A Cost-Efficient Approach to High Cyber Security Assurance in Nuclear Power Plants
|
|
|
- Christiana Simpson
- 10 years ago
- Views:
Transcription
1 A Cost-Efficient Approach to High Cyber Security Assurance in Nuclear Power Plants The RIPE Framework as an Alternative to Regulatory Guide 5.71 and NEI Perry Pederson April 2014 The Langner Group Arlington Hamburg Munich
2 Contents Executive Summary... 3 Regulation of Cyber Security for Critical Infrastructure: The Past, the Present, and the Potential Future... 3 Cyber Security Regulatory Requirements for Nuclear Power Plants... 4 Requirements to be met by a Cyber Security Program... 4 Visualizing 10 CFR RIPE Versus NRC Regulatory Requirements... 6 Mapping RIPE to 10 CFR RIPE Framework Elements... 7 RIPE Versus Existing Regulatory Guidance... 8 Mapping RIPE to RG Hands-on Approach rather than Stating Performance Goals... 9 Guidance going beyond requirements and/or demonstrable value Missing in Action: Cost-Efficiency and Continuous Improvement Conclusion Appendix CFR Protection of digital computer and communication systems and networks CFR 73.1 General Provisions (a.k.a. design basis threat) Regulatory Guide 5.71 versus RIPE NEI versus RIPE About the author: Perry Pederson is a co-founder and managing principal of The Langner Group. He began protecting critical infrastructure against cyber attacks with the US Department of Defense and continued that effort as the Director of the Control Systems Security Program (CSSP) at the US Department of Homeland Security. At DHS, he managed the Aurora project where it was demonstrated that electrical generators can be destroyed by a cyber attack. Pederson then moved to the US Nuclear Regulatory Commission where he helped build the regulatory framework for cyber security at US nuclear power reactors and has consulted with the International Atomic Energy Agency on applying security controls to digital instrumentation and control systems globally. Before joining The Langner Group, Pederson held the position of Senior Cyber Threat Analyst for the Nuclear Regulatory Commission. High Cyber Security Assurance in NPPs
3 Executive Summary This paper demonstrates that the RIPE Framework can be applied to meet the regulatory requirements as put forth in the Nuclear Regulatory Commission (NRC) cyber security rule published in The rule is publicly available and can be found at Title 10 of the Code of Federal Regulation Part Protection of Digital Computer and Communication Systems and Networks (10 CFR 73.54); it is also included in full text in the appendix of this paper. Licensees of nuclear power plants (NPPs) are required to provide high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks, up to and including the design basis threat (DBT) as described in 10 CFR 73.1 (also in the appendix). As illustrated in this paper, the RIPE Framework not only meets the NRC s requirements for providing high assurance against cyber attacks, but does so at the least cost and can also produce empirical evidence to support that assertion. Regulation of Cyber Security for Critical Infrastructure: The Past, the Present, and the Potential Future For several critical infrastructure sectors (e.g., electrical, nuclear) high cyber security assurance is said to be achieved when the asset owner has complied with all regulatory requirements. When the nuclear industry speaks of requirements for cyber security at nuclear power plants (NPPs), 10 CFR and 10 CFR73.1 (as well as other related NRC regulations such as the requirements for physical security) form the regulatory basis for what follows. Subsequent to the rule in 2009, the NRC published Regulatory Guide 5.71 (RG 5.71) in 2010 as one way to meet the regulation and it contains a template for a cyber security plan (which outlines a cyber security program). However, the NPP licensees are free to devise a cyber security program of their own design as long as it meets the requirement published in 10 CFR This may seem like a tall order, to prove to the NRC that you have devised a cyber security program that meets all of the regulatory requirements. And, considering that the Nuclear Energy Institute (NEI) has published its own guidance document (NEI 08-09) that essentially mirrors the NRC s RG 5.71, industry has conceded that beating the NRC at their own game is either not possible, not wise, or too costly. However, this paper posits that not only is it possible to design a cyber security program for NPPs that meets or exceeds the NRC requirements, but the goal can be met with measurable results while minimizing costs. Just a decade ago the NPP industry had an opportunity for self-regulation by adopting an industry best practice based on NEI and NUREG 6847 (neither of these documents are publicly available). Apparently, because the NRC subsequently published their own rule and guidance, the industry s self-regulation efforts were deemed to be insufficient. This presents an object lesson for other industries facing various forms of cyber regulation: If an industry led effort is not deemed adequate by the industry regulatory body, then additional regulation is likely to ensue. Many observers see the recent Cyber Security Framework (CSF) issued by the US government through the National Institute of Standards and Technology (NIST) as a result of Presidential Executive Order Many view this as the last chance for US critical infrastructure owners and operators to get cyber security right by adopting an approach to cyber security like the one laid out in the CSF voluntarily or face unprecedented political pressure for regulation. However, if any industry were to adopt an approach to cyber security that can show empirically (as opposed to the musings of opposing experts) that it meets all of the regulatory requirements AND does so at an overall lower cost for the asset owner, then it presents the classic win-win situation. In this manner, through a sustainable and measurable approach to cyber security, additional regulation may be forestalled or even rolled-back. High Cyber Security Assurance in NPPs
4 Cyber Security Regulatory Requirements for Nuclear Power Plants For the purpose of this paper, a comparison will start at the regulatory level and then in a later section extend the comparison to NRC s regulatory guidance. Requirements to be met by a Cyber Security Program All NPP licensees are required by regulation to establish, implement, and maintain a cyber security program that provides high assurance of adequate protection against cyber attacks. When analyzing the language directly from the rule we discover there are three distinct groups or types of requirements: Performance Requirements, Programmatic Requirements, and Documentary Requirements that the cyber security program must meet. This perspective allows us to see clearly the distinction between what outcomes are expected versus the necessary programmatic and documentary elements required to demonstrate the achievement of those outcomes. Performance Requirements (PER) High-level requirement: Provide high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks, up to and including the design basis threat Specific requirements: PER-1 Protect digital computer and communication systems and networks associated with safety-related and important-to-safety functions, security functions, emergency preparedness (SSEP) functions, including offsite communications; and support systems and equipment which, if compromised, would adversely impact SSEP functions PER-2 Protect the systems and networks from cyber attacks that would adversely impact the integrity or confidentiality of data and/or software, deny access to systems, services, and/or data and adversely impact the operation of systems, networks, and associated equipment PER-3 Analyze digital computer and communication systems and networks and identify those assets that must be protected against cyber attacks PER-4 Ensure that appropriate facility personnel, including contractors are aware of cyber security requirements and receive the training necessary to perform their assigned duties and responsibilities PER-5 Evaluate and manage cyber risks PER-6 Ensure that modifications to assets are evaluated before implementation to ensure cyber security performance objectives are maintained Programmatic Requirements (PRO) High-level requirement: Establish, implement, and maintain a cyber security program Specific requirements: PRO-1 Implement security controls to protect the identified assets from cyber attacks PRO-2 Apply and maintain defense-in-depth protective strategies to ensure the capability to detect, respond to, and recover from cyber attacks PRO-3 Mitigate the adverse effects of cyber attacks PRO-4 Ensure that the functions of protected assets are not adversely impacted by cyber attacks High Cyber Security Assurance in NPPs
