Cynthia Broadwell, Progress Energy. William Gross, Nuclear Energy Institute

Size: px
Start display at page:

Download "Cynthia Broadwell, Progress Energy. William Gross, Nuclear Energy Institute"

Transcription

1 Cyber Security Plan Overview Cynthia Broadwell, Progress Energy Nolan Heinrich, TVA William Gross, Nuclear Energy Institute

2 Introduction Cynthia Broadwell Progress Energy Progress Energy Fleet Cyber Security and SQA Program manger > 30- Years Nuclear Industry Experience Engineering, Technical Support, Nuclear Information Technology NEI Cyber Security Task Force Member (2010 Present) NITSL Executive Committee Cyber Security Sponsor ( ) NITSL Cyber Security Committee Chairman ( ) Member writing team: NEI Rev. 0 Rev. 6 NEI Rev. 0 NEI Rev. 0 NITSL SQA Policy and Guidance Documents Four nuclear sites / 5 units/ BWR & PWR Fortune 500 Service Area in the Carolinas & Florida 21,800 owned Mw of capacity 11,000 employees/ 3.1 Million customers

3 Digital Systems History in Nuclear Plants 1990s computer systems in a nuclear power plant were less susceptible to the random worms and virus most of those systems were completely isolated from any external connectivity Before 9/11 nuclear power plants were transitioning to modern operating systems Site personnel wanted connectivity to desktop Vendors wanted remote access

4 Cyber Security Evolution EA (B5b) (2002) Security Order to insure security connectivity for safety systems NEI 04-04, Cyber Security Program for Power Reactors (Accepted by NRC 12/2005) Cyber added to both RG 5.69 and 10 CFR 73.1 which described the types of cyberattacks and attackers (~2007) NEI Cyber Security Program Implemented and migrated to maintenance phase (May 2008) 4

5 Cyber Security Codified 10CFR73.54,Cyber Security Regulation (Effective May 26, 2009) Cyber Security Plan Submittals to the NRC as a license amendment (LAR) (November 2009) ~100 generic RAIs resolved (May 2010) All plants submitted revision of Cyber Security Plan based on NEI Rev. 6 (July 2010) 3 generic RAIs on the cyber security LAR; resubmittal (April 2011) Licensees expect the NRC will approve site/fleet license amendments by July 31, 2011

6 What is Cyber Security? Provides high assurance that digital computer and communication systems and networks associated with SSEP are adequately protected t from cyber attack up to and including DBT: 73.54(a)(1)(i) Safety and Important to Safety functions 73.54(a)(1)(ii) Security functions 73.54(a)(1)(iii) Emergency Preparedness functions including off-site communications 73.54(a)(1)(iv) Support Systems Cyber Security Plan, 73.54, is one of four Security Plans required by 10 CFR 73 Component of operating license 6

7 Why is Cyber Security important? Protects site Critical Systems and Critical Digital Assets from cyber attack Implements cyber security controls to mitigate internal and external threat vectors: Network/Internet (Direct connection) Wireless Access/Capability Portable Mass Media Supply Chain Direct Physical Access

8 What are our Commitments? 10 CFR 73.54, Protection of digital computer and communications i systems and networks The Rule The Cyber Security Plan, Appendix A Performance Requirements ( 73.54, 73.55, 73.56) Technical Security Controls designated to be implemented in Appendix A The Implementation Schedule Technical Security Controls designated to be implemented in the Implementation Schedule The two commitment dates: December 31, 2012 [mm/dd/yyyy] Full Compliance with the Rule

9 Implementation Schedule Template Establish Cyber Security Assessment Team * Identify Critical Systems and Critical Digital Assets * Install Unidirectional Network equipment * Implement portable media controls * Implement observation of obvious cyber related tampering * Perform assessment to identify, document, and implement cyber security controls * Commence ongoing monitoring and assessment of CDAs and Cyber Program * Full implementation of Cyber Security Plan (12/31/20##) * Actions to be completed by 12/31/2012 9

10 LEVEL 4 CDA FW/ IDS LEVEL 3 LEVEL 2 LEVEL 1 LEVEL 4 CDA Diode CDA Data Diode Diode LEVEL 4 FW FW CDA Diode LEVEL 3 Level 4 Isolated Network CDA CDA FW/ IDS Less Attack Vectors More Attack Vectors NEI Digital Protection Boundaries

11 Owner Controlled Area Outside Plant Boundary Unmanned Room Protected Area Vital Area OCA Room E Other Area Room G Vital Room A Protected LOCKED CABINET LOCKED ROOM Room C More Attack Vectors Vital Room B Protected t Room D Manned Room Locked Cabinet/Door OCA Room F LOCKED AND ALARMED CABINET/DOOR Other Area Room H ACCESS CONTROLLED BUILDING WITH ALARMED ROOM/CABINET Les s Attack Ve ectors Less Attack More Attack Vectors Vectors NEI Physical Protection Boundaries

12 Introduction Nolan Henrich General Manager, Computer Engineering Real Time Computer Systems SQA Program Management Cyber Security Program Management NITSL Executive Committee NITSL SQA Subcommittee NITSL Cyber Security Subcommittee TVA Three nuclear sites 6 nuclear units in service (3 BWR/3 PWR) Watts Bar 2 fuel load and startup in next 18 months

13 Key Take Aways Cyber Security is a way of doing business; it is not an event, it is a collection of processes It requires a significant change in the q g g way business is conducted

14 How does Cyber Security impact my organization? Engineering (Systems and Design) Information Technology Physical Security Operations Maintenance Emergency Preparedness Training i Work Management Procurement

15 Observations From WB2 CSAT team (6 permanent team members) CSAT supplemented by system engineer for the system under review Dedicated 3 days per week 3 Month effort Drew on information collected during NSIAC Cyber Security Initiative

16 Observations From WB2 (Continued) 50 Plant Systems 1400 digital devices 900 Critical Digital Devices (CDAs) 500 Digital Devices (DAs) Evaluated assets against approximately 1100 cyber controls

17 Next Steps Develop remediation plans and implementation schedules Integrate cyber security into existing plant processes, training, and procedures Develop implementing procedures (fleet- wide approach) PMs developed for ongoing cyber activities (approximately 75 controls must be performed on CDAs monthly)

18 Challenges Changing regulatory environment Integration of cyber security controls with plant processes and procedures Changing the Culture Project mentality (cyber security is an event) Resistance to change (trying to make my job harder) Resources

19 Introduction William Gross Project Manager, Security Cyber Security all activities NEI 08-09, NEI 10-04, NEI 10-09, NEI FERC Order 706-B Chair, NEI Cyber Security Task Force Member, NEI Security Working Group NEI Policy organization for nuclear industry Members b include all entities licensed to operate commercial nuclear power plants in the United States, nuclear plant designers, major architect/ engineering g firms, fuel fabrication facilities, nuclear materials licensees, etc.

20 Who is the CSTF? The NEI Cyber Security Task Force: Reports to the Security Working Group SGI workshop NNSC workshop Recommends cyber initiatives to be approved by SWG then to be carried out by the CSSC CSTF member is sponsor and lead participant i of CSTF initiative INPO representative Industry Fleet and Individual Licensee Directors, Managers, Designees Interface to government and regulatory agencies Sponsors annual Workshop

21 Who is the CSSC? The NITSL Cyber Security Standing Committee: Sponsored by NEI and INPO Has been in place since ~2006 All licensee companies represented Forms working team for CSTF initiatives Sponsors weekly meetings and annual workshop Attended d by NRC, DHS, FBI, others

