Regulatory Guide 5.12: Difference between revisions

From kanterella
Jump to navigation Jump to search
(Created page by program invented by StriderTol)
(StriderTol Bot change)
 
(8 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Adams
{{Adams
| number = ML15357A411
| number = ML003740035
| issue date = 09/29/2016
| issue date = 11/30/1973
| title = General Use of Locks in the Protection and Control of: Facilities, Radioactive Materials, Classified Information, Classified Matter, and Safeguards Information
| title = General Use of Locks in Protection and Control of Facilities and Special Nuclear Materials
| author name =  
| author name =  
| author affiliation = NRC/NRR
| author affiliation = NRC/RES
| addressee name =  
| addressee name =  
| addressee affiliation =  
| addressee affiliation =  
| docket =  
| docket =  
| license number =  
| license number =  
| contact person = Bayssie M M
| contact person =  
| case reference number = DG-5027
| document report number = RG-5.12
| document report number = RG-5.12, Rev. 1
| package number = ML15357A337
| document type = Regulatory Guide
| document type = Regulatory Guide
| page count = 28
| page count = 5
}}
}}
{{#Wiki_filter:U.S. NUCLEAR REGULATORY COMMISSION
{{#Wiki_filter:November 1973 U.S. ATOMIC ENERGY COMMISSION
  October 201 6 OFFICE OF NUCLEAR REGULATORY RESEARCH
                            /
Revision 1 REGULATORY GUIDE
                            r~REGULATORY,
Technical Lead A. Tardiff    Written suggestions regarding this guide or development of new guides may be submitted through the NRC's public Web site under the Regulatory Guides document collection of the NRC Library at http://www.nrc.gov/reading
                                DIRECTORATE OF REGULATORY STANDARDS
-rm/doc-collections/reg
                                                                                                                            GU IDE
-guides/contactus.html.  Electronic copies of this regulatory guide, previous versions of this guide, and other recently issued guides are available through the NRC's public Web site under the Regulatory Guides document collection of the NRC Library at http://www.nrc.gov/reading
                                                                  REGULATORY GUIDE 5.12 GENERAL USE OF LOCKS IN THE PROTECTION AND CONTROL OF
-rm/doc-collections/. The regulatory guide is also available through the NRC's Agencywide Documents Access and Management System (ADAMS) at http://www.nrc.gov/reading
                                      FACILITIES AND SPECIAL NUCLEAR MATERIALS
-rm/adams.html, under ADAMS Accession No. ML15357A411
. The regulatory analysis may be found in ADAMS under Accession No. ML16099A029, and the staff responses to the public comments on DG
-5027 may be found under ADAMS Accession No. ML15357A410.
 
REGULATORY GUIDE  
5.12 (Draft was issued as DG-5027, dated January 2015
GENERAL USE OF LOCKS IN THE PROTECTION
AND CONTROL OFFACILITIES, RADIOACTIVE MATERIALS, CLASSIFIED INFORMATION, CLASSIFIED MATTER, AND SAFEGUARDS INFORMATION


==A. INTRODUCTION==
==A. INTRODUCTION==
Purpose This regulatory guide (RG) describes methods and procedures that the staff of the U.S. Nuclear Regulatory Commission (NRC) considers acceptable for the selection, use, and control of locking devices. Locks can be used in the protection of
are diffieult to pick or manipulate, no lock can claim to Gmearnaiipuation proof." Because of the large variety of'
:  areas, facilities, certain radioactive materials
      Paragraph 50.34c) of 10 CFR Part 50, "Licensing                                  Iocks' ivailable, it is necessary to subdivide the discussion of* Production and Utilization Facilities," requires each                          "`on locks into the following types:.(1) combinat~ion, (2)
, and specific types of information (e.g., classified matter , National Security Information (NSI), Restricted Data (RD), Formerly Restricted Data (FRD)
application for a liccn'se to operate a production or                                kcy, (3) electrical, and (4) pushbutton mechanical locks.
, Safeguards Information (SGI)
).    Applicable Regulations U.S. Code of Federal Regulations, "Domestic Licensing of Production and Utilization Facilities," Part 50, Chapter I, Title 10, "Energy
" (10 CFR Part 50)
, (Ref. 1). Specifically Section 10 CFR 50.34 "Contents of applications" requires under (c)(1) that "[e]ach applicant for an operating license for a production or utilization facility that will be subject to §§ 73.50 and 73.60 of this chapter must include a physical security plan" and under (c)(2) "[e]ach applicant for an operating license for a utilization facility that will be subject to the requirements of § 73.55 of this chapter must include a physical security plan-"  10 CFR Part 50, Appendix R, "Fire Protection Program for Nuclear Power Facilities Operating Prior to January 1, 1979," requires under III.N.4, that the fire brigade leader shall have ready access to keys for any locked fire doors.
 
10 CFR Part 5 2 , "Licenses, Certifications and Approvals for Nuclear Power Plants" (Ref. 2). Specifically Section 52.79
, "Contents of applications; technical information in final safety analysis report
," requires under (a)(35)(i) the applicant to submit to the NRC
a physical security plan that describes how the requirements of
10 CFR Part 73 will be met.
 
RG 5.12, Rev. 1, Page
2   10 CFR Part 70, "Domestic Licensing of Special Nuclear Material
" (Ref. 3). Specifically Section 10 CFR 70.22 "Contents of applications,"
require s under (h)(1) that licensees controlling a formula quantity of Special Nuclear M aterial (SNM) (except those licensed to operate a nuclear power reactor under 10 CFR Part 50) submit a physical security plan for NRC approval
.  10 CFR Part 72, "Licensing Requirements for the Independent Storage of Spent Nuclear Fuel Independent Storage of Spent Nuclear Fuel, High
-Level Waste, and Reactor
-Related Greater than Class C Waste" (Ref. 4). Specifically Subpart H "Physical Protection" describes physical protection requirements, under Section
:  o 72.180, "Physical protection plan," requires that "[t]he licensee shall establish, maintain, and follow a detailed plan for physical protection as described in
§73.51 of this chapter."
  10 CFR Part 73, "Physical Protection of Plants and Materials
" (Ref. 5), prescribes requirements for the establishment and maintenance of a physical protection system for the protection of special nuclear material at fixed sites and in transit
. Specifically Section(s):  o 73.22 "Protection of Safeguards Information: Specific requirements
," under (c)(2) requires that SGI be stored in a locked Security Storage Container when unattended.


o 73.40, "Physical protection:  General requirements at fixed sites,"
utilization facility and paragraph 70.22(b).of* 10 CIFR                                The discussion of each type includes ageneral section on Part '70. "Special Nuclear Material," requires. certain                               advantages and disadvantages, a section on control over applications for alicense to possess or use special nuclear                          the locks, and a section on the applicable standards and material (SNM) to include a physical security plan to                                 specifications.
requires that certain licensees provide physical protection at a fixed site, or contiguous sites where licensed activities are conducted
, against radiological sabotage
, or against theft of SNM, or against both.  o 73.46, "Fixed Site Physical Protection Systems, Subsystems, Components, and Procedures ," under (d)(14) and 73.50 , "Requirements for physical protection of licensed activities
," under (c)(7) require s licensees to control all keys, locks, combinations and related equipment used to limit access to protected, material access, vital, and controlled access areas
, to reduce the probability of compromise.  o 73.51, "Requirements for the physical protection of stored spent nuclear fuel and high
-level waste," under (d)(7) requires that, "[a] personnel identification system and a controlled lock system must be established and maintained to limit access to authorized individuals.


