BESS M&A Due Diligence: The Physics Checklist Before You Commit Capital
Infrastructure funds buying operating BESS assets need an independent view of degradation, operating history, and remaining revenue capacity before signing.
Practical writing on forensic reviews, diagnostics, and deployment choices for BESS teams.
Infrastructure funds buying operating BESS assets need an independent view of degradation, operating history, and remaining revenue capacity before signing.
For IPPs operating utility-scale BESS in Singapore's frequency regulation and energy arbitrage markets, SoH errors become revenue leakage. Inaccurate battery health assumptions distort bids, cycling depth, and operating limits.
Following Singapore EMA technical updates, grid operators need a clearer record of how battery safety is monitored, reviewed, and documented beyond basic BMS alarms.
HDB rooftop portfolios often underperform their original models for reasons that are measurable after commissioning, from soiling patterns to new shading and equipment mismatch.
Across ASEAN, many solar and BESS projects leave COD with performance paperwork that says little about long-run operating yield. A post-COD forensic review helps owners separate temporary issues from structural ones.
Why SCADA alarms arrive late for LFP battery risk, what dQ/dV analysis can reveal from exported telemetry, and how Verify and Horizon split the job between diagnosis and continuous monitoring.
A practical operator guide to what physics-informed anomaly detection actually catches, why statistical alerting misses it, and where Verify, Horizon, and Sovereign each fit.
Most solar PV operators accept 2-5% annual degradation as normal. A forensic review can often uncover another 5-15% yield gap caused by inverter clipping, module mismatch, and soiling patterns invisible to standard monitoring.
Independent forensic review
Scoped forensic review for BESS assets
We review telemetry, operating history, and the physical signals standard reporting tends to miss.
Brief the asset, share available telemetry, and we’ll scope the review from there.
Scope first
Defined review scope
Boundary, telemetry window, and mandate question are pinned down before conclusions move.
Encrypted handling
Protected review workflow
Review traffic and operating data are handled with encrypted transfer and controlled access.
Customer boundary
Customer-controlled deployment
Managed, private, and isolated deployment paths are available when the environment requires them.
Direct accountability
Principal sign-off
Technical accountability stays close to the method rather than disappearing into a generic workflow.