HCIT — Millhaven, Ohio · Fictional Mid-Size County Government · C2M2 v2.1 Training Case Study
Harmon County, Ohio (fictional) is a mid-size county in the state of Ohio with a county seat in Millhaven (population ~22,000). The county government provides a broad range of services to its 94,200 residents across 542 square miles, including law enforcement (Sheriff's Office), 911 emergency dispatch, courts, elections administration, public health, building permits, road and bridge maintenance, and financial services (Auditor, Treasurer, Recorder). The county operates under a three-member elected Board of County Commissioners with a professional County Administrator overseeing day-to-day operations.
The Harmon County Information Technology Department (HCIT) serves as the centralized IT function for all county departments, including the Sheriff's Office, Courts, Health Department, Board of Elections, and Public Works. IT Director Marcus Webb (hired 2018) reports directly to the County Administrator and leads a team of 9 FTE. Webb also serves as the county's de facto information security officer — there is no dedicated CISO, no security manager, and a cybersecurity analyst position has been unfilled for 14 months due to budget constraints approved by the Board of County Commissioners. The county joined the Multi-State Information Sharing and Analysis Center (MS-ISAC) in 2019 and deployed a CISA Albert network sensor in 2022.
County IT faces the challenges common to resource-constrained local governments: a very broad technology footprint spanning public safety, elections, health, finance, and general administration; regulatory obligations across multiple federal and state frameworks simultaneously (CJIS, HIPAA, IRS Publication 1075, HAVA/EAC); a flat IT budget that has not grown in proportion to the county's expanding digital services; aging infrastructure that was budgeted during a period of lower cybersecurity awareness; and a small staff that must manage both day-to-day operations and respond to incidents without dedicated security personnel. These conditions — extremely common across mid-size county governments — make HCIT an ideal C2M2 assessment scenario.
| Attribute | Detail |
|---|---|
| Full Name | Harmon County Information Technology Department (HCIT) |
| Jurisdiction Type | County Government — Ohio General Law County |
| County Seat | Millhaven, Ohio (fictional) — population ~22,000 |
| County Population | 94,200 residents (2020 Census estimate) |
| County Area | 542 square miles (land) |
| Governance | Board of County Commissioners (3 elected); County Administrator: Patricia Holloway |
| IT Director | Marcus Webb — hired 2018; reports to County Administrator; de facto Security Officer |
| IT Staff | 9 FTE (1 director, 2 sys admins, 1 network admin, 1 app specialist, 1 GIS analyst, 2 help desk, 1 cybersecurity analyst — VACANT) |
| Annual County Budget (FY2025) | $87.3 million |
| Annual IT Budget (FY2025) | $1.84 million (2.1% of county budget) |
| Cybersecurity Sub-Budget | ~$94,000 (tools, training, MS-ISAC; no dedicated security staffing budget) |
| Dedicated CISO | None — IT Director serves as de facto security lead |
| MS-ISAC Membership | Member since 2019 — Albert sensor active since 2022 |
| CISA Regional Advisor | Contact established — annual check-in; no formal assessment completed |
| Cyber Insurance | $2M limit; Ohio County Risk Sharing Authority (CORSA) policy; last reviewed FY2023 |
| IT Help Desk Ratio | 1 technician per 228 county employees (industry benchmark: 1:70–100) |
| Primary Regulatory Frameworks | FBI CJIS Security Policy v5.9.2 · HIPAA Security Rule · IRS Publication 1075 · HAVA / EAC · Ohio RC §9.08 |
| C2M2 Self-Assessment | Completed Q1 2026 by IT Director Webb with MS-ISAC state coordinator support |
| Overall C2M2 Level | MIL 0–2 (mixed); MIL 2 in Asset Mgmt only; MIL 0 in Situational Awareness & Supply Chain |
Harmon County IT supports eight primary facilities across Millhaven and the surrounding county, plus four remote township offices connected via commercial internet. All primary facilities connect to the FAC-01 data center via AT&T fiber circuits. The 911 Emergency Communications Center (FAC-03) is co-located with the Sheriff's Office (FAC-02) in a shared public safety complex, with a physically dedicated 911 network infrastructure. The Board of Elections (FAC-08) operates as a separate building with specific isolation requirements for election management systems per Ohio Secretary of State directive.
