Managing Security Risks in Smart Lighting Systems, Part 2

Access Control & Authentication

Dec 11, 2019

This blog post is the second of a 4-part introductory series on managing security risks in smart lighting systems.

The first blog post in this series introduced the concept of a multi-tiered approach to identifying and mitigating Building Automation and Control System (BACS) cybersecurity risks and threats. We highlighted the NIST cybersecurity framework and associated security controls as best practice guidelines. U.S. Federal Information Systems and Organizations have strict security and privacy control requirements and rely heavily on the work of NIST and the guidelines published.

In this blog post, we’ll focus on two key security control families: access control and identification and authentication.

Key Security Control Strategies

Access Control

A minimum security requirement is controlling physical access to the system as well as access between users (or processes acting on behalf of users). An access control strategy enables users to have access to a system function that they have privilege to access based on their role or identity. As examples, some personnel may need remote access to the lighting system for troubleshooting or remote management, while only a select group of privileged users should have access to the server in a server room. Only a system administrator should have the permissions to configure user rights.

Access control policies, procedures and account management

In order to operate a Smart Lighting System, the operating organization has to develop and document access control policies and procedures that define the roles and responsibilities of personnel interacting with the system. It also defines how these roles and responsibilities are managed. These roles include (but are not limited to) the following functions:

• system administrators

• facility managers & operators

• commissioning specialists

• field support and service specialists

All of these roles should be associated with a set of privileges or authorizations following a separation of duties and least privilege principles. Applying these principles allows users only to access and control system functions and information that are necessary to perform a certain task. For facility managers, this could mean that access is controlled to just the building operation functions of a specific asset. For instance, Facility Manager A might only have access to Building A, and Facility Manager B only access to Building B. Neither of them has access to system and security configuration functions such as user management or the configuration of system devices.

System administrators are responsible for identifying and naming authorized users and assigning/revoking users’ group memberships and privileges. It is important that an organization has a management process in place that regularly reviews and updates defined roles and responsibilities.

User authentication and authorization provides the necessary controls to enforce the logical access to system functions and controlled assets based upon the applicable access control policy. User access can be controlled for local, remote and wireless access, with each potentially having their own policies.

Where necessary, the system may control the number of concurrent user sessions and provide mechanisms to lock and terminate sessions after a defined period of inactivity. The latter reduces the risks of providing access to unauthorized users that intend to hijack an authenticated user session.

At the same time, the Building Automation Control System denies access to users that do not have the authorization to access the system and keeps record of unsuccessful logon attempts.

Identification and authentication

For secure operation, a BACS system must provide identification and authentication functions for users, devices and services.

Identification and authentication of system users is commonly known as user management where users either use individual or group credentials. Credentials can be either simple user name password credentials or more sophisticated authenticators such as tokens, Personal Identification Numbers (PINs), challenges or a public key infrastructure with the use of certificates. To increase security, the system may use multi- or two-factor authentication where two or more authenticators are combined, e.g. password and challenge.

Device identification and authentication ensures that only uniquely identified and authenticated devices, such as system controllers, control modules and sensors, gain access to the system. Identification can be based on IP or MAC addresses or other unique identifiers including certificate based identifiers. Similar to devices, the system has to ensure that only trusted services gain access to the system, e.g. by the use of web tokens of identified and authenticated users.

In many cases security guidelines require authenticators to be of a certain strength and to be changed on a periodic basis. When entering authenticators, systems should provide feedback and obscure the feedback. 

Authentications should expire, if connections are closed, after a certain amount of inactivity or when authenticators expire. To re-gain access to the system users, devices and services will have to successfully re-authenticate.

Authentication processes should be secure and should provide record/replay protection, e.g. by the use of Transport Layer Security.

The ENCELIUM® EXTEND Light Management System has been accepted by the GSA (General Services Administration), an independent agency of the United States government, and is currently used for smart lighting in government and commercial buildings.

