This document specifies the data prerequisites, telemetry protocols, cybersecurity controls, and onboarding workflow required to bring an active utility-scale solar O&M site online with the Earthflow Physics AI™ engine. It is the companion document to the Reinsurance Cat-Modeling Methodology: that document explains what Earthflow computes; this document explains how the data gets in.
A reinsurance underwriter or IT lead reading this document should walk away with three concrete answers: (i) the minimum data set required from the cedent / site operator for a first-look risk map, (ii) the protocol options for connecting a live SCADA / BMS / weather feed, and (iii) the cybersecurity controls that make the integration safe, read-only, and audit-trail-complete.
Earthflow's onboarding model — like the Underground Cable Analytics methodology that precedes it — is built around frictionless first-look: a cedent can have Physics AI™ risk scores published for a portfolio within seven days using only existing O&M historian exports and module / inverter spec sheets. Live SCADA, BMS, and weather-station integration follows in weeks 2–12, layered on top of the same data model.
This document is organized into eight chapters covering the full onboarding lifecycle from first contact through scaled production deployment.
Earthflow's first-look risk map for a utility-scale solar site requires only a small set of Tier 1 (mandatory) data fields that any cedent will already have in their EPC or O&M submission packet. Tier 2 (recommended) adds live telemetry — SCADA, weather station, hail detector — for condition-monitoring-aware underwriting. Tier 3 (advanced) adds BMS streams, EL imaging, transformer DGA, and substation IEC 61850 telemetry for a full digital twin. Cedents move through the tiers at their own pace; no tier is a prerequisite for the prior one's outputs to be usable.
Required for the first-look risk map. Earthflow can produce a complete 12-peril decomposition, composite risk grade, and bind-ready verdict from this data alone — no live feeds required.
| Field | Format | Typical Source | Why Earthflow Needs It |
|---|---|---|---|
| Site coordinates (lat / lon) | Decimal degrees | EPC submission · site permit | Anchor for all hazard lookups |
| Capacity (MWdc + MWac) | Numeric | PPA · interconnection agreement | TIV scaling · production modeling |
| COD (commercial operation date) | Date | PPA · O&M handoff | Asset age · warranty status |
| Module make / model / quantity | Text + count | Bill of materials | ASTM E1038 lookup · glass thickness · frame |
| Inverter make / model / quantity | Text + count | Bill of materials | MTBF curve · efficiency · derating |
| Racking make / model | Text | Bill of materials | Clamp type · stow capability · pull-test |
| Foundation type | Text (pile / ballast / helical / pier) | Civil drawings | Seismic + wind uplift response |
| Geotech / pull-test report | Pre-construction survey | SDC-D foundation validation | |
| As-built electrical drawings (PE-stamped) | Construction handoff | String / combiner-box mapping | |
| FEMA flood-zone letter (if applicable) | Permit packet | Pre-validated flood zone | |
| O&M provider + contract scope | Text | O&M agreement | SLA expectations · spare inventory |
Adds live telemetry feeds that update vulnerability parameters in real time. With Tier 2 data, the composite risk grade refreshes daily; predictive-maintenance alerts and energy-shortfall signals become first-class outputs.
| Feed | Update Cadence | Typical Protocol | What It Powers in Earthflow |
|---|---|---|---|
| Inverter-level fault log | Real-time (1-sec to 1-min) | Modbus TCP · REST · MQTT | Equipment-breakdown peril · MTBF tracking |
| String-level V/I telemetry | 1–15 min | Modbus TCP via inverter | String-fault detection · AFCI status |
| Combiner-box temperature | 5–15 min | Modbus TCP · OPC-UA | Hot-spot precursor · arc-fault risk |
| Tracker stow position | 15 min · event-driven | Modbus TCP via tracker controller | Stow-protocol audit · hail-mitigation factor validation |
| Weather station POA pyranometer | 1–5 min | Modbus · REST · MQTT | Energy-shortfall trigger · P50 vs actual |
| Hail detector feed | Event-driven | REST · MQTT | Parametric hail-trigger validation |
| Revenue-grade meter | 15 min | DNP3 · Modbus | Production reconciliation |
| O&M ticket / work-order log | Daily | REST · SFTP · CMMS API | Mean-time-to-repair tracking |
Adds cell-level BMS streams, EL imaging, transformer condition data, and substation IEC 61850 GOOSE messaging for sites that require continuous-monitoring underwriting (typically BESS-co-located or high-value coastal projects). Tier 3 enables parametric trigger structures that pay on objective sensor thresholds.
| Feed | Cadence | Protocol | What It Powers |
|---|---|---|---|
| BMS cell-level temperature | 1 sec | REST · MQTT · Modbus | BESS thermal-runaway peril · ΔT parametric trigger |
| BMS pack voltage / SOC / SOH | 1 min | REST · MQTT | State-of-health degradation tracking |
| Isolation-valve test results | Quarterly | Manual CMMS upload | BMS-cert subjectivity audit |
| EL imaging scan (drone IR) | Annual · post-event | SFTP · vendor API | Module hot-spot peril · serial-defect detection |
| I-V curve sweep | Annual | Vendor API · SFTP | Module degradation rate fit |
| Transformer DGA (dissolved gas) | Monthly · annual lab | SFTP · vendor API | Transformer health · BI exposure |
| Substation IEC 61850 GOOSE | Real-time | IEC 61850 / MMS | Grid-side trip events · BI exposure |
| Cybersecurity audit reports | Annual | PDF upload | Cyber/SCADA peril score |
Earthflow is sensor-agnostic and vendor-agnostic by design — we ingest from whatever the cedent's existing fleet uses. The platform supports the eight major industrial protocols used in utility-scale solar today: Modbus TCP/RTU, OPC-UA, MQTT, DNP3, REST, SunSpec Alliance, IEC 61850, and BACnet. The vendor cards below show the integration patterns for the most common equipment in the field.
| Protocol | Layer | Typical Use | Earthflow Support |
|---|---|---|---|
| Modbus TCP | OT industrial | Inverter · combiner-box · tracker · weather station | Native |
| Modbus RTU | Serial · RS-485 | Legacy inverters · trackers | Via gateway |
| OPC-UA | OT industrial | Modern SCADA · multi-vendor aggregation | Native |
| MQTT | IoT pub/sub | BMS · hail detector · cloud-native fleets | Native (TLS) |
| DNP3 | Utility OT | Substation · revenue meter · grid handoff | Via gateway |
| REST | App-layer | Cloud-resident SCADA · BMS · CMMS | Native |
| SunSpec Alliance | App-layer over Modbus/IP | Inverter interoperability standard | Native |
| IEC 61850 | Substation | GOOSE · MMS · SV — utility-side | Via gateway |
| BACnet | Building automation | O&M building HVAC · access control | As-needed |
Modbus TCP at inverter level + iSolarCloud REST API at fleet level. SunSpec-compliant register map.
Earthflow ingests fault log · efficiency · MPPT data · DC arc-fault flags · produces MTBF observed vs spec, predicted-failure window
Modbus TCP + SunSpec Alliance compliance. ennexOS REST API for fleet aggregation. Encrypted-transit native.
Earthflow ingests AC/DC power · cabinet temperature · fault events · produces efficiency derating curve, salt-spray wear flag
Modbus TCP native. Vendor SCADA Reactor for fleet management. DNP3 available for utility-grade integration.
Earthflow ingests inverter fault codes · ambient temperature · cooling fan status · produces equipment-breakdown score
Modbus TCP. WebMP cloud platform via REST. Native MQTT broker available on newer firmware.
Earthflow ingests three-phase output, harmonics, AFCI status · produces DC arc-fault risk score
Modbus TCP + MQTT. FusionSolar cloud REST API. ⚠ Verify regulatory clearance for utility deployment per jurisdiction.
Earthflow ingests string-level optimizer data · produces sub-string-level fault localization
Modbus TCP. Aurora Vision cloud REST. SunSpec compliant.