| Facility ID | Name | Location | Primary IT Systems | IT Risk Notes |
|---|---|---|---|---|
| FAC-01 | Courthouse Annex — Primary Data Center & IT Offices | Millhaven, OH (Downtown) | All county servers (SRV-01 through SRV-10); Munis ERP; domain controllers; backup infrastructure | Primary data center; server room access shared with facilities staff; no card reader — key lock only |
| FAC-02 | Harmon County Sheriff's Office & County Jail | Millhaven Public Safety Complex | Tyler New World RMS (law enforcement); Axon/Evidence.com (body cams); CJIS-regulated workstations; jail management module | CJIS Security Policy applies — MDM not deployed; screensaver lockout policy missing; CJIS audit Q3 2026 |
| FAC-03 | 911 Emergency Communications Center | Millhaven Public Safety Complex (co-located with FAC-02) | Zetron Viper 9-1-1 CAD system (SRV-06); 12 dispatch consoles; PSAP phone trunks; radio dispatch | Life-safety system; SRV-06 EOL and never patched; no IDS on VLAN 30; Zetron SLA is next-business-day |
| FAC-04 | Harmon County Courts / Municipal Court Complex | Millhaven, OH (Courthouse Square) | Tyler New World courts/justice module (SRV-05); 32 court workstations; public kiosk terminals | SRV-05 patch lag ~6 months; Tyler support VPN persistent; public kiosks on separate VLAN — OK |
| FAC-05 | Harmon County Health Department | Millhaven, OH (Health Services Campus) | Electronic Health Record (EHR) system; 24 HIPAA-scope workstations; state immunization registry connection | HIPAA Security Rule applies; risk analysis last updated 2022; BAA inventory incomplete; VLAN 50 isolated |
| FAC-06 | Auditor / Treasurer / Recorder Offices | Millhaven, OH (Courthouse Main Building) | COGNOS BI (SRV-08, SQL 2014 EOL); 18 auditor workstations; IRS federal tax information; property tax portal | IRS Pub 1075 — federal tax information (FTI) on EOL SQL Server 2014; access logs not reviewed quarterly |
| FAC-07 | Public Works / Highway Department | Route 40 East, Harmon County (outside Millhaven) | 18 workstations; 8 Android tablets (field staff); road/bridge monitoring sensors; Accela (permits) | Most remote primary facility; Android tablets lack MDM; road sensors on VLAN 60 (flat, no microsegmentation) |
| FAC-08 | County Annex / Board of Elections | Millhaven, OH (separate building) | Dominion Democracy Suite 5.17 EMS workstation; 6 administrative workstations; voter registration system | EMS workstation found connected to VLAN 10 (Admin network) Feb 2026 — Ohio SoS air-gap directive violated |
Four Harmon County township offices (Jackson Township, Perry Township, Liberty Township, and Washington Township) connect to county resources via Comcast Business SDSL circuits (25 Mbps down / 5 Mbps up). These sites have no on-site IT support, no local server infrastructure, and rely entirely on VPN connectivity to FAC-01 for access to Munis ERP and county file shares. IT support is provided remotely or by dispatch from FAC-01 (30–45 minute drive to the most remote site).
| Role | FTE | Name / Status | Key Certifications | Primary Responsibilities & Notes |
|---|---|---|---|---|
| IT Director | 1 | Marcus Webb (hired 2018) | CompTIA Network+; no security cert | All IT operations + de facto CISO; budget owner; primary vendor contact; incident commander |
| Systems Administrator | 2 | Kevin Okafor, Rachel Dietz | Microsoft MTA (Okafor); no current cert (Dietz) | Windows Server, Active Directory, Veeam backup, Tyler application server management |
| Network Administrator | 1 | Daniel Cruz | CompTIA Network+; Cisco CCNA (lapsed) | Cisco LAN/WAN, Fortinet firewall, Pulse Secure VPN, Ubiquiti wireless |
| Application Specialist | 1 | Sandra Nguyen | Tyler Technologies certified (Munis) | Tyler Munis ERP and Tyler New World system administration, user training, Tyler support liaison |
| GIS Analyst | 1 | Thomas Brewer | Esri ArcGIS Desktop Associate | Esri ArcGIS Enterprise administration, parcel mapping, county GIS data governance |
| Help Desk Technician | 2 | Aaliyah Johnson, Patrick Simmons | CompTIA A+ (Johnson) | Tier 1 support for all 822 county employees; imaging workstations; printer support |
| Cybersecurity Analyst | 0 — VACANT | Position unfilled since January 2025 | — | Intended scope: SIEM monitoring, vulnerability management, policy compliance, security awareness. All duties absorbed by IT Director ad hoc. |
| Asset ID | Description | OS / Platform | Location | Status / Risk Notes |
|---|---|---|---|---|
| SRV-01 | Primary Domain Controller / Active Directory (FSMO roles) | Windows Server 2012 R2 (EOL Oct 2023) | FAC-01 Data Center | CRITICAL — EOL; authentication, Group Policy, CJIS access mgmt depend on EOL infrastructure; budget migration denied FY2024 |