"  o 73.55, "Requirements for Physical Protection of Licensed Activities in Nuclear Power Reactors against Radiological Sabotage
demonstrate how thc applicant plans to meet' the physical protection requirements of 10 CFR Part 73,                                  I.:      Combinatlon Locks
," requires in subsection
"~Physical Protection of Plants and Materials."
"(e) Physical barriers , under (4)," that "-openings in any barrier-
Paragraphs 50.54(p) and 70.32(e) require existing                                              a. General. It ~is desirable that a combination licensees licensed under Part 50 and certain licensees                              ,lock be designed to afford a choice of a large number of licensed under Part 70 who have noit submitted a                                    combinations. The number of combinations is physical security plan to submit such a plan to the                                   'Ict.ý miincd by the'number of tumbler wheels in the lock C~ommnission for approval. Section 73.40 of 10CFR Part                                mechanism and the number of graduations on the dial.
" shall be "-secured and monitored to prevent exploitation of the opening-
" commensurate with the intended function of the barrier.   o 73.55 under (e)(8)(i)(C)(iii) requires all emergency exits in the protected area to be alarmed and secured by locking devices that allow prompt egress during an emergency and satisfy the requirements of 10 CFR 73.55 for access control into the protected area.


o 73.55 under (e)(9)(ii) requires licensees to protect all vital area access portals and vital area emergency exits with intrusion detection equipment and locking devices that allow rapid egress during an emergency and satisfy the vital area entry control requirements.
73 requires that certain licensees provide. physical                                High-quality locks 'usually have 100 divisions on the dial protectioni against industrial sabotage and against theft                            and -three tumbler wheels; such a lock is capable of of SNM at the fixed sites where licensed activities 'are                              providing a theoretical 10'- combina13tions, which in conducted.                                                                            practice .reduces to -tens of thousand


RG 5.12, Rev. 1, Page
====s. Sonic====
3  o 73.67, "Licensee Fixed Site and In
                                                                                    'Combination locks are made with four tumbler wheels, but it is considered that the added number of Locks are acceptable devices to be used in adhering                          combinations. possible does not proportionally impro%0
-Transit Requirements for the Physical Protection o f Special Nuclear Material of Moderate and Low Strategic Significance," requires licensees to, under (d)(5)  "develop and maintain a controlled badging and lock system which identifies and limit s access only to authorized individuals for controlled access areas that store SNM of moderate strategic significance," and under (f)(1) utilize a controlled access area for activities involving SNM of low strategic significance.
to the physical protection requirements identified above                            the security of the lock and does increase the to assist in controlling access to areas, facilities, and                           inconvenience~of,dialing the combination.


10 CFR Part 20 , "Standards for Protection Against Radiation," (Ref. 6), specifically within Subpart I "Storage and Control of Licensed Material-". Specifically Section(s
nmaterials through doors, gates, container lids, and similar material or personnel access points, and are Iconsidered                                              It is.desirable for a combination lock to be essential components Of a physical barrier. This guide                              designed'so its,combinatlion can be easily changed but at provides criteria acceptable to the Regulatory Staff for                             the same time be tamper resistant. The combination of the selection and use of commercially available locks in                           ,some locks can be changed by disassembly of' the the protection of facilities and SNM.                                               tumbler wheel, pack and relocation of screws or pins. In
):  o 1801, "Security of stored material
                                                                                    ,this method the effective number or combinations possible is res'trled. Another method involves taking
," requires that
"[t[he licensee shall secure from unauthorized removal or access licensed materials that are stored in controlled or unrestricted areas
,"  o 1802, "Control of material not in storage ," requires that
"[t]he licensee shall control and maintain constant surveillance of licensed material that is in a controlled or unrestricted area and that is not in storage."
  10 CFR Part 37, "Physical Protection of Category 1 and Category 2 Quantities of Radioactive Material," (Ref.
 
7) provides the requirements for the physical protection program for any licensee that possesses an aggregated Category 1 or Category 2 quantity of radioactive material listed in Appendix A to 10 CFR Part 37.
 
10 CFR Part
95 , "Facility Security Clearance and Safeguarding of National Security Information and Restricted Data
," (Ref. 8) specifically Section 95.25 "Protection of National Security Information and Restricted Data in storage
," under (a),(j) and Section 95.29 "Establishment of Restricted or Closed areas," under (c)(3), describe s licensee requirements to provide locks for the protection of classified matter and information.
 
Related Guidance RG 5.79, "Protection of Safeguards Information
," (Ref. 9) in Section C.4. "Protection While in Use or Storage
," within subsection (d).(2), provides related information on a "security filing cabinet that bears a Test Certification Label on the side of the locking drawer, or interior plate, and is marked as 'GSA-Approved Security Container
.'"  Purpose of Regulatory Guides The NRC issues RGs to describe to the public methods that the staff considers acceptable for use in implementing specific parts of the agency
's regulations, to explain techniques that the staff uses in evaluating specific problems or postulated events, and to provide guidance to applicants. Regulatory guides are not substitutes for regulations and compliance with them is not required. Methods an d solutions that differ from those set forth in RGs will be deemed acceptable if they provide a basis for the findings required for the issuance or continuance of a permit or license by the Commission.
 
Paperwork Reduction Act This RG contains and references information collections covered by 10 CFR Parts
20, 37, 50, 52, 70, 72, 73, and 95 that are subject to the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.). These information collections were approved by the Office of Management and Budget (OMB), control RG 5.12, Rev. 1, Page
4  numbers (listed in the numerical sequence of the applicable Parts)
3150-0014, 3150-0214, 3150
-0011, 3150-0151, 3150
-0009 , 3150-0132 , 3150-0002, and 3150
-0047. Public Protection Notification The NRC may not conduct or sponsor, and a person is not required to respond to, a request for information or an information collection requirement unless the requesting document displays a currently valid OMB control number.
 
RG 5.12, Rev. 1, Page


==B. DISCUSSION==
==B. DISCUSSION==
Reason for Revision This revision of the guide (Revision 1) incorporates new information, lessons learned, and insights from operating experience since the original guide was issued in 1973 , particularly information on new locking technologies and standards for locks and keys.
apart, the wheet pack and resetting an insert in each whiel.'Irhis method requires, substantial skill on the part Loicks are very important components of a physical                           of he operaf r. The most desirable method of changing barrier. Their effectiveness, however, lies in their use in                         a combination isty a special key which requires minimal conjunction with other security measures su6h as                                     training o( the' operator and provides a mn'aximumn intrusion alarm systems and seals. Although some locks                               number of combinations. The special key is inserted in USAEC REGULATORY GUIDES                                      Copies of publstid iuidt may be ebtseumd by                        he dwo.sons t~etmmsu Ruaouloory Guides we Issued to deoscrace and make ovallgtle go I.,. pubic
 
                                                                                  ~efsmsd     Ill IMwUS.
Some specific items addressed include the some basic characteristics of a lock that licensees should consider when selecting locks, and information on when licensees should change combinations or keys.
 
In addition, the revised guide cites updated references and describes relevant regulations, where appropriate.
 
Background Locks can be an essential component of a physical barrier and consequently assist in meeting specific protection requirements
. Locks assist in controlling access to areas, facilities, materials and information through doors, gates, and container s. NUREG-1964 , "Access Control Systems" (Ref. 10) discusses information rela t e d to designing, installing, testing, maintaining, and monitoring access control systems used for the protection of facilities licensed by the NRC.  A lock is a mechanical latching device for securing moveable portions of physical barriers (examples include door s, gate s, drawer s) in a secured position. Locks are important components of a physical barrier
; however, they should be considered as delay devices only, rather than permanent impediments to unauthorized entry, since any lock can be defeated by expert manipulation or force given enough time. Ideally, the lock delay capability should match the penetration resistance of the rest of the barrier. However, the effectiveness of locks depends upon their use in conjunction with other security measures that balance the protection afforded across multiple surfaces and points of entry, since a potential adversary seeks to minimize the time or detection inherent in the defeat or bypass of a given security layer. To this end, multiple barrier system s , seals, tamper safe devices, intrusion detection and alarm systems
, and response actions should be considered as an integrated system. This integration should include evaluation of the door or barrier materials, hinges, frame, and nearby wall and mounting surfaces t o identify weaknesses that could enable an adversary to bypass the locking system in favor of a more advantageous pathway.
 
Locks are commonly categorized by the mechanism used to withdraw the latching system to allow access. The most common mechanisms are by entry of a specific sequence of numbers in the case of combination locks, manipulation with a key in the case of keyed locks
, and presentation of electronic security tokens in the case of electronic locks. Locks and locking systems can further be categorized as being part of access control systems. Lock componentry can consist of:
physical latching systems for securing a movable portion of the security barrier, keys, and combinations. Access control systems, as described in NUREG
-1964, include:  identity verification devices, search procedures, search equipment , and locks. The elements of an access control system can consist of:  procedures, access granting/denial hardware, contraband detection activities, computers, electronic databases, and associated detection, alarm, and communication infrastructures.
 
This guide uses a number of technical terms and phrases related to lock systems. Definitions an d explanation of these lock terms can be found in "The Professional Locksmith Dictionary" (Ref.
 
