ML14323A644

From kanterella
Jump to navigation Jump to search

Issuance of Amendment No. 249, Request to Revise Operating License Conditions Related to Cyber Security Plan Milestone 8 Full Implementation Date
ML14323A644
Person / Time
Site: Cooper Entergy icon.png
Issue date: 12/12/2014
From: Siva Lingam
Plant Licensing Branch IV
To: Limpias O
Nebraska Public Power District (NPPD)
Oesterle E
References
TAC MF3631
Download: ML14323A644 (16)


Text

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 December 12, 2014 Mr. Oscar A. Limpias Vice President-Nuclear and CNO Nebraska Public Power District 72676 648A Avenue Brownville, NE 68321

SUBJECT:

COOPER NUCLEAR STATION -ISSUANCE. OF AMENDMENT RE:

APPROVAL OF THE REVISED CYBER SECURITY PLAN IMPLEMENTATION SCHEDULE MILESTONE 8 (TAC NO. MF3631)

Dear Mr. Limpias:

The U.S. Nuclear Regulatory Commission (NRC) has issued the enclosed Amendment No. 249 to Renewed Facility Operating License (FOL) No. DPR-46 for the Cooper Nuclear Station (CNS). The amendment consists of changes to the Renewed FOL in response to your application dated March 14, 2014, as supplemented by letter dated July 28, 2014.

The amendment approves the revised schedule for implementation of the CNS Cyber Security Plan (CSP) and revises paragraph 2.C.(3) of Renewed FOL No. DPR-46 for CNS to incorporate the revised CSP implementation schedule. The CNS CSP and associated implementation schedule were previously approved by the NRC staff by letter dated July 27, 2011.

A copy of our related Safety Evaluation is also enclosed. The Notice of Issuance will be included in the Commission's next biweekly Federal Register notice.

Sincerely, Siva P. Lingam, Project Manager Plant Licensing Branch IV-1 Division of Operating Reactor Licensing Office of Nuclear Reactor Regulation Docket No. 50-298

Enclosures:

1. Amendment No. 249 to DPR-46
2. Safety Evaluation cc w/encls: Distribution via Listserv

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 NEBRASKA PUBLIC POWER DISTRICT DOCKET NO. 50-298 COOPER NUCLEAR STATION AMENDMENT TO RENEWED FACILITY OPERATING LICENSE Amendment No. 249 License No. DPR-46

1. The U.S. Nuclear Regulatory Commission (the Commission) has found that:

A. The application for amendment by Nebraska Public Power District (the licensee),

dated March 14, 2014, as supplemented by letter dated July 28, 2014, complies with the standards and requirements of the Atomic Energy Act of 1954, as amended (the Act), and the Commission's rules and regulations set forth in 10 CFR Chapter I; B. The facility will operate in conformity with the application, the provisions of the Act, and the rules and regulations of the Commission; C. There is reasonable assurance (i) that the'activities authorized by this amendment can be conducted without endangering the health and safety of the public, and (ii) that such activities will be conducted in compliance with the Commission's regulations; D. The issuance of this license amendment will not be inimical to the common defense and security or to the health and safety of the public; and E. The issuance of this amendment is in accordance with 10 CFR Part 51 of the Commission's regulations and all applicable requirements have been satisfied.

Enclosure 1

2. Accordingly, the license is amended by changes as indicated in the attachment to this license amendment, and Paragraph 2.C.(3) of Renewed Facility Operating License No. DPR-46 is hereby amended to read, in part, as follows:

NPPD shall fully implement and maintain in effect all provisions of the Commission-approved cyber security plan (CSP), including changes made pursuant to the authority of 10 CFR 50.90 and 10 CFR 50.54(p).

The NPPD CSP was approved by License Amendment No. 238 as supplemented by changes approved by License Amendments 244 and 249.

3. The license amendment is effective as of its date of issuance and shall be implemented within 30 days from the date of issuance.

