RECENTLY SMART BUILDING INSTALLATIONS - INCLUDING ONES BASED ON KNX - ARE INCREASINGLY THE SUBJECT OF CYBER ATTACKS. THESE CYBER ATTACKS CAN BE EASILY AVOIDED IN CASE OF KNX BY ENSURING THAT INSTALLATIONS ARE NEVER DIRECTLY (WITHOUT VPN) ACCESSIBLE VIA THE INTERNET. FOR THIS KNX ALREADY WARNED YEARS AGO IN THE KNX SECURE CHECKLIST.
Following heavy investments from both the KNX members as well as the KNX Association, last year and this year tangible KNX Secure products saw the light. All of these products were submitted to the stringent KNX certification process, during which their conformity to implemented AES128 authentication and encryption mechanisms are put to the test. Together with the ETS, this allows the installer/integrator to now evaluate in which cases the use of KNX Secure products brings added value to the KNX installation.
This checklist has been designed to make sure that people are not trying to take advantage of possible security loopholes in installations.
In many installations, such loopholes are unfortunately very straightforward. Some examples:
As the KNX Secure checklist says, many of the above can be overcome with very simple measures and of course by making use of KNX Secure. KNX offers so many opportunities to make buildings smart that it would be a shame to let this be spoiled by avoidable security attacks.
KNX provides all the required puzzle pieces: one just has to lay them in the right way.