Back to Resources
Field Note April 2026 6 min read

Your BMS Is Part of Your Attack Surface. Act Like It.

Building management systems — chillers, ATSes, CRACs, lighting — routinely sit on flat networks with default credentials and vendor-remote access. In a data center, that is a production risk.

C

Cascadia OT Security

Physical Security

Firewall · OT Edge1UCore Switch1UHistorian1USCADA Server2ULog Aggregator1UUPS2UConsole1URACK 07CAGE BOT ZONEPWR · A+BTEMP · 68°FACCESS · KEYRACK LAYOUTCRITICAL PATH

Ask a data center security team about their attack surface and you will hear about the corporate network, tenant environments, perimeter firewalls. Ask about the building management system and you will hear about the facilities team. This is the mismatch that keeps me up at night.

In a hyperscale or colocation data center, the BMS controls cooling delivery, power switching, leak detection, and — increasingly — physical access. A BMS compromise is a production compromise. And yet most BMS environments are run on the security maturity of an early-2000s enterprise network.

What we see in the field

Across 23 data center assessments in 2025, a consistent set of BMS findings emerged:

None of this is hypothetical. These are the findings we document, with screenshots and packet captures, in actual engagements.

Why BMS ends up this way

Two structural reasons. First, BMS is procured through facilities and construction, not through IT or security. The vendor selection process rarely includes security review, and the commissioning team's job ends at "does it work?" — not "is it defensible?"

Second, BMS is operated on a "don't touch what isn't broken" principle that is, to be fair, completely reasonable from a facilities perspective. Firmware upgrades risk breaking carefully-tuned HVAC sequences. Patch cycles create change-management friction. The path of least resistance is to leave the system alone.

That path is now a business-continuity risk.

What responsible BMS operation looks like

Start with three things:

Do those three things and your BMS goes from "uncomfortably undefended" to "defensible" — and the cost is measured in weeks of work, not years of platform deployment.

The common objection

"Our BMS is on a separate physical network from corporate."

In our experience, that statement is true in intent and false in reality about 40% of the time. There is usually a workstation somewhere with a foot in both networks, or an integrator laptop that VPNs to corporate and connects to BMS over Wi-Fi, or a supervisor with a forgotten second NIC. The claim does not survive contact with a physical walkthrough.

Test it. Walk the IDFs. Map the supervisors. Trace the vendor access paths. You will find the seam.

The takeaway

BMS is OT. It deserves the same security rigor you apply to any other production-critical system. If you operate a Pacific Northwest data center and your BMS security posture has not been independently reviewed in the last 24 months, consider this an invitation.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call