For mobile, landscape view is recommended.
Solutions were for automated tools to scan and inventory Facility Related Control Systems (FRCS) in DoD facilities. FRCS related to real property assets include systems such as Fire and Life Safety (FLS), Utility Monitoring and Control Systems (UMCS), Heating, Ventilation and Air Conditioning (HVAC), etc. To enable installation and enterprise level decision making to improve the cybersecurity poster of our FRCS, it is important to have accurate and current inventories of control systems and their components.
Successful tools must be able to meet one or more of the following sub-objectives, and must be able to receive an Authority To Operate (ATO) after undergoing the Risk Management Framework (RMF) process:
Successful technologies and solutions will help the DoD build resilient and efficient installations by having a comprehensive assessment of their FRCS inventory. The demonstrated solutions will inform DoD installations in their installation assessment and resilience planning activities. Any technologies/solutions will significantly reduce the manual nature of the current inventory process and enable for continuous inventory of these systems.
Several Executive Orders (EO), Policy and Executive order (EO) 14008 on tackling climate crisis, the DoD climate adaptation plan, and the latest EO on catalyzing clean energy industries and jobs through federal sustainability, all stress the importance of building an efficient, reduced carbon or carbon free, resilient, climate-ready installation that can withstand changing conditions and maintain operations in the event of grid outage to support mission preparedness and readiness. The National Defense Authorization Act for Fiscal Year 2021 highlighted the importance of on-base energy resources and reduction of the DoD’s dependence on off-base resources. The installation energy priority of the DoD is to ensure mission readiness by pursuing energy resilience. Most of these goals depend on FRCS for successful execution; as systems get increasingly complex, automated tools are needed to inventory them for visibility as well as cybersecurity.
Example protocols in use for communication by the device are: