ML22042A009

From kanterella
Jump to navigation Jump to search
NEI Presentation Slides for February 15, 2022, Public Meeting on Common-Cause-Failure (CCF) Policy
ML22042A009
Person / Time
Site: Nuclear Energy Institute
Issue date: 02/11/2022
From: Andy Campbell
Nuclear Energy Institute
To: Bhagwat Jain
NRC/NRR/DORL/LPL4
Jain B
References
Download: ML22042A009 (22)


Text

Common Cause Failure Policy Alan Campbell Technical Advisor

©2022 Nuclear Energy Institute

State of Digital I&C The Digital I&C Integrated Action Plan (IAP) has improved regulatory guidance clarity and consistency

  • RIS 2002-22 Supplement 1 provided criteria for qualitative assessments of Common Cause Failure (CCF) in low safety significant safety-related systems.
  • BTP 7-19 Revision 8 incorporated graded approach assessments into staff review guidance
  • DI&C-ISG-06 Rev. 2 provided an Alternate Review Process to improve regulatory confidence for digital safety systems upgrades.

©2022 Nuclear Energy Institute 2

Treatment of Digital I&C Addressing CCF in complex High Safety Significant Safety-Related I&C Systems remains a barrier that must be overcome SRM/SECY-93-087 provides digital CCF policy.

BTP 7-19 provides review guidance describing acceptable methodologies to meet digital CCF policy.

BTP 7-19 Rev. 8 prescribes one of the following:

  • Diversity
  • Testing - BTP-7-19 Acceptance Criteria are not possible for complex systems, for example every possible executable logic path (includes nonsequential logic paths)

©2022 Nuclear Energy Institute 3

Prescribed Diversity Prescribed diversity does not address initial NRC concerns documented in SECY-91-292, Digital Computer Systems for Advanced Light Water Reactors

  • Lack of experience in nuclear applications
  • Absence of requirements and standards related to digital-specific design aspects
  • Lack of guidance and standards related to software development processes These concerns are not applicable today.

©2022 Nuclear Energy Institute 4

Prescribed Diversity (cont.)

Other issues with current approach:

  • Lack of clear acceptance criteria:

NUREG/CR-6303 describes 6 attributes to diversity to be considered, but does not provide acceptance criteria

  • Application of diversity does not improve digital control system reliability
  • Adds cost barrier to upgrading critical safety systems

©2022 Nuclear Energy Institute 5

Why Digital Safety Systems?

Existing systems are reaching obsolescence (or have already passed it)

Enhances safety via system diagnostic capabilities to identify and respond to issues Improves plant performance via improved accuracy, processing time, and automated capabilities Provides more data available to Operations, Maintenance and Engineering resulting in better real-time knowledge Reduces hardware inventory compared to existing systems Supports long-term, safe operation of our plants

©2022 Nuclear Energy Institute 6

Todays Digital Landscape Digital I&C technology has design features that provide for deterministic behaviors through the use modern standards International standards, such as IEC/IEEE, are widely accepted and have stable processes to reflect current understanding Hazard analysis techniques have matured and are used extensively in non-nuclear safety industries (such as aviation/aerospace, defense, automotive, and chemical industries)

NRC needs a modernized digital CCF policy that reflects todays technology, experience, and understanding

©2022 Nuclear Energy Institute 7

SRM/SECY-93-087 Policy Summary SRM/SECY-93-087 Four Position Policy

1. Assess defense-in-depth and diversity to demonstrate CCF vulnerabilities are addressed
2. Analyze each CCF vulnerability for each accident analysis event and demonstrate diversity
3. Provide a diverse means for each CCF vulnerability that could disable a safety function. Diverse means can be non-safety related
4. Provide diverse and independent MCR displays and controls for manual, system level actuation of critical safety function

©2022 Nuclear Energy Institute 9

SRM/SECY-93-087 Position 1

1. The applicant shall assess the defense-in-depth and diversity of the proposed instrumentation and control system to demonstrate that vulnerabilities to common-mode failures have adequately been addressed

©2022 Nuclear Energy Institute 10

SRM/SECY-93-087 Position 1 Remains applicable and provides high-level requirement to evaluate common-mode failures Industry Proposal

  • Remove diversity Defense-in-depth adequately encompasses the assessment
  • Limit scope of policy to complex High Safety Significant Safety-Related systems
  • Specify the policy is intended to address digital common cause failures
  • Update common-mode failures to common cause failures

©2022 Nuclear Energy Institute 11

Proposed Position1

1. The applicant shall assess the defense-in-depth and diversity of the proposed complex high safety significant safety-related instrumentation and control system to demonstrate that vulnerabilities to digital common-mode cause failures have adequately been addressed RPS/ESFAS Upgrade Example:

There is no change to the application of this policy to a complex high safety significant safety-related upgrade from these changes. Existing guidance for low safety significant safety-related systems in RIS 2002-22 Supplement 1 and BTP 7-19 is sufficient for applicable systems.