1 1). 
RG 5.12, Rev. 1, Page
6  Combination Locks In a combination lock
, the locking mechanism is disengaged by entering a specific sequence of numbers (i.e., the combination
). A combination lock should be designed to provide a large number of possible combinations. The number of possible combinations is determined by the number of numerals available for each number in the sequence and the length of the sequence. For example, a lock having 100 possible numerals (for example, 0 through 99)
and a three
-number sequence (an example being
"0-10-30") offers 1 million (100 x 100 x 100) combinations. Some combination locks require a four
-number sequence (an example being
"0-10-30-40").  Combination locks are designed for use in two basic forms. The first is a case lock , in which a combination lock is mounted on or into a door or container as a mortise or rim
-mounted lock , and the second is a padlock. High-quality combination locks are tested for resistance to surreptitious entry (examples are:
  manipulation, radiological analysis
, and emanations analysis) and forcible entry.
 
Protection against forcible entry on a mortise or rim
-mounted lock can be increased if the lock is equipped with hardened steel plates and if it is designed with relocking triggers or devices that dead lock the bolt or bolt
-actuating mechanism upon forcibl e entry. These locks should use a deadbolt and not a dead-locking latch
, which is more susceptible to force. The deadbolt should have a minimum
1-inch lateral throw or multiple vertical engagements with its strike. Astragal s (for example
, the vertical member attached to the meeting edge of one door panel of a pair, bridging the opening and holding one door panel inactive) on out-swinging doors and in
-swinging double doors without mullions (for example
, the stationary member of the frame used to separate door panels) provide additional protection to the lock bolt.
 
Security can be increased by frequently changing a lock's combination. Therefore, locks in which the combination can be readily changed are desirable. Some locks permit a new combination to be directly entered when u sing a special key inserted into the back of the lock. These locks are commonly termed "key-change" locks. Others require replacing internal partsto change the combination.
 
Combination locks may be susceptible to compromise if the back of the lock is readily available (examples are:
  when the back of the lock is accessible or the lockable access is open
). Removing the back cover from the lock may allow the combination to be determined. The combinations of some key-change locks can be changed directly when the lock is in the open position, while others must have the existing combination re-entered when the access is in the open position to permit the combination change. The former type permits an intruder to quick ly change the combination to one of his or her own choosing. If the combination of a lock is changed by an intruder, that person would have access, but an authorized user would no
 
====t. For these reasons====
, backplates or other devices should be used to protect the back of the lock
, and the door or container in which the lock is located should not be left unattended when open.  Both mechanical pushbutton and electronic (keypad) locks offer varying degrees of possible combinations and unsuccessful attempts. In a mechanical pushbutton lock, the pushbuttons activate linkages that connect a gate with an external knob to permit opening of the lo ck. This type of lock typical ly offer s relatively few possible combinations
, and therefore can be defeated by simply attempting each possible combination until the correct combination is discovered. Infrequent combination changes can result in wear patter n s appearing on the pushbuttons, which could further reduce the number of combinations an intruder would need to enter to gain unauthorized entry. For electronic locks (keypads), a limited set of possible combinations can be balanced by limiting the number of unsuccessful attempts to access the lock (an example of this is after three failed attempts the lock would refuse to open even for the RG 5.12, Rev. 1, Page
7  correct combination). However, it is difficult to limit the number of unsuccessful attempts for mechanical pushbutton locks.    Federal Specification FF
-L-2740 , "Locks, Combination
" (Ref. 1 2) covers changeable combination locks designed to be mounted on safes, security files, vault doors, and similar items that are intended for the protection of classified information. To be approved by the U.S.
 
General Services Administration (GSA), security file cabinets, map and plan containers, vault doors, and doors for facilities approved for open storage of classified information must be secured with a lock that has been tested and approved under FF-L-2740. The only exception is for field safes (safes specifically designed and built for the protection and storage of classified material in other than fixed facilities)
, which should use a lock meeting the standards in Underwriters Laboratories (UL) 768, "Standard for Combination Locks
" (Ref. 1 3) or locks meeting Federal Specification FF
-L-2937 , "Combination Lock, Mechanic al" (Ref. 14). Locks meeting FF
-L-2740 should not be used on field safes.
 
Figure 1. Field safe Locks meeting FF
-L-2740 resist 20
hours of manipulation, 20
hours of radiological analysis, 20 hours of emanations analysis, and 30
minutes of covert opening. Six locks have been approved under FF-L-2740:  Mas-Hamilton Group models X
-07 and X-08; Kaba Mas models X
-09 and X-10; and Sargent and Greenleaf models 2740 and 2740B. All six models are electromechanical locks
; the X-07, X-08, X-09, and X-10 are generator
-powered, and the 2740 and 2740B are battery
-powered. While all six models are approved, only the X
-10 and 2740B are currently being produced
.  Figure 2. X-10 lock  Pedestrian door deadbolts covered by Federal Specification FF
-L-2890 , "Lock Extension (Pedestrian Door, Deadbolt
)" (Ref. 1 5) are intended for use on interior pedestrian doors into areas of facilities approved for open storage of classified information. This specification is intended for deadbolts located on interior pedestrian doors used for normal entrance and egress during day
-to-day operations. A pedestrian door deadbolt meeting FF
-L-2890 consists of a mounting plate, a combination lock that meets RG 5.12, Rev. 1, Page
8  FF-L-2740 , and a strike plate. The mounting plate is surface mounted to the inside face of the door. The deadbolt baseplate has two essential features. First, it provides a means of latching the bolt in the retracted position. This prevents the bolt from being inadvertently extend ed. Second, turning a knob on the baseplate will retract the bolt to allow egress. Proper deadbolt operation requires installation of the correct strikeplate. The strikeplate needed depends on the door bevel and whether it is a single
- or double-door leaf. Pedestrian door locks meeting the requirements of FF
-L-2890 , that feature single
-motion egress for life safety, are available and applicable for protection of facilities approved for open storage of classified information. These locks can be integrated with a variety of access control system
 
====s. Locks on GSA====
-approved containers and vault doors for securing arms , ammunition, and explosives should meet additional federal specifications. According to the U.S. Department of Defense Lock Program, mechanical combination locks should meet the latest revisions to the federal specifications listed below
:  FF-L-2937, "Combination Locks, Mechanical" (see Ref. 14)  UL 768 , Group 1, "Standard for Combination Locks
." 
Locks on GSA
-approved containers and vault doors securing classified information, and on doors of facilities approved for open storage of classified information, should meet FF-L-274
 
===0. Locks on GSA===
-approved field safes should meet FF-L-2937 or UL 768, Group
 
===1. Locks meeting FF===
-L-2740 should not be used on field safes.
 
Locks that meet the requirements of FF
-L-2937 are available from the Defense Logistics Agency Troop Support. See the Mechanical Combination Lock Ordering Information page on its website for information on how to procure mechanical combination locks.
 
http://www.navfac.navy.mil/navfac_worldwide/specialty_centers/exwc/products_and_services/capital_improvements/dod_lock/SecurityHardware/CombinationLocks/ProductInformation/FF
-L-2937_Locks/FFL2937_Order.html Federal Specification FF
-P-110, "Padlock, Changeable Combinati on (Resistant to Opening by Manipulation and Surreptitious Attack
)" (Ref. 1 6) covers changeable combination padlocks designed to conform to the standards for security equipment set forth in the
"Classified National Security Information; Final Rule
" (Ref. 17). The se padlocks are required to resist opening for not less than 30 minutes by manipulation and 10 minutes by surreptitious attack but are not tested for forced opening. The se padlocks are intended for use on shore and aboard ocean
-going vessels, indoor s , or outdoors (in areas that are semi-protected by a structural overhang similar to eaves or a lean
-to).  The standards in American National Standards Institute/Builders Hardware Manufacturers Association (ANSI/BHMA) A156.5-2014 , "Cylinders and Input Devices for Locks
," (Ref. 1 8) provide current guidance for mechanical pushbutton locks.  Key Locks  Most keyed locks fall into four general classes
:  warded locks, wafer (or disk) locks, lever locks, and pin-tumbler locks. In the United States, the most common type of keyed lock for security purposes is the pin-tumbler.  As in the case of combination locks, a key lock should be capable of being set for a large number of different keys (i.e., it should be difficult to guess the correct key shape to open the lock
). A six-pin cylinder with ten depths per pin theoretically provides 1 million different key
 
====s. Beyond basic pin====
-tumbler cylinders, several high
-security lock cylinders are available. These can provide increased resistance to
 
RG 5.12, Rev. 1, Page
9  covert and surreptitious attack, as well as increased key control. They also can offer greater key control capability because the lock systems themselves and their key blanks should not be readily available commercially.
 