Earthflow ingests legacy ABB-pedigree inverter data · produces aging-curve calibration
REST API · authenticated TLS · cell-level temperature + SOC + isolation-valve status. Powerhub aggregation.
Earthflow ingests cell ΔT · pack voltage · thermal-anomaly events · produces BESS thermal-runaway peril score, parametric ΔT trigger
Modbus TCP at container level · iEnergyCloud REST. Cell-level BMS exposed via OPC-UA upgrade option.
Earthflow ingests pack-level + (with OPC-UA) cell-level telemetry · produces BMS recert tracking
REST API · TLS · Mosaic AI control layer integration. IEC 62443 Level 2 certified at system level.
Earthflow ingests state-of-health degradation · cycle count · produces SOH-aware BESS vulnerability adjustment
Modbus TCP + vendor REST APIs. MQTT available on cloud-enabled deployments. Region-specific certifications.
Earthflow ingests chemistry-specific (LFP / NMC) BMS data · produces chemistry-aware vulnerability factor
Modbus TCP + REST + LoggerNet aggregation. Industry-standard utility-scale weather station.
Earthflow ingests POA pyranometer · ambient temp · wind speed/direction · produces energy-shortfall trigger, P50 reconciliation
Modbus TCP + MQTT + Smart Weather Sensor SDK. Native TLS support on newer firmware.
Earthflow ingests integrated atmospheric data · produces meteorological hazard context
REST + MQTT · event-driven push. Acoustic-impact sensor with stone-size estimation.
Earthflow ingests strike events with kinetic-energy estimate · produces parametric hail-trigger validation
REST aggregation from third-party network · event-confirmation API.
Earthflow ingests event confirmations with confidence scores · produces parametric trigger event-attribution
IEC 61850 GOOSE/MMS + DNP3 + Modbus. Industry-leading utility relay platform.
Earthflow ingests trip events · breaker status · DGA where instrumented · produces grid-side BI exposure score
IEC 61850 + DNP3. Utility-grade with NERC CIP-aware deployment patterns.
Earthflow ingests substation events when integrated under cedent's NERC CIP envelope · produces BI exposure tracking
Solar O&M data flows out of operational-technology (OT) networks into Earthflow's information-technology (IT) cloud — a class of integration that cyber teams scrutinize heavily, with good reason. This chapter documents the seven cybersecurity pillars that govern Earthflow's ingest architecture and the industry standards they align to.
| Standard | Scope | Earthflow Alignment |
|---|---|---|
| NIST Cybersecurity Framework 2.0 | Six functions: Govern · Identify · Protect · Detect · Respond · Recover | Aligned across all six |
| IEC 62443-3-3 | System security requirements for industrial automation & control systems | Aligned to Security Level 2 (SL-2) |
| NERC CIP-005 | Electronic Security Perimeters | When integrating BES — IRA via dedicated ESP |
| NERC CIP-007 | System Security Management | When applicable to BES integration |
| NERC CIP-010 | Configuration Change Management | Change-control aligned |
| NERC CIP-013 | Supply-Chain Cyber Risk | Vendor risk assessment available |
| ISO 27001 | Information Security Management System | Roadmap (target Q1 2027) |
| SOC 2 Type II | Trust Services Criteria audit | In progress (target Q3 2026) |
Earthflow's threat model documents the controls against the most common OT-integration attack vectors. The full Threat Model document is available under NDA; the high-level summary:
Three reference architectures cover essentially every solar-site integration we have seen. The right pattern depends on the cedent's existing fleet age, cloud posture, and cyber appetite. None require greenfield infrastructure; all three can be deployed within 12 weeks.
For newer fleets where the inverter, BMS, and weather-station vendors already expose cloud-native REST APIs or MQTT brokers. Typical of post-2022 installations from Sungrow iSolarCloud, SMA ennexOS, Tesla Powerhub, and Huawei FusionSolar. Lowest integration effort; highest latency precision.
