Letter Sequence Request |
---|
|
|
MONTHYEARLIC-10-0055, License Amendment Request, Request for Approval of the Fcs/Oppd Cyber Security Plan2010-07-26026 July 2010 License Amendment Request, Request for Approval of the Fcs/Oppd Cyber Security Plan Project stage: Request ML1023006762010-08-18018 August 2010 Acceptance Review Email, License Amendment Request to Revise License Condition and Approve Cyber Security Plan Project stage: Acceptance Review ML1105507722011-02-24024 February 2011 Draft Generic Request for Additional Information, License Amendment Request to Revise License Condition and Approve Cyber Security Plan Project stage: Draft RAI ML1105507692011-02-24024 February 2011 E-mail, Draft Generic Request for Additional Information, License Amendment Request to Revise License Condition and Approve Cyber Security Plan Project stage: Draft RAI ML1106007592011-03-0202 March 2011 Generic Request for Additional Information, License Amendment Request to Revise License Condition and Approve Cyber Security Plan Project stage: RAI LIC-11-0033, Response to NRC Generic Request for Additional Information (RAI)2011-03-31031 March 2011 Response to NRC Generic Request for Additional Information (RAI) Project stage: Request LIC-11-0036, (Fcs), Unit No.1, FCS / OPPD Cyber Security Plan, License Amendment Request (Revised)2011-04-0808 April 2011 (Fcs), Unit No.1, FCS / OPPD Cyber Security Plan, License Amendment Request (Revised) Project stage: Request ML1118010942011-07-27027 July 2011 Issuance of Amendment No. 266, Revise License Condition and Approve Cyber Security Plan and Associated Implementation Schedule Project stage: Approval LIC-16-0043, Certification of Permanent Cessation of Power Operations2016-06-24024 June 2016 Certification of Permanent Cessation of Power Operations Project stage: Request LIC-17-0016, License Amendment Request 17-02; Request Extension for Milestone 8 of Cyber Security Plan Implementation Schedule2017-03-24024 March 2017 License Amendment Request 17-02; Request Extension for Milestone 8 of Cyber Security Plan Implementation Schedule Project stage: Request 2011-03-31
[Table View] |
|
---|
Category:Letter type:LIC
MONTHYEARLIC-23-0007, Response to Fort Calhoun, Unit 1 & Independent Spent Fuel Storage Installation Review of License Amendment Request to Add License Condition to Include License Termination Plan Requirements Request for Additional Information2023-12-0606 December 2023 Response to Fort Calhoun, Unit 1 & Independent Spent Fuel Storage Installation Review of License Amendment Request to Add License Condition to Include License Termination Plan Requirements Request for Additional Information LIC-23-0005, Response to Fort Calhoun Station, Unit No. 1 - Review of License Amendment Request to Add License Condition to Include License Termination Plan Requirements - 2nd Request for Additional Information (EPID L-2021-LIT-0000) June 2, 20232023-08-24024 August 2023 Response to Fort Calhoun Station, Unit No. 1 - Review of License Amendment Request to Add License Condition to Include License Termination Plan Requirements - 2nd Request for Additional Information (EPID L-2021-LIT-0000) June 2, 2023 LIC-23-0004, (FCS) Radiological Effluent Release Report and Radiological Environmental Operating Report2023-04-20020 April 2023 (FCS) Radiological Effluent Release Report and Radiological Environmental Operating Report LIC-23-0003, Annual Decommissioning Funding / Irradiated Fuel Management Status Report2023-03-15015 March 2023 Annual Decommissioning Funding / Irradiated Fuel Management Status Report LIC-23-0001, Response to Fort Calhoun Station, Unit No. 1 - Review of License Amendment Request to Add License Condition to Include License Termination Plan Requirements - Request for Additional Information2023-02-27027 February 2023 Response to Fort Calhoun Station, Unit No. 1 - Review of License Amendment Request to Add License Condition to Include License Termination Plan Requirements - Request for Additional Information LIC-23-0002, Independent Spent Fuel Storage Installation, Annual Radioactive Effluent Release Report2023-02-20020 February 2023 Independent Spent Fuel Storage Installation, Annual Radioactive Effluent Release Report LIC-22-0010, Response to Fort Calhoun Station, Unit No. 1 - Review of License Termination Plan Requirements - Request for Additional Information2022-06-15015 June 2022 Response to Fort Calhoun Station, Unit No. 1 - Review of License Termination Plan Requirements - Request for Additional Information LIC-22-0005, (FCS) Radiological Effluent Release Report and Radiological Environmental Operating Report2022-04-20020 April 2022 (FCS) Radiological Effluent Release Report and Radiological Environmental Operating Report LIC-22-0009, Annual Decommissioning Funding / Irradiated Fuel Management Status Report2022-03-30030 March 2022 Annual Decommissioning Funding / Irradiated Fuel Management Status Report LIC-22-0006, Reactor Head Disposition Project Overview2022-03-17017 March 2022 Reactor Head Disposition Project Overview LIC-22-0004, Independent Spent Fuel Storage Installation, Annual Radioactive Effluent Release Report2022-02-17017 February 2022 Independent Spent Fuel Storage Installation, Annual Radioactive Effluent Release Report LIC-21-0008, Organizational and Management Change2021-10-28028 October 2021 Organizational