| SRV-02 | Secondary Domain Controller / AD replication | Windows Server 2012 R2 (EOL Oct 2023) | FAC-01 Data Center | CRITICAL — EOL; no security patches since Oct 2023; known CVEs unmitigated |
| SRV-03 | Domain Controller / DNS / DHCP (replacement — partial) | Windows Server 2022 | FAC-01 Data Center | Current — provisioned 2024; FSMO roles not yet migrated from SRV-01/02; transition incomplete |
| SRV-04 | Tyler Technologies Munis ERP (Finance, HR, Payroll, Procurement) | Windows Server 2019 | FAC-01 Data Center | Minor patch lag (~6 weeks); Tyler support requires change window coordination; persistent VPN for Tyler remote support unmonitored |
| SRV-05 | Tyler Technologies New World (Courts, Justice, Jail Management, RMS) | Windows Server 2016 | FAC-01 Data Center | Patch lag ~6 months — Tyler sign-off required for each patch; last OS update: August 2025; Server 2016 mainstream support ended Oct 2022 |
| SRV-06 | Zetron Viper 9-1-1 CAD Server (Life-Safety) | Windows Server 2012 R2 (EOL) — physically at FAC-03 | FAC-03 (911 Comm Center) | CRITICAL — EOL; zero OS patches in 36+ months; Zetron written approval submitted Jan 2023, no response; no IDS on VLAN 30; life-safety dependency |
| SRV-07 | File Server / County Records / Shared Drives | Windows Server 2016 | FAC-01 Data Center | No DLP controls; unclassified CUI (law enforcement records, health documents) commingled with general files; no access review in 24 months |
| SRV-08 | SQL Database Server — COGNOS BI backend (IRS Pub 1075 scope) | SQL Server 2014 (EOL Jul 2019) | FAC-01 Data Center | CRITICAL — EOL since 2019; hosts federal tax information (FTI); multiple known CVEs; IRS Pub 1075 access log review noncompliant |
| SRV-09 | Backup Server (Veeam Backup & Replication 11) | Windows Server 2019 | FAC-01 Data Center | No offsite copy; tapes rotated to locked closet in same building; restore integrity never tested; Veeam 11 (EOL — upgrade to v12 unfunded) |
| SRV-10 | Esri ArcGIS Enterprise (GIS / Parcel Mapping) | Windows Server 2019 | FAC-01 Data Center | Current patching; public-facing parcel portal — no WAF; internal parcel database exposed via unauthenticated API endpoint (minor data risk) |
| Department / Use | Count | OS | Regulatory Scope | Risk Notes |
|---|---|---|---|---|
| County Administrative Staff (Finance, HR, General) | 280 | Windows 10 Pro / Windows 11 Pro (mixed) | Munis ERP access; general PII | Patch compliance ~78% via WSUS; 61 workstations running Win10 21H2 (unsupported build); no EDR deployed |
| Sheriff / Law Enforcement | 45 laptops | Windows 10 Pro | CJIS Security Policy v5.9.2 | Screensaver timeout policy not enforced (CJIS §5.6.2.2); MDM not deployed for 12 mobile devices; CJIS audit Q3 2026 |
| 911 Dispatch Consoles | 12 | Windows 10 Pro (dedicated) | Life-safety — 911 operations | Dedicated VLAN 30; aging hardware (avg 7 years old); no redundant dispatch workstations; manual CAD fallback procedure undocumented |
| Courts / Justice | 32 | Windows 10/11 Pro (mixed) | Tyler New World; court records | 2 courtroom kiosk terminals on public VLAN — isolated OK; staff workstations patching current; no MFA for Tyler New World access |
| Health Department | 24 | Windows 10 Pro | HIPAA Security Rule | HIPAA risk analysis dated 2022; no BAA inventory; EHR vendor (state-hosted) has SOC 2 Type II; workstation-level encryption not verified |
| Auditor / Treasurer Offices | 18 | Windows 10 Pro | IRS Publication 1075 — Federal Tax Information | FTI accessed via COGNOS on EOL SQL Server 2014; access logs not reviewed quarterly; shared login used by 3 of 18 staff for COGNOS reporting |
| Public Works (field staff) | 18 workstations + 8 Android tablets | Windows 10 / Android 10–12 | General county systems; Accela permits | Android tablets: no MDM, no device encryption enforced, 3 personal apps installed; workstations patching current via WSUS |
| Board of Elections | 6 workstations + 1 EMS workstation | Windows 10 Pro | HAVA / EAC; Ohio SoS election directives | EMS workstation (Dominion Democracy Suite) found connected to VLAN 10 Feb 2026 — Ohio SoS air-gap directive violated; admin workstations patching current |
| IT Staff | 9 (admin workstations / laptops) | Windows 11 Pro | Domain admin access; all systems | IT staff have domain admin privileges; shared account "countyit" used for server work — no individual accountability for admin actions |
| Application | Vendor | Function | Hosting | Risk / Access Notes |
|---|---|---|---|---|
| Tyler Munis ERP | Tyler Technologies | Finance, payroll, HR, procurement — 822 employees | On-prem (SRV-04) | No MFA enforced for any users; Tyler support VPN persistent (always-on); payroll dependency: $2.1M/month |