FOR THE NUCLEAR REGULATORY COMMISSION Eric R. Oesterle, Acting Chief Plant Licensing Branch IV-1 Division of Operating Reactor Licensing Office of Nuclear Reactor Regulation

Attachment:

Changes to the Renewed Facility Operating License No. DPR-46 Dateoflssuance:December 12, 2014

ATIACHMENT TO LICENSE AMENDMENT NO. 249 RENEWED FACILITY OPERATING LICENSE NO. DPRA6 DOCKET NO. 50-298 Replace the following page of the Renewed Facility Operating License No. DPR-46 with the enclosed revised page. The revised page is identified by amendment number and contains marginal lines indicating the area of change.

Renewed Facility Operating License REMOVE INSERT 3 3

(5) Pursuant to the Act and 10 CFR Parts 30, 40, and 70, to possess, but not separate, such byproduct and special nuclear materials as may be produced by operation of the facility.

  • C. This license shall be deemed to contain and is subject to the conditions specified in the following Commission regulations in 10 CFR Chapter 1: Part 20, Section 30.34 of Part 30, Section 40.41 of Part 40; Sections 50.54 and 50.59 of Part 50, and Section 70.32 of Part 70; is subject to all applicable provisions of the Act and to the rules, regulations, and orders of the Commission now or hereafter in effect; and is subject to the additional conditions specified or incorporated below:

(1) Maximum Power Level The licensee is authorized to operate the facility at steady state reactor core power levels not in excess of 2419 megawatts (thermal).

(2) Technical Specifications The Technical Specifications contained in Appendix A as revised through Amendment No. 248, are hereby incorporated in the license. The licensee shall operate the facility in accordance with the Technical Specifications.

(3) Physical Protection The licensee shall fully implement and maintain in effect all provisions of the Commission-approved physical security, *training and qualification and safeguards contingency plans including amendments made pursuant to provisions of the Miscellaneous Amendments and Search Requirements revisions to 10 CFR 73.55 (51 FR 27817 and 27822) and to the authority of 10 CFR 50.90 and 10 CFR 50.54(p). The combined set of plans, which contain Safeguards Information protected under 10 CFR 73.21, are entitled: "Cooper Nuclear Station Safeguards Plan," submitted by letter dated May 17, 2006.

NPPD shall fully implement and maintain in effect all provisions of the Commission-approved cyber security plan (CSP), including changes made pursuant to the authority of 10 CFR 50.90 and 10 CFR 50.54(p). The NPPD CSP was approved by License Amendment No. 238 as supplemented by changes approved by License Amendments 244 and 249.

(4) Fire Protection NPPD shall implement and maintain in effect all provisions of the approved fire protection program that comply with 10 CFR 50.48(a) and 10 CFR 50.48(c), as specified in the license amendment request dated April 24, 2012 (and supplements dated July 12, 2012, January 14, 2013, February 12, 2013, March 13, 2013, June 13, 2013, December 12, 2013, January 17, 2014, February 18, 2014, and April 11, 2014), and as approved in the safety evaluation dated April 29, 2014.

Except where NRC approval for changes or deviations is required by.

10 CFR 50.48(c), and provided no other regulation, technical specification, license condition or requirement would require prior NRC approval, the licensee may make changes to the fire protection program without prior approval of the Commission if Amendment No. 249

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 SAFETY EVALUATION BY THE OFFICE OF NUCLEAR REACTOR REGULATION.

RELATED TO AMENDMENT NO. 249 TO RENEWED FACILITY OPERATING LICENSE NO. DPR-46 NEBRASKA PUBLIC POWER DISTRICT COOPER NUCLEAR STATION DOCKET NO. 50-298

1.0 INTRODUCTION

By application*dated March *14, 2014 (Agencywide Documents Access and Management System (ADAMS) Accession No. ML14078A039) as supplemented by letter dated July 28, 2014 (ADAMS Accession No. ML14211A527), the Nebraska Public Power District (NPPD, the licensee) requested a change to the renewed facility operating license (FOL) for Cooper Nuclear Station (CNS). Portions of the letters dated March 14, 2014 and July 28, 2014, contain '

sensitive unclassified non-safeguards information and accordingly, those portions are withheld from public disclosure in accordance with the provisions of paragraph 2.390(d)(1) of Title 10 of the Code of Federal Regulations (10 CFR).

