ML22140A344

From kanterella
Jump to navigation Jump to search
kima-lawson-jenkinsk-hv-w12
ML22140A344
Person / Time
Issue date: 03/08/2022
From: Kim A, Kim Lawson-Jenkins
Office of Nuclear Security and Incident Response, Office of Nuclear Regulatory Research
To:
Office of Nuclear Reactor Regulation
References
Download: ML22140A344 (11)


Text

A Zero Trust Paradigm for Cyber Security in New Reactors Anya Kim, NRC Kim Lawson-Jenkins, NRC

Outline

  • Why Zero Trust?
  • What is Zero Trust, really?
  • How do we plan to apply Zero Trust concepts to the nuclear industry?

Cyber security defensive architecture - current Continuous Threats, New Technologies, Shifting Paradigms Malware Artificial IoT Remote Drones Physical Regulatory intelligence Wireless operations and security compliance monitoring Need a new way of thinking about security

What is Zero Trust?

  • Heres what it is not - not a product or solution, not one-size-fits-all
  • It is a strategy - with set of guiding principles/assertions/tenets
  • Assume network is always hostile
  • Trust is explicit
  • Least privilege access (e.g., risk-based adaptive policies)
  • Every device, user, data flow should be authenticated and authorized

Core Components of a Zero Trust Architecture From NIST SP 800-207 Zero Trust Architecture

Zero Trust Applied to the Nuclear Industry

  • Can a Zero Trust paradigm be applied as one way to protect new and advanced reactors?
  • Replace current defensive architecture
  • Satisfy safety requirements
  • Applicability of Zero Trust assertions and concepts in Industrial Control Systems
  • How to provide guidance for licensees considering applying a Zero Trust architecture?

Our Approach

  • Survey the Zero Trust landscape
  • Develop Zero Trust Framework suitable for nuclear security
  • Scope and define Zero Trust principle(s) suitable for use in nuclear industry
  • Identify the technical challenges
  • Examine the interface between cyber security and safety for a Zero Trust architecture
  • Develop Implementation strategies
  • Develop guidance on adoption of Zero Trust strategies for new and advanced reactors
  • Develop performance criteria for the trust algorithm/policy engine

Zero Trust Architecture Revisited Trust Algorithm From NIST SP 800-207 Zero Trust Architecture

Expected Results and Benefits

  • Provide the basis for future regulatory guidance documents
  • Zero Trust architectures may provide alternatives to current defensive architectures when applied to new reactors
  • Educate applicants, licensees, vendors, and inspectors regarding not only the Zero Trust paradigm, but the potential usefulness of various (Zero Trust) implementation strategies

Thank you!

Anya Kim Kim Lawson-Jenkins Anya.Kim@nrc.gov Kim.Lawson-Jenkins@nrc.gov Computer Scientist Cyber Security Specialist Instrumentation, Controls, and Electrical Eng. Branch Cyber Security Branch Division of Engineering Division of Physical and Cybersecurity Policy Office of Research Office of Nuclear Security and Incident Response