| Tyler New World | Tyler Technologies | Courts, justice, jail records, police RMS | On-prem (SRV-05) | Patch lag 6 months; Tyler support VPN persistent; CJIS data in RMS module — not inventoried for CJIS compliance scope |
| Zetron Viper 9-1-1 CAD | Zetron (Motorola Solutions) | Emergency dispatch, call tracking, unit status | On-prem (SRV-06) | Life-safety; EOL OS; Zetron SLA is next-business-day; vendor patch approval process never completed in 3 years |
| Dominion Democracy Suite 5.17 | Dominion Voting Systems | Election management, ballot programming, results tabulation | Standalone workstation (FAC-08) | Air-gap required per Ohio SoS; found on county network Feb 2026; last security update from Dominion: Oct 2024 |
| Microsoft 365 GCC | Microsoft | Email (Outlook), Teams, SharePoint — all 822 employees | Cloud (GCC) | Microsoft Defender for Office 365 Plan 1 licensed but not fully configured; MFA enforced only for IT staff (9 of 822); conditional access policies not configured |
| COGNOS BI | IBM / legacy | Financial reporting; federal tax data processing (IRS Pub 1075 scope) | On-prem (SRV-08, SQL 2014) | EOL SQL Server 2014; access logs not reviewed quarterly (IRS Pub 1075 §4.6 requirement); 3 shared COGNOS logins in use |
| Esri ArcGIS Enterprise | Esri | GIS, parcel mapping, infrastructure planning | On-prem (SRV-10) + public portal | Public parcel portal has no WAF; unauthenticated API endpoint exposes internal parcel records — low sensitivity but unintended exposure |
| Accela | Accela Inc. | Building permits, inspections, code enforcement | SaaS (cloud-hosted) | SOC 2 Type II; MFA enforced by Accela; BAA not applicable; annual security review conducted by Accela |
| Axon / Evidence.com | Axon Enterprise | Body camera video, digital evidence chain-of-custody (Sheriff) | SaaS (cloud) | Axon-managed security; CJIS-compliant platform; encrypted at rest and in transit; SOC 2 Type II |
| OpenGov | OpenGov Inc. | Public budget transparency portal (citizen-facing) | SaaS (cloud) | Read-only public data; no county PII; SOC 2 Type II; no significant security risk |
Government IT is distinct from commercial IT in that system failures directly impact legally mandated public services, public safety, and constitutional processes. For Harmon County, five system categories carry critical or life-safety designations: 911 Emergency Dispatch, Election Management, Courts and Justice, Law Enforcement RMS, and Finance/Payroll (ERP). Unlike commercial environments where outages translate to revenue loss, outages in these systems can delay court proceedings, disrupt emergency response, interrupt legally required payroll disbursements, and compromise election integrity — each with distinct legal, regulatory, and public safety consequences.
| System | Platform | Function | Connectivity | Criticality | Security Notes |
|---|---|---|---|---|---|
| Zetron Viper 9-1-1 CAD | On-prem SRV-06 (Win Server 2012 R2 EOL, FAC-03) | Emergency call intake, dispatch, incident tracking for all Harmon County 911 calls (~38,000/year) | Dedicated PSAP phone trunks; VLAN 30 (isolated from corp LAN); Zetron remote support VPN | ⚠️ Life-Safety | EOL OS, zero patches in 36+ months, Zetron SLA = next-business-day, no IDS on VLAN 30, no redundant CAD server, manual fallback procedure undocumented |
| Tyler Munis ERP | On-prem SRV-04 (Win Server 2019, FAC-01) | County payroll ($2.1M/month for 822 employees), finance, HR, purchasing, accounts payable/receivable | VLAN 10 (Admin); Tyler persistent support VPN; Pulse Secure VPN (remote access) | High — Operational | No MFA for any user; Tyler support VPN persistent and unmonitored; ransomware on VLAN 10 could encrypt Munis data and halt county operations |
| Tyler New World (Courts & RMS) | On-prem SRV-05 (Win Server 2016, FAC-01) | Court docketing, case management, jail records, inmate booking, law enforcement records management (RMS) | VLAN 20 (CJIS/Sheriff) + VLAN 40 (Courts); Tyler support VPN; statewide LEADS connection | High — Justice / CJIS | 6-month OS patch lag; Tyler support VPN persistent; CJIS data in RMS module — CJIS compliance audit pending; statewide LEADS connection requires CJIS certification |
| Dominion Democracy Suite 5.17 (EMS) | Dedicated workstation (Win 10 Pro, FAC-08) | Election ballot programming, logic & accuracy testing, results tabulation for all Harmon County elections | Should be completely air-gapped per Ohio SoS directive; found on VLAN 10 Feb 2026 | High — Election Integrity | Ohio SoS air-gap directive violated; workstation connected to county Admin VLAN for voter registration data download "convenience"; Ohio SoS notification not yet made; last security patch from Dominion: Oct 2024 |