The supplemental letter dated July 28, 2014, provided additional information that clarified the application, did not expand the scope of the application as originally noticed, and did not change the U.S. Nuclear Regulatory Commission (NRC) staffs original proposed no significant hazards consideration determination as published in the Federal Register on July 8, 2014 (79 FR 38580).

The proposed change would revise the date of Cyber Security Plan (CSP) Implementation Schedule Milestone 8 and the existing license conditions in the renewed FOL. Milestone 8 of the CSP implementation schedule concerns the full implementation of the CSP.

2.0 REGULATORY EVALUATION

The NRC staff reviewed and approved the licensee's existing CSP implementation schedule by License Amendment No. 238 dated July 27, 2011 (ADAMS Accession No. ML111801081 ), to Renewed FOL No. DPR.;46 for the CNS, concurrent with the incorporation of the CSP into the facility's current licensing basis. By letter dated March 14, 2014, as supplemented by letter dated July 28, 2014, the licensee requested to change Milestone 8 of the CSP implementation Enclosure 2

schedule. The NRC staff considered the following regulatory requirements and guidance in its review of the current license amendment request to modify the existing CSP implementation schedule:

  • The regulations in 10 CFR 73.54, "Protection of digital computer and communication systems and networks," which state, in part, that "Each [CSP]

submittal must include a proposed implementation schedule. Implementation of the licensee's cyber security program must be consistent with the approved schedule."

  • The licensee's facility operating licenses includes a license condition that requires the licensee to fully implement and maintain in effect all provisions of the Commission-approved CSP- (License Condition 2.C.(3) for the CNS Renewed FOL).
    • Review criteria provided by the NRC staff's internal memorandum, "Review Criteria for Title 10 of the Code of Federal Regulations Part 73.54, Cyber Security Implementation Schedule Milestone 8 License Amendment Requests,"

dated October 24, 2013 (publicly available at ADAMS Accession No. ML13295A467), to be considered for evaluating licensees' requests to postpone their cyber security program implementation date (commonly known as Milestone 8).

The NRC staff does not regard the CSP milestone implementation dates as regulatory commitments that can be changed unilaterally by the licensee, particularly in light of the regulatory requirement at 10 CFR 73.54, that "[i]mplementation of the licensee's cyber security program must be consistent with the approved schedule." As the NRC staff explained in its letter to all operating reactor licensees dated May 9, 2011 (ADAMS Accession No. ML110980538), the implementation of the plan, including the key intermediate milestone dates and the full implementation date, shall be in accordance with the implementation schedule submitted by the licensee and approved by .the NRC. All subsequent changes to the NRC-approved CSP implementation schedule, thus, will require prior NRC approval as required by 10 CFR 50.90.

3.0 TECHNICAL EVALUATION

3.1 Background The NRC staff issued Amendment No. 238 'to Renewed FOL DPR-46 for CNS on July 27, 2011, approving the licensee's CSP. The NRC staff also approved the licensee's CSP implementation schedule, as discussed in the safety evaluation issued with Amendment No. 238. In addition, the NRC staff approved changes to the scope of CSP Milestone 6 on December 12, 2012, and issued Amendment No. 244 (ADAMS Accession No. ML12318A160) to reflect the approved schedule change for implementation of the operational and management controls for the CSP per Milestone 6 to coincide with the implementation of Milestone 8. As such, implementation of the operational and management controls associated with Milestone 6 will also be postponed to be coincident with the requested change in implementation of Milestone 8 per this amendment request. The implementation schedule had been submitted by the licensee based on a

template developed by the Nuclear Energy Institute (NEI) (ADAMS Accession No. ML110600206). The NRC staff found the NEI template acceptable for licensees to use to develop their CSP implementation schedules (ADAMS Accession No. ML110070348). The licensee's proposed implementation schedule for the Cyber Security Program identified completion dates and bases for the following eight milestones:

  • Identify Critical Systems (CSs) and Critical Digital Assets (CDAs);
    • Install a deterministic one-way device between lower level devices and higher level devices;
  • Implement the security control "Access Control For Portable And Mobile Devices";
  • Implement observation and identification of obvious cyber related tampering to existing insidermitigation rounds;
  • Identify, document, and implement cyber security controls in accordance with "Mitigation of Vulnerabilities and Application of Cyber Security Controls" for CDAs that could adversely impact the design function of physical security target set equipment;
  • Commence ongoing monitoring and assessment activities for those target set CDAs whose security controls have been implemented; and

3.2 Licensee's Proposed Change Currently, Milestone 8 of the NPPD CSP requires the licensee to fully implement the CSP by December 15,2014. By letter dated March 14,2014, as supplemented by letter dated July 28, 2014, the licensee has proposed to change the Milestone 8 completion date to June 30, 2017.

The licensee also p'roposed to modify Paragraph 2.C.(3) of Renewed FOL DPR-46 for CNS to reflect the revised full implementation schedule for the CSP. The proposed change also, in effect, changes the implementation of the operational and management controls associated with Milestone 6 to the revised Milestone 8 implementation date since Amendment No. 244 approved implementation of the operational and management controls to coincide with the implementation of Milestone 8.

3.3 NRC Staff Evaluation

,The licensee's request dated March 14, 2014, as supplemented by letter dated July 28, 2014, is consistent with the NRC staff guidance memorandum dated October 24, 2013, developed to evaluate requests to postpone Milestone 8 implementation dates. The intent of the cyber security implementation schedule was for licensees to demonstrate ongoing implementation of

their cyber security program prior to full impleme*ntation, which is set for the date specified in

  • Milestone 8. Activities include establishing a CSAT, identifying CSs and CDAs, installing deterministic one-way devices between defensive levels, implementing access control for portable and mobile devices, implementing methods to observe and identify obvious cyber related tampering, and conducting ongoing monitoring and assessment activities for target set CDAs. In their aggregate, the interim milestones demonstrate ongoing implementation of the cyber security program.

The criteria stated in the NRC guidance memorandum dated October 24, 2013, and addressed by the licensee as justification for its request are:

1) Identification of the specific requirement or requirements of the cyber security plan that the licensee needs additional time to implement.
2) Detailed justification that describes the reason the licensee requires additional time to implement the specific requirement or requirements identified.
3) A proposed completion date for Milestone 8 consistent with the remaining scope of work to be conducted and the resources available.
4) An evaluation of the impact that the additional time to implement the requirements will have on the effectiveness of the licensee's overall cyber security program in the context of milestones already completed.
5) A description of the licensee's methodology for prioritizing completion of work for critical digital assets associated with significant safety security, or emergency preparedness consequences and with reactivity effects in the balance of plant.
6) A discussion of the licensee's cyber security program performance up to the date of the license amendment request.
7) A d.iscussion of cyber security issues pending in the licensee's corrective action program.
8) A discussion of modifications completed to support the cyber security program and a discussion of pending cyber security modifications.

The NRC staff evaluated the licensee's request based on the above review criteria specified in the NRC guidance memorandum dated October 24, 2013.

1) Identification of the specific requirement br requirements of the cyber security plan that the licensee needs additional time to implement.

The licensee identified specific CSP requirements requiring additional time to implement. The licensee also stated that there are specific tasks related to the requirements requiring additional time to implement. These tasks are related to aspects of NEI 08-09 Appendix D and

Appendix E. The licensee provided a list of additional activities required to implement the CSP requirements.

2) Detailed justification that describes the reason the licensee requires additional time to implement the specific requirement or requirements identified.

The licensee stated the CDA analyses required to determine which CDAs require additional controls or configuration changes are presently projected to be completed by the end of the third

. quarter of 2014 for assets that do not require a refueling outage to assess. The analyses for CDAs which require a refueling outage to assess are projected to be completed by December 15, 2014. The licensee also noted there are approximately 1,600 CDAs at CNS and there are hundreds of security control attributes resulting in a significant project involving plant components and systems, and substantial planning and resources. Additionally, changes to CDAs and procedures must be integrated into the plant operational schedule including on-line operations, maintenance and testing, as well as planning and execution of refueling outages.