22 CSTF and CSSC Initiatives NEI 04-04, Voluntary Cyber Security Initiative NEI 08-09, Cyber Security Plan Template NEI 10-04, Critical Systems (SSEP, BOP, EP) NEI 10-09, Addressing Security Controls NEI 10-08, Cyber Security Rule Evaluation Program SFAQ IT Functions for the Critical Group DG-5019 Reporting Cyber Events; Industry Response Team White paper: Crediting the Insider Mitigation Program Nuclear Responses to NERC Alerts/Advisories Brief NRC on initiatives Host DHS, FBI, others, to ensure awareness of cyber related issues

23 Questions

24 What are the key terms and definitions? i i Adversary Individual, group or organization that has adversely impacted or is attempting to adversely impact a CDA. (Cyber Security Plan) Critical System A system that is associated with safety-related functions; important-to-safety functions; security functions; emergency preparedness functions, including offsite communications; or support systems and equipment which, if compromised, would adversely impact safety, security, or emergency preparedness functions. (Cyber Security Plan)

25 What are the key terms and definitions? Critical Digital Asset A digital computer, communication system, or network that is 1) a component of a critical system (this includes assets that perform SSEP functions; provide support to, protect, or provide a pathway to Critical Systems); or 2) a support system asset whose failure or compromise as the result of a cyber attack would result in an adverse impact to a SSEP Function. (Cyber Security Plan) Critical Digital Asset The electronic systems, networks, or equipment that fall within the scope of 10 CFR (i.e., within the Level 3 or 4 boundaries described in Regulatory Guide 5.71). Such systems, networks, and equipment have the ability to compromise the facility s safety, security, or emergency response (SSEP) functions. DG

26 What are the key terms and definitions? Cyber Attack Any event in which there is reason to believe that an adversary has committed or caused, or attempted to commit or cause, or has made a credible threat to commit or cause malicious exploitation of a CDA. * Clarify definition and align with definition found acceptable by the NRC as documented in a USNRC letter from Richard P. Correia to Christopher E. Earls, Nuclear Energy Institute 08-09, Cyber Security Plan Template, Rev. 6, dated June 7, Cyber Attack (1 hour reportable) Any event in which there is reason to believe that a person has committed or caused, or attempted to cause, or has made a threat to commit or cause, an act to modify, destroy, or compromise any systems, networks, or equipment that falls within the scope of of this part. As established by 10 CFR 73 Appendix G Paragraph I (h) 26

27 What are the key terms and definitions? Threat Any circumstance or event with the potential to adversely impact SSEP functions through a CDA via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. (derived from NIST ) Threat Vector Pathways that can be exploited through malicious activity to penetrate security perimeters or network devices to adversely impact a CDA s SSEP functions (derived from Twenty Critical Controls for Effective Cyber Defense: Consensus Audit Version 2.3: November 13, 2009) 27

28 What are the key terms and definitions? Threat Vectors The means an adversary must have at his disposal to compromise a CDA. This list could be collapsed into two items, physical access and logical access. (NEI 10-09) 09) Direct Network Connectivity Wireless Access Capability Portable Media and Equipment Supply Chain Direct Physical Access 28

29 Break 3 3:30 p.m.

NRC Cyber Security Regulatory

NRC Cyber Security Regulatory Ask SME and Learn NRC Cyber Security Regulatory Program Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda

More information

U.S. NUCLEAR REGULATORY COMMISSION January 2010 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH. REGULATORY GUIDE 5.71 (New Regulatory Guide)

U.S. NUCLEAR REGULATORY COMMISSION January 2010 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH. REGULATORY GUIDE 5.71 (New Regulatory Guide) U.S. NUCLEAR REGULATORY COMMISSION January 2010 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH REGULATORY GUIDE 5.71 (New Regulatory Guide) CYBER SECURITY PROGRAMS FOR NUCLEAR FACILITIES A INTRODUCTION

More information

A Regulatory Approach to Cyber Security

A Regulatory Approach to Cyber Security A Regulatory Approach to Cyber Security Perry Pederson Security Specialist (Cyber) Office of Nuclear Security and Incident Response U.S. Nuclear Regulatory Commission 1 Agenda Overview Regulatory Framework

