ML19074A204: Difference between revisions

From kanterella
Jump to navigation Jump to search
(Created page by program invented by StriderTol)
 
(Created page by program invented by StriderTol)
 
Line 18: Line 18:
{{#Wiki_filter:Risk-Informing Physical and Cyber Security Programs MARCH 21, 2019
{{#Wiki_filter:Risk-Informing Physical and Cyber Security Programs MARCH 21, 2019


©2018 Nuclear Energy Institute 2 The holistic process of considering the likelihood of attack, likelihood of adversary success, and resulting level of threat consequences in the design, operation and management of a security program   *Outcomes of this process may inform potential changes to security plans, organizations, systems, and implementing measures What is Risk-Informing Security?
What is Risk-Informing Security?
The holistic process of considering the likelihood of attack, likelihood of adversary success, and resulting level of threat consequences in the design, operation and management of a security program
* Outcomes of this process may inform potential changes to security plans, organizations, systems, and implementing measures
                                                            ©2018 Nuclear Energy Institute 2


©2018 Nuclear Energy Institute 3 Where used in 10 CFR 73.55 and related guidance, the concept of "high assurance" of adequate protection is equivalent to "reasonable assurance" All outcomes of the process must ensure that reasonable assurance of adequate protection is maintained
Principles Where used in 10 CFR 73.55 and related guidance, the concept of high assurance of adequate protection is equivalent to reasonable assurance All outcomes of the process must ensure that reasonable assurance of adequate protection is maintained
*Conclusion should be made considering overall capabilities of the physical protection program, rather than an individual program component Regulatory standards already include appropriate margin that the Commission deemed necessary to provide for adequate protection; there is no requirement for additional margin beyond these regulatory standards Principles
* Conclusion should be made considering overall capabilities of the physical protection program, rather than an individual program component Regulatory standards already include appropriate margin that the Commission deemed necessary to provide for adequate protection; there is no requirement for additional margin beyond these regulatory standards                                                 ©2018 Nuclear Energy Institute 3


©2018 Nuclear Energy Institute 4 Risk-informing criteria and processes should reflect realism Performance
Principles Risk-informing criteria and processes should reflect realism Performance-based approaches and data are preferred Approaches will likely use qualitative and semi-quantitative analyses as quantitative data may not be available or feasible to produce Decisions may consider insights from safety and engineering assessments, and capabilities described in the facility licensing basis
-based approaches and data are preferred Approaches will likely use qualitative and semi
                                                            ©2018 Nuclear Energy Institute 4
-quantitative analyses as quantitative data may not be available or feasible to produce Decisions may consider insights from safety and engineering assessments, and capabilities described in the facility licensing basis   Principles


©2018 Nuclear Energy Institute 5 Revise criterion #3 in Regulatory Guide (RG) 5.81 to permit consideration of the capabilities of a site protective strategy (e.g., likelihood of neutralizations)
Planned NEI Initiatives - Physical Security Revise criterion #3 in Regulatory Guide (RG) 5.81 to permit consideration of the capabilities of a site protective strategy (e.g.,
In RG 5.81, define/characterize "desirable" and the relationship of this term to level of protection Gain efficiencies through flexible post staffing and rotation requirements Gain efficiencies by basing security equipment surveillance/testing activities on performance and reliability data (i.e., not prescriptive requirements) Update guidance to provide realistic assessments of 3-D pathways Planned NEI Initiatives
likelihood of neutralizations)
- Physical Security
In RG 5.81, define/characterize desirable and the relationship of this term to level of protection Gain efficiencies through flexible post staffing and rotation requirements Gain efficiencies by basing security equipment surveillance/testing activities on performance and reliability data (i.e., not prescriptive requirements)
Update guidance to provide realistic assessments of 3-D pathways
                                                              ©2018 Nuclear Energy Institute 5


