✏️ EDIT MODE — Click any cell or text to edit  |  + Add Row to insert  |  × to delete
🗂️
⚡ C2M2 Audit Report  |  ASSET Domain

Asset Inventory & Categorization Report

Muskingum Valley Electric Cooperative (MVEC) — Coshocton County, Ohio  |  Prepared for C2M2 v2.1 Self-Evaluation Exercise

NIST FIPS-199 NIST SP 800-60 C2M2 ASSET Domain Current MIL: 1 (Partial) Exercise Document — Fictional Data
Document Title
Asset Inventory & Categorization Report
Organization
Muskingum Valley Electric Cooperative
System Name
MVEC IT/OT Environment
Prepared By
TechPath Solutions LLC (MSP)
Reviewed By
David Harmon, General Manager
Report Date
March 28, 2026
Version
1.0 — Initial Draft
Classification
SENSITIVE — Exercise Use Only
Section 1 — Scope & Purpose
📋

Report Scope, Purpose & Methodology

SCOPE
Purpose This Asset Inventory and Categorization Report documents all information technology (IT) and operational technology (OT) assets within the MVEC system boundary. Assets are categorized using NIST FIPS-199 impact levels (Confidentiality / Integrity / Availability) to establish the overall system security categorization. This report supports the C2M2 ASSET domain self-evaluation and serves as the foundation for risk management, access control, and vulnerability management activities.

Inventory Methodology

ActivityMethodDatePerformed By
IT Hardware DiscoveryTechPath RMM Agent (ConnectWise Automate) + manual walkthroughNov 2023TechPath Solutions
OT/ICS Asset Walk-downPhysical inspection of substations and main officeNov 2023Kyle Zumpf, SCADA Tech
Software DiscoveryManual survey; no automated software inventory tool deployedNov 2023TechPath Solutions
Cloud/SaaS ReviewInterview with department managersDec 2023David Harmon, GM
Categorization ReviewFIPS-199 impact analysis by asset ownerJan 2024TechPath Solutions

FIPS-199 Impact Level Definitions

LevelConfidentialityIntegrityAvailability
LOWLimited adverse effectLimited adverse effectMinor disruption <8 hrs
MODSerious adverse effectSerious adverse effectSignificant disruption 8–72 hrs
HIGHSevere/catastrophic effectSevere/catastrophic effectExtended disruption >72 hrs
Inventory Completeness Warning This inventory was compiled from a single site visit in November 2023 and has not been formally validated by MVEC management. Shadow IT and undocumented assets are likely. No automated discovery tool was used for OT assets.
Section 2 — Asset Count & Categorization Summary
📊

Categorization Summary

SUMMARY
47
Total Assets
18
HIGH Impact
21
MODERATE Impact
8
LOW Impact
9
OT / ICS Assets
6
Servers
10
Applications / SaaS
3
End-of-Life Assets
System Overall Security Categorization: HIGH Applying FIPS-199 "high watermark" principle — the overall system categorization is HIGH because multiple assets (SCADA server, AMI head-end, accounting server) carry HIGH availability or integrity impact ratings. Loss of the SCADA system could result in inability to monitor and control the distribution grid serving ~38,200 customers.
Section 3 — IT Hardware Assets
🖥️

IT Hardware Asset Inventory

IT HARDWARE

Servers

Asset IDHostnameMake / ModelOS / Version FunctionLocationOwner CIA OverallStatus
SRV-001MVEC-FILESRVDell PowerEdge R440Windows Server 2019 (21H2) Primary file server; VMware host for SRV-005, SRV-006; departmental shared drives Server Room, Main OfficeTechPath Solutions MODMODMOD MODERATEPartially Patched (~6 mo lag)
SRV-002MVEC-SCADA01HP ProLiant DL360 G9Windows Server 2016 (EOL) GE e-terra Habitat v2.8 SCADA application server; HMI host; operational historian Server Room, Main OfficeRandy Fulton / TechPath MODHIGHHIGH HIGHCritical Patch Lag (18+ mo); GE e-terra EOL 2021
SRV-003MVEC-ACCTGDell OptiPlex 9020 (repurposed)Windows Server 2012 R2 (EOS Jan 2023) QuickBooks Enterprise 22.0 server; payroll, AP/AR, general ledger Finance Office, Main OfficeGene Westfall HIGHHIGHMOD HIGHEOL OS — No patches since Jan 2023
SRV-004MVEC-AMI-HEDell PowerEdge R340Windows Server 2019 Landis+Gyr Gridstream Command Center v8.2; AMI head-end; 14,620 smart meters Server Room, Main OfficeRandy Fulton MODMODHIGH HIGHPartially Patched; L+G app v8.2 (current v9.1)
SRV-005MVEC-CISVirtual (VMware on SRV-001)Windows Server 2019 Milsoft CIS — customer billing, outage mgmt, work orders; 14,620 customer records Logical (hosted on SRV-001)Carol Bynum HIGHMODHIGH HIGHPartially Patched
SRV-006MVEC-GISVirtual (VMware on SRV-001)Windows Server 2019 ESRI ArcGIS Server; distribution system GIS model; infrastructure mapping Logical (hosted on SRV-001)Teresa Albright LOWMODMOD MODERATEPartially Patched

Workstations, Laptops & Mobile Devices

Asset TypeCountOS / VersionPrimary Users AV / ProtectionEncryption CIAOverallNotes
Desktop PC6Windows 11 ProManagement, Finance, Engineering Windows Defender (not centrally managed)Not enabled MODMODLOW MODERATENo AD domain; local accounts only
Desktop PC7Windows 10 Pro (mixed builds)Customer Service, Admin, Operations Windows Defender (not centrally managed)Not enabled MODMODLOW MODERATE2 units running Win 10 21H2 (EOL)
SCADA HMI Workstation2Windows 10 LTSC 2019Kyle Zumpf, Randy Fulton (OT network) AV DISABLED (vendor recommendation)Not enabled LOWHIGHHIGH HIGHDedicated SCADA HMI; OT network only; no internet
Laptop4Windows 11 ProEngineering, Operations Mgr, GM (remote work) Windows DefenderBitLocker on 2 of 4 only MODMODLOW MODERATEAll take work data offsite; BYOD risk; no MDM
iPad Tablet3iOS 17Field engineering, line superintendent N/A (iOS)iOS default encryption MODLOWLOW LOWPersonal Apple IDs used; no MDM; access ESRI Field Maps
Smartphone (BYOD)9Mixed iOS / AndroidLine crew leads, all managers N/ADevice default MODLOWLOW LOWM365 email access; no MDM; BYOD — no formal policy

Network Infrastructure

Asset IDDeviceMake / ModelFunctionFirmwareCIAOverallStatus
NET-001Perimeter FirewallFortinet FortiGate 60E WAN perimeter firewall; NAT; stateful inspection for corporate LAN FortiOS 7.0.12 (1 minor version behind) MODHIGHHIGH HIGHFunctional; IPS signatures not enabled; rules last reviewed 2022
NET-002VPN ApplianceCisco ASA 5505 Remote access VPN for TechPath MSP and GE Grid Solutions SCADA support ASA 9.2(4)25 (End-of-Support 2017) HIGHHIGHMOD HIGHEOL — End-of-Support; no security patches available
NET-003Corporate LAN SwitchCisco Catalyst 2960-X Core switching for corporate LAN (192.168.1.0/24); also trunks to OT switch IOS 15.2(7)E8 LOWMODHIGH HIGHNo VLANs configured; flat network; trunk to OT
NET-004OT/SCADA LAN SwitchCisco Catalyst 2960 SCADA network switching (10.0.10.0/24); connects SCADA server, AMI, HMI workstations IOS 15.2(4)E10 LOWHIGHHIGH HIGHLayer-3 route to Corp LAN exists — no OT firewall
NET-005Wi-Fi Access Points (×2)Netgear WAC104 Wireless LAN — SSID: MVEC-Staff and MVEC-Guest; main office building Firmware V2.1.7 (home-grade device) MODMODLOW MODERATEGuest SSID not isolated from Corp LAN at switch level
Section 4 — Operational Technology (OT) / ICS Assets