More information

NUCLEAR REGULATORY COMMISSION. 10 CFR Part 73 [NRC-2014-0036] RIN 3150-AJ37. Cyber Security Event Notifications

NUCLEAR REGULATORY COMMISSION. 10 CFR Part 73 [NRC-2014-0036] RIN 3150-AJ37. Cyber Security Event Notifications This document is scheduled to be published in the Federal Register on 11/02/2015 and available online at http://federalregister.gov/a/2015-27855, and on FDsys.gov [7590-01-P] NUCLEAR REGULATORY COMMISSION

More information

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 ATC Nuclear ATC-N serves the commercial nuclear utilities in the US and many foreign

More information

NRC Cyber Security Policy &

NRC Cyber Security Policy & Ask SME and Learn NRC Cyber Security Policy & Guidance Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda

More information

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001. March 3, 2011

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001. March 3, 2011 UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 March 3, 2011 Mr. Timothy S. Rausch Senior Vice President and Chief Nuclear Officer PPL Susquehanna, LLC 769 Salem Boulevard Berwick,

More information

Cyber Security R&D (NE-1) and (NEET-4)

Cyber Security R&D (NE-1) and (NEET-4) Cyber Security R&D (NE-1) and (NEET-4) Trevor Cook Office of Science and Technology Innovation Office of Nuclear Energy U.S. Department of Energy Cyber Security for Nuclear Systems (the threat is real)

More information

NEI 08-09 [Rev. 6] Cyber Security Plan for Nuclear Power Reactors

NEI 08-09 [Rev. 6] Cyber Security Plan for Nuclear Power Reactors NEI 08-09 [Rev. 6] Cyber Security Plan for Nuclear Power Reactors [THIS PAGE IS LEFT BLANK INTENTIONALLY] NEI 08-09 [Rev. 6] Nuclear Energy Institute Cyber Security Plan for Nuclear Power Reactors Nuclear

More information

Options for Cyber Security. Reactors. April 9, 2015

Options for Cyber Security. Reactors. April 9, 2015 Options for Cyber Security Design Requirements for Power Reactors April 9, 2015 Scope Discuss options for including cyber security design requirements for power reactors into NRC regulations Scope does

More information

Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants

Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, and Dong-Young Lee I&C and HF Research Division, Korea Atomic Energy

More information

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one

More information

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Sooill Lee a*, Yong Sik Kim a, Song Hae Ye a a Central Research Institute, Korea Hydro and

More information

Spreading the Word on Nuclear Cyber Security

Spreading the Word on Nuclear Cyber Security Spreading the Word on Nuclear Cyber Security Clifford Glantz, Guy Landine, Philip Craig, and Robert Bass Pacific Northwest National Laboratory (PNNL) PO Box 999; 902 Battelle Blvd Richland, WA 99352 USA

More information

The U.S. Nuclear Regulatory Commission s Cyber Security Regulatory Framework for Nuclear Power Reactors

The U.S. Nuclear Regulatory Commission s Cyber Security Regulatory Framework for Nuclear Power Reactors NUREG/CR-7141 The U.S. Nuclear Regulatory Commission s Cyber Security Regulatory Framework for Nuclear Power Reactors Office of Nuclear Security and Incident Response AVAILABILITY OF REFERENCE MATERIALS

More information

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001. November 13, 2012

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001. November 13, 2012 UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 November 13, 2012 Vice President, Operations Entergy Nuclear Operations, Inc. Vermont Yankee Nuclear Power Station P.O. Box 250 Governor

More information

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Deanna Zhang U.S. Nuclear Regulatory Commission Document Date: 05/21/2010 Objectives To provide methods for utilizing safety features,

More information

Ask SME and Learn. NRC Cyber Security Oversight. Cyber Security Directorate

Ask SME and Learn. NRC Cyber Security Oversight. Cyber Security Directorate Ask SME and Learn NRC Cyber Security Oversight Program Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda Cyber Security

More information

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS http://dx.doi.org/10.5516/net.04.2011.065 A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG, JUNG-WOON LEE *, CHEOL-KWON LEE, KEE-CHOON KWON, and DONG-YOUNG