©2022 Nuclear Energy Institute 12

SRM/SECY-93-087 Position 2-4

2. In performing the assessment, the vendor or applicant shall analyze each postulated common-mode failure for each event that is evaluated in the accident analysis section of the safety analysis report (SAR) using best-estimate methods. The vendor or applicant shall demonstrate adequate diversity within the design for each of these events
3. If a postulated common-mode failure could disable a safety function, then a diverse means, with a documented basis that the diverse means is unlikely to be subject to the same common-mode failure, shall be required to perform either the same function or a different function. The diverse or different function may be performed by a non-safety system if the system is of sufficient quality to perform the necessary function under the associated event conditions
4. A set of displays and controls located in the main control room shall be provided for manual, system-level actuation of critical safety functions and monitoring of parameters that support the safety functions. The displays and controls shall be independent and diverse from the safety computer system identified in items 1 and 3 above

©2022 Nuclear Energy Institute 13

SRM/SECY-93-087 Position 2-4 Summary

2. Analyze each CCF vulnerability for each accident analysis event and demonstrate diversity
3. Provide a diverse means for each CCF vulnerability that could disable a safety function. Diverse means can be non-safety related
4. Provide diverse and independent MCR displays and controls for manual, system level actuation of critical safety function

©2022 Nuclear Energy Institute 14

SRM/SECY-93-087 Position 2-4 Industry Proposal:

  • Provide for two acceptable pathways
  • Pathway 1:

Maintain current SRM/SECY-93-087 approach Consolidate positions 2-4 into point 2.a Replace safety computer system with digital safety system Update common-mode failure to common cause failure

  • Pathway 2:

Add risk-informed, performance-based approach as point 2.b

©2022 Nuclear Energy Institute 15

Proposed Position 2.a

2. In performing the assessment, the vendor or applicant shall perform one of the following:
a. Analyze each postulated common-mode cause failure for each event that is evaluated in the accident analysis section of the safety analysis report (SAR) using best-estimate methods. The vendor or applicant shall demonstrate adequate diversity within the design for each of these events If a postulated common-mode cause failure could disable a safety function, then a diverse means, with a documented basis that the diverse means is unlikely to be subject to the same common-mode cause failure, shall be required to perform either the same function or a different function. The diverse or different function may be performed by a non-safety system if the system is of sufficient quality to perform the necessary function under the associated event conditions A set of displays and controls located in the main control room shall be provided for manual, system-level actuation of critical safety functions and monitoring of parameters that support the safety functions. The displays and controls shall be independent and diverse from the digital safety computer system identified in items 1 and 3 above

©2022 Nuclear Energy Institute 16

Proposed Position 2.a Example RPS/ESFAS Upgrade Example:

  • There is no change to the application of this policy to a complex high safety significant safety-related upgrade from these changes.
  • The applicant will continue to:

perform a NUREG/CR-6303 analysis implement a diverse means for CCF that can disable safety functions implement diverse and independent displays and controls in the Main Control Room (MCR) for manual actuation

©2022 Nuclear Energy Institute 17

Proposed Position 2.b

2. In performing the assessment, the vendor or applicant shall perform one of the following:
b. Identify each common cause failure that could disable a safety function using risk-informed hazards analysis techniques. Commensurate with the risk significance of each identified CCF, the applicant shall demonstrate adequate measures, such as design attributes, diversity or testing, to address the potential cause of the CCF that could disable a safety function or the resulting event.

The measures may be performed by non-safety systems or components if they are of sufficient quality and can reliably perform the necessary functions and with a documented basis that the measures are unlikely to be subject to the same common cause failure.

©2022 Nuclear Energy Institute 18

Proposed Position 2.b Example RPS/ESFAS Upgrade Example Using NEI 20-07 Rev. D:

The applicant will:

  • apply systems theoretic process analysis techniques to model the system and determine specific scenarios leading to failures.
  • apply measures to address each scenario commensurate with results of PRA sensitivity study and mapping.

©2022 Nuclear Energy Institute 19

Proposed Position 2.b Example isk eduction Obj e ~ tive t

§ a;. _ AF ::UE B IE-E "M..ERf :!:i lE-5 C l.E-1 " i!ilERf :!:i 1E-6i OlfRf ~ lE.-7

©2022 Nuclear Energy Institute 20

Proposed Position 2.b Example Identify all Losses

[ associated with Loss 1 Loss 2 the Site ldeni;ty all H azard 1 H azard 2 H azard 3 H azard s

[

associa ted with t---~11 ~I I I'-----------.

system( s) failure Part I

.~----+-1 --+--1

  • Identify all unsafe n-unsafe control unsafe control unsafe control unsafe control unsafe control unsafe con t rol Control Actions

[ that can lead to Action 1 Action 2 Action 3 Action 4 Actions Action 6 H azard s Part II All Loss A ll Lo ss All Loss All Loss A ll Loss All Loss

} Sce narios and } Scenarios and } Sce narios and } Sce narios and } Sce narios and } Scenarios and Control Meth ods Cont~ol Meth ods Control Methods Control Met hods Cont~~I Method s Control Meth ods Identified Identified Identified Identified ldent1f1ed Identified Loss Scenario n Loss Scenario n Loss Scenario n Loss scenario n Cont rol Control Control Control M ethod 1 Method 1 M ethod 1 Method 1 Control Control Method 2 Method 2 Control Method 3

©2022 Nuclear Energy Institute 21

NEI Path Forward Consider public meeting Update proposed CCF Issue NEI dialogue policy, as needed recommendation to NRC via transmittal letter

©2022 Nuclear Energy Institute 22