OT / ICS / SCADA Asset Inventory

OT / ICS
OT Asset Inventory — Limited Confidence The OT asset list below was compiled during a single walk-down in November 2023. No automated OT discovery tool (e.g., Claroty, Dragos, Nozomi) has been deployed. Field device firmware versions were obtained from visual inspection and operator interviews. Actual installed versions may differ.
Asset IDDevice / SystemVendor / ModelLocation ProtocolFunctionFirmware CIAOverallCyber Notes
OT-001SCADA Application ServerGE e-terra Habitat v2.8 Main Office (SRV-002)DNP3, Modbus, IEC 61968 Supervisory control, data acquisition, HMI, operational historian EOL — Vendor support ended 2021 MODHIGHHIGH HIGHNo upgrade budget; shared admin account "SCADA_ADMIN"
OT-002RTU — Coshocton SS-01GE D20MX RTU SS-01, CoshoctonDNP3 over fiber Breaker status, voltage, current telemetry to SCADA; limited control Firmware v3.04 (current v3.06 — 2 versions behind) LOWHIGHHIGH HIGHDNP3 SAv5 authentication not enabled
OT-003RTU — Warsaw SS-02GE D20MX RTU SS-02, WarsawDNP3 over fiber Same as OT-002 Firmware v3.04 (2 versions behind) LOWHIGHHIGH HIGHDNP3 SAv5 not enabled; no encryption on fiber link
OT-004RTU — Newcomerstown SS-03SEL-2414 RTU SS-03, NewcomerstownDNP3 / 900 MHz radio Monitoring only — no remote control capability Current LOWMODMOD MODERATERadio link unencrypted and unauthenticated
OT-005Protective Relays — SS-01 (×3)SEL-351 Feeder Protection Relay SS-01, CoshoctonSerial (EIA-232) to RTU Overcurrent and ground fault protection for 3 distribution feeders Firmware R114-V2 (current R117-V1 — 1 version behind) LOWHIGHHIGH HIGHNo direct Ethernet; default passwords not yet changed on SS-01 relays
OT-006Protective Relays — SS-02 (×3)SEL-351 Feeder Protection Relay SS-02, WarsawSerial (EIA-232) to RTU Same as OT-005 Firmware R114-V2 LOWHIGHHIGH HIGHDefault vendor passwords confirmed in use
OT-007Automated Recloser Controllers (×12)S&C Electric IntelliRupter PulseCloser Various field locations across service territoryDNP3 / 900 MHz radio Automated fault isolation and service restoration on 12 distribution feeders Mixed — 4 of 12 current; 8 of 12 behind 1–2 versions LOWHIGHHIGH HIGH900 MHz radio — no encryption; older units use unencrypted protocol
OT-008AMI Head-End SystemLandis+Gyr Gridstream Command Center v8.2 Main Office (SRV-004)RF Mesh (2.4 GHz), HTTPS Smart meter data collection, demand response, remote connect/disconnect for 14,620 meters v8.2 (current is v9.1 — 1 major version behind) MODMODHIGH HIGHRF mesh spans entire service territory; remote disconnect capability = HIGH availability risk
OT-009Power Quality MonitorDranetz HDPQ Xplorer (×1) SS-01, Coshocton (permanent install)USB export (no network) Voltage sag/swell, flicker monitoring; data exported manually via USB Current LOWLOWLOW LOWAir-gapped (USB only); low cyber risk
Section 5 — Software & Application Inventory
💾

Software, Applications & SaaS Services

SOFTWARE
App IDApplicationVendorVersionFunction HostingData ClassificationAuth / MFA CIAOverall
APP-001GE e-terra HabitatGE Grid Solutionsv2.8 (EOL) SCADA / EMS / DMS — supervisory control of distribution grid On-premise (SRV-002)OT Operational — SENSITIVE Shared account; no MFA MODHIGHHIGH HIGH
APP-002Milsoft Utility Solutions (CIS)MilsoftCurrent Customer Information System — billing, outage management, work orders On-premise (SRV-005)PII / Customer Data — CONFIDENTIAL Individual accounts; no MFA HIGHMODHIGH HIGH
APP-003Milsoft WindMilMilsoft2023 Distribution system planning and modeling; power flow analysis Desktop (2 engineering PCs)Engineering — INTERNAL Windows login only; no MFA LOWMODLOW LOW
APP-004ESRI ArcGIS ServerEsri10.9.1 GIS — distribution system geographic model; infrastructure mapping On-premise (SRV-006)Infrastructure Mapping — SENSITIVE Windows auth; no MFA MODMODMOD MODERATE
APP-005Landis+Gyr Command CenterLandis+Gyrv8.2 (current v9.1) AMI meter data management; demand response; remote connect/disconnect On-premise (SRV-004)OT Operational — SENSITIVE Local accounts; no MFA MODMODHIGH HIGH
APP-006QuickBooks Enterprise 22.0Intuit22.0 (outdated) Accounting, payroll, accounts payable/receivable, general ledger On-premise (SRV-003, EOL OS)Financial — CONFIDENTIAL Local QB accounts; no MFA HIGHHIGHMOD HIGH
APP-007Microsoft 365 (E1 license)MicrosoftExchange Online / Teams / OneDrive Email, collaboration, cloud file storage for all 34 employees Cloud SaaS (Microsoft)Business Communications — INTERNAL Password only — MFA NOT enforced MODMODMOD MODERATE
APP-008Buckeye Power EMS Data LinkBuckeye Power / OSIsoft PIN/A Wholesale energy metering data exchange; generation scheduling interface Vendor-hosted; IPsec VPN to Buckeye PowerOT Metering — SENSITIVE Shared service account (no individual auth) MODHIGHHIGH HIGH
APP-009AutoCAD LT 2022Autodesk2022 Electrical/civil engineering drawings; substation layout plans Desktop (engineering PCs); Autodesk cloud licenseEngineering — INTERNAL Autodesk cloud login LOWMODLOW LOW
APP-010NISC SmartHubNISCCurrent (NISC-managed) Customer self-service portal — bill pay, outage reporting, account management Cloud SaaS (NISC-hosted)PII / Customer Data — CONFIDENTIAL Customer-facing; admin access password only (no MFA) HIGHMODMOD MODERATE
Section 6 — Data Asset Classification
🗄️