More information

A Cost-Efficient Approach to High Cyber Security Assurance in Nuclear Power Plants

A Cost-Efficient Approach to High Cyber Security Assurance in Nuclear Power Plants A Cost-Efficient Approach to High Cyber Security Assurance in Nuclear Power Plants The RIPE Framework as an Alternative to Regulatory Guide 5.71 and NEI 08-09 Perry Pederson April 2014 The Langner Group

More information

NEI 10-04 [Revision 2] Identifying Systems and Assets Subject to the Cyber Security Rule

NEI 10-04 [Revision 2] Identifying Systems and Assets Subject to the Cyber Security Rule NEI 10-04 [Revision 2] Identifying Systems and Assets Subject to the Cyber Security Rule [THIS PAGE IS LEFT BLANK INTENTIONALLY] NEI 10-04 [Revision 2] Nuclear Energy Institute Identifying Systems and

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations

Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations What Changes Are We Facing? Cyber Security Regulation and Threats Changing IT Landscape and Expectations

More information

Standard CIP 007 3a Cyber Security Systems Security Management

Standard CIP 007 3a Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for

More information

REGULATORY GUIDE 5.29 (Draft was issued as DG 5028, dated May 2012) SPECIAL NUCLEAR MATERIAL CONTROL AND ACCOUNTING SYSTEMS FOR NUCLEAR POWER PLANTS

REGULATORY GUIDE 5.29 (Draft was issued as DG 5028, dated May 2012) SPECIAL NUCLEAR MATERIAL CONTROL AND ACCOUNTING SYSTEMS FOR NUCLEAR POWER PLANTS U.S. NUCLEAR REGULATORY COMMISSION June 2013 Revision 2 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH REGULATORY GUIDE 5.29 (Draft was issued as DG 5028, dated May 2012) SPECIAL NUCLEAR MATERIAL

More information

Protecting Organizations from Cyber Attack

Protecting Organizations from Cyber Attack Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

October 29, 2014 - Washington, DC. Copyr i g h t 2014-1 5 O S Is o f t, LLC. 1

October 29, 2014 - Washington, DC. Copyr i g h t 2014-1 5 O S Is o f t, LLC. 1 October 29, 2014 - Washington, DC 1 Shared Situational Awareness for US Nuclear Emergency Planning, Preparedness and Response (EP) Presented by Chris Crosby US Federal -- Global Nuclear and Renewable Energy

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS. Kwangjo Kim

CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS. Kwangjo Kim PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea Khalifa University of Science, Technology and Research, Abu Dhabi, UAE [email protected], [email protected]

More information

DRAFT REGULATORY GUIDE

DRAFT REGULATORY GUIDE U.S. NUCLEAR REGULATORY COMMISSION August 2012 OFFICE OF NUCLEAR REGULATORY RESEARCH Division 1 DRAFT REGULATORY GUIDE Contact: K. Sturzebecher (301) 251-7494 DRAFT REGULATORY GUIDE DG-1206 (Proposed Revision

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

Regulatory Guide 1.169 Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear Power Plants

Regulatory Guide 1.169 Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear Power Plants Regulatory Guide 1.169Configuration Managemen... Page 1 of 10 September 1997 Regulatory Guide 1.169 Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear Power

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

The Anatomy of an Effective Cyber Security Solution: Regulatory Guidelines and the Technology Required for Compliance

The Anatomy of an Effective Cyber Security Solution: Regulatory Guidelines and the Technology Required for Compliance The Anatomy of an Effective Cyber Security Solution: Regulatory Guidelines and the Technology Required for Compliance A Bentley White Paper Hilmar Retief, Product Manager AssetWise July 2011 www.bentley.com

More information

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary - Organization responsible for the review of physical security

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

NUCLEAR REGULATORY COMMISSION [EA-14-193; NRC-2015-0289] In the Matter of Northern States Power Company, Minnesota

