.