Licensees choosing to use master keying and interchangeable core systems should be aware of the susceptibilities created by such systems. Master-keyed systems and interchangeable core systems (which require a control key) should be set up so that distinct areas
/programs are not under the same master key or control key. Likewise, highly sensitive areas and areas containing sensitive information should not be master keyed at all. Furthermore, where locks are not routinely monitored (e.g., a padlock on a gate at a remote site), the lock should not be master keyed
, and the control key should be unique to that padlock
. Control keys should only be issued to individuals authorized by the person in charge of the lock program.
 
Master keying should be done correctly to minimize the loss of security associated with such a system. Master keying is undesirable from a security perspective because any cylinder may be reverse
-engineered to reveal the top master key. In addition, any compromise of a master key (e.g., termination of an employee who had a c ce s s to a master key) compromises that entire master key system. Rekeying all the effected locks is costly, but because of the convenience of master key systems
, there is strong desire to use them. A graded approach to this conflict, between convenience and security, could be to:
(1) utilize a set of locks that has not been master
-keyed for protected areas, material access areas, vital areas, and areas containing NSI, RD, FRD or SGI; and (2) use master-keyed lock sets for other, less sensitive areas. Master keying is prohibited for the protection of classified information or matter per
10 CFR 95.25(j)(8).  It is essential that the bolt of a lock is retained in the locked position by positive means, so that end pressure on the bolt will not retract it. In some locks, the bolt is held in a locked position by a spring only. This permits, in the case of padlocks, the use of rapping or shimming defeat techniques (rapping and shimming techniques are common lock defeat actions)
, and in the case of door locks, the opportunity to surreptitiously retract the bolt without the use of force.
 
The pneumatic deadbolt locking system (PDLS), designed by the U.S. Army , has acceptable forced entry protection. The PDLS is in compliance with Military Specification MIL
-DTL-43607 , "Padlock, Key Operated, High Security, Shrouded Shackle" (Ref. 1 9). The PDLS typical configuration has six hardened steel bolts and the locking system behind the door panel. The steel bolts extend from brackets , located behind and on the door panel
, into the surrounding structure.    Figure 3. Pneumatic Deadbolt Locking System UL 437 , "Key Locks" (Ref. 20) covers door locks and locking cylinders
, as well as other types of locks. It provides , for example, testing in terms of security, endurance (cycle test)
, and salt fog test. A salt fog test provides a controlled corrosive environment that has been u sed to produce relative corrosion RG 5.12, Rev. 1, Page
10  resistance information for specimens of metals and coated metals. Salt fog testing is described in the American Society for Testing and Materials (ASTM) International B-117-07a, "Standard Practice for Operating Salt Spray (Fog) Apparatus
" (Ref. 2 1). For a complete description of all the tests a lock should pass in order to meet a certain lock specification, see the lock specification, for the lock of interest.
 
ASTM F883 , "Standard Performance Specification for Padlocks
," (Ref. 2 2) covers key-operated padlocks and has provisions for graded testing in terms of, for example,  security, endurance (cycle test)
, and environmental attack.
 
Federal Specification FF
-P-2827, "Padlock, Key Operated, General Field Service" (Ref. 2 3) covers key
-operated padlocks intended for outdoor use. These padlocks are tested to the highest levels of environmental attack specified in ASTM F883 and provide moderate resistance to forced entry and picking.
 
M IL-DTL-43607 covers high
-security , shrouded shackle padlocks intended for protection of military arms, ammunition, and explosives. These padlocks are intended to be used as a system with a high-security shrouded hasp that meets the requirements of Military Specification MIL-DTL-29181 , "Hasp, High Security, Shrouded, for High and Medium Security Padlock
" (Ref. 2 4). 
The Internal Locking Device (ILD), designed by the U.S.
 
Navy, is a keyed lock that provides acceptable forced entry protectio
 
====n. In the ILD====
, the locking system is located behind the door panel or in a protected housing. The ILD , in addition to possessing increased resistance to forced entry, is resistant to surreptitious neutralization attempts by picking, shimming, impressioning
, and bypassing methods. These qualifications are the same as the U.S. Department of Defense's (DoD's) high security padlock and meet MIL-D TL-43607. The DoD has approved the ILD lock for protection of conventional arms, ammunition, explosives, nuclear weapons, and chemical weapons.    Figure 4. Internal locking device  Electronic Locks An electr onic lock is a system comprised of an automatic door closer on the door, an input device, a controlling device
, and a lock, usually mechanical, which is released or activated when the correct combination is entered or correct token is presented. Various technologies are available in such systems, including biometric, magnetic
-stripe card s w ith a unique identifier encoded on to the card, proximity cards containing a unique identification code in a microchip that transmit s when the card is near a card reader, smart cards that contain a memory chip to store identification data, and combination entry. A robust system will use two or more of these methods. A system using two technologies is RG 5.12, Rev. 1, Page
11  referred to as a two
-factor authentication system. As an example of a two
-factor authentication system, an employee's photo identification card can also serve as a smart card that awaken s a digital scramble keypad into which the employee enters a personal identification number. A scramble keypad places the keys on the keypad in a random order which facilitates protection against an observer perceiving the number sequence being applied. The electronic lock offers a number of advantages, including isolation of the lock part containing the code from the exposed part of the lock, versatility of programming
, and ease of integration into alarm systems.
 
In the event of a power failure
, an electronic lock system should "fail secure.
 
" That is, doors should remain locked to personnel on the unprotected side
, but egress from the secure side should remain possible. The mechanical lock is often a case lock in the door. There is often a physical key to its cylinder (i.e., the emergency override key
) that can be used to gain access to areas during a power outage. Only authorized personnel should have that key.
 
The actual unlocking and locking of the door is often accomplished by use of an electric strike. This is mounted in the frame, and the lock's bolt projects into it. The electric strike is released when electric current is sent to it, based on a valid opening signal (e.g., insertion of a valid credential
). The electric strike should be selected depending on the amount of use it will get, and it should be periodically checked to see that it hold s the door locked when it should.
 
If the lock system involves a person pressing buttons or switches to enter a code, a sight barrier should be installed to prevent observation of the code as it is entered. A system, in which each person presents a unique credential (e.g., an identification card with an electronic chip) and enters a unique personnel identification code, is more secure than a system that uses a single combination. In a unique credential only system, if an employee were to retire or be debriefed from the program, that employee's access can be removed from the system without affecting the other employees. In a single combination system, if an employee were to retire or be debriefed from the program, all employees with access to the area would need to be given the new combination
.  Pushbutton lock systems should incorporat e devices o r programming that prevent trial and error methods of surreptitious attack by activating an alarm after a certain number of unsuccessful attempts or by introducing a delay after each unsuccessful attempt which prevents operation of the lock for a period of time.
 
Current guidance and specifications for electric locks include UL 1034 , "Burglary-Resistant Electric Locking Mechanisms" (Ref. 2 5) and ANSI/BHMA A156.25
-20 13 , "Electrified Locking Devices" (Ref. 2 6).  Control of Locks, Keys, Key Cards, Combinations
, and Related Equipment Possession of locks, keys, key cards, combination s , and other related equipment by unauthorized individuals severely affects security and neutralizes the primary purpose of an access control program. In addition, information gained from spare locks and related equipment can allow unauthorized individuals to gain access. Licensees are required to control
:  (1) the distribution of keys, key cards, combination s , and locks; and (2) the storage of spare locks and related equipment (e.g., 10 CFR 73.22(a)(1)(6) locks combinations, mechanical key design, or passwords integral to the physical security system must be protected as SGI)
.      In order to implement such control measures, licensees should develop, implement, and maintain a formal process for distributing locks, keys, key cards, combinations, and related equipment to only authorized personnel. Furthermore, when an individual's authorization for access has been revoked or RG 5.12, Rev. 1, Page
12  suspended or has left employment duty, under less than favorable conditions, licensees should reduce security risk by:  accounting for spare lock components, changing keys, denying function of specific access cards to key card processing systems, and changing combinations on certain lock systems.
 