For mixed fleets with on-prem SCADA, legacy Modbus RTU equipment, or vendor-specific protocols requiring local translation. The on-site gateway aggregates multiple protocols, applies TLS encryption, and pushes outbound to Earthflow via IPSec or PrivateLink. The most common pattern in production.
For first-look pilots, legacy fleets, or cedents whose cyber policy prohibits any live tunnel during pre-binding. Earthflow ingests daily or weekly historian extracts via SFTP, S3, or signed Cloud Storage URL. No live connection; lowest cyber footprint; highest latency.
| Scenario | Recommended Pattern | Why |
|---|---|---|
| Pre-binding pilot · 5–20 sites · < 30 days | C — Batch ETL | No live cyber posture to negotiate · fastest start |
| Post-bind continuous monitoring · operational sites | B — Gateway | Real-time enough for alerts · cyber-defensible |
| BESS-co-located · parametric trigger structure | A — Cloud-Direct + Tesla / Sungrow cloud | Sub-minute latency required for ΔT trigger |
| NERC-CIP regulated assets (utility-owned) | B — Gateway in CIP-conformant ESP | Required for BES-side integration |
| Multi-cedent portfolio · scaled deployment | Mix of A + B by site age | Newer sites → A · older sites → B |
Earthflow's onboarding is engineered to deliver visible value in under a week using only data the cedent already has on hand, then layer live telemetry on top over the following 11 weeks. This chapter is the cedent's operational playbook: who does what, on which day, with which prerequisites.
NDA + DPA executed. Earthflow shares the SOC 2 readiness letter, pen-test summary, threat-model overview, and architecture-review document. Onboarding portal credentials issued to cedent point-of-contact (typically the broker-of-record or cedent data-engineer).
Earthflow: 1 hr · Cedent: 1 hr · IT/Cyber: 0.5 hrCedent uploads Tier 1 documents into the secure onboarding portal: spreadsheet of site coordinates + capacity + COD, EPC bill-of-materials per site, racking + foundation spec, geotech / pull-test PDFs, as-built electrical drawings, O&M contract scope summary. For a 10-site portfolio this is typically a 200–500 MB upload taking 2–6 hours of cedent time to assemble.
Cedent: 4–8 hr per 10 sitesEarthflow integration engineer maps cedent's BoM schema to Earthflow's canonical asset model. Physics AI™ engine runs across all sites: 12-peril decomposition, composite risk grade, EP curve, indicated rate per site published to the cedent's portal. ACORD-aligned bordereau row generated.
Earthflow: 6–8 hr · Cedent: passive60-minute walk-through with cedent's underwriting + actuarial team. Earthflow team walks composite scores, top-tail drivers, parametric structuring opportunities. Cedent decides whether to advance to full pilot (Weeks 2–12) or stay on monthly batch refresh.
Earthflow: 2 hr · Cedent UW team: 2 hrCedent IT / Cyber team completes Earthflow's standard cyber-review packet (Threat Model, Pen-Test Summary, SOC 2 readiness, architecture review). Tunnel pattern selected (IPSec VPN default · PrivateLink for cloud-native customers). On-site gateway hardware ordered if Pattern B chosen.
Earthflow: 8 hr · Cedent IT/Cyber: 12–24 hrGateway installed on 1–3 representative sites · Modbus / OPC-UA / REST endpoints mapped per inverter / weather-station fleet. Live telemetry flowing into Earthflow ingest. Daily reconciliation against cedent's existing O&M dashboard for 2 weeks to validate.
Earthflow: 32 hr per site · Cedent O&M: 8 hr per siteFor BESS-co-located sites: BMS cell-level streams added via Tesla Powerhub or Sungrow PowerTitan API. Weather stations integrated. Most-recent EL imaging scans (where available) ingested via SFTP. IoT panel populates with live equipment health.
Earthflow: 24 hr per site · Cedent: 4 hr per siteOnboarding cadence accelerates to 1–2 sites per day. Cedent's full pilot portfolio (5–20 sites) onboarded with live telemetry. ACORD bordereau pipeline switches from manual daily export to streaming generation. Production sign-off.