| Esri ArcGIS Enterprise | On-prem SRV-10 (Win Server 2019, FAC-01) | County GIS, parcel mapping, infrastructure planning, public property search portal | VLAN 10 (internal) + public-facing internet portal (no WAF) | Medium — Public Service | Public parcel portal internet-exposed without WAF; unauthenticated REST API endpoint returns internal parcel owner records — low sensitivity but unintended; no monitoring on public-facing portal |
| COGNOS BI (IRS Pub 1075) | On-prem SRV-08 (SQL Server 2014 EOL, FAC-01) | County financial reporting; processes and stores federal tax information (FTI) for property tax administration | VLAN 10 (Admin); county auditor staff access; IRS data feed | High — IRS Pub 1075 | EOL SQL Server 2014 (known CVEs); IRS access log review noncompliant; 3 shared COGNOS logins in use; IRS CP2000 equivalent risk if FTI is exfiltrated |
| Accela (Permits) | SaaS — Accela cloud-hosted | Building permits, inspections, code enforcement — public-facing and staff-facing | Internet HTTPS; Accela-managed infrastructure | Medium — Public Service | SOC 2 Type II; MFA enforced by Accela for staff; public portal scoped appropriately; annual security review current |
| Axon / Evidence.com | SaaS — Axon cloud-hosted | Sheriff body camera video, digital evidence, chain-of-custody documentation | Internet HTTPS (encrypted); Axon-managed | Medium — CJIS / Evidence | Axon-managed security; CJIS-compliant platform; encrypted at rest and in transit; SOC 2 Type II; no significant IT-managed risk |
Harmon County's network infrastructure is centralized at FAC-01 (Courthouse Annex data center) and extends to seven county facilities via AT&T fiber and to four remote township offices via Comcast SDSL. The core switching infrastructure consists of Cisco Catalyst 9200 series managed switches. Perimeter security is provided by a Fortinet FortiGate 200E next-generation firewall with UTM features licensed (IPS, web filtering, application control) — though IPS signatures have not been updated in 14 weeks. Remote access is handled by Pulse Secure SSL VPN with no MFA enforcement — a known gap affecting all remote users including IT staff and township employees. Wireless is deployed via Ubiquiti UniFi APs in a mixed deployment; several APs at the Courthouse public lobby and Public Works were installed without proper SSID isolation configuration and are not managed via the central UniFi controller.
| VLAN | Name | Subnet | Primary Systems / Users | Segmentation Notes |
|---|---|---|---|---|
| VLAN 10 | Admin / General | 10.10.0.0/20 | Finance, HR, general staff (280 workstations); Tyler Munis (SRV-04); COGNOS (SRV-08); file server (SRV-07) | Largest segment; Munis ERP and IRS Pub 1075 COGNOS data co-mingled with general staff; Election EMS workstation found here (Feb 2026) |
| VLAN 20 | Law Enforcement / CJIS | 10.20.0.0/24 | Sheriff's Office workstations (45 laptops); Tyler New World RMS; jail management systems; LEADS terminal | ACL MISCONFIGURATION — traffic from VLAN 10 (Admin) can reach VLAN 20 (CJIS); violates CJIS Security Policy network isolation requirements; identified Jan 2026, not yet remediated |
| VLAN 30 | 911 Emergency Comms | 10.30.0.0/24 | Zetron CAD server (SRV-06); 12 dispatch consoles; PSAP telephone trunks; radio dispatch infrastructure | Physically separate at FAC-03; Zetron support VPN terminates on this VLAN; no IDS coverage; no monitoring of network traffic on this segment |
| VLAN 40 | Courts / Justice | 10.40.0.0/24 | Court workstations (32); Tyler New World court module; public kiosk terminals (2, isolated sub-VLAN) | SRV-05 bridged between VLAN 20 and VLAN 40 for RMS/courts integration — bridge not documented in network diagrams; patch lag on SRV-05 |
| VLAN 50 | Health Department | 10.50.0.0/24 | Health Dept workstations (24); state immunization registry connection; EHR vendor connection | HIPAA-scope segment; adequately isolated; state EHR connection exits via dedicated path — not through county firewall; firewall rule review needed |
| VLAN 60 | Public Works | 10.60.0.0/24 | Public Works workstations (18); field Android tablets (8, when docked); road/bridge monitoring sensors (12 sensors) | Flat — road sensors and staff workstations share segment; no microsegmentation; sensor firmware not updated since 2022; tablets connect via Wi-Fi without NAC |
| VLAN 70 | Guest / Public Wi-Fi | 192.168.70.0/22 | Courthouse public lobby Wi-Fi; courtroom attorney access; public kiosk tablets | Isolated — no route to any county VLAN; Fortinet content filtering active; acceptable security posture for this segment |