NUCLEAR REGULATORY COMMISSION [EA-14-193; NRC-2015-0289] In the Matter of Northern States Power Company, Minnesota This document is scheduled to be published in the Federal Register on 01/11/2016 and available online at http://federalregister.gov/a/2016-00322, and on FDsys.gov [7590-01-P] NUCLEAR REGULATORY COMMISSION

More information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe 2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

More information

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Announcement of a new IAEA Co-ordinated Research Programme (CRP) Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)

More information

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department

More information

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table

More information

NRC REGULATORY ISSUE SUMMARY 2006-11, REQUESTING QUALITY ASSURANCE PROGRAM APPROVAL RENEWALS ONLINE BY ELECTRONIC INFORMATION EXCHANGE

NRC REGULATORY ISSUE SUMMARY 2006-11, REQUESTING QUALITY ASSURANCE PROGRAM APPROVAL RENEWALS ONLINE BY ELECTRONIC INFORMATION EXCHANGE UNITED STATES NUCLEAR REGULATORY COMMISSION OFFICE OF NUCLEAR MATERIAL SAFETY AND SAFEGUARDS WASHINGTON, DC 20555 July 20, 2006 NRC REGULATORY ISSUE SUMMARY 2006-11, REQUESTING QUALITY ASSURANCE PROGRAM

More information

UF IT Risk Assessment Standard

UF IT Risk Assessment Standard UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on

More information

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions

More information

AURORA Vulnerability Background

AURORA Vulnerability Background AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History

More information

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook Introduction Per UCSC's HIPAA Security Rule Compliance Policy 1, all UCSC entities subject to the HIPAA Security Rule ( HIPAA entities ) must implement the UCSC Practices for HIPAA Security Rule Compliance

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration

More information

Security Risk Management For Health IT Systems and Networks

Security Risk Management For Health IT Systems and Networks Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Setting the stage. NATIONAL INSTITUTE OF STANDARDS AND

More information

Top 10 Compliance Issues for Implementing Security Programs

Top 10 Compliance Issues for Implementing Security Programs www.dyonyx.com Top 10 Compliance Issues for Implementing Security Programs This White Paper articulates the top ten issues that we have encountered in the design and implementation of comprehensive Security

More information

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES JAEKWAN PARK * and YONGSUK SUH Korea Atomic Energy Research Institute

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes HIPAA Security Rule requirements that should be implemented by covered entities and business associates. The citations are to 45 CFR 164.300

More information

Standard CIP 007 3 Cyber Security Systems Security Management

Standard CIP 007 3 Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing

More information

Audit Report. Management of Naval Reactors' Cyber Security Program

Audit Report. Management of Naval Reactors' Cyber Security Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

Regulatory Guide 1.168 Verification, Validation, Reviews, And Audits For Digital Computer Software Used in Safety Systems of Nuclear Power Plants

Regulatory Guide 1.168 Verification, Validation, Reviews, And Audits For Digital Computer Software Used in Safety Systems of Nuclear Power Plants Regulatory Guide 1.168 Page 1 of 10 September 1997 Regulatory Guide 1.168 Verification, Validation, Reviews, And Audits For Digital Computer Software Used in Safety Systems of Nuclear Power Plants Publication

More information

OVERVIEW OF THE OPERATING REACTORS BUSINESS LINE. July 7, 2016 Michael Johnson Deputy Executive Director for Reactor and Preparedness Programs

OVERVIEW OF THE OPERATING REACTORS BUSINESS LINE. July 7, 2016 Michael Johnson Deputy Executive Director for Reactor and Preparedness Programs OVERVIEW OF THE OPERATING REACTORS BUSINESS LINE July 7, 2016 Michael Johnson Deputy Executive Director for Reactor and Preparedness Programs Program Overview Bill Dean Director Office of Nuclear Reactor

