ML22042A009

From kanterella
Jump to navigation Jump to search
NEI Presentation Slides for February 15, 2022, Public Meeting on Common-Cause-Failure (CCF) Policy
ML22042A009
Person / Time
Site: Nuclear Energy Institute
Issue date: 02/11/2022
From: Andy Campbell
Nuclear Energy Institute
To: Bhagwat Jain
NRC/NRR/DORL/LPL4
Jain B
References
Download: ML22042A009 (22)


Text

©2022 Nuclear Energy Institute Common Cause Failure Policy Alan Campbell Technical Advisor

©2022 Nuclear Energy Institute 2 The Digital I&C Integrated Action Plan (IAP) has improved regulatory guidance clarity and consistency RIS 2002-22 Supplement 1 provided criteria for qualitative assessments of Common Cause Failure (CCF) in low safety significant safety-related systems.

BTP 7-19 Revision 8 incorporated graded approach assessments into staff review guidance NEI 96-07, Appendix D and Reg. Guide 1.187 Rev. 3 provided enhanced guidance for digital systems under 50.59 DI&C-ISG-06 Rev. 2 provided an Alternate Review Process to improve regulatory confidence for digital safety systems upgrades.

State of Digital I&C

©2022 Nuclear Energy Institute 3 Addressing CCF in complex High Safety Significant Safety-Related I&C Systems remains a barrier that must be overcome SRM/SECY-93-087 provides digital CCF policy.

BTP 7-19 provides review guidance describing acceptable methodologies to meet digital CCF policy.

BTP 7-19 Rev. 8 prescribes one of the following:

Diversity Testing - BTP-7-19 Acceptance Criteria are not possible for complex systems, for example every possible executable logic path (includes nonsequential logic paths)

Treatment of Digital I&C

©2022 Nuclear Energy Institute 4 Prescribed diversity does not address initial NRC concerns documented in SECY-91-292, Digital Computer Systems for Advanced Light Water Reactors Lack of experience in nuclear applications Absence of requirements and standards related to digital-specific design aspects Lack of guidance and standards related to software development processes These concerns are not applicable today.

Prescribed Diversity

©2022 Nuclear Energy Institute 5 Other issues with current approach:

Lack of clear acceptance criteria:

NUREG/CR-6303 describes 6 attributes to diversity to be considered, but does not provide acceptance criteria Application of diversity does not improve digital control system reliability Adds cost barrier to upgrading critical safety systems Prescribed Diversity (cont.)

©2022 Nuclear Energy Institute 6 Existing systems are reaching obsolescence (or have already passed it)

Enhances safety via system diagnostic capabilities to identify and respond to issues Improves plant performance via improved accuracy, processing time, and automated capabilities Provides more data available to Operations, Maintenance and Engineering resulting in better real-time knowledge Reduces hardware inventory compared to existing systems Why Digital Safety Systems?

Supports long-term, safe operation of our plants

©2022 Nuclear Energy Institute 7 Digital I&C technology has design features that provide for deterministic behaviors through the use modern standards International standards, such as IEC/IEEE, are widely accepted and have stable processes to reflect current understanding Hazard analysis techniques have matured and are used extensively in non-nuclear safety industries (such as aviation/aerospace, defense, automotive, and chemical industries)

Todays Digital Landscape NRC needs a modernized digital CCF policy that reflects todays technology, experience, and understanding

SRM/SECY-93-087

©2022 Nuclear Energy Institute 9 SRM/SECY-93-087 Four Position Policy 1.

Assess defense-in-depth and diversity to demonstrate CCF vulnerabilities are addressed 2.

Analyze each CCF vulnerability for each accident analysis event and demonstrate diversity 3.

Provide a diverse means for each CCF vulnerability that could disable a safety function. Diverse means can be non-safety related 4.

Provide diverse and independent MCR displays and controls for manual, system level actuation of critical safety function Policy Summary

©2022 Nuclear Energy Institute 10

1. The applicant shall assess the defense-in-depth and diversity of the proposed instrumentation and control system to demonstrate that vulnerabilities to common-mode failures have adequately been addressed SRM/SECY-93-087 Position 1

©2022 Nuclear Energy Institute 11 Remains applicable and provides high-level requirement to evaluate common-mode failures Industry Proposal Remove diversity

Defense-in-depth adequately encompasses the assessment Limit scope of policy to complex High Safety Significant Safety-Related systems Specify the policy is intended to address digital common cause failures Update common-mode failures to common cause failures SRM/SECY-93-087 Position 1

©2022 Nuclear Energy Institute 12 1.

The applicant shall assess the defense-in-depth and diversity of the proposed complex high safety significant safety-related instrumentation and control system to demonstrate that vulnerabilities to digital common-mode cause failures have adequately been addressed Proposed Position1 RPS/ESFAS Upgrade Example:

There is no change to the application of this policy to a complex high safety significant safety-related upgrade from these changes. Existing guidance for low safety significant safety-related systems in RIS 2002-22 Supplement 1 and BTP 7-19 is sufficient for applicable systems.

©2022 Nuclear Energy Institute 13 2.

In performing the assessment, the vendor or applicant shall analyze each postulated common-mode failure for each event that is evaluated in the accident analysis section of the safety analysis report (SAR) using best-estimate methods. The vendor or applicant shall demonstrate adequate diversity within the design for each of these events 3.