©2018 Nuclear Energy Institute 6 Longer-term action
Planned NEI Initiatives - Physical Security Longer-term action
*Consider a consequence
* Consider a consequence-based security performance standard for existing fleet using insights from the physical security for advanced reactors rulemaking (SRM-SECY-18-0076)
-based security performance standard for existing fleet using insights from the physical security for advanced reactors rulemaking (SRM
This includes consideration of containment features
-SECY-18-0076) This includes consideration of containment features Planned NEI Initiatives
                                                            ©2018 Nuclear Energy Institute 6
- Physical Security


©2018 Nuclear Energy Institute 7 Qualitative risk
Planned NEI Initiatives - Cyber Security Qualitative risk-informing considerations in cyber security:
-informing considerations in cyber security:
* Transforming the NRC cyber security inspection process
*Transforming the NRC cyber security inspection process
* Right-sizing cyber security scoping of CDAs and cyber security controls
*Right-sizing cyber security scoping of CDAs and cyber security controls *Revision to cyber security guidance, as appropriate Longer-term action
* Revision to cyber security guidance, as appropriate Longer-term action
*Changes to the cyber security rule, consistent with NEI's petition for rulemaking Planned NEI Initiatives
* Changes to the cyber security rule, consistent with NEIs petition for rulemaking
- Cyber Security
                                                            ©2018 Nuclear Energy Institute 7


Questions?}}
Questions?}}

Latest revision as of 00:00, 20 October 2019

NEI Slides for March 21 2019 Public Meeting on Risk Informing Security
ML19074A204
Person / Time
Site: Nuclear Energy Institute
Issue date: 03/21/2019
From:
Nuclear Energy Institute
To:
Office of Nuclear Security and Incident Response
Wes Held 301-287-3591
References
ML19046A195
Download: ML19074A204 (8)


Text

Risk-Informing Physical and Cyber Security Programs MARCH 21, 2019

What is Risk-Informing Security?

The holistic process of considering the likelihood of attack, likelihood of adversary success, and resulting level of threat consequences in the design, operation and management of a security program

  • Outcomes of this process may inform potential changes to security plans, organizations, systems, and implementing measures

©2018 Nuclear Energy Institute 2

Principles Where used in 10 CFR 73.55 and related guidance, the concept of high assurance of adequate protection is equivalent to reasonable assurance All outcomes of the process must ensure that reasonable assurance of adequate protection is maintained

  • Conclusion should be made considering overall capabilities of the physical protection program, rather than an individual program component Regulatory standards already include appropriate margin that the Commission deemed necessary to provide for adequate protection; there is no requirement for additional margin beyond these regulatory standards ©2018 Nuclear Energy Institute 3

Principles Risk-informing criteria and processes should reflect realism Performance-based approaches and data are preferred Approaches will likely use qualitative and semi-quantitative analyses as quantitative data may not be available or feasible to produce Decisions may consider insights from safety and engineering assessments, and capabilities described in the facility licensing basis

©2018 Nuclear Energy Institute 4

Planned NEI Initiatives - Physical Security Revise criterion #3 in Regulatory Guide (RG) 5.81 to permit consideration of the capabilities of a site protective strategy (e.g.,

likelihood of neutralizations)

In RG 5.81, define/characterize desirable and the relationship of this term to level of protection Gain efficiencies through flexible post staffing and rotation requirements Gain efficiencies by basing security equipment surveillance/testing activities on performance and reliability data (i.e., not prescriptive requirements)

Update guidance to provide realistic assessments of 3-D pathways

©2018 Nuclear Energy Institute 5

Planned NEI Initiatives - Physical Security Longer-term action

  • Consider a consequence-based security performance standard for existing fleet using insights from the physical security for advanced reactors rulemaking (SRM-SECY-18-0076)

This includes consideration of containment features

©2018 Nuclear Energy Institute 6

Planned NEI Initiatives - Cyber Security Qualitative risk-informing considerations in cyber security:

  • Revision to cyber security guidance, as appropriate Longer-term action
  • Changes to the cyber security rule, consistent with NEIs petition for rulemaking

©2018 Nuclear Energy Institute 7

Questions?