Harmonization with International Standards The International Atomic Energy Agency (IAEA) has established a compendium of publications which address security
-related recommendations to prevent, detect, and respond to theft, sabotage, unauthorized access or other malicious acts involving nuclear material and other radioactive substances, in facilities and during transport. Pertinent to this RG, IAEA Nuclear Security Series No. 13, "Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/22/Revision 5)," (Ref. 2 7) addresses the recommended elements of a State's physical protection regime in the aspects of:  use, storage, and transport of nuclear materials. This RG incorporates similar operational guidance and is consistent with the principles provided in the IAEA Nuclear Security Series No. 13.
 
Documents Discussed in Staff Regulatory Guidance This RG endorses the use of one or more codes or standards developed by external organizations
, and other third party guidance documents. These codes, standards and third party guidance documents may contain references to other codes, standards or third party guidance documents ("secondary references"). If a secondary reference has itself been incorporated by reference into NRC regulations as a requirement, then licensees and applicants must comply with that standard as set forth in the regulation. If the secondary reference has been endorsed in a RG as an acceptable approach for meeting an NRC requirement, then the standard constitutes a method acceptable to the NRC staff for meeting that regulatory requirement as described in the specific RG. If the secondary reference has neither been incorporated by reference into NRC regulations nor endorsed in a RG, then the secondary reference is neither a legally
-binding requirement nor a "generic" NRC approved acceptable approach for meeting an NRC requirement. However, licensees and applicants may consider and use the information in the secondary reference, if appropriately justified , consistent with current regulatory practice, and consistent with applicable NRC requirement
 
====s.      ====
RG 5.12, Rev. 1, Page
13  C.  STAFF REGULATORY GUIDANCE
  1. Selection and Use of Locks t o Protect NSI, RD, and FRD
  Locks may need to meet various federal specifications. In particular, 32 CFR 2001 (see Ref. 17), contains the most recent federal requirements to secure Secret and Confidential NSI, RD and FRD
.  The regulation at 10 CFR 95.29(c)(3) require s that, during non
-working hours, entrances and exits to restricted or closed areas must be secured by either an approved built-in combination lock or an approved combination or key operated padlock. When combination locks are used, the requirements of 10 CFR 95.25(c)-(f) apply. When key operated padlocks are used, the requirements of 10 CFR 95.25(j) apply.  In addition, licensee s should consider complying with the National Industrial Security Program Operators Manual (NISPOM), DoD 52200.22
-M, dated February 28, 2006, Incorporating Change 2, May 18, 2016, section 5-303 (Ref. 28), which states "SECRET material shall be stored in a GSA
-approved security container, an approved vault, or closed area. Supplemental controls are required for storage in closed areas."  2. Selection and Use of Locks t o Protect SGI
  The regulation at 10 CFR 73.22(c)(2)
require s SGI to be stored in a locked Security Storage Container when unattended.
 
Security Storage Containers, as defined in 10
CFR 73.2, "Definitions,"
"includes any of the following repositories:
(1) for storage in a building located within a protected or controlled access area, a steel filing cabinet equipped with a steel locking bar and a three position, changeable combination, GSA- approved padlock; (2) a security filing cabinet that bears a Test Certification Label on the side of the locking drawer, or interior plate, and is marked, General Services Administration Approved Security Container on the exterior of the top drawer or door; (3) a bank safe-deposit box; and (4) other repositories which , in the judgement of the NRC, would provide comparable physical protection."
Therefore, besides utilizing a defined Security Storage Container for the storage of SGI, other proposed storage containers may be submitted to the NRC for approval.
 
Under 10 CFR 73.22(c)(2) knowledge of lock combinations protecting SGI "- must be limited to a minimum number of personnel for operating purposes who have a
'need to know' and are otherwise authorized to access Safeguards Information in accordance with the provisions of this Section." Lock combinations to locks that protect SGI must be strictly controlled, per 10 CFR 73.2
2(a)(1)(vi), in order t o prevent disclosure to an individual that is not authorized to access SGI.  Locks are required for the protection of SGI per 10 CFR 73.22(c)(2). Locks suitable for the protection of SGI include:
  a. Combination locks installed in doors in, or leading to, areas containing SGI (i.e., open storage areas) should meet FF-L-2740 (if in vault doors) or should be pedestrian door deadbolts meeting FF
-L-2890 (for doors to vault
-type rooms).
  b. Combination padlocks protecting SGI
should be three-position, dial
-type changeable
-combination padlocks meeting FF
-P-110.
 
RG 5.12, Rev. 1, Page
14  3. Selection and Use of Locks and/or a Lock and Key Control System to Protect Facilities/SNM under Part 73 (Radioactive Materials, Spent Nuclear Fuel, High Level Waste , SGI, NSI, FRD, and RD), and Administrative controls For the protection of: 
(1) special nuclear material of a formula quantity, moderate strategic significance or low strategic significance, (2) a nuclear power plant, (3) classified matter/information or safeguards information, (4) spent fuel, (5) high level waste, or (6) quantities of radioactive material that fall under the jurisdiction of 10 CFR Part 37, a lock and key control system should be established. Key blanks and blank key cards can be of three types:  (1) available to the public, (2) restricted access, and
(3) unique to the site. A key blank or blank key card that is unique to the site may be numerically or alphanumerically stamped or otherwise configured in such manner that it is traceable by the licensee. Key blanks and blank key cards readily available to the public need not be recorded, controlled
, and inventoried.
 
For licensees who are licensed to possess radioactive materials under 10 CFR Part 37 and/or   
10 CFR Part 20, the guidance does not provide specific means to meet certain requirements, however the information within this RG as described in this section. may be useful in the development of a licensee's approach to meet security requirements.
 
The lock and key control system should include the following elements, where appropriate:
    a. Unimpeded emergency egress should be ensured from all parts of the facility, and the security hardware and systems should be designed and installed so as to not degrade life safety. Security hardware and systems should conform to applicable (state and local) fire regulations and building codes. In recognition of the competing needs of safety and security, the 2012 edition of the National Fire Protection Association's standard termed the, "NFPA 101:
  Life Safety Code ,"
(Ref. 2 9) suggests among other things, the use of "Key
-Operated Locks" (Section 7.2.1.5
.5), and "Special Locking Arrangements" (Section 7.2.1.6). The "Special Locking Arrangements" section includes provisions for delayed egress (Section 7.2.1.6.1) and access
-controlled egress (Section 7.2.1.6.2). Each section has a number of specifications for the locking mechanism, its release, and identification. For example, under the Life Safety Code, a nuclear power plant would be classified as an "Industrial Occupancy" with a sub-classification of "Light,"
"Ordinary," or "High Hazard.
 
" Light and ordinary industrial occupancy allow the use of special locking arrangements. Building codes often have similar requirements for egress while recognizing the need to provide security
.  b. The following guidelines are acceptable for the selection and use of locks in the protection of facilities and SNM
.  (1) Locks (locking systems) and all associated hardware should be properly installed, operable, and free of substantive indications of tampering. An explicit record should be maintained concerning such items as possible tampering marks and all service work rendered.
 
(2) Combination locks installed in doors inside of, or leading to, areas containing classified matter should meet FF-L-2740 (if in vault doors) or should be pedestrian door deadbolts meeting FF
-L-2890 (for doors to vault
-type rooms). Combination locks on classified storage containers (GSA
-approved security containers)
should meet FF-L-2740.
 