5 PRO-5 Review the cyber security program as a component of the physical security program in accordance with the requirements of the physical security program Documentary Requirements (DOC) High-level requirement: Develop and maintain a cyber security plan (CSP) and supporting technical documentation Specific requirements: DOC-1 Develop and submit a CSP with implementation schedule for review and approval DOC-2 Establish and maintain a CSP that implements the cyber security program requirements DOC-3 The CSP must describe how requirements are met and account for site-specific conditions DOC-4 Develop and maintain written policies and procedures to implement the CSP DOC-5 The CSP must include measures for cyber incident response and recovery DOC-6 The CSP must include measures for timely detection and response to cyber attacks DOC-7 The CSP must include measures for the mitigation of the consequences of cyber attacks DOC-8 The CSP must include measures to correct exploited vulnerabilities DOC-9 The CSP must include measures for restoring affected systems, networks, and/or equipment resulting from a cyber attack DOC-10 Retain all records and supporting technical documentation as a record until the Commission terminates the license for which the records were developed, and maintain superseded portions of these records for at least three (3) years after the record is superseded, unless otherwise specified by the Commission Visualizing 10 CFR One way to visualize the mapping of requirements outlined in 10 CFR is depicted below. As is the case in the rule, every element clearly supports the ultimate goal of protecting NPPs and hence the public and the environment from the potentially devastating effects of a successful cyber attack on a NPP. Performance requirements PER-1 Protect SSEP functions PER-2 Protect systems and networks PER-3 Analyze and identify assets PER-4 Ensure personnel awareness and training PER-5 Evaluate and manage cyber risks PER-6 Ensure mods are evaluated before implementation Programmatic Requirements PRO-1 Implement security controls PRO-2 Apply and maintain defense-in-depth PRO-3 Mitigate adverse effects of cyber attacks PRO-4 Ensure that functions of protected assets are not adversely impacted by cyber attacks PRO-5 Review the cyber security program as a component of the physical security program Documentary Requirements DOC-1 Submit a CSP DOC-2 Establish and maintain a CSP DOC-3 CSP describes how requirements are met DOC-4 Policies and implementing procedures DOC-5 CSP with incident response/recovery DOC-6 CSP with detection/response DOC-7 CSP with mitigation of consequences DOC-8 CSP with correction of vulnerabilities DOC-9 CSP to restore affected systems DOC-10 Retain records and tech documentation High Cyber Security Assurance in NPPs
6 RIPE Versus NRC Regulatory Requirements As part of the licensing process for NPPs, licensees must submit a CSP for review and approval by the NRC per 10 CFR As previously noted, licensees can submit a plan of their own creation. However, they decided en masse to use the template provided in the NEI 08-09, although some of the new reactor license applicants opted to use the template in RG While the cyber security requirements are outlined in 10 CFR 73.54, once the licensee submits a plan to the NRC under oath an affirmation and the NRC approves it, the CSP has essentially the same weight as the regulation. In other words, when the inspectors show up, they will be reading the CSP and comparing the commitments made in that document to ground truth at each site. The requirements in the rule are the same for each NPP, however, the CSP contains the site specific adaptations necessary to ensure compliance. Whatever the level of security determined by the asset owner or by regulation, RIPE can meet the requirement while also providing robustness, measurability, and continuous improvement at the least cost. Mapping RIPE to 10 CFR The following chart provides a visual mapping of the RIPE Framework elements to the regulatory requirements of 10 CFR Arguably, the performance requirements outlined in 10 CFR are the critical piece of the cyber security puzzle. If the documentation is not quite up to snuff, but not even nation states can adversely impact your processes, that s what s important. Nonetheless, even in the realm of performance based regulation, the inspector will look at the various artifacts of the cyber security program to determine compliance. The quality of the information found on paper impacts the result of the inspection as well as having potentially adverse effects on systems themselves due to incompleteness or inaccuracy. Because of the way the RIPE Framework was designed, there is not a direct (i.e., exclusive/fixed) one-to-one mapping between it and 10 CFR requirements, as shown in the graph above. RIPE was designed from the ground up to be a completely integrated whole. However, we can look at each of the RIPE program elements and see how they map to the various requirements found in 10 CFR High Cyber Security Assurance in NPPs
7 RIPE Framework Elements A brief synopsis of each RIPE element is presented below along with a list of 10 CFR requirements as shown previously. Architecture Analysis o System Inventory for digital industrial control systems, process IT systems, software applications and middleware, and network gear. The quality of this information is paramount as it forms the basis for Network Architecture and Data Flow Diagrams as well as determining device legitimacy, proper configuration and access control. 10 CFR Requirements: PER-3, 5, 6; PRO-4; DOC-10 o Network Architecture and Data Flow Diagrams allows for a full understanding of all data exchanged between components of a distributed system. This includes digital dependencies between system components, and thus also for professional system maintenance. 10 CFR Requirements: PER-5, 6; PRO-2; DOC-10 o Plant Planning and Procurement Guidelines require the asset owner to define and maintain a standard set of cyber security and robustness criteria in their Requests For Proposals. Suppliers that meet these criteria are preferred. This approach is applied to new installs as well as configuration changes. 10 CFR Requirements: PER-4, 6; DOC-3, 10 People and Procedures o Workforce Information Database contains information on individuals with legitimate access to digital plant floor systems and also determines which individuals to notify in case of policy, SOP, or configuration changes. In addition, it allows for determining training requirements for personnel given their responsibilities along with an assessment if the training requirements are met. 10 CFR Requirements: PER-4; DOC-10 o Training Program enables every individual subject to the Cyber Security and Robustness Program to correctly perform the activities mandated by this program and is extended to contractors. 10 CFR Requirements: PER-4; DOC-10 o Policy and Standard Operating Procedure Repository provides a central location that allows for easy access and management of all regulations that must be observed when interacting with specific industrial control systems in various roles (such as end user, maintenance engineer, contractor, etc.). 10 CFR Requirements: DOC-4, 10 Intelligence and Improvement o Program Compliance Measurement measures how successfully the program is executed. Compliance metrics are used to identify program areas where execution does not match specification, allowing for corrective action. 10 CFR Requirements: PER-2, 5; PRO-1, 2; DOC-3, 10 o Vulnerability and Fragility Analysis of systems, architectures, and procedures used or planned to be used, extending from component-level vulnerabilities to Plant Level Vulnerabilities. The vulnerability analysis uses input from System Inventory and from Network and Data Flow Diagrams. 10 CFR Requirements: PER-1, 5, 6; PRO-1, 3, 4; DOC-10 o Performance Evaluation and Improvement evaluates the performance of the Cyber Security and Robustness Program in respect to target cyber security and robustness levels as determined by the asset owner. High Cyber Security Assurance in NPPs