and Management Change LIC-21-0007, ISFSI Only Emergency Plan Update2021-09-0808 September 2021 ISFSI Only Emergency Plan Update LIC-21-0004, Radiological Effluent Release Report and Radiological Environmental Operating Report2021-04-29029 April 2021 Radiological Effluent Release Report and Radiological Environmental Operating Report LIC-21-0003, Independent Spent Fuel Storage Installation - 2021 Annual Decommissioning Funding / Irradiated Fuel Management Status Report2021-03-30030 March 2021 Independent Spent Fuel Storage Installation - 2021 Annual Decommissioning Funding / Irradiated Fuel Management Status Report LIC-21-0002, Independent Spent Fuel Storage Installation Annual Radioactive Effluent Release Report2021-02-22022 February 2021 Independent Spent Fuel Storage Installation Annual Radioactive Effluent Release Report LIC-20-0015, Correction to Independent Spent Fuel Storage Installation Annual Radioactive Effluent Release Report 2019 (ML20121A092)2020-07-29029 July 2020 Correction to Independent Spent Fuel Storage Installation Annual Radioactive Effluent Release Report 2019 (ML20121A092) LIC-20-0014, Submittal of Revision 8 to the Fort Calhoun Station (Fcs), Physical Security Plan (PSP)2020-07-15015 July 2020 Submittal of Revision 8 to the Fort Calhoun Station (Fcs), Physical Security Plan (PSP) LIC-20-0012, Independent Spent Fuel Storage Installation (ISFSI) Cask Registration and Certification of Permanent Removal of All Spent Fuel Assemblies from the Spent Fuel Pool2020-05-18018 May 2020 Independent Spent Fuel Storage Installation (ISFSI) Cask Registration and Certification of Permanent Removal of All Spent Fuel Assemblies from the Spent Fuel Pool LIC-20-0011, Independent Spent Fuel Storage Installation (ISFSI) Cask Registration2020-05-0707 May 2020 Independent Spent Fuel Storage Installation (ISFSI) Cask Registration LIC-20-0009, (FCS) Radiological Effluent Release Report and Radiological Environmental Operating Report2020-04-30030 April 2020 (FCS) Radiological Effluent Release Report and Radiological Environmental Operating Report LIC-20-0008, Independent Spent Fuel Storage Installation (ISFSI) Cask Registration2020-04-13013 April 2020 Independent Spent Fuel Storage Installation (ISFSI) Cask Registration LIC-20-0006, (Fcs), Unit 1, Request for Exemption from 10 CFR 20, Appendix G, Section Iii.E2020-03-26026 March 2020 (Fcs), Unit 1, Request for Exemption from 10 CFR 20, Appendix G, Section Iii.E LIC-20-0004, Independent Spent Fuel Storage Installation (ISFSI) Cask Registration2020-03-10010 March 2020 Independent Spent Fuel Storage Installation (ISFSI) Cask Registration LIC-20-0003, Independent Spent Fuel Storage Installation Annual Radioactive Effluent Release Report2020-02-27027 February 2020 Independent Spent Fuel Storage Installation Annual Radioactive Effluent Release Report LIC-20-0002, Independent Spent Fuel Storage Installation - Submittal of Revision 7 to Physical Security Plan2020-02-27027 February 2020 Independent Spent Fuel Storage Installation - Submittal of Revision 7 to Physical Security Plan LIC-20-0001, Independent Spent Fuel Storage Installation (ISFSI) Cask Registration2020-02-0606 February 2020 Independent Spent Fuel Storage Installation (ISFSI) Cask Registration LIC-19-0025, Independent Spent Fuel Storage Installation (ISFSI) Cask Registration2019-12-19019 December 2019 Independent Spent Fuel Storage Installation (ISFSI) Cask Registration LIC-19-0007, Post-Shutdown Decommissioning Activities Report2019-12-16016 December 2019 Post-Shutdown Decommissioning Activities Report LIC-19-0021, Independent Spent Fuel Storage Installation - Response to Request for Additional Information License Amendment for ISFSI-only EP and EAL Scheme2019-11-20020 November 2019 Independent Spent Fuel Storage Installation - Response to Request for Additional Information License Amendment for ISFSI-only EP and EAL Scheme LIC-19-0022, Independent Spent Fuel Storage Installation (ISFSI) Cask Registration2019-11-18018 November 2019 Independent Spent Fuel Storage Installation (ISFSI) Cask Registration LIC-19-0018, Submittal of Revision 6 to the Fort Calhoun Station (Fcs), Physical Security Plan (PSP)2019-11-14014 November 2019 Submittal of Revision 6 to the Fort Calhoun Station (Fcs), Physical Security Plan (PSP) LIC-19-0020, Independent Spent Fuel Storage Installation - Updated Information Submittal and Revision 1 of the Blast Analysis2019-10-17017 October 2019 Independent Spent Fuel Storage Installation - Updated Information Submittal and Revision 1 of the Blast Analysis LIC-19-0017, Clarification to Revised Response to Orders for Interim Safeguards and Security Compensatory Measures and Implementation of Additional Security Measures Associated with Access Authorization for Fort Calhoun Station Dated 9 November, 20042019-08-0808 August 2019 Clarification to Revised Response to Orders for Interim Safeguards and Security Compensatory Measures and Implementation of Additional Security Measures Associated with Access Authorization for Fort Calhoun Station Dated 9 November, 2004 An LIC-19-0010, License Amendment Request (LAR) 19-03; Revised Fort Calhoun Station License in Support of the Revised Response to Orders for Interim Safeguards and Security Compensatory Measures and Implementation of Additional Security Measures Associa2019-05-20020 May 2019 