twinos Assess · Data Centre

OT cyber assessment for colo and hyperscale halls. Computed, not authored. Risk you can defend to a tenant.

twinos

Most Data Centre Cyber Assessments Audit the Wrong Network.

The corporate IT side gets a real audit. The facilities side gets an asset list, an SNMP walk and a CVE rollup on PDUs that the operator cannot reboot. The deliverable looks rigorous and answers the wrong question.

The colo operator recognises this report. The hyperscale operator has filed five of them. None of them changed what the facilities team is afraid of at 03:00.

02 / 12
twinos

Data Centre OT Risk Is an SLA Equation. Not a Patch Backlog.

Data centre OT risk has three terms and CVE count is not one of them. A BMS controller can carry a CVSS 9.8 vulnerability and present negligible risk — and a fully patched chiller plant controller can sit one BACnet write away from a hall trip. The rubric matters.

CONSEQUENCEthermal · SLA ·hardware loss×CAPABILITYopportunist ·insider · criminal×EXPOSUREBMS VLAN ·remote accessOT RISKper controllerper techniqueThree terms. CVE count is not one of them.
TermWhat it measuresWhat it ignores
ConsequenceThermal excursion, hall trip, redundant-path loss, suppression mis-trigger, SLA credit exposure, tenant notification, hardware damage — measured in facility outcomes, not data recordsCVE severity in isolation
Adversary capabilityPlausible threat actor tier for this site, this tenant mix, this geography — opportunist, insider, criminal, nation-state — and the techniques each can actually deploy against facilities OTTheoretical exploits no realistic adversary will weaponise against a BMS
ExposureReachable attack surface accounting for BMS-network segregation, IT/OT boundary, supervisor-vs-controller separation, vendor remote access and contractor identity hygieneOpen-port counts on a flat-BMS-VLAN assumption

Risk = Consequence × Capability × Exposure. Every finding in our report scores on this rubric. Every recommendation moves one of these three terms — and is sized against an SLA clock, not a patch calendar.

03 / 12
twinos

Our Method — ATT&CK for ICS, Mapped to the Protocols and Devices on Your Floor.

MITRE ATT&CK for ICS is the public scaffold. On its own it is a vocabulary, not an assessment. We add three layers of mapping that turn a vocabulary into a finding the facilities team can act on.

ATT&CK FOR ICS · TECHNIQUEPROTOCOLBACnet/IP · Modbus TCP · SNMP · IPMI / Redfish · OPC UA · Niagara Foxwhat runs on the BMSDEVICEBMS controllers (JACE / Tridium / Distech) · CRAC / CRAH · chiller managers · PDUs · UPS · ATS · suppressionwhat sits on the floorCONSEQUENCEThermal excursion · hot-aisle breach · false alarm · suppression mis-trigger · SLA credit · tenant notificationwhat breaks in the hall
LayerWhat we mapExample
Protocol layerEach ATT&CK technique against the protocols actually on the BMS network — BACnet/IP, Modbus TCP, SNMP v1/v2c/v3, IPMI / Redfish, OPC UA, Niagara Fox, KNX where presentT0855 Unauthorized Command Message → BACnet write-property on chiller setpoint objects
Device layerEach technique against the controllers and gateways in the hall — BMS controllers (Niagara JACE, Tridium, Distech, Honeywell, Siemens Desigo), CRAC / CRAH, chiller plant managers, PDUs (Vertiv, Schneider, Eaton), UPS, ATS, leak detection, EPMS gateways, suppression panelsT0836 Modify Parameter → CRAH supervisory setpoint via Niagara JACE
Consequence layerEach technique against the facility outcome it produces — thermal excursion, hot-aisle breach, false alarm flood, suppression mis-trigger, redundant-path loss, tenant SLA clock-startHall-wide hot-aisle excursion during peak load window

The library is curated for the controller stacks and protocol mixes we see in colo and hyperscale halls — and it grows with every engagement.

04 / 12
twinos

Worked Example — BACnet Setpoint Injection on a Chilled-Water Loop.

One real chain, end to end, against the rubric. This is what twinos Assess · Data Centre emits against a BACnet BMS — not a hand-written finding, not a CVE row, not a CVSS number. One row out of a generated register.

StepFinding
TechniqueT0855 Unauthorized Command Message / T0836 Modify Parameter — BACnet/IP write-property against chilled-water supply setpoint objects on the plant controller
Protocol exposureBACnet/IP is unauthenticated by default; the BMS supervisory VLAN is flat; write-property is accepted from any source on the segment; BACnet/SC not deployed
Device exposureChiller plant controller and CRAH supervisor on the same VLAN as the BMS engineering workstation; vendor remote-access jump-host writes against the same objects; no allow-list of legitimate writers
Adversary capabilityTier-2 criminal or opportunistic actor reaching the BMS VLAN via a stale contractor VPN credential — observed during scoping
ConsequenceChilled-water supply shifted 6 °C; hot-aisle excursion across Hall-2 and Hall-3 within 18 minutes; tenant notification triggered; SLA credit window opened; risk of cascaded shutdown if redundant chiller had been in maintenance
Risk score (our rubric)Consequence: High · Capability: Medium · Exposure: High → Aggregate: High. CVE-only view of this chain: zero CVEs, no scanner output, would not appear on a quarterly VA report
RecommendationDeploy BACnet/SC where supported; segregate supervisory VLAN behind an L3 boundary with whitelisted writers only; alert on write-property from non-supervisor sources at the BMS gateway; revoke stale contractor identities; enforce named-identity remote access for vendor jump-host

Zero CVEs. SLA-credit-grade OT risk. Generated, not authored. The next three slides are how.

05 / 12
twinos

twinos Assess · Data Centre — ATT&CK at the Object · Property Level.