RG 5.12, Rev. 1, Page
15  (3) Locks on GSA
-approved containers and vault doors for arms, explosives and ammunition should meet FF-L-2937 or UL
768, Group
1. The requirements of FF-L-2937 include the requirements of UL
768, Group
1. Locks that meet FF-L-2740 should not be used to secure arms, explosives or ammunition in storage
.  (4) Combination padlocks, rather than key padlocks, should be used when practical on doors or gates to material access areas, in protected and vital area perimeters, and for access to vital equipment. Combination padlocks should be used on closed vehicles or containers holding SNM that are required to be locked. These combination padlocks should be three
-position , dial-type changeable
-combination padlocks meeting FF
-P-110.  (5) Key locks used in lieu of combination padlocks on doors or gates to material access areas, in protected and vital area perimeters
, and for access to vital equipment should provide a high degree of resistance to opening by force and tamper techniques. Locks should meet the requirements of UL 437, MIL
-DTL-4360, or MIL-DTL-29181, with respect to 15
-minute surreptitious neutralization resistance. Section B of this RG describes two such locking systems
.  (6) Key padlocks used in lieu of combination padlocks on doors or gates to material access areas, in protected and vital area perimeters
, and for access to vital equipment should be of rugged and sturdy construction and designed for outdoor use
, if necessary , and should meet FF-P-2827.  (7) Locks used in the protection of Categories I (formula quantity) and II (moderate strategic significance) SNM (for example locks used on security containers, safes, vaults) should meet FF-L-2740 or FF-L-2890. This is applicable to locks purchased or installed after the date July 14 , 19 94 , and for replacement of damaged equipment
.  (8) Electric locks should be used inside the protected area as a means of access control only if a magnetic card key system is coupled with a pushbutton system and integrated into the alarm system. This lock combination should have features that resist tampering with the combination
-changing mechanism and that alarm after a set number of errors in entering the combination are made. When consider i ng electric locks , the standards UL 1034 and ANSI/BHMA
A156.25-2013 should be utilized
.  (9) Mechanical locks used as panic locks on emergency exit doors within protected area perimeters should be operable only from the inside.
 
(10) Mechanical pushbutton locks should be used inside the protected area as a means of access control and should comply with ANSI/BHMA A156.5-200 1.  (11) For general purposes (no special requirements such as SGI, NSI, FRD, RD , radioactive material, spent fuel, high level waste or SNM), emergency egress locks should comply with ANSI/BHMA A156.2-200 3 , "American National Standard for Bored and Preassembled Locks & Latches
" (Ref. 3 0).  Regulations at 10 CFR 73.46 , and 73.50(c)(7) require licensees to control all keys, locks, combinations
, and related equipment used to control access to protected, material access, vital, and controlled access areas to reduce the probability of compromise. Whenever there is evidence that a key, lock, combination, or related equipment may have been compromised
, the item shall be changed.
 
RG 5.12, Rev. 1, Page
16  Consistent with
10 CFR 73.46(d)(14), "- U pon termination of employment of any employee, keys, locks, combinations, and related equipment to which that employee had access , shall be changed.
 
"  Under 10 CFR 73.51(d)(7) licensees are required to  "
establish a "-controlled lock system
-" in order "- to limit access to authorized individuals.
 
Furthermore, consistent with
10 CFR 73.55(g)(6)(i)
,  "[t]he licensee shall control all keys, locks, combinations, passwords and related access control devices used to control access to protected areas, vital areas and security systems to reduce the probability of compromise."
 
Per 10 CFR 73.70(h), each licensee
, subject to the provisions of 10 CFR
73.20, 73.25, 73.26, 73.27, 73.45, 73.46, 73.55, or 73.60
, shall keep records of procedures for controlling access to protected areas and for controlling access to keys for locks used to protect special nuclear material. The licensee shall retain a copy of the current procedures as a record until the Commission terminates each license for which the procedures were developed and, if any portion of the procedure is superseded, shall retain the superseded material for 3 years after each change.
 
Keys not returned may warrant the generation of a "Reportable Safeguards Event" per 10 CFR
  73.71 , "Reporting of safeguards events." 10 CFR Part 73 , Appendix G describes under I (c), a requirement that a reportable safeguard event is
"[a]ny failure, degradation, or discovered vulnerability that could have allowed surreptitious entry into a protected area, material access area, controlled access area, vital area, or transport, for which compensatory measures have not been employed" and therefore may be applicable
 
when keys are not returned. Applicability depends upon the specific type of licensee/applicant and protection the lock was providing.
 
c. Administrative controls for a lock and key control system should include the following elements, where appropriate:
  (1) A specific individual (usually a lock and key custodian) should be designated as responsible for all keys
, locks, combinations, key cards, key codes , and keying records. All keys permanently assigned and not retained by the security organization should be recorded and tracked by a receipt
, and the key custodian should retain the original receipt.
 
(2) A record of all locks, cores, keys, key blanks, and cards should be maintained and kept in a location secured by a combination lock. These records should be protected to the same degree or greater than the protection provided to the information, matter, SNM, radioactive material, or facility records being protected by the locks. This lock and key control record should identify the number of keys for each lock and their location and should note whe n a lock was changed, rekeyed, or rotated.
 
(3) A log of keys and key cards should be maintained that includes:
(1) key identification, (2) user, and
(3) times/dates issued and returned.
 
(4) Keys, key blanks, combinations
, and key cards not in use should be protected adequately from theft, alteration, and measuring or reading.
 
For example keys, combinations and key cards not in actual use should remain in an individual's possession at all times and not left unattended.
 
(5) Keys and combinations should be issued only to individuals who are authorized users and whose official duties require use of the security key/combination. For example, RG 5.12, Rev. 1, Page
17  keys should only be issued to those persons who have the responsibility for accessing specific locations for their assigned conduct of business. The licensee should maintain, supervise, and annually review an authorized access list (for example, those who require access to security keys) for this purpose.
 
(6) A lock and key control system should include procedures for verifying the identity of the individual requesting the keys or combinations and determining the individual is authorized access to all areas unlocked by the keys or combinations provided.  (7) Keys, key blanks, key codes, key cards
, and written combinations should not be removed from the site, except when specifically approved by the security plan.
 
(8) Keys should be issued daily, as required , and should be returned immediately thereafter or at the end of the duty shift.
 
(9)        Keys should be inventoried during change of custody (usually each shift change).
            (10)      Master keying should not be practic ed , except whe n safety and security
 
considerations are an overriding factor.
 
(11)     
Any lock hardware removed from service should go directly to the locksmith                   
 
responsible for the system or be secured
.              (12)      Unused locks, cores, keys, key blanks
, and cards should be stored in a location secured by a combination lock.                      (13)      The licensee should conduct a n annual physical inventory of those locks, cores, keys, key blanks, and cards used for the protection of facilities and a bimonthly inventory of those locks used for the protection of SNM. The lock and key control record should confirm the results of the inventory
.              (14)     In accordance with 10 CFR Part 50, Appendix R, Requirement III.N.4., the fire        brigade leader shall have ready access to keys for any locked fire doors. The fire        brigade leader should be properly authorized for unescorted access to information,        SNM, classified matter, or a facility before granting access to keys that would provide        such access. If the fire brigade leader is not authorized for unescorted access,          procedures for escorting the fire brigade leader should be developed and personnel trained on the correct responses.
 
(15)    Beyond site
-specific persons who require access to certain areas, offsite persons may
 
have the need to access certain site areas.
 
(16)    The licensee should establish, and document in the physical security plan, a system for changing locks, keys, key cards, combinations
, and related equipment. This should include a documented procedure by which to train personnel on the correct processes related to the following:
  i. Licensees should change locks, keys, key cards, combinations
, and related equipment used to control access whenever there is evidence that they may have been compromised. Determination of what constitutes possible compromise is subject to judgment, however, the security plan should describe RG 5.12, Rev. 1, Page
18  factors to be considered
. Generally speaking, compromise has occurred when an unauthorized person has gained internal access to a lock and its cylinder, been informed of its combination or code, gained possession of its key or key blank, or when a lock, key, key blank, key card, or written combination or code has been removed from the site without authorization or has been lost.
 
ii. If an employee is transferred under less than favorable condition or has an access authorization terminated or suspended under less than favorable conditions, then the keys, key cards, key codes, control keys, combinations, and related equipment to which an employee had access should be changed. However, a licensee need not replace the affected locks.  iii. If a core, key, or card is lost or missing; the lock, core, key, or card has been compromised; or unrecorded keys or cards are found , then locks should be changed or cores replaced and an inventory conduct ed as soon as possible
. In a lock system that is master
-keyed, a complete remastering of the system should be conducted whenever a core, card, master
, control key, or a lock is lost or compromised
. In addition, these change processes should be conducted after an employee who had access to these components of a lock/key system is terminated or loses access under less than favorable conditions.
 
iv. Combinations should be changed before putting combination lock device s into service.  v. The licensee should change key codes and combinations for locks or padlocks used on repositories containing SNM or used on gates or doors to material access areas, in protected and vital area perimeters, and for access to vital equipment , at least once every
6 months. Keys and locks should be changed or rotated at least once every 12 months.
 
vi. Deadbolts securing doors should have either a
1-inch lateral throw or use multiple vertical engagements with its strike.
 
vii. O ut-swinging doors and in
-swinging double doors without mullions should be equipped with securely mounted astragals or guard plates.
 
viii. Exterior or exposed cylinders should be rim, bored auxiliary or mortise lock mounted and should be protected with
:  (1) a cylinder guard
, or (2) a substantial collar , which is tapered, extends beyond the face of the cylinder, and rotates independently when torque is applied.
 
ix. Whe n electr onic locks are used on safety
-related areas, the licensee should ensure prompt emergency ingress into the areas by essential personnel during any postulated occurrence by:  (1) using a combination of reliable and uninterruptable auxiliary power to the entire electrical locking system, including its controls , (2) providing the electrical locking devices, which are required to fail in the secure mode for security purposes, with secure mechanical means and associated procedures to override the devices upon loss of both primary and auxiliary power (e.g., key locks with keys held by appropriate personnel who know when and how to use them)
, or (3) providing RG 5.12, Rev. 1, Page
19  periodic tests of all locking systems and mechanical overrides to confirm their operability and their capability to switch to auxiliary power.
 