License Amendment Request (LAR) 19-03; Revised Fort Calhoun Station License in Support of the Revised Response to Orders for Interim Safeguards and Security Compensatory Measures and Implementation of Additional Security Measures Associated LIC-19-0008, Submittal of 2018 Annual Report2019-04-0404 April 2019 Submittal of 2018 Annual Report LIC-19-0004, Independent Spent Fuel Storage Installation - Submittal of Revision 4 to Physical Security Plan (PSP)2019-03-28028 March 2019 Independent Spent Fuel Storage Installation - Submittal of Revision 4 to Physical Security Plan (PSP) LIC-19-0005, 2019 Annual Decommissioning Funding I Irradiated Fuel Management Status Report2019-03-28028 March 2019 2019 Annual Decommissioning Funding I Irradiated Fuel Management Status Report LIC-19-0001, License Amendment Request (LAR) 19-01: Independent Spent Fuel Storage Installation (ISFSI) Emergency Plan and Emergency Action Level Scheme2019-02-28028 February 2019 License Amendment Request (LAR) 19-01: Independent Spent Fuel Storage Installation (ISFSI) Emergency Plan and Emergency Action Level Scheme LIC-19-0003, Revised Response to Orders for Interim Safeguards and Security Compensatory Measures and Implementation of Additional Security Measures Associated with Access Authorization for Fort Calhoun Station Dated 9 November, 2004 and Relaxation R2019-02-28028 February 2019 Revised Response to Orders for Interim Safeguards and Security Compensatory Measures and Implementation of Additional Security Measures Associated with Access Authorization for Fort Calhoun Station Dated 9 November, 2004 and Relaxation Requ LIC-19-0002, Independent Spent Fuel Storage Installation Annual Radioactive Effluent Release Report2019-01-0303 January 2019 Independent Spent Fuel Storage Installation Annual Radioactive Effluent Release Report LIC-18-0031, Independent Spent Fuel Storage Installation - Transmittal of Emergency Plan Update2018-12-17017 December 2018 Independent Spent Fuel Storage Installation - Transmittal of Emergency Plan Update LIC-18-0030, Request for Partial Site Release Phase 22018-11-12012 November 2018 Request for Partial Site Release Phase 2 LIC-18-0028, Letter of Intent to Submit Request for Additional Partial Site Release2018-10-18018 October 2018 Letter of Intent to Submit Request for Additional Partial Site Release LIC-18-0027, Submittal of Foreign Ownership, Control or Influence Five-Year Renewal Filing and NRC Facility Clearance Update2018-10-0303 October 2018 Submittal of Foreign Ownership, Control or Influence Five-Year Renewal Filing and NRC Facility Clearance Update LIC-18-0003, License Amendment Request (LAR) 18-01; Revised Fort Calhoun Station Permanently Defueled Technical Specifications to Align to Those Requirements for Permanent Removal of Spent Fuel from Spent Fuel Pool2018-09-28028 September 2018 License Amendment Request (LAR) 18-01; Revised Fort Calhoun Station Permanently Defueled Technical Specifications to Align to Those Requirements for Permanent Removal of Spent Fuel from Spent Fuel Pool LIC-18-0025, Guarantee of Payment of Deferred Premiums for the Period of July 1, 2018 to June 30, 20192018-07-19019 July 2018 Guarantee of Payment of Deferred Premiums for the Period of July 1, 2018 to June 30, 2019 LIC-18-0023, Fort Calhoun Station, Unit 1 Request for Partial Site Release2018-06-29029 June 2018 Fort Calhoun Station, Unit 1 Request for Partial Site Release LIC-18-0021, Transmittal of Revision 3 to the Physical Security Plan (PSP) and Revision 4 to the FCS Protective Strategy (Safeguards Contingency Plan)2018-06-0606 June 2018 Transmittal of Revision 3 to the Physical Security Plan (PSP) and Revision 4 to the FCS Protective Strategy (Safeguards Contingency Plan) LIC-18-0017, Submittal of Revision 2 to the Fort Calhoun Station (Fcs), Physical Security Plan (PSP) and Revision 3 of the FCS Protective Strategy2018-04-26026 April 2018 Submittal of Revision 2 to the Fort Calhoun Station (Fcs), Physical Security Plan (PSP) and Revision 3 of the FCS Protective Strategy 2023-08-24
[Table view] Category:Request for Additional Information (RAI)
MONTHYEARML23151A0042023-06-0606 June 2023 Second Set RAIs Rev 4 ML22357A0672022-12-30030 December 2022 Enclosure RAI Re Approval of License Termination Plan ML22119A2472022-05-0303 May 2022 Review of Amendment Request to Add a LC to Include LTP Requirements, RAI for Environmental Review ML20111A2162020-05-20020 May 2020 Revised PSDAR Request for Additional Information - RAI ML19241A1812019-08-21021 August 2019 Request for Additional Information on Proposed Changes to the FCS Emergency Plan and Emergency Action Level Scheme to Reflect an ISFSI-only Status ML18067A1432018-03-0808 March 2018 Enclosurequest for Additional Information (Letter to M. J. Fisher Request for Additional Information Regarding Omaha Public Power District'S Decommissioning Funding Plan Update for Fort Calhoun Station ISFSI) ML17236A3442017-08-24024 August 2017 NRR E-mail Capture - Final RAI for Fort Calhoun Exemption from 10 CFR 140.11(a)(4), Off-site Primary and Secondary Liability Insurance (MF9664) ML17236A3462017-08-24024 August 2017 NRR E-mail Capture - Final RAI for Fort Calhoun LAR Regarding Permanently Defueled TS (MF9567) ML17234A4692017-08-22022 August 2017 NRR E-mail Capture - Final RAI for Fort Calhoun LAR Regarding Removal of Dry Cask