There is insufficient time to conduct modification planning activities, procurement, and pre-installation testing to allow inclusion of modifications in the fall 2014 refueling outage scope.

Some plant modifications to control and data acquisition networks cannot be applied during power operations. The proposed implementation date change allows for an additional refueling outage to implement potential modifications. The licensee then provided detailed justification for additional time to fully implement the CSP.

3) A proposed completion date for Milestone 8 consistent with the remaining scope of work to be conducted and the resources available.

The licensee proposed a Milestone 8 completion date of June 30, 2017. The licensee also stated that changing the completion date of Milestone 8 will encompass one additional refueling outage and provide adequate time to plan and schedule the implementation of the modifications identified as the result of CDA assessments plus a contingency of approximately 6 months.

4) An evaluation of the impact that the additional time to implement the requirements will have on the effectiveness of the licensee's overall cyber security program in the context of milestones already completed.

The licensee indicated the impact of the requested additional implementation time on the effectiveness of the overall cyber security program is considered to be very low, because the milestones already completed have resulted in a high degree of protection of safety-related, important-to-safety, and security CDAs against common threat vectors. With the exception of implementation of the operational and management controls associated with Milestone 6, CNS completed the implementation of Milestones 1 through 7 as required by December 31, 2012.

Subsequently, in 2013, CNS completed additional actions to address* issues identified for Milestone 4. Implementation of the operational and management controls associated with Milestone 6 was previously approved by the NRC in Amendment 244 to coincide with the implementation of Milestone 8. The licensee provided details about implementation of each completed milestone.

5) A description of the licensee's methodology for prioritizing completion of work for critical digital assets associated with significant safety security, or emergency preparedness consequences and with reactivity effects in the balance of plant.

The licensee stated its methodology for prioritizing CDA activities is centered on considerations for safety, security, or emergency preparedness (SSEP), and balance-of-plant (continuity of power) consequences. Because CDAs are plant components, prioritization of work on CDAs follows the normal work management process. The licensee's Cyber Security organization will provide input to this process, taking into consideration defense~in-depth, installed (secure) configuration of the CDA, susceptibility to identified threat vectors, and availability of the assets.

While CNS will attempt to address components with the highest risk first, work will depend on the availability of the assets. Some modifications will require the components to be taken out of service or may require a plant outage to perform. In addition, CNS will place a high priority on any emergent issue involving a CDA that could potentially challenge the established cyber security barriers.

6) A discussion of the licensee's cyber security program performance up to
  • the date of the license amendment request.

The licensee stated that there has been no identified compromise of SSEP functions by cyber means at CNS. With the exception of implementation of the operational and management controls associated with Milestone 6, CSP Milestones 1 through 7 actions were successfully completed by December 31, 2012. Implementation of the operational and management controls associated with Milestone 6 was previously approved by the NRC in Amendment 244 to coincide with the implementation of Milestone 8. These actions provide a high degree of protection against cyber attacks while full program actions required to provide defense-in-depth are in progress. There was a focused self-assessment in May 2013 to assess compliance of the CNS cyber security program with the seven cyber security milestones. The self-assessment verified compliance. Performance deficiencies and recommendations to close program performance gaps are entered in CNS' corrective action program (CAP). A formal quality assurance audit was conducted in the first quarter of 2013 pursuant to the-24-month physical security program review required by 10 CFR 73.55(m), which included review of cyber security program implementation. The issues were entered into the CAP and have been resolved.

7) A discussion of cyber security issues pending in the licensee's corrective action program.

The licensee stated there are presently no significant (constituting a threat to a CDA via cyber means or calling into question program effectiveness) nuclear cyber security issues pending in the CNS CAP. It provided three examples of non-significant cyber security issues currently in the CAP.

