Copper State Solutions
Platform

Built for the hardest environments. Designed to scale.

The ACSS platform is an edge-to-operator data infrastructure purpose-built for mission-critical industrial and government environments. Every architectural decision reflects the conditions our customers operate in — not the conditions that made the demo look good.

Reference Architecture

Every layer. Every boundary. Nothing hidden.

The following diagram represents a standard multi-site deployment. Components can be deployed independently or as an integrated stack depending on your environment and requirements.

Customer Sites
Site Alpha
· Edge Node (hardened)
· Local sensor bus
· 72hr local buffer
Site Bravo
· Edge Node (hardened)
· Local sensor bus
· 72hr local buffer
Site Charlie
· Edge Node (hardened)
· Local sensor bus
· 72hr local buffer
mTLS / Encrypted Transport
Transport
Secure Ingestion Gateway
· Certificate validation
· Rate limiting & DDoS protection
· Tenant routing
Identity & Access
· Hardware attestation
· RBAC enforcement
· Session audit logging
Normalized Event Stream
Platform Core
Ingest & Normalize
· Schema validation
· Unit normalization
· Tag enrichment
Storage
· Time-series DB
· Event log store
· Blob / file store
Analytics
· Rules engine
· ML anomaly models
· Threshold evaluation
Alerting
· Escalation chains
· SLA tagging
· Deduplication
Role-Scoped Data Access
Operators
Operations Dashboard
· Shift overview
· Asset health map
· Active alerts
Compliance Console
· Audit log viewer
· Report generation
· Evidence packaging
API / Integrations
· REST + GraphQL
· Webhook events
· SIEM / DCIM export
Security & Compliance

Security is not a feature. It is the foundation.

Every deployment decision in the ACSS platform starts from a security posture assumption, not an optimization assumption. The following capabilities are standard — not add-ons.

Zero-Trust Architecture

Every service, device, and user is authenticated and authorized on every request. No implicit trust based on network location. Hardware-attested device identity for edge nodes.

Encrypted Transport

Mutual TLS between all platform components. Certificate pinning on edge nodes. All data encrypted in transit and at rest using AES-256.

Role-Scoped Access

Attribute-based access control with hard data boundaries between tenants. Users see only what their role permits. Every access event is logged.

Tamper-Evident Logging

Cryptographically chained event logs that cannot be silently altered. Exportable for audit, incident response, and regulatory review.

Vulnerability Management

Continuous dependency scanning and a structured patch cadence. Security advisories disclosed within 30 days of confirmed vulnerability discovery.

Compliance Documentation

Pre-structured evidence packages for NIST CSF, NERC-CIP, and SOC 2 Type II audit processes. Customer-facing compliance documentation available under NDA.

Aligned Standard
NERC-CIP

Event logging, access control, and incident documentation structured for NERC-CIP compliance for bulk electric system operators.

Production
Aligned Standard
NIST CSF

Platform controls mapped to the NIST Cybersecurity Framework Identify, Protect, Detect, Respond, and Recover functions.

Production
Roadmap Standard
ISO 27001

ISO 27001 certification is on our product roadmap. Current controls are being structured for audit readiness. Expected certification in 2026.

Roadmap — 2026
Integrations

Connects to what you already run.

ACSS is designed to complement your existing systems, not replace them. We pull data from the field, normalize it, and push insights to the tools your teams already use.

Field Protocols
  • Modbus TCP/RTU
  • DNP3
  • OPC-UA
  • IEC 61850
  • MQTT
  • BACnet
Enterprise Systems
  • SAP PM
  • IBM Maximo
  • OSIsoft PI / AVEVA
  • Honeywell Forge
  • GE APM
Security & Identity
  • Active Directory / LDAP
  • SAML 2.0 / OIDC
  • CAC / PIV
  • CrowdStrike (log export)
  • Splunk SIEM
Notification & Ops
  • PagerDuty
  • OpsGenie
  • ServiceNow
  • Slack / Teams (webhooks)
  • Email / SMS

Integration catalog continues to expand. Custom integrations available through our professional services team.

Scalability

Starts small. Scales to the full operation.

You do not need to deploy everything at once. ACSS is designed for phased rollout — start with the highest-priority assets and scale to full coverage as confidence and budget allow.

  • 01Horizontally scalable ingest layer — tested to 500,000+ sensor events per second in synthetic load scenarios
  • 02Multi-region deployment for redundancy and data sovereignty requirements
  • 03Hard multi-tenant data isolation — customer data never co-mingles at the storage layer
  • 04Edge nodes operate independently during cloud connectivity loss, buffering up to 72 hours of data locally
  • 05API-rate-limited ingestion protects platform stability during upstream data bursts
  • 06Automated failover tested quarterly against defined RTO and RPO targets
Get the Technical Brief

Architecture documentation available under NDA.

Detailed technical documentation, security architecture diagrams, and compliance evidence packages are available for qualified customers and procurement reviewers.