Loading Limits (MF9831) ML17194A9732017-07-13013 July 2017 NRR E-mail Capture - Final RAI for Fort Calhoun Ultimate Strength Design for Aux. Bldg LAR (MF8525) ML17112A0362017-04-20020 April 2017 NRR E-mail Capture - Fort Calhoun Station - Final RAI Regarding Permanently Defueled EP and EAL Scheme Change LAR ML17090A3942017-03-31031 March 2017 NRR E-mail Capture - Fort Calhoun - Final RAI Regarding Administrative Control TS Change LAR (MF8437) ML17082A0022017-03-22022 March 2017 NRR E-mail Capture - Fort Calhoun Station - Final Nsir/Dpr RAI Regarding Proposed Emergency Planning Exemption ML17081A0192017-03-21021 March 2017 NRR E-mail Capture - Fort Calhoun Station - Final RAI Regarding Proposed Emergency Planning Exemption ML17067A3862017-03-15015 March 2017 Request for Additional Information, Request for Approval of Certified Fuel Handler Training and Retraining Program to Facilitate Activities Associated with Decommissioning and Irradiated Fuel Handling Management ML17033A9692017-02-0202 February 2017 NRR E-mail Capture - Fort Calhoun Station - Final Request for Additional Information Concerning Post-Shutdown Eplan Amendment ML16263A0492016-09-20020 September 2016 Request for Additional Information, Request for Approval of Certified Fuel Handler Training and Retraining Program to Facilitate Activities Associated with Decommissioning and Irradiated Fuel Handling Management ML16174A1502016-06-27027 June 2016 Request for Additional Information, Relief Request, Use of Code Case N-513-4, Evaluation Criteria for Temporary Acceptance of Flaws in Moderate Energy Class 2 or 3 Piping Section XI, Division 1 ML16146A1782016-05-27027 May 2016 Request for Additional Information, Round 2, Request to Revise Current Licensing Basis as Described in the Final Safety Analysis Report to Allow Equipment Classification Methodology from ANSI/ANS-58.14-2011 ML16106A0232016-04-29029 April 2016 Request for Additional Information, Generic Letter 2004-02, Potential Impact of Debris Blockage on Emergency Recirculation During Design Basis Accidents at Pressurized-Water Reactors ML16104A2872016-04-25025 April 2016 Request for Additional Information, License Amendment Request to Revise Current Licensing Basis to Use American Concrete Institute (Aci) Ultimate Strength Requirements ML16048A1542016-02-23023 February 2016 Request for Additional Information, License Amendment Request, Revise Current Licensing Basis as Described in the Final Safety Analysis Report to Allow Equipment Classification Methodology from ANSI/ANS-58.14-2011 ML16048A0242016-02-23023 February 2016 Request for Additional Information, License Amendment Request to Adopt Technical Specification Task Force (TSTF)-501, Revision 1, Relocate Stored Fuel Oil and Lube Oil Volume Values to Licensee Control ML15343A1082015-12-15015 December 2015 Request for Additional Information, License Amendment Request to Make Administrative Changes to the Technical Specifications to Update Titles, Delete Obsolete Actions in Appendix B, and Relocate a Definition ML15323A0362015-11-24024 November 2015 Request for Additional Information, Relief Requests P-1 - LPSI and CS Pumps and P-2 - Adjusting Hydraulic Parameters Consistent W/Code Case OMN-21, Fifth 10-Year Inservice Testing Interval ML15194A2722015-07-14014 July 2015 Request for Additional Information, Adopt Emergency Action Level Scheme Pursuant to Nuclear Energy Institute (NEI) 99-01, Revision 6, Development of Emergency Action Levels for Non-Passive Reactors ML15057A0152015-03-0303 March 2015 Request for Additional Information, Materials Reliability Program (MRP)-227-A, Materials Reliability Program: Pressurized Water Reactor Internals Inspection and Evaluation Guidelines, Implementation Review ML15043A0612015-02-25025 February 2015 Request for Additional Information, Round 2, License Amendment Request to Revise Updated Safety Analysis Report to Allow Pipe Stress Analysis to Be Performed in Accordance with ASME Code Section III ML14353A0512014-12-22022 December 2014 Request for Additional Information, Request to Revise Updated Safety Analysis Report, Design and Evaluation of Seismic Class I Structures Using Ascm (Alternate Seismic Criteria and Methodologies) Developed Floor Response Spectra ML14259A3652014-09-24024 September 2014 Request for Additional Information, License Amendment Request to Revise Updated Safety Analysis Report to Allow Pipe Stress Analysis to Be Performed in Accordance with ASME Code Section III ML14195A0862014-07-16016 July 2014 Request for Additional Information Associated with Near-Term Task Force Recommendation 2.1, Seismic Hazard and Screening Report ML13317A5832013-11-25025 November 2013 Interim Staff Evaluation and Request for Additional Information Regarding Overall Integrated Plan for Reliable Spent Fuel Pool Instrumentation (Order Number EA-12-051) ML13304B4182013-11-0101 November 2013 Request for Additional Information Associated with Near-Term Task Force Recommendation 2.3, Seismic Walkdowns ML13282A5362013-10-0909 October 2013 Request for Additional Information Email, Round 2, Exemption Request, Use of Less Restrictive Work Hour Limitations During First 60 Days of Outage, in Lieu of 10 CFR 26.205(d)(7) ML13290A0022013-10-0909 October 2013 Request for Additional Information Email, License Amendment Request to Revise Current Licensing Basis of Pipe