Public ATT&CK for ICS publishes technique names. twinos Assess holds a database of realisation conditions per technique — mapped to BACnet object types and properties, Modbus register semantics, IPMI / Redfish endpoints, Niagara station internals; equivalent surface for SNMP and OPC UA; and extended to OS hardening gaps and hardware exposure. For any controller whose configuration we hold, we can compute which techniques are realisable today — before we walk on site.

NETWORKDEVICEOBJECT TYPEOBJECT INSTANCEPROPERTYBMS-NetJACE-Bldg1analog-valueAV:101 chiller-CWSpresent-value (REAL · w)REALISATION CONDITIONSWriteProperty accepted unauthenticated· BACnet/SC not enforced· supervisory VLAN flatT0855 · REALISABLEBACnet object hierarchy — every leaf is a query against the realisation-condition database.
TechniqueProtocol primitiveMapped pointRealisation conditionsRealisable?
T0855 Unauthorized Command MessageBACnet WritePropertychiller-CWS · present-valueWriteProperty accepted without authentication · BACnet/SC not enforced · supervisory VLAN flatYes — High consequence (hot-aisle excursion)
T0836 Modify ParameterIPMI / Redfishserver thermal-limit registersDefault credentials in use · OOB management on production VLAN · firmware updates unsignedYes — Medium consequence (thermal-trip surface)
T0843 Modify ProgrammingNiagara station importBMS schedule objectStation file writable from supervisor · no integrity check on import · no audit on schedule changeYes — Medium consequence (schedule-driven excursion)

Every row in our risk register starts as a realisation-condition query. The report is a join, not a narrative.

06 / 12
twinos

Two Scanners. Same Realisable Surface. Zero Impact on Your Floor.

Most assessments collect what an engineer can write down in a notebook. twinos Assess collects what the controller, its station files and its hardware actually say — and feeds it into the realisation-condition library.

ModeWhat it readsBus impactWhat we see
Active — protocolBACnet ReadProperty, Modbus reads, SNMPv3 walks, IPMI inventory under signed read-only ground rulesNegligible — read-only, rate-limitedLive controller state, subscribed objects, schedule and calendar bindings
Passive — protocolNiagara station exports, BACnet EDE / PICS files, Modbus register maps, IPMI inventoriesZero packets on the BMS networkFull BACnet object model, supervisor-to-controller bindings, write paths
Passive — OSConfiguration exports from BMS supervisors, EWS and jump hosts — services, accounts, patch state, hardening postureZeroOS-level realisation conditions per technique
Passive — HWController datasheets, FAT documents, PDU port surveysZeroDebug ports, console exposure, firmware extraction reachability, default-credential exposure

On a typical colo or hyperscale hall, around 80 percent of the answer comes from Niagara station exports and BACnet EDE files alone. We bring the bus in only when the exports do not tell us.

07 / 12
twinos

Risk-Based Scoring. Not CVE-Based.

The industry default

  • Count CVEs per BMS asset from a vulnerability database
  • Sum or average CVSS — produce a per-controller 'severity'
  • Rank assets by patch backlog the operator cannot apply
  • Heatmap by colour, file the report, present at the SteerCo
  • Hall manager cannot reboot a CRAH controller in production
  • Same finding next quarter, same colour, same shelf

The twinos rubric

  • Score consequence per technique per controller — what breaks in the hall
  • Tier the plausible adversary for this site, this tenant mix, this geography
  • Score exposure with BMS segmentation and remote-access hygiene credited
  • Risk = Consequence × Capability × Exposure — defensible line by line
  • Recommendations sized against the SLA clock, not a patch calendar
  • The same controller can be 'CVSS 9.8' and negligible risk — and vice versa
08 / 12
twinos

What You Get — Artefacts, Not Adjectives.

DeliverableWhat it containsWho reads it
Prioritised Facilities-OT Risk RegisterPer-controller, per-technique findings — protocol, device class, consequence, capability tier, exposure, aggregate risk, recommendationFacilities security lead, hall manager
Device-Level Remediation RoadmapSequenced 0–3 month, 3–9 month, 9–24 month actions — segmentation, BACnet/SC adoption, remote-access hardening, compensating controls; replacement only where it pays backCISO, head of critical environments
Compliance & Tenant Evidence PackFindings mapped to IEC 62443-3-3, ISO 27001 Annex A, Uptime Tier compliance evidence, SOC 2 control narratives, tenant-facing security attestation appendixAuditor, compliance officer, tenant security counterpart
Executive ReadoutBoardroom and tenant-review narrative — what the floor is exposed to, what we are doing about it, what we are accepting and whyC-suite, key tenant security review

Every artefact is defensible — line by line, against a documented rubric. The auditor, the tenant and the board read it the same way.

09 / 12
twinos

How an Engagement Runs — Without Touching the Hall.

Operations-conscious by design. We do not actively scan BMS controllers. We do not reboot a CRAC. We do not require a maintenance window to deliver the assessment.

Indicative duration — 4 weeks for a single hall, 6–10 weeks for a multi-hall or multi-site portfolio. No tripped CRACs. No tenant-notification incidents during the assessment itself.

10 / 12
twinos

Where This Sits in Your Programme.

The assessment is the entry point — and complete in itself. The risk register, roadmap and evidence pack stand on their own; many operators stop here and use the output to drive their facilities-OT security programme for a year.

When the next question is asked, the same methodology extends:

No upsell pressure. The assessment is sold standalone, priced standalone, and delivered standalone.

11 / 12

Book a Scoping Call.

30 minutes. Bring your MEP single-line, your BMS topology and your last tenant security review. We will tell you what an assessment of your halls looks like — duration, deliverables, indicative number.