| VLAN 80 | IT Management | 10.80.0.0/24 | Server management interfaces; Veeam backup (SRV-09); IT admin workstations; iDRAC/BMC management | Shared account "countyit" (Domain Admin) used for all management tasks on this segment; no individual admin accountability; password on whiteboard in FAC-01 server room |
Harmon County conducted a C2M2 v2.1 self-evaluation in Q1 2026, facilitated by IT Director Marcus Webb with support from the MS-ISAC Ohio state coordinator. The assessment evaluated all ten C2M2 domains against documented practices, interviews with IT staff, and review of available policy documentation. Results reflect a posture typical of a resource-constrained county IT department managing a broad technology footprint without dedicated security staff: generally MIL 1 across most operational domains, with MIL 2 achieved only in Asset Management (where the Tyler Munis asset module provides structured tracking), and critically MIL 0 in both Situational Awareness and Supply Chain & Dependencies — two domains where absence of capability creates outsized risk.
| Domain (Abbrev.) | Full Domain Name | MIL Achieved | Key Finding | Priority |
|---|---|---|---|---|
| ASSET | Asset, Change & Configuration Management | MIL 2 | Server and application inventory maintained via Tyler Munis asset module; change log spreadsheet exists but is informal; configuration baselines not formally documented for servers or network devices | Maintain |
| THREAT | Threat & Vulnerability Management | MIL 1 | Nessus Essentials (free) scans conducted quarterly; results reviewed by IT Director but not formally tracked or remediated on a defined schedule; EOL servers not scanned (vendor restriction); no threat intelligence integration | High |
| RISK | Risk Management | MIL 1 | Informal risk register maintained by IT Director in a spreadsheet; no defined risk appetite or tolerance statements; no executive risk review cycle; Board of County Commissioners has not received a formal cybersecurity risk briefing since 2022 | High |
| ACCESS | Identity & Access Management | MIL 1 | Active Directory manages user accounts; onboarding/offboarding process exists but access review has not been conducted in 24 months; 14 former employees' accounts are still active; shared "countyit" domain admin account; no MFA on VPN or Microsoft 365 for general staff | Critical |
| SITUATION | Situational Awareness | MIL 0 | No SIEM deployed; MS-ISAC Albert sensor generates alerts that are not actively monitored by any staff member (alert emails go to a shared mailbox checked irregularly); Microsoft 365 Defender alerts not reviewed; no log aggregation; the county would not know it was breached until operational failure | Critical |
| RESPONSE | Event & Incident Response, Continuity of Operations | MIL 1 | Incident response plan written in 2021; never exercised or tabletop tested; no 24/7 monitoring or on-call rotation for IT; IR plan does not map to Ohio RC §9.08 72-hour reporting requirement; disaster recovery plan last updated 2021 (backup site = locked closet at FAC-01) | Critical |
| DEPENDENCIES | Supply Chain & External Dependencies | MIL 0 | No vendor risk assessments ever conducted; Tyler Technologies, Zetron, and Dominion all have persistent VPN or direct access to county systems with no monitoring or time-limited sessions; no vendor SOC 2 reports reviewed; no third-party dependency inventory; the county cannot identify all entities with active access to its systems | Critical |
| WORKFORCE | Workforce Management | MIL 1 | Annual security awareness training via KnowBe4 free tier; completion rate not tracked or enforced; no role-based training for high-risk roles (finance, wire/payroll, law enforcement); no background check policy for IT admin access to CJIS systems beyond state standard | Medium |
| ARCHITECTURE | Cybersecurity Architecture | MIL 1 | Fortinet NGFW in place; VLAN segmentation implemented (with critical ACL misconfiguration in VLAN 10→20); no zero-trust principles; no endpoint detection/response (EDR) deployed; no email security gateway beyond M365 Defender (partially configured); no WAF on ArcGIS public portal | High |
| PROGRAM | Program Management | MIL 1 | No formal cybersecurity program; IT Director manages security ad hoc alongside all other IT duties; cybersecurity analyst position vacant 14 months; no cybersecurity budget line item separate from general IT; no formal metrics reported to Board of County Commissioners | High |
The county has no ability to detect an active intrusion. The MS-ISAC Albert sensor generates network alerts that arrive in a shared email inbox checked irregularly. Microsoft 365 Defender for Office 365 is licensed but alert policies have not been configured. There is no log aggregation, no SIEM, and no defined process for reviewing security events.