8) A discussion of modifications completed to support the cyber security program and a discussion of pending cyber security modifications.

The licensee provided a brief discussion of completed and pending modifications.

3.3 NRC Staff Evaluation The NRC staff has evaluated the licensee's application using the regulatory requirements and guidance above. The NRC staff's evaluation is below.

The NRC staff concludes that the actions the licensee noted as being required to implement the cyber security program based on the guidance in NEI 08-09 Appendix 0 and Appendix E are considered reasonable as discussed below.

With the exception of implementation of the operational and management controls associated with Milestone 6, the licensee indicated that completion of the activities associated with the CSP, as described in Milestones 1 through 7 were completed prior to December 31, 2012, and provide a high degree of protection to ensure that the most significant digital computer and communication systems and networks associated with SSEP functions are protected against cyber attacks. Implementation of the operational and management controls associated with Milestone 6 was previously approved by the NRC in Amendment 244 to coincide with the implementation of Milestone 8. The licensee also stated that there has been no identified compromise of SSEP functions from cyber means.

Milestone 6 requires the identification, documentation, and implementation of cyber security controls (technical, operational, and management) for critical digital assets (CDAs) related to target set equipment. The licensee already completed milestones 1 through 5, technical cyber security controls of milestone 6, and 7. The technical cyber security controls of milestone 6 include access controls, audit and accountability, CDA and communications protection, identification and authentication, and syste'm hardening. These controls are executed by computer systems as opposed to people, and consist of hardware and software controls that provide automated protection to a system or application. Implementation of technical cyber security controls promotes standardization, trust, interoperability, connectivity, automation, and.

increased efficiency. The interim milestones 1 through 5, technical cyber security controls of milestone 6, and 7 provide sufficient operational and management cyber security protection during the interim period until the cyber security program is fully implemented. Many of the licensee's existing programs are primarily procedure-based programs and must be implemented in coordination with the comprehensive cyber security program. The existing programs currently in place at CNS (e.g., physical protection, maintenance, configuration management, and operating experience) provide sufficient operational and management cyber security protection during the interim period until the cyber security program is fully implemented.

Therefore, implementation of operational and management controls of milestone 6 along with milestone 8 is acceptable. The NRC staff concludes that the licensee's site is more secure after the implementation of these cyber security controls, because the activities the licensee completed mitigate the most significant cyber attack vectors for the most significant CDAs. In addition, the NRC staff concludes that the delay in implementation of the operational and management controls associated with Milestone 6 which is coincident with implementation of Milestone 8, as previously approved by Amendment 244, continues to provide significant protection against cyber attacks. Therefore, the NRC has reasonable assurance that full

  • implementation of the CSP by June 30, 2017 will provide adequate protection of the public health and safety and the common defense and security.

The licensee has stated that the scope of actions required to fully implement its CSP were not anticipated when the implementation schedule was originally determined. The NRC staff recognizes that CDA assessment work including application of controls is much more complex and resource intensive than originally anticipated, in part due to the NRC expanding the scope of the cyber security requirements to include balance of plant. As a result, the licensee has a large number of additional tasks not originally considered when developing its CSP implementation schedule. The NRC staff concludes that the licensee's request for additional time to implement Milestone 8 is reasonable given the unanticipated complexity and scope of the work required to come into full compliance with its CSP.

The licensee proposed a Milestone 8 completion date of June 30, 2017. The licensee stated that changing the completion date of Milestone 8 allows for an additional refueling outage to methodically plan, implement, and test the required additions or changes and allows those additions or changes that require a design change to be performed. The licensee stated its methodology for prioritizing Milestone 8 activities is centered on considerations for SSEP and balance-of-plant (continuity of power) consequences. The methodology is based on defense-in-depth, installed configuration of the CDA and susceptibility to the five commonly identified threat vectors. Prioritization for CDA assessment begins with safety related CDAs and continues through lower priority non-safety and EP CDAs. The NRC staff concludes that based on the large number of digital assets described above and the limited resources with the appropriate expertise to perform these activities, the licensee's methodology for prioritizing work on CDAs is appropriate. The NRC staff further concludes that the licensee's request to delay final implementation of the CSP until June 30, 2017, is reasonable given the complexity of the remaining unanticipated work and the need to perform certain work during the scheduled refueling outage.

