Electrical infrastructure used to be air-gapped. Today, EPMS systems, BMS platforms, generator controllers, UPS systems, and protective relays all connect to networks. The cybersecurity exposure that came with that connectivity gets overlooked during construction and discovered during operations — usually after an incident.
A decade ago, electrical infrastructure was largely isolated. Protective relays talked to nothing. Generator controllers had local displays only. BMS connected to a single building’s HVAC. The attack surface was physical access, and the controls were locks and cameras.
Today, the same infrastructure is networked. Schweitzer relays expose engineering ports for remote configuration. Eaton xPert generator controllers report status to cloud platforms. EPMS systems publish data to corporate dashboards. BMS interfaces with corporate IT for energy reporting. The attack surface has expanded dramatically, and many facilities aren’t configured for the threat model that comes with that connectivity.
What attackers actually want from electrical infrastructure:
Modern protective relays (SEL, Schweitzer, GE Multilin, ABB, Siemens) have engineering ports, often exposed via Ethernet for remote configuration. Default passwords, weak authentication, and unsegmented network exposure create real risk. NERC CIP requirements address this for utilities, but commercial and industrial facilities often have similar exposure without similar controls.
Cummins PowerCommand, Caterpillar EMCP, Kohler, ASCO, Russelectric, Eaton, Vertiv — all have IP-connected controllers with management interfaces. Default credentials are common. Cloud connectivity is increasingly default-on.
Schneider PME, Eaton Power Xpert, ABB Ability, custom SCADA-based EPMS — all expose web interfaces, APIs, and database access. Many also connect to cloud platforms for trending and analytics.
Johnson Controls Metasys, Honeywell EBI, Siemens Desigo, Schneider EcoStruxure — the BMS frequently bridges into corporate IT for energy reporting, scheduling, and remote operations. The bridge creates attack surface in both directions.
Networked meters from Schneider PowerLogic, Eaton xPert, GE multilin, and others. Often on the BMS network, sometimes on the corporate network.
Networked lighting controls (Acuity nLight, Hubbell NX, Lutron Athena) are increasingly cloud-connected. Each connection is a potential entry point.
Several standards apply to OT cybersecurity:
What should be addressed during construction:
OT systems on dedicated network segments separated from corporate IT by firewalls. The Purdue Model defines this in detail. Implementations range from simple VLANs to physically separate networks with industrial firewalls (Cisco IE3300, Fortinet FortiGate Rugged, Belden / Tofino).
Every device with default credentials gets them changed at commissioning. Documented credential management going forward. Bid documents should explicitly require this.
Role-based access control on EPMS and BMS platforms. Active Directory integration where supported. Multi-factor authentication for remote access. Service accounts documented and managed.
TLS for web interfaces. Encrypted protocols (Modbus Secure where supported, MQTT over TLS) where the equipment supports them. Many older OT protocols don’t support encryption natively, which is part of why segmentation matters so much.
EPMS, BMS, and OT systems generate security-relevant logs. Forward to a central SIEM or security monitoring platform. Without monitoring, intrusions go unnoticed for months.
OT systems require patches. Patches can’t be applied as casually as on IT systems (operations impact, regression testing). Planned patch windows, tested updates, documented procedures.
Equipment manufacturers want remote access for support and updates. Each remote access path is exposure. Vendor access should go through a controlled jump host with logging and access approval, not direct VPN.
For new construction or major retrofits, specifications that protect against current threats:
Send us your scope and IT/security requirements. We will engage on architecture and execution planning.