Copper State Solutions
Resources

Documentation for the people who have to make the call.

Technical papers, deployment case studies, and concise briefing materials for operators, engineers, security architects, and procurement teams. No gated lead-gen — just useful content.

All
Defense
Whitepapers
Case Studies
One-Pagers
[CS] Capability Statement2 pages

ACSS Defense Capability Statement

SAM.gov-formatted capability statement for DoD and prime contractor procurement teams. Covers core competencies, differentiators, NAICS codes, past performance framework, and contact information for the ACSS defense team.

Audience:Contracting Officers, Prime SBLOs, Procurement Teams
Download PDF
[CB] Compliance Brief4 pages

CMMC Level 2 Alignment: Platform Controls Mapping

Technical brief mapping ACSS platform capabilities to NIST SP 800-171 practices across all 14 control domains. Identifies current production controls, in-progress remediations, and roadmap items. Designed for prime contractor qualification teams and DoD procurement reviewers.

Audience:Defense IT, Program Managers, CMMC Assessors
Download PDF
[1P] One-Pager1 page

ACSS Defense & Military: Solution Brief

One-page overview of ACSS capabilities for defense installations and defense contractor facilities. Covers problem statement, platform capabilities, compliance posture, deployment model, and trust signals — formatted for executive briefings, prime contractor intake, and SBIR/AFWERX submissions.

Audience:Executive, Program Managers, Primes
Download PDF
[WP] Whitepaper18 pages

Edge-First Architectures for Critical Infrastructure Monitoring

A technical examination of why edge-resident processing is not optional in mission-critical industrial environments — and what the architecture looks like when you build for disconnected, contested, and high-latency conditions from the start.

Audience:Engineering & IT leadership
Download PDF
[WP] Whitepaper24 pages

Zero-Trust Security for Industrial IoT: Principles and Implementation

Zero-trust is a well-understood concept in enterprise IT. Industrial OT environments are a different problem. This paper addresses the specific challenges of applying zero-trust principles to sensor networks, field devices, and the security gaps that sit between them and the enterprise security stack.

Audience:Security architects & CISO offices
Download PDF
[CS] Case Study8 pages

Mining Operations: Predictive Maintenance at Scale

How a major copper mining operation reduced unplanned equipment downtime by instrumenting their haul fleet and processing plant with ACSS edge nodes — and what the path from pilot to production looked like.

Audience:Operations leadership, Mining & Metals
Download PDF
[CS] Case Study10 pages

Defense Installation: Unified Situational Awareness

A Defense contractor facility consolidated disparate legacy monitoring systems under the ACSS platform, eliminating blind spots in their perimeter and facility monitoring and achieving ATO-ready documentation within a single deployment cycle.

Audience:Defense IT, Program Managers
Download PDF
[1P] One-Pager1 page

ACSS Platform: Capabilities at a Glance

A single-page summary of ACSS platform capabilities, deployment models, supported protocols, and compliance alignment — formatted for executive briefings and procurement intake.

Audience:Executive, Procurement
Download PDF
[1P] One-Pager2 pages

ACSS for Energy & Grid: Solution Brief

A focused overview of ACSS capabilities for bulk electric system operators and distribution utilities, including NERC-CIP compliance alignment, supported grid communication protocols, and typical deployment scope.

Audience:Utility operations, Compliance teams
Download PDF
Note on Content Status

Resources marked with case study or whitepaper content are in active development. Final documents will be available for download upon release. If you need specific technical documentation for a procurement or evaluation process ahead of that timeline, contact us directly and we will provide what is available.

Need Something Specific

Tell us what your team needs to evaluate ACSS.

RFI response templates, security questionnaire pre-fills, architecture documentation, and reference letters are available for customers in active procurement.