Break Criteria for High Energy Line Breaks ML13270A2872013-09-27027 September 2013 Email, Request for Additional Information Round 4 (Apla), Request to Adopt National Fire Protection Association Standard 805, Performance-Based Standard for Fire Protection for Light-Water Reactor Generating Plants (2001 Edition) ML13261A2122013-09-18018 September 2013 Request for Additional Information Email, Exemption Request, Use of Less Restrictive Work Hour Limitations During First 60 Days of Outage, in Lieu of 10 CFR 26.205(d)(7) ML13233A2482013-08-26026 August 2013 Supplemental Information Needed for Acceptance of Requested Licensing Action; Request for Exemption, Use of Less Restrictive Work Hour Limitations During First 60 Days of Outage in Lieu of 10 CFR 26.205(d)(7) ML13235A1682013-08-23023 August 2013 Draft Request for Additional Information Email, Overall Integrated Plan in Response to 3/12/2012 Commission Order Modifying Licenses with Regard to Reliable Spent Fuel Pool Instrumentation (Order EA-12-051) ML13234A4352013-08-22022 August 2013 Request for Additional Information Email, Round 2, Request to Revise TS 2.0.1, General Requirements, and TS 2.7, Electrical Systems, for Inoperable System, Subsystem. or Component Due to Inoperable Power Source ML13226A1222013-08-14014 August 2013 Email, Request for Additional Information Round 3 (Apla), Request to Adopt National Fire Protection Association Standard 805, Performance-Based Standard for Fire Protection for Light-Water Reactor Generating Plants (2001 Edition) ML13212A0092013-07-30030 July 2013 Request for Additional Information Email, Request to Revise Technical Specification (TS) 2.0.1, General Requirements, and TS 2.7, Electrical Systems, for Inoperable System, Subsystem, or Component Due to Inoperable Power Source ML13205A1252013-07-24024 July 2013 Request for Additional Information Email Round 2, Exigent Amendment Request to Revise Current Licensing Basis to Adopt Revised Design Basis/Methodology for Addressing Design-Basis Tornado/Tornado Missile Impact ML13205A0182013-07-23023 July 2013 Request for Additional Information Email, Exigent License Amendment Request to Revise Current Licensing Basis to Adopt Revised Design Basis/Methodology for Addressing Design-Basis Tornado/Tornado Missile Impact ML13144A4822013-05-23023 May 2013 Request for Additional Information Email, Decommissioning Funding Status Report ML13100A1752013-04-10010 April 2013 Request for Additional Information Email, Request for One-Time Exemption from Requirements of 10 CFR 26.205(d)(7) to Allow Less Restrictive Working Hour Limitations to Support Activities for Plant Startup ML13086A4732013-03-27027 March 2013 Request for Additional Information Email, Request to Revise Technical Specification 2.16, River Level, and Establish EAL Classification Criteria for External Flooding Events Under Radiological Emergency Response Plan ML13120A0842013-03-22022 March 2013 Request for Additional Information Email Physical Security Plan, Training and Qualification Plan, and Safeguards Contingency Plan, Revision 20 (TAC No. D91660) ML13053A2262013-02-22022 February 2013 Email, Second Round Draft Request for Additional Information, Request to Adopt National Fire Protection Association Standard 805, Performance-Based Standard for Fire Protection for Light-Water Reactor Generating Plants. ML13016A4322013-01-16016 January 2013 E-mail, Request for Additional Information, Round 2, Request to Adopt National Fire Protection Association Standard 805, Performance-Based Standard for Fire Protection for Light-Water Reactor Generating Plants (2001 Edition) 2023-06-06
[Table view] Category:Schedule and Calendars
[Table view] |
Text
-~
Djjjjfj Dmtlha PubliC Power D/striCt 444 South 16th Street Mall Omaha, NE 68102-2247 March 31, 2011 LI C-11-0033 U.S. Nuclear Regulatory Commission Attn: Document Control Desk Washington, D.C. 20555
References:
- 1. Docket No. 50-285
- 2. Letter from OPPD (J. A. Reinhart) to NRC (Document Control Desk), "Fort Calhoun Station, Unit No.1, License Amendment Request (LAR), Request for Approval of the FCS/OPPD Cyber Security Plan," dated July 26,2010 (LlC-10-0055) (ML102080452)
(TAC No. ME4380)
- 3. Letter from OPPD (J. A. Reinhart) to NRC (Document Control Desk), "Fort Calhoun Station (FCS), Unit No.1, Supplement to FCS I OPPD Cyber Security Plan License Amendment Request (LAR)
Regarding Balance of Plant Systems within the Scope of the Program," dated November 30, 2010 (LlC-1 0-01 01 ) (ML102080452) (TAC No. ME4380)
- 4. Letter from NRC (L. E. Wilkins) to OPPD (D. J. Bannister), "Fort Calhoun Station, Unit No. 1 - Request for Additional Information Regarding Revision to the Renewed Facility Operating License and Request for Review and Approval of the Cyber Security Plan (TAC No. ME4380)," dated March 2, 2011 (NRC-11-0027)
SUBJECT:
Response to NRC Generic Request for Additional Information (RAI)
In Reference 2, the Fort Calhoun Station (FCS), Unit No. 1 / Omaha Public Power District (OPPD) Cyber Security Plan (Le., the Plan) was submitted for I\IRC review and approval. In Reference 3, OPPD revised the Plan to clarify that certain structures, systems, and components (SSCs) in the balance of plant (BOP) will be protected by the Plan. In Reference 4, the NRC requested additional information concerning the Plan and OPPD's response is attached.