Data Assets & Classification

DATA
No Formal Data Classification Policy MVEC has no formal data classification policy. The classifications below reflect the assessed sensitivity of each data type based on potential impact of unauthorized disclosure or modification. A formal data classification policy is a gap in the ASSET and PROGRAM domains.
Data AssetClassificationDescriptionSystem(s) Volume / RecordsRetentionStorage Location CIARegulatory Obligation
Customer Account & Billing RecordsCONFIDENTIAL Names, addresses, account numbers, energy usage, payment history Milsoft CIS (SRV-005), NISC SmartHub14,620 active accounts 7 years (per Ohio utility regulations)On-premise + NISC cloud HIGHMODHIGH Ohio PUC, potential CPNI
Financial Records (AP/AR/Payroll)CONFIDENTIAL Bank accounts, vendor invoices, employee payroll, general ledger QuickBooks Enterprise (SRV-003)34 employee payroll records; full GL history 7 yearsOn-premise only; tape backup offsite (GM's home) HIGHHIGHMOD IRS, GAAP, Ohio DOT
OT / SCADA Operational DataSENSITIVE Real-time telemetry, breaker status, control commands, operational historian GE e-terra SCADA (SRV-002), RTUs (OT-002 to OT-004)Real-time + 90-day historian 90 days historian; real-time operationalOn-premise only (no backup of SCADA historian) MODHIGHHIGH NERC CIP Low Impact (CIP-003-8)
AMI Meter DataSENSITIVE 15-minute interval consumption data; remote connect/disconnect command log Landis+Gyr Command Center (SRV-004); L+G cloud14,620 smart meters × 15-min intervals 13 months on-premise; longer in L+G cloudOn-premise + Landis+Gyr cloud MODMODHIGH Ohio PUC smart meter data rules
Distribution Infrastructure GIS DataSENSITIVE Pole locations, underground cable routes, substation layouts, critical infrastructure mapping ESRI ArcGIS Server (SRV-006)Full service territory — 1,140 sq mi Current; historical versions in AutoCAD drawingsOn-premise; some in AutoCAD files on engineering PCs MODMODMOD None specific; CISA critical infrastructure guidance
Employee HR & Personnel RecordsCONFIDENTIAL SSNs, home addresses, performance reviews, medical/benefits data Shared file server (SRV-001) — HR folder; paper files34 employees + former employees 7 years post-terminationFile server + paper (HR office) HIGHMODLOW Ohio PIIA, ADA, FLSA
IT System Credentials & ConfigurationsRESTRICTED Server admin passwords, VPN PSKs, network device configs, SCADA credentials Various — many stored informally (sticky notes, shared documents)~20 system accounts Current; no formal credential vaultNo PAM; informal — major gap HIGHHIGHHIGH NERC CIP CIP-003-8
Section 7 — End-of-Life / End-of-Support Asset Register
⚠️

End-of-Life & End-of-Support Asset Register

EOL RISK
Critical Finding — Multiple EOL Assets in Production MVEC is operating three systems past vendor end-of-support and two OS versions with no security patches available. These represent the highest cyber risk in the asset inventory. EOL systems cannot be patched when new vulnerabilities are discovered.
Asset IDAsset NameEOL DateRiskCompensating ControlsRemediation PlanTarget Date
SRV-003Windows Server 2012 R2 (MVEC-ACCTG)Oct 14, 2023 CRITICAL Network firewall provides perimeter protection; no direct internet access; access limited to 2 users Upgrade to Windows Server 2022; migrate QuickBooks to newer host or SaaS No funding allocated — TBD
OT-001GE e-terra Habitat v2.8 (SCADA)Dec 31, 2021 CRITICAL Air-gap from internet (partial — VPN access exists); no external connections to SCADA network except VPN Replace with modern SCADA/DMS platform (e.g., Survalent, OSIsoft PI, or NISC SmartGrid) No budget allocated; 3–5 year capital plan needed
NET-002Cisco ASA 5505 VPN ApplianceAug 31, 2017 CRITICAL Firewall upstream (FortiGate); limited inbound rules; PSK not shared broadly Replace with Fortinet FortiGate SSL-VPN or equivalent; implement MFA for all remote access Priority — within 6 months; ~$3,000–5,000 estimated
Endpoints (×2)Windows 10 Version 21H2 (EOL May 2022)May 10, 2022 HIGH Windows Defender running; no direct internet browsing on these units Windows 10 in-place upgrade to 22H2 or Windows 11; no hardware replacement needed Within 30 days; no cost (license included)