8 10 CFR Requirements: PER-5, 6; PRO-2, 3, 4, 5; DOC-10 Reporting and Management Sign-Off o Results from the Intelligence and Improvement Program Practices are reported annually to management for review and sign-off. 10 CFR Requirements: PRO-5; DOC-1, 10 Roles and Responsibilities o Central Cyber Security Entity is responsible for providing a technical basis and maintaining; System Inventory, User Inventory, delivering and adapting policies and procedures, developing, updating, and delivering the Training Program, performing audits, Compliance Measurements, Vulnerability Analysis, Performance Evaluation and Improvement supporting end users and maintenance engineers from other departments and from contractors in executing the provisions of the Cyber Security Program. 10 CFR Requirements: All o Staff Members from other Departments includes; Plant Planning, Buying Department and Legal Department, Plant Maintenance, Plant Operations, Business Users, and the IT Department. 10 CFR Requirements: PER-4 o Third Parties includes contractors, vendors, system integrators, and consultants who are responsible for executing any provisions set forth in the Cyber Security and Robustness Program activities. Third Parties are expected to comply with all policies and procedures in respect to remote access (if applicable), usage of BYOD, removable media, and system access. 10 CFR Requirements: PER-5 o Management is responsible for signing off annual reports, security policies, procurement guidelines, and for allocating budget for executing the Cyber Security and Robustness Program. 10 CFR Requirements: PER-4 The bottom line here is that the RIPE Framework addresses every requirement currently established by the NRC for NPP cyber security. Furthermore, RIPE provides additional benefits such as continuous improvement as an outcome, performance metrics, and information sharing so there is a means to benefit from lessons learned. RIPE Versus Existing Regulatory Guidance Once a cyber security program is reviewed and approved by the NRC, it represents the standard by which inspectors will evaluate compliance. The underlying premise is that if licensees diligently implement the cyber security program as approved by the NRC, they will have met the requirements of 10 CFR Following the guidance in either of RG 5.71 or NEI is by definition meeting the regulatory requirement of providing high assurance of adequate protection against a cyber attack. However, the RIPE Framework goes beyond compliance to regulatory requirements (i.e., the what of cyber security) and outlines a detailed process (i.e., the how of cyber security) that provides a sustainable, measureable and continuously improving cyber security capability at the least cost. Mapping RIPE to RG 5.71 The following chart provides a visual mapping of the RIPE Framework elements to the regulatory guidance as found in RG 5.71 or NEI High Cyber Security Assurance in NPPs
9 Hands-on Approach rather than Stating Performance Goals Outlined below are the areas where RIPE provides general performance goals as well as specific guidance on how to achieve those goals: RIPE provides guidance and templates on how to discover systemic or plant level vulnerabilities o Plant level vulnerabilities emerge based on the specific hardware/software, architecture, and protocols that exist in the plant and may include systems deemed by some to be non-critical o Licensees are expected to assess their digital assets and determine which are critical and which are non-critical, but without the right input and rigor, the analysis may not be complete or accurate RIPE provides guidance on how to first build a cyber security capability that can maintain a given level of security (as determined by the asset owner) o Existing regulatory frameworks assume that providing high-level performance objectives is sufficient, but experience on the plant floor suggests otherwise RIPE provides guidance and templates on how to implement a process of continuous improvement that will also minimize costs o Regulators are not necessarily concerned about continuous improvement, but in compliance o Likewise, regulators are not necessarily interested in reducing costs RIPE provides guidance and templates on how to procure more secure systems o Although there is an intrinsic motivation on the part of licensees to procure more secure digital assets, there is a dearth of guidance on exactly how to incorporate security requirements into procurement specifications RIPE, as a proprietary product/service, provides something that no regulatory body can legally provide; guidance on what to do and how to do it supported by a cadre of SMEs that an average utility could not manage to employ o The level of expertise brought to bear by The Langner Group is broad and deep and once RIPE is established, are only required for short periods on a periodic basis o Every year the RIPE process is tweaked as needed and the templates are updated based on aggregated lessons learned across the client base o Information on vulnerabilities as well as mitigation strategies and solutions are shared on a continual basis amongst all RIPE customers High Cyber Security Assurance in NPPs
10 For a comparison of RIPE Framework domains and RG 5.71/NEI the reader can refer to the appendix in this document. Guidance going beyond requirements and/or demonstrable value While the RG 5.71 and NEI are certainly not without value, some of the guidance goes beyond the regulation as specified in 10 CRF and provides dubious value to the cyber security posture of a NPP network. A few examples are highlighted below. Training RG 5.71 dedicates sections C.10.1 to C.10.4 directly to training of NPP staff and contractors, resulting in roughly 2.5 pages of text. In comparison, the only requirement regarding training in the regulation reads: Ensure that appropriate facility personnel, including contractors, are aware of cyber security requirements and receive the training necessary to perform their assigned duties and responsibilities. Compared to the regulatory requirement, training as outlined in RG 5.71 reads like overkill. For example, section 10.2 which specifically covers awareness training is specific on teaching hacking skills. However, this goes well beyond the awareness of cyber security requirements as stated in the regulation. Furthermore, it has never been proven that familiarity with hacking skills would make an organization more cyber-secure. In contrast, the RIPE Framework limits cyber security training to the kind of drills that personnel in a NPP are familiar with when it comes to safety and physical security. Beyond that, in-depth courses for system designers and control system engineers are provided to promote design and implementation strategies for robust and secure control and safety system installations. Section C.10.4 of RG 5.71 intends to train a workforce of cyber security specialists in the licensee s organization which goes beyond the regulatory requirements, is highly unrealistic, and even focuses on misleading techniques. For example, the cyber security specialist should be able to conduct penetration tests and harden Critical Digital Assets (CDAs). The reality is that sophisticated penetration testing cannot be done in live NPPs for safety reasons, and the hardening of CDAs is a process that must be left to the respective vendor (and, as a configuration changes, is subject to re-certification). In contrast, the RIPE Framework does not attempt to develop a group of cyber security super-experts at every NPP but provides the best expert advice both as a service in ongoing support and as a product in form of the various design guidelines, policies and procedures, templates, and assessment reports. Security Controls and Cyber Security Capability Both RG 5.71 and NEI place an unsubstantiated faith in the mere presence of security controls, which is expressed in a checklist approach where the presence or absence of specific security controls for every CDA is judged as an indicator of cyber security posture. However, security controls are not magic properties that, if allegedly present, would provide security assurance in a guaranteed manner. In reality, any typical security control provides not much more than a grey zone which must be carefully examined in order to establish the factual value of such control. The reason for this grey zone has been extensively covered in our whitepaper The RIPE Framework and is known as cyber security capability. The term reflects the gap between a conceptual security control and its actual de-facto implementation, configuration, and behavior. For example, regimes for the application of security patches or antivirus updates regularly are not executed per policy in real-life plant environments. The same is true for behavioral controls such as policies where audits regularly show that security policies are either not known to their intended audience, not practicable (such as non-comprehensive, non-memorizable, or simply non-executable for practical reasons), or simply not followed for convenience. High Cyber Security Assurance in NPPs