Earthflow: 8 hr per site · Cedent: 2 hr per site| Role | Days 1–7 Effort | Weeks 2–12 Effort | Total Pilot Effort |
|---|---|---|---|
| Cedent data engineer | 4–8 hr | 20–40 hr | ~50 hr |
| Cedent O&M / SCADA admin | — | 40–80 hr | ~60 hr |
| Cedent IT / Cyber lead | 0.5 hr | 12–24 hr | ~15 hr |
| Cedent underwriting team | 2 hr | 8–16 hr | ~12 hr |
| Earthflow integration eng. | 15 hr | 200–400 hr | ~300 hr |
A reinsurer integrating Earthflow into its book has to navigate four categories of governance issues beyond the technical onboarding: data ownership, bordereau aggregation, cross-border data flows, and liability allocation. This chapter walks each in turn.
Earthflow's default contracting model:
When a reinsurer's treaty covers multiple sites for the same cedent, Earthflow re-runs the Monte Carlo aggregation across the entire portfolio in a single simulation, preserving peril correlations. Outputs include:
The aggregate output contains no PII. Site identifiers are anonymized references; no operational personnel or proprietary contract terms appear in bordereau outputs.
| Cedent Jurisdiction | Default Data Residency | Compliance Frameworks |
|---|---|---|
| United States | GCP us-central1 | SOC 2 (in progress) · NIST CSF 2.0 · State data-protection laws (CCPA, NY DFS Cybersecurity) |
| European Union | GCP europe-west1 or europe-west3 | GDPR · Schrems II compliant (data does not cross to US under default config) |
| United Kingdom | GCP europe-west2 | UK GDPR · ICO data-protection alignment |
| Canada | GCP northamerica-northeast1 | PIPEDA aligned · OSFI guidance for federally regulated insurers |
| LATAM | GCP southamerica-east1 (São Paulo) or us-central1 | Brazil LGPD · Argentina PDPA per regional law |
| APAC (Singapore, Australia) | GCP asia-southeast1 or australia-southeast1 | Singapore PDPA · Australia Privacy Act 1988 |
NERC Critical Infrastructure Protection (CIP) standards apply when Earthflow integrates directly into a Bulk Electric System (BES) Reliability Coordinator or Balancing Authority's control envelope. For most solar O&M integrations, this is not the case:
This chapter is an honest accounting of current vs. roadmap compliance posture. Black-box vendors that won't publish their compliance status deserve more scrutiny, not less. Below is the full Earthflow position as of this methodology version.
| Control / Standard | Status | Evidence |
|---|---|---|
| TLS 1.3 in transit · AES-256 at rest | Active | GCP-managed · architecture diagram available |
| Cloud KMS for cryptographic keys | Active | HSM-backed available on enterprise tier |
| MFA + SSO (SAML 2.0 / OIDC) | Active | Okta, Azure AD, Auth0, Google Workspace supported |
| RBAC with least-privilege roles | Active | Standard role definitions documented |
| Audit logging · 13-month retention default | Active | Google Cloud Audit Logs · SIEM export streaming |
| Annual third-party penetration test | Active | Most recent report 2026 · available under MNDA |
| NIST Cybersecurity Framework 2.0 alignment | Active | Self-attestation · framework mapping document |
| IEC 62443-3-3 SL-2 alignment | Active | Architecture-level controls in place |
| Cyber-liability insurance ($10M aggregate) | Active | Certificate available under contract |
| Standard / Certification | Target | Status |
|---|---|---|
| SOC 2 Type II | Q3 2026 | Type I complete · Type II audit in progress |
| ISO 27001 | Q1 2027 | ISMS scoping & gap analysis underway |
| Standard / Certification | Target | Driver |
|---|---|---|
| IEC 62443 Security Level 2 certification | Q3 2027 | Utility-side integration demand |
| FedRAMP Moderate | Q4 2027 | Federal-customer interest |
| NERC CIP-013 supply-chain vetting | Per-customer basis | BES integration on demand |