Source https://info.osram.us/blog/best-practice-security-control-strategies-for-smart-lighting-systems

Related Articles


Latest Articles

  • Ottawa Day 2026: EFC Members Engage with Parliamentarians on Canada’s Electricity Future

    Ottawa Day 2026: EFC Members Engage with Parliamentarians on Canada’s Electricity Future

    March 16, 2026 By Electro-Federation Canada Following EFC’s recent update on our 2026 Ottawa Day, we are pleased to share photo highlights from two days of engagement on Parliament Hill, where members met with federal decision-makers to discuss the future of Canada’s electricity system. More than 40 EFC member leaders and Government Relations representatives travelled Read More…

  • Industrial Construction Intentions Drive Increase in Non-Residential Sector in January

    Industrial Construction Intentions Drive Increase in Non-Residential Sector in January

    March 13, 2026 In January, the total value of building permits issued in Canada increased $607.0 million (+4.8%) to $13.3 billion. The increase was led by the non-residential sector (+$464.0 million) and supported by the residential sector (+$143.0 million). On a constant dollar basis (2023=100), the total value of building permits issued in January rose 4.3% from the previous month Read More…

  • Multi-Unit Construction Drives Growth in December Residential Construction Investment, 2025 Review

    Multi-Unit Construction Drives Growth in December Residential Construction Investment, 2025 Review

    March 13, 2026 The total value of investment in building construction increased $442.9 million (+1.9%) to $23.7 billion in December. The residential sector grew 2.4%, while the non-residential sector edged up 0.6%. Year over year, investment in building construction grew 12.2% in December. On a constant dollar basis (2023=100), the total value of investment in building construction in December rose 1.7% Read More…

  • 5 Strategic Reasons to Attend the Lumen Exhibition

    5 Strategic Reasons to Attend the Lumen Exhibition

    March 13, 2026 In a market where deadlines are tight and projects are increasingly complex, staying competitive is no longer just about technical skills. It also depends on having the right tools, the right information, and the right partners by your side. The Lumen Exhibition is more than just an event—it’s a strategic lever designed to Read More…


Changing Scene

  • Blackstone Announces Agreement to Acquire Arlington Industries

    Blackstone Announces Agreement to Acquire Arlington Industries

    March 20, 2026 Blackstone and Arlington Industries announced that funds managed by Blackstone Energy Transition Partners have entered into a definitive agreement to acquire Arlington. Founded in 1949, Arlington designs and manufactures a range of electrical products such as fittings, enclosures and other components. The company’s innovative solutions are used across commercial, industrial and data Read More…

  • A New Guillevin.com, Designed to Simplify Your Purchasing Experience

    A New Guillevin.com, Designed to Simplify Your Purchasing Experience

    March 16, 2026 Guillevin.com was built as a digital working tool, designed to support the way their customers plan, search for, and purchase products today. The goal is simple: to offer a fast, reliable, and intuitive online platform capable of supporting real-world operations; both on the job site and in the office. A platform built around Read More…

  • Nova Scotia Strengthens Housing Legislation to Accelerate Supply

    Nova Scotia Strengthens Housing Legislation to Accelerate Supply

    March 13, 2026 Amendments to existing legislation will mean more housing, improved efficiency in the sector and better alignment of related agencies. The changes extend the Executive Panel on Housing in the Halifax Regional Municipality and give the Minister of Housing new authority to ensure housing projects aren’t delayed. “We are strengthening how we plan, Read More…

  • BC Introduces Public Sector Construction Projects Procurement Act

    BC Introduces Public Sector Construction Projects Procurement Act

    March 13, 2026 Kiel Giddens, MLA for Prince George-Mackenzie and Critic for Labour, has introduced the Public Sector Construction Projects Procurement Act, legislation aimed at ensuring publicly funded construction contracts are awarded through labour-neutral, merit-based procurement. “Here’s the simple question: if labour shortages are driving cost overruns, why would government limit who can work on public projects?” Read More…