Employment with Equal Opportunity
U.S. Nuclear Regulatory Commission LI C-11-0033 Page 2 Please note that the FCS Plant Review Committee (PRC) must approve the Plan and Implementation Schedule changes described in the attachments. Therefore, OPPD commits to revise and resubmit the Plan within 15 days of this response (AR 46159).
If you have any questions regarding this submittal, please contact Mr. Bill Hansher at (402) 533-6894.
Sincerely,
~
. f1~
J. . Herman vision Manager-Nuclear Engineering
..IBH/CJS/mle Attachments: 1. OPPD Response to Generic Request for Additional Information (RAI)
- 2. Cyber Security Plan Implementation Schedule c: E. E. Collins, Jr., NRC Regional Administrator, Region IV L E. Wilkins, NRC Project Manager J. C. Kirkland, NRC Senior Resident Inspector
LlC-11-0033 Page 1 OPPD Response to NRC Request for Additional Information
LlC- t 1-0033 Page 2 Generic Request for Additional Information (RAI)
NRC RAI1: Records Retention Title 10 of the Code of Federal Regulations (10 CFR) Paragraph 73.54(c)(2) requires licensees to design a cyber security program to ensure the capability to detect, respond to, and recover from cyber attacks. Furthermore, 10 CFR 73.54(e)(2)(i) requires licensees to maintain a cyber security plan that describes how the licensee will maintain the capability for timely detection and response to cyber attacks. The ability for a licensee to detect and respond to cyber attacks requires accurate and complete records and is further supported by 10 CFR 73.54(h), which states that the licensee shall retain all records and supporting technical documentation required to satisfy the requirements of 10 CFR Section 73.54 as a record until the Commission terminates the license for which the records were developed, and shall maintain superseded portions of these records for at least 3 years after the record is superseded, unless otherwise specified by the Commission.
The licensee's Cyber Security Plan (CSP) in Section [4.13] states that Critical Digital Asset (CDA) audit records and audit data (e.g., operating system logs, network device logs) are retained for a period of time that is less than what is required by 10 CFR 73.54(h).
Explain the deviation from the 10 CFR 73.54(h) requirement to retain records and supporting technical documentation until the Commission terminates the license (or to maintain superseded portions of these records for at least 3 years) and how that meets the requirements of 10 CFR 73.54.
OPPD Response Section 4.13, Document Control And Records Retention And Handling of the FCS I OPPD Cyber Security Plan will be revised to incorporate the following text:
"FCS I OPPD has established the necessary measures and governing procedures to ensure that sufficient records of items and activities affecting cyber security are developed, reviewed, approved, issued, used, and revised to reflect completed work.
The following are examples of records or supporting technical documentation that are retained as a record until the Commission terminates the license for which the records are developed. Superseded portions of these records are retained for three years unless otherwise specified by the Commission in accordance with the requirements of 10 CFR 73.54(h):
- Modification records for CDAs;
- Analyses, baSiS, conclusions, and determinations used to establish a component as a CDA;
LlC-11-0033 Page 3
- Written Policies and Procedures that implement and maintain the Cyber Security program, with records of changes;
- Corrective Action records related to Cyber Security non-conformance or adverse conditions;
- Documentation of periodic Cyber Security Program reviews and Program audits;
- Vulnerability notifications determined to adversely impact CDAs and the associated analyses, assessments and dispositions;
- Training records to document personnel qualifications and program implementation and maintenance; and
- Audit records, which are electronic or manual event records (logs) that facilitate the identification and analysis of cyber security attacks and are developed in accordance with Appendix D, Section 2, Audit and Accountability.
o The scope of auditable events is developed in accordance with Appendix D, Section 2.2, Auditabfe Events. Events identified for auditing are recorded in accordance with Appendix D, Section 2.3, Content of Auditable Records and Appendix D, Section 2.4, Audit Storage Capacity (for electronic audit records). The source of auditable events (electronic and non-electronic) include, but are not limited to:
- Service and application logs
- Access Logs o Audit records of auditable events are retained to document access history, as well as to discover the source of cyber attacks or other security-related incidents affecting CDAs or SSEP functions, or both. These records are reviewed and analyzed in accordance with the policies, procedures, and programs implementing Appendix D, Section 2.6, Audit Review, Analysis and Reporting. The review and analysis is conducted consistent with maintaining high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks, up to and including the design basis threat as described in 10 CFR 73.1.
Superseded records (or portions thereof) are then retained for three years, after the record has been reviewed and analyzed."
NRC RAI2: Implementation Schedule The regulation at 10 CFR 73.54, "Protection of digital computer and communication systems and networks," requires licensees to submit a CSP that satisfies the requirements of this section for Commission review and approval. Furthermore, each submittal must include a proposed implementation schedule and the implementation of the licensee's cyber security program must be consistent with the approved schedule.
Paragraph 73.54(a) of 10 CFR requires licensees to provide high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks, up to and including the design basis threat.
LlC-11-0033 Page 4 The completion of several key intermediate milestones (Items (a) through (g) below) would demonstrate progress toward meeting the requirements of 10 CFR 73.54. The Nuclear Regulatory Commission (NRC) staff's expectation is that the key intermediate milestones will be completed in a timely manner, but no later than December 31, 2012.
The key CSP implementation milestones are as follows:
(a) Establish, train and qualify Cyber Security Assessment Team, as described in Section 3.1.2, "Cyber Security Assessment Team," of the CSP.
(b) Identify Critical Systems and CDAs, as described in Section 3.1.3, "Identification of Critical Digital Assets," of the CSP.