3.4 Technical Evaluation Conclusion The NRC staff concludes that the licensee's request to delay full implementation of its CSP until June 30, 2017 is reasonable for the following reasons: (i) the licensee's implementation of cyber security controls to date provides mitigation for significant cyber attack vectors for the most significant CDAs as discussed in the staff conclusion evaluation above; (ii) the scope of the work required to come into full compliance with the CSP implementation schedule was much more complicated than anticipated and not reasonably foreseeable when the CSP implementation scheduled was originally developed; and (iii) the licensee has reasonably prioritized and scheduled the work required to come into full compliance with its CSP implementation schedule.

3.5 Revision to License Condition 2.C.(3)

By letter dated March 14, 2014, as supplemented by letter dated July 28, 2014, the licensee proposed to modify Paragraph 2.C.(3) of Renewed FOL No. DPR-46, which provides a license condition to require the licensee to fully implement and maintain in effect all provisions of the NRC-approved CSP.

Current License Condition The current license condition in Paragraph 2.C.(3) of Renewed FOL No. DPR-46 for CSN states, in part, that NPPD shall fully implement and maintain in effect all provisions of the Commission-approved cyber security plan (CSP), including changes made pursuant to the authority of 10 CFR 50.90 and 10 CFR 50.54(p). The NPPD CSP was approved by License Amendment No. 238 as supplemented by a change approved by License Amendment No. 244.

Revised License Condition The revised license condition in Paragraph 2.C.(3) of Renewed FOL No. DPR-46 for CSN would state, in part, that NPPD shall fully implement and maintain in effect all provisions of the Commission-approved cyber security plan (CSP), including changes made pursuant to the authority of 10 CFR 50.90 and 10 CFR 50.54(p). The NPPD CSP was approved by License Amendment No. 238 as supplemented by changes approved by License Amendments 244 and 249.

Based on the information in Section 3.0 of this safety evaluation and the modified license condition described above, the NRC staff concludes that the proposed Milestone 8 date is acceptable.

4.0 STATE CONSULTATION

In accordance with the Commission's regulations, the Nebraska State official was notified of the proposed issuance of the amendment. The State official had no comments.

5.0 ENVIRONMENTAL CONSIDERATION

This is an amendment of a 10 CFR Part 50 license that relates solely to safeguards matters and does not involve any significant construction impacts. This amendment is an administrative change to extend the date by which the licensee must have its cyber security plan fully implemented. The Commission has previously issued a proposed finding that the amendment involves no significant hazards consideration, and there has been no public comment on such finding published in the Federal Register on July 8, 2014 (79 FR 38580). Accordingly, the amendment meets the eligibility criteria for categorical exclusion set forth in 10 CFR 51.22(c)(12). Pursuant to 10 CFR 51.22(b), no environmental impact statement or environmental assessment need be prepared in connection with the issuance of the amendment.

6.0 CONCLUSION

The Commission has concluded, based on the considerations discussed above, that: (1) .there is reasonable assurance that the health and safety of the public will not be endangered by

operation in the proposed manner, (2) there is reasonable assurance that such activities will be conducted in compliance with the Commission's regulations, and (3) the issuance of the amendment will not be inimical to the common defense and security or to the health and safety of the public.

Principal Contributor: John Rycyna Date: December 12, 2014

ML14323A644 *via email OFFICE NRR/DORLILPL4-1/PM NRR/DORLILPL4-1/LA NSIR/CSD/DD NAME SLingam JBurkhardt I RFelts*

DATE 12/2/14 12/2/14 10/27/14 OFFICE OGC NRR/DORLILPL4-1/BC(A) NRR/DORL/LPL4-1/PM NAME NSaffor (LSCiark for) EOesterle 1 Slingam (BSingal for)

DATE 12/12/14 12/12/14 12/12/14