ML22130A736

From kanterella
Jump to navigation Jump to search
NRC Cyber Security Oversight Program Overview for the Polish Regulators
ML22130A736
Person / Time
Issue date: 05/10/2022
From: Michael Brown
NRC/NSIR/DPCP/CSB
To:
Brown M
References
Download: ML22130A736 (20)


Text

U.S NUCLEAR REGULATORY COMMISSION (NRC)

CYBER SECURITY OVERSIGHT PROGRAM OVERVIEW FOR THE POLISH REGULATORS Michael Brown, CISSP Michael.brown@nrc.gov Cyber Security Branch (CSB)

Division of Physical and Cyber Security Policy (DPCP)

Office of Nuclear Security and Incident Response (NSIR)

AGENDA

  • Cyber for the AP1000 2

Overview Cyber of US Security NRC Cyber Program SecurityHistory Program The Cyber Rule 10 CFR 73.54 NRC & Industry Issued work to assess and address cyber Full Implementation 9/11 security at NPPs RG 5.71 & NEI 08-09 Inspections started Terrorist Implementation Attack Guidance Cyber Security MS 1 - 7 Assessments Inspections Cyber Security 2001 2002 -> <- 2008 2009 2012 2010 2013 2015 2016 2017 Implementation Inspections NRC & Industry collaborative work on implementation guidance SFAQs, NEI 13-10, workshops, tabletops, CSP addendums NPP CSPs &

Implementation Schedules Approved 3

SM1 BM3 Future of US NRC Cyber Security Program Full Implementation Inspections Full Started Implementation Inspections Full Implementation Completed Inspections at all Licensee Sites Baseline 2017 2018 2019 2020 2021 2022 Inspection Program continues Biennial Baseline inspections start 4

4

Slide 4 SM1 missing the slide number on slide 4 Sampson, Michele, 4/18/2022 BM3 Added slide number Brown, Michael, 4/20/2022

10 CFR 73.54 Protection of Digital Computer

& Communication Systems and Networks High assurance that digital computer and communication systems and networks are adequately protected against cyber attacks Cyber Security Program Implementation Requirements at NewRx and OpRx Focus: Prevention of Radiological Sabotage 5

10 CFR 73.54

- Protect digital computer and communication systems and networks associated with

  • Support systems and equipment which, if compromised, would adversely impact SSEP functions

- Protect from cyber attacks that adversely impact

  • Integrity or confidentiality of data and/or software
  • Deny access to systems, services, and/or data
  • Operation of systems, networks, & associated equipment 6
1. Cyber Security Implementation Guidance Assessment Team
2. Identify Critical Digital Assets (CDAs)
3. Implement Defensive Architecture
4. Apply Security Controls to CDAs
5. Cyber Security Program Must Include These Areas to Support Implementation 5/25/2022 7

Generic Defensive Architecture Security / Site Corporate Internet Network Network Safety Systems One-way Deterministic Device 8

IAEA Guidance Documents

  • US nuclear plants typically use either NEI 08-09 or RG 5.71 for guidance in developing their cybersecurity programs
  • Most International plants use IAEA guidance in developing their cybersecurity programs.

- IAEA Nuclear Security Series (NSS) No. 13 Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities

- NSS No. 23-G Security of Nuclear Information

  • Provides guidance on securing information
  • Provides different classifications for information (e.g.

secret, confidential, etc.)

9

IAEA Guidance Documents

- NSS No. 42-G Computer Security for Nuclear Security

  • Provides implementing guidance for computer security
  • Provides recommendations for different security levels

- NSS No. 17-T Rev 1 Computer Security Techniques for Nuclear Facilities

  • Provides technical guidance on how to setup your computer security program and the security requirements for different security levels 10

Full Implementation Inspection Resources

  • Team Composition (4 inspectors) NRC Lead inspector

- Regional Inspector Team Lead

- Regional Inspector

- 2 Cyber Security Subject Matter NRC 2 NRC Experts (Contractor SMEs) inspector Contractors Inspectors Available HQ Support

  • The initial round of full implementation (remotely) to staff inspections were completed in 2021 the team as needed
  • These inspections consisted of a week onsite followed by an offsite week, followed by a 2nd week onsite 11

Inspection Procedure 71130.10P Programmatic Technical Cyber security program & training Access control/media and portable device protection:

Attack mitigation, incident response, and

  • Policies & procedures, CDAs, Networks, contingency planning Portable Media Devices,
  • Controls login, authentication, wireless Program monitoring, assessment, CDA and communications protection configuration, and change management
  • Protocols, passwords, shared resources, Systems/services acquisition and supply Denial-of-Service protection, digital chain protection certificates, information protection, encryption, removal of unnecessary services, OS Review changes to the cyber security plan Defense-in-depth, detection, and response
  • Hardware configuration, intrusion Cyber security event reporting detection system, malicious code protection, monitoring tools, information flow enforcement Identification and resolution of problems 12 12

Cyber Security During Construction

  • NEI 08-09 Addendum 3 provides guidance on System and Services Acquisition (Supply Chain) and discusses some of the following:

- Maintaining custody and control of device from vendor to installation

  • Many components at Vogtle were shipped without software installed and software was installed during system turnover
  • Requirements for tamper proof products or tamper seal on acquired products

- Establishment of trusted distribution paths to ensure traceability

- Integration of security capabilities

  • The best time to add security features is during the design and construction of a product, not as an add on after construction

- Licensee testing

  • Licensee should always test products prior to installation 13

Cyber Security During Construction

  • A good practice is to store safety related and important to safety CDAs in a secured storage areas prior to their installation in the plant to minimize any unauthorized access to them

- These areas should be access controlled to minimize unnecessary traffic to them 14

Cyber Security For the AP-1000

  • A major difference between the AP-1000 and current nuclear fleet in the USA is the shear number and complexity of digital components
  • Most of the nuclear plants in the USA were designed in the 60s and built in the 70s and 80s.

- The old nuclear fleet relied on relays, analog controllers (4-20ma),

sensors and switches for operation

  • Analog equipment is typically not susceptible to cyber disruption - (e.g.

you turn a hand switch and the rods fall into the core)

- The AP 1000 relies on a digital network for communication

  • Much faster and more efficient, however, more susceptible to cyber disruption 15

Data Highway for the AP-1000 16

Picture of Current Control Room 17

Picture of AP-1000 Control Room 18

Questions 19