For specific examples of how to secure radioactive material through the use of locks, in addition to the appropriate elements discussed in Section C.3.
 
"Selection and Use of Locks and/or a Lock and Key Control System to Protect Facilities/SNM under Part 73, Radioactive Materials, Spent Nuclear Fuel, High Level Waste, SGI, NSI, FRD, and RD
," there is information on how to secure radioactive material through the use of locks in NUREG-2155, Rev. 1, "Implementation Guidance for 10 CFR Part 37, Physical Protection of Category 1 and 2 Quantities of Radioactive Material," dated January 2015, (Ref. 3 1) and NUREG-2166, "Physical Security Best Practices for the Protection of Risk-Significant Radioactive Material," dated May 2014 (Ref. 32). 
RG 5.12, Rev. 1, Page
20 
 
==D. IMPLEMENTATION==
The purpose of this section is to provide information regarding the NRC's plans for using this regulatory guide and information on how the following entities ("applicants and licensees
1") may use this guide:  applicants for, and holders of: (1) licenses issued under 10 CFR Part 70 to possess or use, at any site or contiguous sites subject to licensee control, a formula quantity of strategic special nuclear material, as defined in 10
CFR 70.4; (2) operating licenses for nuclear power reactors under 10
CFR Part 50; and (3) approvals issued under subpart B, C, E, and F of Part 52 ("protected applicants and licensees");
  applicants for, and holders of, operating licenses for nuclear non
-power reactors under
10 CFR Part 50;
  applicants for, and holders of, licenses for industrial radiography under Part 34;
  applicants for, and holders of, licenses for medical use of byproduct material under Part 35;  applicants for, and holders of, licenses for irradiators under Part 36;
  applicants for, and holders of, licenses authorizing the possession of an aggregated category 1 or category 2 quantity of radioactive material listed in Appendix A to 10
CFR Part 37;  applicants for, and holders of, licenses for well logging under Part 39
;  applicants for, and holders of, licenses, certificates, and other NRC approvals, who protect safeguards information regulated by the Commission under 10
CFR 73.21-73.23; and  applicants for, and holders of, licenses, certificates, and other NRC approvals
, who may protect Secret and Confidential NSI, RD, and FRD received or developed in conjunction with activities licensed, certified, or regulated by the Commission under Part 9
5. In addition, this section describes how the NRC staff complies with the backfitting provisions found in 10 CFR 50.109(a)(1) and 10
CFR 70.76(a)(1), or any applicable issue finality provisions in 10
CFR Part 52, in its use of this regulatory guide.
 
Use by Applicants and Licensees Applicants and licensees may voluntarily
2 use the guidance in this document to demonstrate compliance with the underlying NRC regulations. Methods or solutions that differ from those described in this regulatory guide may be deemed acceptable if they provide sufficient basis and information for the NRC staff to verify that the proposed alternative demonstrates compliance with the appropriate NRC regulations. Current licensees may continue to use guidance the NRC found acceptable for complying with the identified regulations as long as their current licensing basis remains unchanged
. The acceptable guidance may be a previous version of this regulatory guide.
 
1  In this section, "licensees" refers to licensees of nuclear power plants under 10 CFR Parts 50 and 52; and the term "applicants," refers to applicants for licenses and permits for (or relating to) nuclear power plants under 10 CFR Parts 50 and 52, and applicants for standard design approvals and standard design certifications under 10
CFR Part 52.
 
2  In this section, "voluntary" and "voluntarily" means that the licensee is seeking the action of its own accord, without the force of a legally binding requirement or an NRC representation of further licensing or enforcement action.
 
RG 5.12, Rev. 1, Page
21  Licensees may use the information in this regulatory guide for actions that do not require NRC review and approval. However, voluntarily using the subject matter in the guidance may change a licensee's security plan such that NRC review may be required under the provisions of 10
CFR 50.54 or 10
CFR 70.32, and should be evaluated prior to incorporating the methods into the security plan. Licensees may use the information in this regulatory guide or applicable parts to resolve regulatory or inspection issues.
 
Use by NRC Staff The NRC staff does not intend or approve any imposition or backfitting of the guidance in this regulatory guide. The NRC staff does not expect any existing licensee to use or commit to using the guidance in this regulatory guide, unless the licensee makes a change to its licensing basis. The NRC staff does not expect or plan to request licensees to voluntarily adopt this regulatory guide to resolve a generic regulatory issue. The NRC staff does not expect or plan to initiate NRC regulatory action that would require the use of this regulatory guide without further backfit consideration for protected licensees. Examples of such unplanned NRC regulatory actions include issuance of an order requiring the use of the regulatory guide, issuance of generic communication, or promulgation of a rule requiring the use of this regulatory guide. During regulatory discussions on licensee
-specific operational issues, the staff may discuss with licensees various actions consistent with staff positions in this regulatory guide, as one acceptable means of meeting the underlying NRC regulatory requirement. Such discussions would not ordinarily be considered backfitting for protected licensees even if prior versions of this regulatory guide are part of the licensing basis. However, unless this regulatory guide is part of the licensing basis, the staff may not represent to the licensee that the licensee's failure to comply with the positions in this regulatory guide constitutes a violation.
 
If an existing licensee voluntarily seeks a license amendment or change and (1) the NRC staff's consideration of the request involves a regulatory issue directly relevant to this revised regulatory guide and (2) the specific subject matter of this regulatory guide is an essential consideration in the staff's determination of the acceptability of the licensee's request, then the staff may request that the licensee either follow the guidance in this regulatory guide or provide an equivalent alternative process that demonstrates compliance with the underlying NRC regulatory requirements.  This is not considered backfitting as defined in 10 CFR 50.109(a)(1) or 10
CFR 70.76(a)(1), or any applicable finality provisions in 10
CFR Part 52.
 
If a protected licensee or applicant believes that the NRC is either using this regulatory guide or requesting or requiring the protected licensee or applicant to implement the methods or processes in this regulatory guide in a manner inconsistent with the discussion in this Implementation section, then the protected licensee or applicant may file a backfit appeal with the NRC in accordance with the NRC Management Directive 8.4, "Management of Facility
-Specific Backfitting and Information Collection" (Ref. 33 ) and the guidance in NUREG
-1409, "Backfitting Guidelines" (Ref.
 
34). 
RG 5.12, Rev. 1, Page
22  GLOSSARY  access control
- any barrier, device or administrative control
, that limits or prohibits, free or unlimited access.  ANSI-American National Standards Institute, the coordinator of America
's voluntary standards system. The system meets national standards needs by marshaling the competence and cooperation of commerce and industry, standards developing organizations, and public and consumer interests. ANSI specifications listed in this manual have been adopted by the U.S. Department of Defense (DoD).  astragal-A member fixed to, or a projection over, an edge of a door or window to cover the joint between the meeting of stiles. It is usually fixed to one of a pair of swinging doors to provide a seal against the passage of weather, light, noise, or smoke.
 
auxiliary lock-A lock installed on a door or window to supplement a previously installed primary lock. It is also called a secondary lock. It can be a mortised, bored, or rim lock.
 
bevel (of a door)
-The angle of the lock edge of the door in relation to its face. Bevel (of a latch bolt) is a term used to indicate the direction in which a latch bolt is inclined:
regular bevel for doors opening in and reverse bevel for doors opening out.
 