If a postulated common-mode failure could disable a safety function, then a diverse means, with a documented basis that the diverse means is unlikely to be subject to the same common-mode failure, shall be required to perform either the same function or a different function. The diverse or different function may be performed by a non-safety system if the system is of sufficient quality to perform the necessary function under the associated event conditions 4.

A set of displays and controls located in the main control room shall be provided for manual, system-level actuation of critical safety functions and monitoring of parameters that support the safety functions. The displays and controls shall be independent and diverse from the safety computer system identified in items 1 and 3 above SRM/SECY-93-087 Position 2-4

©2022 Nuclear Energy Institute 14 2.

Analyze each CCF vulnerability for each accident analysis event and demonstrate diversity 3.

Provide a diverse means for each CCF vulnerability that could disable a safety function. Diverse means can be non-safety related 4.

Provide diverse and independent MCR displays and controls for manual, system level actuation of critical safety function SRM/SECY-93-087 Position 2-4 Summary

©2022 Nuclear Energy Institute 15 Industry Proposal:

Provide for two acceptable pathways Pathway 1:

Maintain current SRM/SECY-93-087 approach

Consolidate positions 2-4 into point 2.a

Replace safety computer system with digital safety system

Update common-mode failure to common cause failure Pathway 2:

Add risk-informed, performance-based approach as point 2.b SRM/SECY-93-087 Position 2-4

©2022 Nuclear Energy Institute 16 Proposed Position 2.a

2. In performing the assessment, the vendor or applicant shall perform one of the following:
a. Analyze each postulated common-mode cause failure for each event that is evaluated in the accident analysis section of the safety analysis report (SAR) using best-estimate methods. The vendor or applicant shall demonstrate adequate diversity within the design for each of these events If a postulated common-mode cause failure could disable a safety function, then a diverse means, with a documented basis that the diverse means is unlikely to be subject to the same common-mode cause failure, shall be required to perform either the same function or a different function. The diverse or different function may be performed by a non-safety system if the system is of sufficient quality to perform the necessary function under the associated event conditions A set of displays and controls located in the main control room shall be provided for manual, system-level actuation of critical safety functions and monitoring of parameters that support the safety functions. The displays and controls shall be independent and diverse from the digital safety computer system identified in items 1 and 3 above

©2022 Nuclear Energy Institute 17 RPS/ESFAS Upgrade Example:

There is no change to the application of this policy to a complex high safety significant safety-related upgrade from these changes.

The applicant will continue to:

perform a NUREG/CR-6303 analysis

implement a diverse means for CCF that can disable safety functions

implement diverse and independent displays and controls in the Main Control Room (MCR) for manual actuation Proposed Position 2.a Example

©2022 Nuclear Energy Institute 18 Proposed Position 2.b

2. In performing the assessment, the vendor or applicant shall perform one of the following:
b. Identify each common cause failure that could disable a safety function using risk-informed hazards analysis techniques. Commensurate with the risk significance of each identified CCF, the applicant shall demonstrate adequate measures, such as design attributes, diversity or testing, to address the potential cause of the CCF that could disable a safety function or the resulting event.

The measures may be performed by non-safety systems or components if they are of sufficient quality and can reliably perform the necessary functions and with a documented basis that the measures are unlikely to be subject to the same common cause failure.

©2022 Nuclear Energy Institute 19 RPS/ESFAS Upgrade Example Using NEI 20-07 Rev. D:

The applicant will:

perform a PRA sensitivity study to determine the impact of each system failure on Core Damage Frequency and Large Early Release Frequency.

map results to RG 1.174 regions (as described in RG 1.174 Figures 4 and 5) apply systems theoretic process analysis techniques to model the system and determine specific scenarios leading to failures.

apply measures to address each scenario commensurate with results of PRA sensitivity study and mapping.

Proposed Position 2.b Example

©2022 Nuclear Energy Institute 20 Proposed Position 2.b Example t

§ isk eduction Obj e ~ tive B

C a;.

_ AF ::UE IE-E "M..ERf :!:i lE-5 l.E-1 "i!ilERf :!:i 1E-6i OlfRf ~ lE.-7

©2022 Nuclear Energy Institute 21 Proposed Position 2.b Example Part I n-Part II unsafe control Action 1 Hazard 1

}

All Loss Scenarios and Control Methods Identified Loss Scenario n Control M ethod 1 Control Method 2 Control Method 3 Loss 1 H azard 2 t---~11 unsafe control Action 2

}

A ll Loss Scenarios and Cont~ol Meth ods Identified unsafe control Action 3

}

All Loss Scenarios and Control Methods Identified Loss Scenario n Control Method 1 Loss 2 H azard 3

[

Identify all Losses associated with the Site

.~----+-1

--+--1

  • ~I I I'-----------.

[

ldeni;ty all H azard s associated with system(s) failure

[

Identify all unsafe Control Actions that can lead to H azard s unsafe control Action 4

}

All Loss Scenarios and Control Methods Identified unsafe control Actions

}

A ll Loss Scenarios and Cont~~I Method s ldent1f1ed Loss Scenario n Control M ethod 1 unsafe control Action 6

}

All Loss Scenarios and Control Methods Identified Loss scenario n Control Method 1 Control Method 2

©2022 Nuclear Energy Institute 22 NEI Path Forward Consider public meeting dialogue Update proposed CCF policy, as needed Issue NEI recommendation to NRC via transmittal letter