(c) Implement cyber security defense-in-depth architecture by installation of
[deterministic one-way] devices, as described in Section 4.3, "Defense-In Depth Protective Strategies" of the CSP.
(d) Implement the management, operational and technical cyber security controls that address attacks promulgated by use of portable media, portable devices, and portable equipment as described in Appendix D Section 1.19 "Access Control for Portable and Mobile Devices," of Nuclear Energy Institute (NEI) 08-09, Revision 6.
(e) Implement observation and identification of obvious cyber related tampering to existing insider mitigation rounds as described in Appendix E Section 4.3, "Personnel Performing Maintenance and Testing Activities," and Appendix E Section 10.3, "Baseline Configuration" of NEI 08-09, Revision 6.
(f) Identify, document, and implement cyber security controls to physical security target set CDAs in accordance with Section 3.1.6, "Mitigation of Vulnerabilities and Application of Cyber Security Controls," of the CSP.
(g) Ongoing monitoring and assessment activities will commence for those target set CDAs whose security controls have been implemented, as described in Section 4.4, "Ongoing Monitoring and Assessment," of the CSP (h) Full implementation of the CSP for all safety, security, and emergency preparedness functions.
Provide a revised CSP implementation schedule that identifies the appropriate milestones, completion dates, supporting rationale, and level of detail to allow the NRC to evaluate the licensee's proposed schedule and associated milestone dates, which include the final completion date. It is the NRC's intention to develop a license condition incorporating your revised CSP implementation schedule containing the key milestone dates.
LlC-11-0033 Page 5 OPPD Response contains a revised CSP implementation schedule that identifies the appropriate milestones, completion dates, and supporting rationale.
NRC RAI 3: Scope of Systems Paragraph 73.54(a) of 10 CFR requires licensees to provide high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks, up to and including the design basis threat as described in 10 CFR 73.1.
In addition, 10 CFR 73.54(a)(1) states that the licensee shall protect digital computer and communication systems and networks associated with:
(i) Safety-related and important-to-safety functions; (ii) Security functions; (iii) Emergency preparedness functions, including offsite communications; and (iv) Support systems and equipment which, if compromised, would adversely impact safety, security, or emergency preparedness functions.
Subsequent to the issuance of the cyber security rule, the NRC stated that 10 CFR 73.54 should be interpreted to include structures, systems, and components (SSCs) in the balance of plant (BOP) that have a nexus to radiological health and safety (Agencywide Documents Access and Management System (ADAMS) Accession No. ML103490344, dated November 19, 2010). The SSCs in the BOP are those that could directly or indirectly affect reactivity of a nuclear power plant and could result in an unplanned reactor shutdown or transient and are therefore, within the scope of important-to-safety functions described in 10 CFR 73.54(a)(1). Furthermore, the NRC issued a letter to NEI dated January 5, 2011 (ADAMS Accession No. ML103550480) that provided licensees with additional guidance on one acceptable approach to comply with the Commission's policy determination.
Explain how the scoping of systems provided by [site/licensee]'s CSP meets the requirements of 10 CFR 73.54 and the additional guidance provided by the NRC.
OPPD Response In Reference 3, OPPD revised its initial license amendment request (Reference 2) to note that the scoping provisions of 10 CFR 73.54 encompass certain structures, systems, and components (SSCs) in the balance of plant (BOP). Reference 3 noted that among the systems to be protected were those SSCs in the BOP out to the first inter-tie with the offsite distribution system whose compromise could result in a reactor scram or transient.
LlC-11-0033 Page 6 Nevertheless, OPPD will revise the FCS I OPPD Cyber Security Plan to be consistent with* the latest NRC guidance on this issue (Adams Accession No. ML103550480).
Thus, the following paragraph will replace the paragraph previously added to the FCS I OPPD Cyber Security Plan in Reference 3:
"Within the scope of NRC's cyber security rule at Title 10 of the Code of Federal Regulations (10 CFR) 73.54, systems or equipment that perform important to safety functions include structures, systems, and components (SSCs) in the balance of plant (BOP) that could directly or indirectly affect reactivity at a nuclear power plant and could result in an unplanned reactor shutdown or transient. Additionally, these SSCs are under the licensee's control and include electrical distribution equipment out to the first inter-tie with the offsite distribution system."
LlC-11-0033 Page 1 FCS I OPPD Cyber Security Plan Implementation Schedule
FCS I OPPD Cyber Security Plan Implementation Schedule Full implementation of the cyber security program involves many supporting tasks. Major activities include: program and procedure development; performing of individual critical digital asset (CDA) assessments; and identification, scheduling, and implementing individual asset security control design remediation actions through the site configuration management program. These design modifications may be performed on-line or could require a refueling outage for installation.
The extensive workload associated with full implementation of the Cyber Security Plan (CSP) requires priOritization to assure those activities that provide higher degrees of protection against radiological sabotage are performed first. Therefore, the CSP implementation schedule will be implemented with two major milestone dates. The first milestone date of no later than December 31,2012, includes the activities listed in the table below. The second milestone date, December 31,2015, includes the completion of all remaining actions that result in the full implementation of the cyber security plan for all applicable Safety, Security, and Emergency Preparedness (SSEP) functions. This date also bounds the completion of all individual asset security control design remediation actions.
Cyber security controls are not applied if the control adversely impacts safety and important to safety, security or emergency preparedness functions.