No vendor risk assessments have ever been conducted. Tyler Technologies, Zetron, and Dominion Voting Systems all have persistent remote access to county systems. No SOC 2 reports have been reviewed for any vendor. The county cannot enumerate all entities with current access.
Active Directory provides user account management. However, no access review has been conducted in 24 months, 14 former employee accounts are active, the shared "countyit" domain admin account eliminates individual accountability, and MFA is enforced for only 9 of 822 M365 accounts.
The Tyler Munis asset module provides structured hardware and software inventory tracking. Change management uses an informal shared spreadsheet. Configuration baselines are not formally documented, but asset visibility is significantly better than most county peers.
| Regulatory Framework | Applies To | Key Requirements | Compliance Status |
|---|---|---|---|
| FBI CJIS Security Policy v5.9.2 | Sheriff's Office, Courts, IT (RMS and Tyler New World system access) | Advanced authentication for remote access; MDM for mobile devices; screensaver lockout; background checks; audit logging; encryption in transit; personnel security training | Non-Compliant: VPN lacks MFA (§5.6.2.2); MDM not deployed for 12 mobile devices; screensaver policy missing on Sheriff workstations; CJIS audit letter received — Q3 2026 audit scheduled |
| HIPAA Security Rule (45 CFR §164) | County Health Department; any IT system handling Protected Health Information (PHI) | Annual risk analysis; access controls; audit logging; workforce training; Business Associate Agreements (BAAs) with vendors handling PHI; encryption; incident response | Partial: Risk analysis dated 2022 (should be annual or upon material change); BAA inventory incomplete — state EHR vendor BAA not on file; workstation-level encryption not verified for Health Dept workstations |
| IRS Publication 1075 (Tax Information Security) | County Auditor / Treasurer — all systems processing Federal Tax Information (FTI) | Quarterly access log review (§4.6); encryption of FTI at rest and in transit; background checks for FTI-authorized personnel; incident reporting to IRS within 24 hours; EOL system prohibition for FTI processing | Non-Compliant: COGNOS running on EOL SQL Server 2014 (IRS explicitly prohibits processing FTI on EOL platforms); quarterly access log review not conducted; 3 shared COGNOS logins violate individual accountability requirement |
| HAVA / EAC Election Security Guidelines | Board of Elections — all election management systems and processes | EMS network isolation; chain-of-custody for ballots and election media; physical security for voting equipment; pre-election logic & accuracy testing; post-election audit capability | Non-Compliant: Dominion EMS workstation found connected to county Admin VLAN during pre-election period (Feb 2026) — direct violation of Ohio SoS air-gap directive; Ohio SoS notification not yet completed |
| Ohio Revised Code §9.08 (Cyber Incident Reporting) | All Harmon County IT operations | Report cybersecurity incidents to the Ohio Department of Administrative Services (DAS) Office of Information Security within 72 hours of discovery; maintain incident documentation | Awareness: Requirement known to IT Director; however, no formal IR procedure maps to ORC §9.08 reporting steps; the county attorney has not issued guidance on what constitutes a reportable incident |
| MS-ISAC / CISA Membership | All county IT operations | Albert network sensor deployment; participation in SLTT threat intelligence sharing; access to free incident response resources; MDBR (Malicious Domain Blocking and Reporting) | Member since 2019; Albert sensor active since 2022; MDBR enrolled; CISA regional advisor contact established; MS-ISAC advisory distribution list subscribed — advisories reviewed by IT Director |
| Ohio Secretary of State Election Directives | Board of Elections; IT (for election system support) | Complete network air-gap for EMS workstation during pre-election and election periods; documented chain of custody; L&A testing procedures; post-election audit retention | Non-Compliant: EMS air-gap directive violated Feb 2026 (workstation on VLAN 10); Ohio SoS auditor present during violation; notification and remediation process initiated but incomplete at time of assessment |
| Ohio Public Records Law (ORC §149.43) | All county departments; IT for records management | Public records must be accessible and retained per schedule; cybersecurity incidents that destroy public records may create legal liability; record retention policies must account for electronic records | Partial: Records retention schedule exists; electronic records on SRV-07 not organized per schedule; a ransomware attack encrypting SRV-07 would create immediate public records law exposure |
The following five scenario injects are designed for classroom and workshop use. Each presents a realistic incident grounded in documented county government cybersecurity incident patterns. Injects can be used individually (45–90 minutes each) or as a sequenced scenario arc (half-day exercise). Each inject identifies C2M2 domain gaps, regulatory notification obligations, operational consequences, and decision points realistic for a county IT director without a dedicated security team. Instructors may layer injects to demonstrate cascading effects.