11 The establishment of security controls without the implementation of a governance process to achieve cyber security capability leaves cyber security to wishful thinking. For this reason, the RIPE Framework places the emphasis on implementing such a governance process that is absent in both guidance documents referenced. To make the picture complete, the RIPE Framework also favors design change over bolt-on security controls, if only to eliminate the need for installing ever more devices and software that can be misconfigured or fail, or mandating new procedures that require staff time which must be subtracted from other tasks. In order to achieve and sustain high assurance against cyber attacks at NPPs, the owners and operators of said plants should consider implementing a governing process such as RIPE that includes continuous monitoring and proactive action in plant planning, procurement, operations, and maintenance as shown in the chart above. For maximum effectiveness, the governing process should address all of the regulatory requirements as set forth in the NRC s cyber security rule 10 CFR The process should cover more than just technical system attributes but also activities of personnel (employees and third-party staff members) that need to interact with such systems in a live production environment, and also staff members who plan, procure, and commission such systems in the first place. Missing in Action: Cost-Efficiency and Continuous Improvement In many organizations, the cyber security of ICS used to be viewed as a task that can be mastered on the side by notoriously overburdened control system engineers, with no specific budget. But as with any other activity, nothing really gets done without good planning, management commitment, and resources. Such must be at the very start of every cyber security program. Fortunately, the RIPE Framework gives the organization all the parameters it needs for resource planning and for monitoring of progress. At the core, the RIPE Framework represents a continuously improving process focused on the cyber security and robustness of digital industrial control systems regardless of the current state. The RIPE Framework provides a clear alternative to many of the security controls outlined in the RG 5.71 and supports that with a rigorous analysis. The chart at left provides an example of the cumulative cost reduction possible (allowing for an incremental increase initially) when the RIPE Framework is implemented to at first augment and then replace the existing cyber security program at NPPs. Pre-RIPE is estimated to require about 3-6 months of effort to ensure the technological capability is in place to build a RIPE program. This Pre-RIPE phase is then followed by RIPE Cycle Zero and includes a full iteration of the RIPE Framework process to include the generation of performance metrics. At the end of RIPE Cycle Zero, the primary inputs to improve the next iteration are the results of the first and thus begins a process of continuous improvement in the overall security posture and all unneeded vestiges of the previous program can be terminated. High Cyber Security Assurance in NPPs
12 Conclusion There is little doubt that compliance to NRC regulatory requirements is what drives the actions of many licensees and has led to substantive improvements in the cyber security posture of the U.S. fleet of NPPs. Regardless, some licensees harbor a vision of cyber security that may in fact exceed the requirements established by the NRC, but have not as yet been able to fully articulate or implement that vision. The truth of the matter is that rather than the regulatory requirement becoming the least that should be done, too often it becomes the limit of what needs to be done. This leaves those who strive for continuous improvement in their cyber security posture wanting for management support and the accompanying budget. This is exactly the value proposition The Langner Group has established for the RIPE Framework. As can be seen in the chart to the left, over time the cost to administer the RIPE Framework will decrease while the cumulative improvements add greater value at a decreasing cost. This provides a measure of predictability in a world being whipsawed by a constant stream of threat reporting that changes almost hourly. The RIPE Framework provides the bridge from a myopic view of regulatory compliance to a sustainable, predictable, and continuously improving cyber security posture at the least possible cost. While many have complimented the NRC for what they have accomplish thus far, the ultimate responsibility for ensuring that NPPs are protected from cyber attacks rests with the licensees. They alone have the responsibility and duty to protect. It is time that the industry stood to say We can do this without the heavy hand of government regulation forcing a minimum set of activities that may or may not contribute to better cyber security. I must first know myself, as the Delphian inscription says; to be curious about that which is not my concern, while I am still in ignorance of my own self would be ridiculous. -Plato High Cyber Security Assurance in NPPs
13 Appendix 10 CFR Protection of digital computer and communication systems and networks 1 By November 23, 2009 each licensee currently licensed to operate a nuclear power plant under part 50 of this chapter shall submit, as specified in 50.4 and of this chapter, a cyber security plan that satisfies the requirements of this section for Commission review and approval. Each submittal must include a proposed implementation schedule. Implementation of the licensee s cyber security program must be consistent with the approved schedule. Current applicants for an operating license or combined license who have submitted their applications to the Commission prior to the effective date of this rule must amend their applications to include a cyber security plan consistent with this section. (a) Each licensee subject to the requirements of this section shall provide high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks, up to and including the design basis threat as described in (1) The licensee shall protect digital computer and communication systems and networks associated with: (i) Safety-related and important-to-safety functions; (ii) Security functions; (iii) Emergency preparedness functions, including offsite communications; and (iv) Support systems and equipment which, if compromised, would adversely impact safety, security, or emergency preparedness functions. (2) The licensee shall protect the systems and networks identified in paragraph (a)(1) of this section from cyber attacks that would: (i) Adversely impact the integrity or confidentiality of data and/or software; (ii) Deny access to systems, services, and/or data; and (iii) Adversely impact the operation of systems, networks, and associated equipment. (b) To accomplish this, the licensee shall: (1) Analyze digital computer and communication systems and networks and identify those assets that must be protected against cyber attacks to satisfy paragraph (a) of this section, (2) Establish, implement, and maintain a cyber security program for the protection of the assets identified in paragraph (b)(1) of this section; and (3) Incorporate the cyber security program as a component of the physical protection program. (c) The cyber security program must be designed to: (1) Implement security controls to protect the assets identified by paragraph (b)(1) of this section from cyber attacks; (2) Apply and maintain defense-in-depth protective strategies to ensure the capability to detect, respond to, and recover from cyber attacks; (3) Mitigate the adverse affects of cyber attacks; and (4) Ensure that the functions of protected assets identified by paragraph (b)(1) of this section are not adversely impacted due to cyber attacks. 1 Retrieved from on 2/8/2014 and reformatted for ease of reading. High Cyber Security Assurance in NPPs
14 (d) As part of the cyber security program, the licensee shall: (1) Ensure that appropriate facility personnel, including contractors, are aware of cyber security requirements and receive the training necessary to perform their assigned duties and responsibilities. (2) Evaluate and manage cyber risks. (3) Ensure that modifications to assets, identified by paragraph (b)(1) of this section, are evaluated before implementation to ensure that the cyber security performance objectives identified in paragraph (a)(1) of this section are maintained. (e) The licensee shall establish, implement, and maintain a cyber security plan that implements the cyber security program requirements of this section. (1) The cyber security plan must describe how the requirements of this section will be implemented and must account for the site-specific conditions that affect implementation. (2) The cyber security plan must include measures for incident response and recovery for cyber attacks. The cyber security plan must describe how the licensee will: (i) Maintain the capability for timely detection and response to cyber attacks; (ii) Mitigate the consequences of cyber attacks; (iii) Correct exploited vulnerabilities; and (iv) Restore affected systems, networks, and/or equipment affected by cyber attacks. (f) The licensee shall develop and maintain written policies and implementing procedures to implement the cyber security plan. Policies, implementing procedures, site-specific analysis, and other supporting technical information used by the licensee need not be submitted for Commission review and approval as part of the cyber security plan but are subject to inspection by NRC staff on a periodic basis. (g) The licensee shall review the cyber security program as a component of the physical security program in accordance with the requirements of 73.55(m), including the periodicity requirements. (h) The licensee shall retain all records and supporting technical documentation required to satisfy the requirements of this section as a record until the Commission terminates the license for which the records were developed, and shall maintain superseded portions of these records for at least three (3) years after the record is superseded, unless otherwise specified by the Commission. [74 FR 13970, Mar. 27, 2009] High Cyber Security Assurance in NPPs
15 10 CFR 73.1 General Provisions 2 (a.k.a. design basis threat) 73.1 Purpose and scope. (a) Purpose. This part prescribes requirements for the establishment and maintenance of a physical protection system which will have capabilities for the protection of special nuclear material at fixed sites and in transit and of plants in which special nuclear material is used. The following design basis threats, where referenced in ensuing sections of this part, shall be used to design safeguards systems to protect against acts of radiological sabotage and to prevent the theft or diversion of special nuclear material. Licensees subject to the provisions of (except for fuel cycle licensees authorized under Part 70 of this chapter to receive, acquire, possess, transfer, use, or deliver for transportation formula quantities of strategic special nuclear material), 73.50, and are exempt from 73.1(a)(1)(i)(E), 73.1(a)(1)(iii), 73.1(a)(1)(iv), 73.1(a)(2)(iii), and 73.1(a)(2)(iv). Licensees subject to the provisions of are exempt from 73.1(a)(1)(iv). (1) Radiological sabotage. (i) A determined violent external assault, attack by stealth, or deceptive actions, including diversionary actions, by an adversary force capable of operating in each of the following modes: A single group attacking through one entry point, multiple groups attacking through multiple entry points, a combination of one or more groups and one or more individuals attacking through multiple entry points, or individuals attacking through separate entry points, with the following attributes, assistance and equipment: (A) Well-trained (including military training and skills) and dedicated individuals, willing to kill or be killed, with sufficient knowledge to identify specific equipment or locations necessary for a successful attack; (B) Active (e.g., facilitate entrance and exit, disable alarms and communications, participate in violent attack) or passive (e.g., provide information), or both, knowledgeable inside assistance; (C) Suitable weapons, including handheld automatic weapons, equipped with silencers and having effective long range accuracy; (D) Hand-carried equipment, including incapacitating agents and explosives for use as tools of entry or for otherwise destroying reactor, facility, transporter, or container integrity or features of the safeguards system; and (E) Land and water vehicles, which could be used for transporting personnel and their hand-carried equipment to the proximity of vital areas; and (ii) An internal threat; and (iii) A land vehicle bomb assault, which may be coordinated with an external assault; and (iv) A waterborne vehicle bomb assault, which may be coordinated with an external assault; and (v) A cyber attack. (2) Theft or diversion of formula quantities of strategic special nuclear material. (i) A determined violent external assault, attack by stealth, or deceptive actions, including diversionary actions, by an adversary force capable of operating in each of the following modes: a single group attacking through one entry point, multiple groups attacking through one or more 2 Retrieved from on 2/8/2014 and reformatted for ease of reading. High Cyber Security Assurance in NPPs
16 (b) Scope. groups and one or individuals attacking through multiple entry points, or individuals attacking through separate entry points, with the following attributes, assistance and equipment: (A) Well-trained (including military training and skills) and dedicated individuals, willing to kill or be killed, with sufficient knowledge to identify specific equipment or locations necessary for a successful attack; (B) Active (e.g., facilitate entrance and exit, disable alarms and communications, participate in violent attack) or passive (e.g., provide information), or both, knowledgeable inside assistance; (C) Suitable weapons, including handheld automatic weapons, equipped with silencers and having effective long range accuracy; (D) Hand-carried equipment, including incapacitating agents and explosives for use as tools of entry or for otherwise destroying reactor, facility, transporter, or container integrity or features of the safe-guards system; (E) Land and water vehicles, which could be used for transporting personnel and their hand-carried equipment; and (ii) An internal threat; and (iii) A land vehicle bomb assault, which may be coordinated with an external assault; and (iv) A waterborne vehicle bomb assault, which may be coordinated with an external assault; and (v) A cyber attack. (1) This part prescribes requirements for: (i) The physical protection of production and utilization facilities licensed under parts 50 or 52 of this chapter, (ii) The physical protection of plants in which activities licensed pursuant to part 70 of this chapter are conducted, and (iii) The physical protection of special nuclear material by any person who, pursuant to the regulations in part 61 or 70 of this chapter, possesses or uses at any site or contiguous sites subject to the control by the licensee, formula quantities of strategic special nuclear material or special nuclear material of moderate strategic significance or special nuclear material of low strategic significance. (2) This part prescribes requirements for the physical protection of special nuclear material in transportation by any person who is licensed pursuant to the regulations in parts 70 and 110 of this chapter who imports, exports, transports, delivers to a carrier for transport in a single shipment, or takes delivery of a single shipment free on board (F.O.B.) where it is delivered to a carrier, formula quantities of strategic special nuclear material, special nuclear material of moderate strategic significance or special nuclear material of low strategic significance. (3) This part also applies to shipments by air of special nuclear material in quantities exceeding: (i) 20 grams or 20 curies, whichever is less, of plutonium or uranium-233, or High Cyber Security Assurance in NPPs
17 (ii) 350 grams of uranium-235 (contained in uranium enriched to 20 percent or more in the U-235 isotope). (4) Special nuclear material subject to this part may also be protected pursuant to security procedures prescribed by the Commission or another Government agency for the protection of classified materials. The provisions and requirements of this part are in addition to, and not in substitution for, any such security procedures. Compliance with the requirements of this part does not relieve any licensee from any requirement or obligation to protect special nuclear material pursuant to security procedures prescribed by the Commission or other Government agency for the protection of classified materials. (5) This part also applies to the shipment of irradiated reactor fuel in quantities that in a single shipment both exceed 100 grams in net weight of irradiated fuel, exclusive of cladding or other structural or packaging material, and have a total radiation dose in excess of 100 rems per hour at a distance of 3 feet from any accessible surface without intervening shielding. (6) This part prescribes requirements for the physical protection of spent nuclear fuel and high-level radioactive waste stored in either an independent spent fuel storage installation (ISFSI) or a monitored retrievable storage (MRS) installation licensed under part 72 of this chapter, or stored at the geologic repository operations area licensed under part 60 or part 63 of this chapter. (7) This part prescribes requirements for the protection of Safeguards Information (including Safeguards Information with the designation or marking: Safeguards Information Modified Handling) in the hands of any person, whether or not a licensee of the Commission, who produces, receives, or acquires that information. (8) This part prescribes requirements for advance notice of export and import shipments of special nuclear material, including irradiated reactor fuel. (9) As provided in part 76 of this chapter, the regulations of this part establish procedures and criteria for physical security for the issuance of a certificate of compliance or the approval of a compliance plan. [44 FR 68186, Nov. 28, 1979, as amended at 45 FR 67645, Oct. 14, 1980; 45 FR 80271, Dec. 4, 1980; 46 FR 51724, Oct. 22, 1981; 47 FR 57482, Dec. 27, 1982; 52 FR 9653, Mar. 26, 1987; 53 FR 31683, Aug. 19, 1988; 53 FR 45451, Nov. 10, 1988; 59 FR 38899, Aug. 1, 1994; 59 FR 48960, Sept. 23, 1994; 63 FR 26962, May 15, 1998; 66 FR 55816, Nov. 2, 2001; 72 FR 12705, March 19, 2007; 72 FR 49561, Aug. 28, 2007; 73 FR 63573, Oct. 24, 2008] Retrieved from on 2/8/2014 High Cyber Security Assurance in NPPs
18 Regulatory Guide 5.71 versus RIPE RIPE Functions Governance Metrics RIPE Domains System Population Characteristics RIPE RG 5.71 A continuous process that determines the accuracy and completeness of system documentation, and measures and enforces compliance to procedural directives periodically. Measures the following attributes for each of the RIPE Domains: Quality Completeness Compliance Detailed equipment and instrument list (cyber system inventory), manifested as a database, stores information on hardware systems, the software running on those systems, network association, and configuration details. Develop, review (1-year cycle) and update a formal, documented security planning, assessment and authorization policy that describes the purpose, scope, roles, responsibilities, management commitments, and coordination and implementation of a cyber security program. No programmatic level metrics, but recommends: Measuring the cyber incident response capability within the organization Measuring vulnerability impact Developer security metrics for defect tracking within the code Identify and document plant systems, equipment, communication systems, and networks that are associated with safety, important-to-safety, security, and emergency preparedness (SSEP) functions, as well as the support systems associated with SSEP functions. Network Architecture Component Interaction Workforce Roles and Responsibilities Workforce Skills and Competence Development Procedural Guidance Deliberate Design and Configuration Change A network architecture model, manifested as a set of diagrams with accompanying detail information for reference, identifies the connectivity options for specific endpoints and groups of endpoints. It identifies which network-connected systems can talk to which other network-connected systems. Process flow diagrams with accompanying detail information, identifies the interfaces of digital components. For interfaces that have dedicated communication counterparts, such association is identified. Interfaces extend to non-ip networks, fieldbus, RS-232, and proprietary. Workforce records of personnel. Identities, affiliation (staff or contractor), role-based physical and logical access and execution privileges, applicable policies and SOPs, and competence of all individuals that legitimately interact with industrial control and safety systems or process IT equipment. Training curriculum and records of operations and maintenance personnel is a requirement that documents staff members and contractors ability to perform their interactions with industrial control systems professionally and meet the provisions of policies and SOPs. Standard operating procedures used by operations and maintenance personnel for cyber, manifested as written documents, structure the activities that comprise legitimate and appropriate interaction with plant floor systems. Plant planning and change management procedures for cyber on the topology and architecture of process networks, configuration of essential infrastructure services, authorized remote access options and products, or proper configuration and usage of virtualization technology. The cyber security defensive model is deployed using a network architecture portrayed by a series of increasing defensive levels and incorporates a defense-in-depth strategy. Requires restricting and controlling data flows. Validation includes the physical and logical location of each CDA, direct and indirect connectivity pathways to and from the CDA, interdependencies of the CDA, and to evaluate the effectiveness of any existing security controls and the location of the CDA in the defensive architecture. Develop and implement a cyber security program that includes policies and procedures that describe the overall security goals, objectives, practices, and roles and responsibilities within the organization and, with high assurance, confirm that the cyber security program is properly established and maintained. Individuals are trained to a level of cyber security knowledge appropriate to their assigned responsibilities in order to provide high assurance that these individuals are able to perform their job functions properly. Develop and implement a cyber security program that includes policies and procedures that describe the overall security goals, objectives, practices, and roles and responsibilities within the organization and, with high assurance, confirm that the cyber security program is properly established and maintained. Document the configuration management policy as a part of the configuration management plan and include hardware configurations, software configurations, and access permissions. Changes to hardware or software are documented and accessed in accordance with existing policies and implementing procedures. High Cyber Security Assurance in NPPs
19 System Acquisition System procurement guidelines specifying physical and functional system attributes and properties that industrial control and safety systems, industrial network gear, and process IT systems must have in order to meet an organization s quality criteria. A procurement policy that provides that the integrity of systems and services is maintained during the procurement process, development of procedures to facilitate and maintain the implementation of procurement policies associated with vendor security and development life cycles, and implementation of the security controls. NEI versus RIPE RIPE Functions Governance Metrics RIPE NEI A continuous process that determines the accuracy and completeness of system documentation, and measures and enforces compliance to procedural directives periodically. Measures the following attributes for each of the RIPE Domains: Quality Completeness Compliance Develop, review (2-year cycle) and update a formal, documented security planning, assessment and authorization policy that describes the purpose, scope, roles, responsibilities, management commitments, and coordination and implementation of a cyber security program. No programmatic level metrics, but recommends: Measuring vulnerability impact RIPE Domains System Population Characteristics Detailed equipment and instrument list (cyber system inventory), manifested as a database, stores information on hardware systems, the software running on those systems, network association, and configuration details. Identify and document plant systems, equipment, communication systems, and networks that are associated with safety, important-to-safety, security, and emergency preparedness (SSEP) functions, as well as the support systems associated with SSEP functions. Network Architecture Component Interaction Workforce Roles and Responsibilities Workforce Skills and Competence Development Procedural Guidance A network architecture model, manifested as a set of diagrams with accompanying detail information for reference, identifies the connectivity options for specific endpoints and groups of endpoints. It identifies which network-connected systems can talk to which other network-connected systems. Process flow diagrams with accompanying detail information, identifies the interfaces of digital components. For interfaces that have dedicated communication counterparts, such association is identified. Interfaces extend to non-ip networks, fieldbus, RS-232, and proprietary. Workforce records of personnel. Identities, affiliation (staff or contractor), role-based physical and logical access and execution privileges, applicable policies and SOPs, and competence of all individuals that legitimately interact with industrial control and safety systems or process IT equipment. Training curriculum and records of operations and maintenance personnel is a requirement that documents staff members and contractors ability to perform their interactions with industrial control systems professionally and meet the provisions of policies and SOPs. Standard operating procedures used by operations and maintenance personnel for cyber, manifested as written documents, structure the activities that comprise legitimate and appropriate interaction with plant floor systems. The cyber security defensive model is deployed using a network architecture portrayed by a series of increasing defensive levels and incorporates a defense-in-depth strategy. Requires restricting and controlling data flows. Validation includes the physical and logical location of each CDA, direct and indirect connectivity pathways to and from the CDA, interdependencies of the CDA, and to evaluate the effectiveness of any existing security controls and the location of the CDA in the defensive architecture. Develop and implement a cyber security program that includes policies and procedures that describe the overall security goals, objectives, practices, and roles and responsibilities within the organization and, with high assurance, confirm that the cyber security program is properly established and maintained. Individuals are trained to a level of cyber security knowledge appropriate to their assigned responsibilities in order to provide high assurance that these individuals are able to perform their job functions properly. Develop and implement a cyber security program that includes policies and procedures that describe the overall security goals, objectives, practices, and roles and responsibilities within the organization and, with high assurance, confirm that the cyber security program is properly established and maintained. High Cyber Security Assurance in NPPs
20 Deliberate Design and Configuration Change System Acquisition Plant planning and change management procedures for cyber on the topology and architecture of process networks, configuration of essential infrastructure services, authorized remote access options and products, or proper configuration and usage of virtualization technology. System procurement guidelines specifying physical and functional system attributes and properties that industrial control and safety systems, industrial network gear, and process IT systems must have in order to meet an organization s quality criteria. Document the configuration management policy as a part of the configuration management plan and include hardware configurations, software configurations, and access permissions. Changes to hardware or software are documented and accessed in accordance with existing policies and implementing procedures. Recommends that contracts specify cyber security requirements for vendors and contractors and these are applied while on site or used during procurement. High Cyber Security Assurance in NPPs
A RIPE Implementation of the NIST Cyber Security Framework
A RIPE Implementation of the NIST Cyber Security Framework Adding the How-To to the NIST CSF Perry Pederson October 2014 The Langner Group Arlington Hamburg Munich Contents EXECUTIVE SUMMARY... 3 THE NIST
NRC Cyber Security Policy &
Ask SME and Learn NRC Cyber Security Policy & Guidance Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda
A Regulatory Approach to Cyber Security
A Regulatory Approach to Cyber Security Perry Pederson Security Specialist (Cyber) Office of Nuclear Security and Incident Response U.S. Nuclear Regulatory Commission 1 Agenda Overview Regulatory Framework
U.S. NUCLEAR REGULATORY COMMISSION January 2010 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH. REGULATORY GUIDE 5.71 (New Regulatory Guide)
U.S. NUCLEAR REGULATORY COMMISSION January 2010 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH REGULATORY GUIDE 5.71 (New Regulatory Guide) CYBER SECURITY PROGRAMS FOR NUCLEAR FACILITIES A INTRODUCTION
NRC Cyber Security Regulatory
Ask SME and Learn NRC Cyber Security Regulatory Program Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 ATC Nuclear ATC-N serves the commercial nuclear utilities in the US and many foreign
Security Requirements for Spent Fuel Storage Systems 9264
Security Requirements for Spent Fuel Storage Systems 9264 P. G. Brochman, S. R. Helton, E. A. Thompson US Nuclear Regulatory Commission 11555 Rockville Pike, M/S: T4-F25M, Rockville, MD 20852-2738 ABSTRACT
Spreading the Word on Nuclear Cyber Security
Spreading the Word on Nuclear Cyber Security Clifford Glantz, Guy Landine, Philip Craig, and Robert Bass Pacific Northwest National Laboratory (PNNL) PO Box 999; 902 Battelle Blvd Richland, WA 99352 USA
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, and Dong-Young Lee I&C and HF Research Division, Korea Atomic Energy
Cynthia Broadwell, Progress Energy. William Gross, Nuclear Energy Institute
Cyber Security Plan Overview Cynthia Broadwell, Progress Energy Nolan Heinrich, TVA William Gross, Nuclear Energy Institute Introduction Cynthia Broadwell Progress Energy Progress Energy Fleet Cyber Security
Security for Independent Spent Fuel Storage Installations (ISFSI)
CRYPTOME 30 March 2011 Security for Independent Spent Fuel Storage Installations (ISFSI) http://adamswebsearch2.nrc.gov/idmws/viewdocbyaccession.asp?accessionnumber =ML080030050 (Nuclear Regulation Commission
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001. March 3, 2011
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 March 3, 2011 Mr. Timothy S. Rausch Senior Vice President and Chief Nuclear Officer PPL Susquehanna, LLC 769 Salem Boulevard Berwick,
REGULATORY GUIDE 5.29 (Draft was issued as DG 5028, dated May 2012) SPECIAL NUCLEAR MATERIAL CONTROL AND ACCOUNTING SYSTEMS FOR NUCLEAR POWER PLANTS
U.S. NUCLEAR REGULATORY COMMISSION June 2013 Revision 2 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH REGULATORY GUIDE 5.29 (Draft was issued as DG 5028, dated May 2012) SPECIAL NUCLEAR MATERIAL
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one
The U.S. Nuclear Regulatory Commission s Cyber Security Regulatory Framework for Nuclear Power Reactors
NUREG/CR-7141 The U.S. Nuclear Regulatory Commission s Cyber Security Regulatory Framework for Nuclear Power Reactors Office of Nuclear Security and Incident Response AVAILABILITY OF REFERENCE MATERIALS
Options for Cyber Security. Reactors. April 9, 2015
Options for Cyber Security Design Requirements for Power Reactors April 9, 2015 Scope Discuss options for including cyber security design requirements for power reactors into NRC regulations Scope does
Security at San Onofre
Security at San Onofre April 16, 2015 Ross Quam Security Manager Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001. November 13, 2012
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 November 13, 2012 Vice President, Operations Entergy Nuclear Operations, Inc. Vermont Yankee Nuclear Power Station P.O. Box 250 Governor
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
TAKE CONTROL OF YOUR DIGITAL PLANT ECOSYSTEM. Practical Industrial Cyber Security with RIPE
TAKE CONTROL OF YOUR DIGITAL PLANT ECOSYSTEM Practical Industrial Cyber Security with RIPE The Industrial Internet s Achilles Heel: Unmanageable Cyber Risk Digital technology, IT, and the Internet have
NUCLEAR REGULATORY COMMISSION. 10 CFR Part 73 [NRC-2014-0036] RIN 3150-AJ37. Cyber Security Event Notifications
This document is scheduled to be published in the Federal Register on 11/02/2015 and available online at http://federalregister.gov/a/2015-27855, and on FDsys.gov [7590-01-P] NUCLEAR REGULATORY COMMISSION
Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants
Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Sooill Lee a*, Yong Sik Kim a, Song Hae Ye a a Central Research Institute, Korea Hydro and
Seoul Communiqué 2012 Seoul Nuclear Security Summit
Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
NEI 08-09 [Rev. 6] Cyber Security Plan for Nuclear Power Reactors
NEI 08-09 [Rev. 6] Cyber Security Plan for Nuclear Power Reactors [THIS PAGE IS LEFT BLANK INTENTIONALLY] NEI 08-09 [Rev. 6] Nuclear Energy Institute Cyber Security Plan for Nuclear Power Reactors Nuclear
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected]
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected] Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
NORTH CAROLINA EASTERN MUNICIPAL POWER AGENCY SHEARON HARRIS NUCLEAR POWER PLANT, UNIT 1. Renewed License No. NPF-63
CAROLINA POWER & LIGHT COMPANY NORTH CAROLINA EASTERN MUNICIPAL POWER AGENCY DOCKET NO. 50-400 SHEARON HARRIS NUCLEAR POWER PLANT, UNIT 1 RENEWED FACILITY OPERATING LICENSE 1. The Nuclear Regulatory Commission
abstract NRC Headquarters United States Nuclear Regulatory Commission
abstract The Strategic Plan Fiscal Years 2008-2013 describes the U.S. Nuclear Regulatory Commission s mission and defines the strategic goals and outcomes the agency intends to pursue. NRC Headquarters
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
2374-19. Joint ICTP-IAEA School of Nuclear Energy Management. 5-23 November 2012. Nuclear Security Fundamentals Module 9 topic 2
2374-19 Joint ICTP-IAEA School of Nuclear Energy Management 5-23 November 2012 Nuclear Security Fundamentals Module 9 topic 2 EVANS Rhonda, IAEA Department of Nuclear Safety and Security Office of Nuclear
A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2011.065 A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG, JUNG-WOON LEE *, CHEOL-KWON LEE, KEE-CHOON KWON, and DONG-YOUNG
AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Part 1 General and Administrative Information. Part 3 Applicant s Environmental Report Combined License Stage
Part 16 South Carolina Electric and Gas V. C. Summer Nuclear Station, Units 2 & 3 COL Application COLA Table of Contents Navigation Page Part 1 General and Administrative Information Part 2 Final Safety
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective
Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective Terry Jamieson Vice-President Technical Support Branch Canadian Nuclear Safety Commission August 11, 2015 www.nuclearsafety.gc.ca
[Insert Company Logo]
[Insert Company Logo] Business Continuity and Disaster Recovery Planning (BCDRP) Manual 1 Table of Contents Critical Business Information 4 Business Continuity and Disaster Recover Planning (BCDRP) Personnel
Designing Compliant and Sustainable Security Programs 1 Introduction
Designing Compliant and Sustainable Security Programs 1 Introduction The subject of this White Paper addresses several methods that have been successfully employed by DYONYX to efficiently design, and
Cyber Security R&D (NE-1) and (NEET-4)
Cyber Security R&D (NE-1) and (NEET-4) Trevor Cook Office of Science and Technology Innovation Office of Nuclear Energy U.S. Department of Energy Cyber Security for Nuclear Systems (the threat is real)
New Proposed Department of Energy Rules to Clarify and Update Part 810. By Shannon MacMichael and Michael Lieberman of Steptoe & Johnson, LLP 1
New Proposed Department of Energy Rules to Clarify and Update Part 810 I. Introduction By Shannon MacMichael and Michael Lieberman of Steptoe & Johnson, LLP 1 Since April 2010, when former U.S. Secretary
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
The Information Assurance Process: Charting a Path Towards Compliance
The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
Audit of NRC s Network Security Operations Center
Audit of NRC s Network Security Operations Center OIG-16-A-07 January 11, 2016 All publicly available OIG reports (including this report) are accessible through NRC s Web site at http://www.nrc.gov/reading-rm/doc-collections/insp-gen
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Executive Director for Operations AUDIT OF NRC S CYBER SECURITY INSPECTION PROGRAM FOR NUCLEAR POWER PLANTS (OIG-14-A-15)
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 OFFICE OF THE INSPECTOR GENERAL May 7, 2014 MEMORANDUM TO: Mark A. Satorius Executive Director for Operations FROM: Stephen D. Dingbaum
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
Nuclear Security Glossary
IAEA NUCLEAR SECURITY SERIES NO. Nuclear Security Glossary Revision 3E Draft 17 March 2010 Page 1 of 16 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME] Page 2 of 16 Introduction The Nuclear
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
Resilient and Secure Solutions for the Water/Wastewater Industry
Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Your slides here Copyright 2011
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
How To Strengthen Nuclear Security
COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Corporate Incident Response. Why You Can t Afford to Ignore It
Corporate Incident Response Why You Can t Afford to Ignore It Whether your company needs to comply with new legislation, defend against financial loss, protect its corporate reputation or a combination
Regulatory Guide 1.169 Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear Power Plants
Regulatory Guide 1.169Configuration Managemen... Page 1 of 10 September 1997 Regulatory Guide 1.169 Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear Power
FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS
IAEA NUCLEAR SECURITY SERIES NO. FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS Revision 17.04 Page 1 of 20 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME]
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
MODEL LAW ON MOTOR VEHICLE INSPECTION BY INDEPENDENT CONTRACTORS AND SELF INSPECTORS
MODEL LAW ON MOTOR VEHICLE INSPECTION BY INDEPENDENT CONTRACTORS AND SELF INSPECTORS Section 1. Definitions.-- As used in this act, the term: (1) "Contractor" means any person, corporation, or partnership
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
Operating Performance: Accident Management: Severe Accident Management Programs for Nuclear Reactors REGDOC-2.3.2
Operating Performance: Accident Management: Severe Accident Management Programs for Nuclear Reactors REGDOC-2.3.2 September 2013 Accident Management: Severe Accident Regulatory Document REGDOC-2.3.2 Canadian
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security
NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary - Organization responsible for the review of physical security
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
AP1000 European 18. Human Factors Engineering Design Control Document
18.2 Human Factors Engineering Program Management The purpose of this section is to describe the goals of the AP1000 human factors engineering program, the technical program to accomplish these goals,
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