More information

Proposal to Consolidate Post-Fukushima Rulemaking Activities

Proposal to Consolidate Post-Fukushima Rulemaking Activities Proposal to Consolidate Post-Fukushima Rulemaking Activities On January 28, 2014, the U.S. Nuclear Regulatory Commission s (NRC s) Fukushima Steering Committee endorsed an NRC staff proposal for integrating

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

NORTH CAROLINA EASTERN MUNICIPAL POWER AGENCY SHEARON HARRIS NUCLEAR POWER PLANT, UNIT 1. Renewed License No. NPF-63

NORTH CAROLINA EASTERN MUNICIPAL POWER AGENCY SHEARON HARRIS NUCLEAR POWER PLANT, UNIT 1. Renewed License No. NPF-63 CAROLINA POWER & LIGHT COMPANY NORTH CAROLINA EASTERN MUNICIPAL POWER AGENCY DOCKET NO. 50-400 SHEARON HARRIS NUCLEAR POWER PLANT, UNIT 1 RENEWED FACILITY OPERATING LICENSE 1. The Nuclear Regulatory Commission

More information

G-Cloud Definition of Services Security Penetration Testing

G-Cloud Definition of Services Security Penetration Testing G-Cloud Definition of Services Security Penetration Testing Commercial in Confidence G-Cloud Services An Overview Inner Security is a leading CREST registered information security services provider. We

More information

Resilient and Secure Solutions for the Water/Wastewater Industry

Resilient and Secure Solutions for the Water/Wastewater Industry Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Your slides here Copyright 2011

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective

Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective Terry Jamieson Vice-President Technical Support Branch Canadian Nuclear Safety Commission August 11, 2015 www.nuclearsafety.gc.ca

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Security Requirements for Spent Fuel Storage Systems 9264

Security Requirements for Spent Fuel Storage Systems 9264 Security Requirements for Spent Fuel Storage Systems 9264 P. G. Brochman, S. R. Helton, E. A. Thompson US Nuclear Regulatory Commission 11555 Rockville Pike, M/S: T4-F25M, Rockville, MD 20852-2738 ABSTRACT

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is

More information

Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected]

Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected] Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a

More information

Building Insecurity Lisa Kaiser

Building Insecurity Lisa Kaiser Building Insecurity Lisa Kaiser Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Insecurity How do I Specify it Buy it Test it Deploy it Regret it Apologize for it Specifying Insecurity

More information

ARE VA AREVA INC. August 31, 2015 NRC:15:035. U.S. Nuclear Regulatory Commission Document Control Desk 11555 Rockville Pike Rockville, MD 20852

ARE VA AREVA INC. August 31, 2015 NRC:15:035. U.S. Nuclear Regulatory Commission Document Control Desk 11555 Rockville Pike Rockville, MD 20852 A ARE VA August 31, 2015 NRC:15:035 U.S. Nuclear Regulatory Commission Document Control Desk 11555 Rockville Pike Rockville, MD 20852 Request for Review and Approval of ANP-10337P, "PWR Fuel Assembly Structural

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure

More information

Energy Cybersecurity Regulatory Brief

Energy Cybersecurity Regulatory Brief Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider

More information

Cyber Security in a Nuclear Context

Cyber Security in a Nuclear Context Cyber Security in a Nuclear Context Mitchell Hewes & Nick Howarth UNCLASSIFIED Who are we? Our Facilities Synchrotron Accelerators Cyclotron OPAL Lucas Heights Campus Some Considerations We have an interesting

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

CONCEPTS IN CYBER SECURITY

CONCEPTS IN CYBER SECURITY CONCEPTS IN CYBER SECURITY GARY KNEELAND, CISSP SENIOR CONSULTANT CRITICAL INFRASTRUCTURE & SECURITY PRACTICE 1 OBJECTIVES FRAMEWORK FOR CYBERSECURITY CYBERSECURITY FUNCTIONS CYBERSECURITY CONTROLS COMPARATIVE

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9 Security Incidents Page: 1 of 9 I. Purpose, Reference, and Responsibility A. Purpose The purpose of this policy is to define a security incident and to provide the procedures for notification, investigation,

More information