The cyberthreats to the U.S. Department of Defense’s building management systems (BMS) have grown exponentially due to the DoD's adoption of smart technologies such as IoT. These smart technologies are designed to improve the monitoring and maintenance of these systems, but they also create new attack surfaces. Here's how the DoD can use operational technology (OT) security to mitigate BMS cyberthreats through enhanced visibility, threat detections and automated risk prioritization.
Building management systems (BMS) have become increasingly essential for the efficient functioning of U.S. military installations. These systems control and monitor a building’s mechanical and electrical equipment, including heating, ventilation, air conditioning (HVAC), fire safety and access control.
The scale of BMS deployments is particularly immense at the U.S. Department of Defense. The DoD noted in its Annual Energy Performance, Resilience and Readiness Report in 2022 that it spent $3.96 billion to power, heat and cool its buildings. In addition there are more than 500 DoD installations worldwide, with over 500,000 buildings and structures, covering millions of acres of land in the U.S, U.S territories and over 30 other countries.
Operational technology (OT) – a broader range of technologies used to monitor and control physical processes and operations — is being increasingly deployed and connected to BMS by the DoD, making BMS a key component of OT environments in the DoD across bases and facilities. Unfortunately, this growing use of OT significantly increases the attack surface and risk for BMS, potentially putting DoD installations at heightened risk of cyberattacks.
BMS adoption brings challenges, especially when legacy systems that lack current cybersecurity capabilities are integrated with modern networks. Further complicating the picture is the integration of smart devices and internet of things (IoT) sensors with BMS, which makes BMS more vulnerable to attacks. Additionally, the unique protocols used by OT in BMS lower asset visibility and increase the risk of security breaches.
The challenges are real. A report by Kaspersky ICS CERT revealed that, in 2022, nearly half (42%) of computers in building automation infrastructures faced cyberthreats.
The integration of OT smart technologies in BMS has revolutionized the way DoD facilities operate, playing a big role in the wellbeing and safety of personnel and the security of critical data and infrastructure. Smart technologies in these BMS include:
The DoD needs to secure its BMS against evolving OT cybersecurity threats. To help make that possible, they need a solution that provides:
Tenable OT Security is designed to protect BMS in DoD agencies and commercial organizations. It helps maintain operational integrity and protect against cyberthreats. It also enables the secure implementation of advanced technologies like artificial intelligence (AI) and IoT within BMS, ensuring these integrations don't compromise security. Furthermore, Tenable OT Security can help streamline security policy enforcement across various BMS environments, automating and standardizing policy applications to reduce errors and complexity.
Tenable OT security seamlessly integrates with Tenable Security Center+, which powers the DoD-mandated Assured Compliance and Assessment Solution (ACAS) for vulnerability management. This integration strengthens the DoD's overall BMS security architecture and provides a single pane of glass view for IT and OT vulnerabilities, while also eliminating the need to add more tools to your tech stack. By adopting Tenable OT Security, the DoD can significantly enhance the efficiency and security of its BMS, safeguarding critical military infrastructure and providing uninterrupted operations.
To discover how Tenable can help you secure your BMS and OT environments in the DoD, reach out to our sales team for a demo or delve into the additional assets below.
Zach is a Senior Security Engineer with Tenable, focused on the Federal theater and primarily the Department of Defense. He has over 12 years of experience in information security, including both offensive and defensive cyber operations, and has worked in product direction and customer education advisory groups outside of his role at Tenable. Zach takes a great deal of pride in the security industry, ensuring that mission-critical goals are met through rigorous requirements analysis and a bottom-up mentality that elevates ideas from the field while giving back best practices to advance organizations' security programs.
Enter your email and never miss timely alerts and security guidance from the experts at Tenable.
Formerly Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Formerly Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
100 assets
Choose Your Subscription Option:
Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.
Formerly Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Formerly Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
100 assets
Choose Your Subscription Option:
Thank you for your interest in Tenable.io. A representative will be in touch soon.
Formerly Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Formerly Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
100 assets
Choose Your Subscription Option:
Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.
Formerly Tenable.io Web Application Scanning
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Formerly Tenable.io Web Application Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Formerly Tenable.sc
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Formerly Tenable.ot
Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.
Formerly Tenable.ad
Continuously detect and respond to Active Directory attacks. No agents. No privileges.
On-prem and in the cloud.
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
Exposure management for the modern attack surface.
Formerly Tenable.asm
Know the exposure of every asset on any platform.
Thank you for your interest in Tenable Attack Surface Management. A representative will be in touch soon.
FREE FOR 7 DAYS
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro Trial.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
FREE FOR 7 DAYS
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.