Scenario: On a Friday at 2:45 PM, a finance department employee at FAC-01 clicks a phishing link in an email mimicking a Tyler Technologies invoice notification. Within 20 minutes, ransomware has spread across VLAN 10 via SMB, encrypting the Tyler Munis ERP application server (SRV-04), file server (SRV-07), and 47 administrative workstations. A ransom note appears demanding $180,000 in Bitcoin within 72 hours. The 911 CAD system (VLAN 30) is unaffected — VLAN segmentation held for public safety. However, county payroll totaling $2.1 million is due to be processed and disbursed by direct deposit on Monday morning. The Veeam backup server (SRV-09) is accessible but no restore has ever been tested. IT Director Webb is the only person authorized to make the ransom decision and is simultaneously fielding calls from the County Administrator, all department heads, and the Board of County Commissioners chair.
Scenario: At 11:15 PM on a Saturday night — peak call volume period for 911 — the Zetron Viper CAD system (SRV-06) at FAC-03 crashes and does not respond to restart attempts. Dispatchers report that all CAD screens have gone dark. Incoming 911 calls are still being answered by the 12 dispatch consoles (the PSAP phone infrastructure is separate from the CAD server), but dispatchers have no computer-assisted dispatch capability and must revert to paper logs, radio, and verbal unit tracking. The 911 Communications Director pages IT Director Webb at 11:22 PM. Webb is on personal time 45 minutes from FAC-03. Zetron's support line confirms their SLA is "next business day" — the earliest a Zetron technician can be on-site is Monday at 8 AM. SRV-06 (Windows Server 2012 R2) has no recent backups (it is outside the Veeam scope), no hot spare, and has never been patched. The cause of the crash is unknown — it could be hardware failure, software corruption, or a cyberattack.
Scenario: At 9:10 AM on a Tuesday during pre-election Logic & Accuracy testing preparation, the Ohio Secretary of State field auditor present at FAC-08 observes that the Dominion Democracy Suite 5.17 EMS workstation has an active network cable connected to the county wall jack. A ping test from the auditor's laptop confirms the workstation is live on the county Admin VLAN (10.10.14.22). The auditor immediately stops all L&A testing and issues a verbal stop-work order. Under Ohio SoS directive, the EMS workstation must be completely air-gapped — no network connection, no Wi-Fi — during the entire pre-election period. Reimaging of the workstation may be required per SoS protocol if the isolation requirement was violated. The county Board of Elections Director, David Cho, is on-site. The primary election is 19 days away. Ballot programming on the EMS workstation is 70% complete. IT Director Webb is at FAC-01, 12 minutes away. The SoS auditor has given the county a two-hour window to respond before she suspends the L&A testing certification process entirely.
Scenario: On a Monday morning, Sheriff Linda Torres delivers a certified letter to IT Director Marcus Webb. The letter is from the FBI CJIS Division Ohio Compact Officer notifying Harmon County of a scheduled CJIS Security Policy audit in 90 days — a "Triennial Compliance Audit" covering all county systems that access, process, or transmit Criminal Justice Information (CJI) via the statewide LEADS network. The audit will evaluate compliance with CJIS Security Policy v5.9.2, specifically Policy Area 1 (Information Exchange Agreements), Policy Area 4 (Auditing and Accountability), Policy Area 5 (Access Control), Policy Area 6 (Identification and Authentication), and Policy Area 8 (Configuration Management). The Sheriff asks Webb to confirm that the county is compliant. Webb knows immediately it is not. The most significant gaps: no MFA on VPN for remote CJIS access (direct §5.6.2.2 violation), no MDM for 12 Sheriff mobile devices, missing screensaver timeout policy on Sheriff workstations, and the VLAN 10→VLAN 20 ACL misconfiguration that allows admin network traffic to reach the CJIS segment.
Scenario: On a Thursday at 3:20 AM, a Microsoft 365 Defender alert (one of only a handful configured) fires to the IT Director's personal email. The alert flags a successful interactive sign-in to a county Microsoft 365 account from an IP address geolocating to Kyiv, Ukraine. The compromised account is the shared "countyit" service account — the Domain Administrator account used for all server management. A follow-up check of the county network logs (manually reviewed on the Fortinet FortiGate) shows that the "countyit" account authenticated to SRV-08 (the COGNOS BI server hosting federal tax information) at 3:24 AM and ran two SQL queries against the COGNOS database before the session dropped. The COGNOS database contains Federal Tax Information (FTI) for approximately 41,000 Harmon County property tax accounts — names, addresses, partial SSN data, and prior-year income brackets used for property tax calculations. IRS Publication 1075 §10.0 requires notification to the IRS Office of Safeguards within 24 hours of discovering a potential FTI breach.
Discussion questions for the remediation exercise: