View on GitHub

Rodney Hall | Cybersecurity Portfolio

Hands-on cybersecurity portfolio covering SOC operations, incident triage, threat detection, identity management, cloud security, and OT/ICS environments.

Back to Portfolio

BAS Security Playbook

Security monitoring and incident response for Building Automation Systems in defense and critical infrastructure environments.

Status: Work in Progress — actively developing based on ICS-300 training, hands-on OT labs, and industry standards (IEC 62443, NIST SP 800-82).


Overview

This playbook documents security monitoring and incident response procedures for Building Automation Systems (BAS) in defense and critical infrastructure environments. BAS networks control HVAC, lighting, access control, and fire safety systems — all availability-critical, all historically under-secured. The playbook focuses on protecting these systems using passive, non-intrusive methods that preserve operational continuity and life safety.

Objective

Provide a structured, analyst-ready reference for detecting, investigating, and responding to security incidents in BAS environments, with controls and procedures appropriate for systems where availability and safety take precedence over aggressive security posture.

Scope

Target Audience

Key Principles

  1. Availability First — BAS systems control life safety. Security controls must not disrupt operations.
  2. Passive Monitoring — Use non-intrusive detection methods to avoid impacting real-time control systems.
  3. Defense in Depth — Layer security controls across network, application, and physical domains.
  4. Operational Awareness — Understand business impact before implementing any security change.

Playbook Sections

1. BAS Architecture Overview

BAS network design, Purdue Model mapping, protocol landscape (BACnet, Modbus, LonWorks), and IT/OT segmentation architecture for defense properties.

2. Common Threats & Attack Scenarios

Threat landscape specific to building automation — reconnaissance via BACnet discovery, unauthorized setpoint manipulation, HVAC disruption, and MITRE ATT&CK correlation for ICS.

3. Monitoring & Detection Strategies

How to detect anomalies without disrupting operations — passive Wireshark captures, BACnet/Modbus baseline deviation alerts, Wireshark filters, and SIEM integration guidance.

4. Incident Response Procedures

Step-by-step response playbook for BAS security incidents, prioritizing life safety and operational continuity throughout detection, containment, eradication, and recovery phases.


Technologies & Standards


Author

Rodney Hall — ICS-300 (CISA/DHS) CompTIA Security+ CompTIA Network+
LinkedIn Portfolio