1 Establish Cyber Security Assessment Team No later than The CSAT, collectively, will need to have digital plant systems (CSAT) as described in Section 3.1.2 "Cyber December 31, 2012 knowledge as well as nuclear power plant operations, engineering Security Assessment Team" of the Cyber Security and nuclear safety experience and technical expertise. The Plan (CSP). personnel selected for this team may require additional training in these areas help to ensure adequate capabilities to perform cyber security assessments as well as others duties.
2 Identify Critical Systems (CSs) and Critical Digital No later than The scope of 10 CFR 73.54 includes digital computer and Assets (CDAs) as described in Section 3.1.3 December 31,2012 communication systems and networks associated with: safety "Identification of Critical Digital Assets" of the CSP. related and important-to safety functions; security functions; emergency preparedness functions, including offsite communications; and support systems and equipment which, if compromised, would adversely impact safety, security, or emergency preparedness functions. The scope of 10 CFR 73.54 includes structures, systems, and components (SSCs) that have a nexus to radiological health and safety and therefore can directly or indirectly affect reactivity of a nuclear power plant and could Page 1 of 4
result in an unplanned reactor shutdown or transient.
3 Implement Installation of a deterministic one-way No later than The implementation of communication barriers protects the most device between lower level devices (level 0 1,2) December 31, 2012 critical SSEP functions from remote attacks on plant systems.
and the higher level devices (level 3,4) as Isolating the plant systems from the internet as well as from the described in Section 4.3, "Defense-In-Depth corporate business systems is an important milestone in Protective Strategies" of the CSP. defending against external threats. While the deployment of the barriers is critical to protection from external cyber threats, it also Lower security level devices (level 0, 1,2 devices) prevents remote access to core monitoring and plant data that bypass the deterministic device and connect systems for reactor engineers, plant operations, and other plant to level 3 or 4 will be modified to prevent the digital staff. This elimination of remote access to reactor core monitoring connectivity to the higher level or will be modified systems may require the development and execution of a detailed to meet cyber security requirements change management plan to ensure continued safe operation of commensurate with the level 3 or 4 devices to the plants. Vendors may be required to develop software which they connect. revisions to support the model. The modification will be developed, prioritized and scheduled.
The design modifications that are not finished by the completion date will be documented in the site configuration management and/or change control program to assure completion of the design modification as soon as possible, but no later than the final implementation date.
4 The security control "Access Control For Portable No later than Portable media devices are used to transfer electronic information And Mobile Devices" described in Appendix D December 31 , 2012 (e.g., data, software, firmware, virus engine updates and 1.19 of NEI 08-09, Revision 6, will be configuration information) to and from plant process equipment.
implemented. Careful use of this class of media is required to minimize the spread of malicious software to plant process equipment. The effective implementation of this control may require the coordinated implementation of other complimentary controls to Page 2 of 4
ensure adequate mitigation.
5 Implement observation and identification of No later than Insider mitigation rounds by trained staff look for obvious signs of obvious cyber related tampering to existing insider December 31, 2012 cyber related tampering and would provide mitigation of mitigation rounds by incorporating the appropriate observable cyber related insider actions. Implementing steps to elements in Appendix ESection 4.3 "Personnel add signs of cyber security-related tampering to insider mitigation Performing Maintenance And Testing Activities." rounds will be performed by the completion date.
6 Identify, document, and implement NEI 08-09, Rev No later than The site physical protection program provides high assurance that 6 Appendix Dtechnical cyber security controls in December 31,2012 these elements are protected from physical harm by an accordance with the Cyber Security Plan Section adversary. The cyber security program will enhance the defense 3.1.6 "Mitigation of Vulnerabilities and Application in-depth nature of the protection of CDAs associated with target of Cyber Security Controls" for CDAs that could sets. Implementing Cyber Security Plan technical controls to adversely impact the design function of physical target set CDAs provides a high degree of protection against security target set equipment. cyber related attacks that could lead to radiological sabotage.
Security controls will be addressed in accordance with Cyber The implementation of controls that require a Security Plan Section 3.1.6 with the exception of those that design modification that are not finished by the require a design modification.
completion date will be documented in the site configuration management and/or change control Note that the Operational and Management controls, as provided program to assure completion of the design in NEI 08-09, Rev 6, Appendix E, will be implemented in modification as soon as possible, but no later than conjunction with the full implementation of the Cyber Security the final implementation date. Program. These controls are primarily procedure based programs and must be implemented in coordination with the comprehensive Cyber Security Program. However, a high degree of protection against cyber related attacks is maintained as many of these programs (e.g., physical protection, maintenance and work management, configuration management, operational experience, etc) are currently in place and are well established within the nuclear industry. For the CDAs in scope, Operational and Page 3 of 4
Management Security Controls will be addressed under an interim auditable process since not all elements of the Operational and Management (O&M) Security Controls Program as required by NEI 08-09, Rev. 6 will be fully developed and implemented by 12131/2012.
7 Ongoing monitoring and assessment activities No later than The ongoing monitoring and assessment activities as described in commence, as described in Section 4.4, "Ongoing December 31, 2012 Section 4.4, "Ongoing Monitoring and Assessment" of the Cyber Monitoring and Assessmenf' of the CSP, for those Security Plan will be implemented for the controls applied to target target set CDAs whose security controls have set CDAs. This action results in the commencement of the cyber been implemented. security program for target set related CDAs.
8 Full implementation of FCS 1OPPD Cyber December 31, 2015 By the completion date, FCS I OPPD Cyber Security Plan will be Security Plan for all SSEP functions will be fully implemented for all SSEP functions in accordance with 10 achieved. CFR 73.54. This date also bounds the completion of all individual asset security control design remediation actions including those that require a refuel outage for implementation.
Page 4 of4