BHMA-Builders Hardware Manufacturers Association. The association manufactures builders'
hardware and publishes BHMA standards.
 
bolt-The part of a lock which, when actuated, is projected (or thrown) from the lock into a retaining member, such as a strike plate, to prevent a door or window from moving or opening.
 
case-The housing in which a lock mechanism is mounted and enclosed.
 
CFR-Code of Federal Regulations control key
-A key whose only purpose is to remove or install an interchangeable or removable core
.  core-The innermost part of a key lock where the key is accepte
 
====d. The terms ====
"lock core" and "lock cylinder" are sometimes used interchangeably
, but the cylinder is actually the part that surrounds the core.  cylinder-The cylindrical subassembly of a lock, including the cylinder housing, cylinder plug, tumbler mechanism, and keyway.
 
cylinder lock-  1. A lock in which the locking mechanism is controlled by a cylinder. A double-cylinder lock has a cylinder on both the interior and the exterior of the door.
 
2.  A lock cylinder that has a threaded housing that screws directly into the lock case with a cam or other mechanism to engag e the locking mechanism (mortise cylinder).
 
RG 5.12, Rev. 1, Page
23  dead bolt lock-Any lock designed in such a manner that when the bolt is extended, it cannot be pushed back or opened with pressure against the end of the bolt.


double door-A pair of doors mounted together in a single opening.
Attention: Ol,.ctor Ato= WcEoe
                                                                                                              9RmltrySedre C
                                                                                                                                        Wahngton. D.C. 20545.


knob-An ornamental or functional round handle on a door, which may be designed to actuate, lock, or latch. latch-Any spring or mechanical device used to secure doors and other opening
-onlsn uset and suggestions for.


====s. Latches can be key====
smathods, acceptabie to the. AIECRepulatory staff of implemesstinq Wecit 11a"no .4    spiosen waninthanI mmuade we encouraged amidshoulid be sen to the Sectotars, tim Comm111460's rem~lultlom. to 404ae~1 techniques musd by 1w staff on            of alsoCotonissien, US. Atomic 6u.vCommission, Wedthngton. D.C. 20615, esmlueting specific problems or postulated accidmnts. or to provide guiqens. to    Attention -Chilef.PublicProceedingsStff.
- or lever-operated; they provide a low level of security.


latch (or latch bolt
applicants. Regulatory Guides weanot substiwita hr mqgulshlons end  N      Noiipnm omth them, is not reclired. Mothoda end soltitons different fom thI wI Saoton      The5guede am issued Imthe following tan broad divisions:
)-A beveled, spring
sheil umdswill be acceptable if tlmeylpow. a basis #or few findingi reQuisrte to m onmnen oa erit or lmcene by the Commintsion.
-actuated bolt that may or may not include a deadlocking feature.


lock manipulation
11wmiued                                                                    I  Power  Rosctort                  0. Products z.   Remairds and Test Reactors       
-The opening of the combination lock without alteration of the physical structure or disarranging of parts. Ordinarily, manipulation would be done by moving the lock dial.


master k ey-A key that will operate two or more locks that can also be operated with their own change keys. master key system-A method of keying locks that allows a single key to operate multiple locks, each of which will also operate with an individual change key. Several levels of master keying are possible:   A single master key is one that will operate all locks of a group of locks with individual change keys.
===7. Transportaitoin===
                                                                                    3.    Fuels and Matalriela Pacilitres  U. Occupat~onal Health Publasied gutdot vall be reme~nd    pooodscsmly.  es aopropo~ts. to accommnodate    4.    Environmental end Sitime          9. Antitrust Revew"
commn"nt and somaelect no5wmnfornmotmn    or esperlence.                            5Materials end Plant Protection    SO.General


A grandmaster key will operate all locks of two or more master key systems.
the hack of lhe lock case ito ,clea- the wheels from: their                            Combin;tlion locks can be set t) a single presenlt combinalion while a new combination Is                        number to simplify the daily chore ofopeni.g, but this imposed by dialing.                                                      is.a very poor practice since it reduces the se'urity olthe lock. Frequently four-wheel locks are set to only three The      'nhiaigi    ii1  .*,el  hocIti cans he          different numbers for ease tf openin


A great grandmaster key will operate all locks of two or more grandmaster key systems. Master key systems are used primarily with pin tumbler locks.
====g. This deifcats thw====
    'ovesIly de:rllhiilu  l hy usig a tadiographic technique.            purpose of the Iourth wheel but it is not considercd Rcsista*ce it'I his is o lallack is designcd into certain              serious since the number of remaining combination locks by wi ilhilg nuilcials in Use munechanism that are                choices is considered adequate. It is not reconinicnded
  11111easily aadiogr: pMIed. V.g.. plastcS.                              thal one select combinations in common sequences and multiples of ten. It is also not generally recommended (Coihil a lioli      locks are vulnerable to                that the last number of a combination be set close to cemanpromise if the hack of the lock is readily available,              zero because in some cases the lock can jam.


mortise lock-A lock in which the case is recessed into the edge of a door in a recess specifically cut out to receive it.
e.g.. when the lockable access is open. Removing the brck cover from the lock usually allows the combination                        c.    Standards and Specificatiomn. A standard for to be determined. The combinations of some key-change                  three. or four-tumbler combination locks issued by locks can be changed directly when the lock is in the                   Underwriters' Laboratories, U,-768, "Combination open- position, while other must have the existing                      Locks,"' covers "combination locks designed for combination redialed to a different index when the                      attachment on doors of safes, cheits, vaults, and' the like access is in the open position to permit the combination                to provide a means of locking the boltwork against change. The former type permits an intruder to make a                   unauthorized opening." Quality assurance provisions quick change of the combination to one of his own                        covering the description, examination, and testing of the choosing; this would permit him to enter following the                  product am included through the UL Label Service. A
closing of the lock and would deny entry to the user.                    Federal Specification issued for combination padlocks.


mullion- 1. A movable or fixed center post used on double door openings, usually for locking purposes.
For these reasons it is desirable to protect the back of                FF-P-IIOF, 'Padlock, Changeable Combination the lock by back plates or other devices.                               (Resistant to Opening by Manipulation and Surreptitious Attack),'      'Includes quality assurance provisions for High-quality combiination locks are designed                design, materials, and performance testing.


2. A vertical or horizontal bar or divider in a frame between windows, doors, or other openings.
for use in two basic forms: (I) in a lock case to be mounted on or into a door as a mortise or rim lock and                 


padlock-A detachable and portable lock.
===2. Key Locks===
(2) as a padlock.


security storage container -Per 10 CFR 73.2 "Definitions," a Security Storage Container is any of the following repositories:
a. GeneraL As in the case of combination locks Protection against forcible attack of a mortise            It is desirable for a key lock to be capable of being set elr rin-mounted lock can be increased if the lock is                    for a larp, number of different kiys. A high-quality provided with hardened steel plates and If the lock is                  six-pin lock with 10 key cutting levels per pin designed with relocking triggers or devices that deadlock              potentially permits 106 different keys to be used.
  Within a building located in a protected or controlled assess area; a steel filing cabinet equipped with a steel locking bar and a three position changeable combination GSA
- approved padlock;


RG 5.12, Rev. 1, Page
the bolt or bolt-actuating mechanism.                                   However, this large number of key cuts is not as useful as a larIp number of combinations because less Combination padlocks are not vulnerable to                time.consuming techniques for defeating key locks .are the usual rapping techniques and are usually resistant to              available. Nevertheless, there Is value In specifying at manipulation. However, common combination padlocks                      least 10          key cuts because it requires careful made of a *cast aluminum alloy are without great                        construction of the lock.
24    A security filing cabinet that bears a Test Certification Label on the side of the locking drawer, or interior plate, and is marked
"General Services Administration Approved Security Container
" on the exterior of the top drawer or door;
  A bank safe
-deposit box; and Other repositories which in the judgment of the NRC would provide comparable physical protection.


security system-The compilation of all elements that make up the physical protection program necessary to meet 10
strength, have little resistance to forcible attack, and are not weather resistant. There are others that are weather                              It is important that the key 'c60 required to resistant but offer little protection against attack.                  open a lock (bitting of a lock) be changeable to permit changes whenever keys are lost or an employee having b.    Combimtion Lock            Control.    The mint          access to a key is reassigned to other duties or important aspect of lock control for comnbinatlon locks is the protection of the combination. It Is desirable to changb the combination of a lock every time that a                              'Copvie nay be obtained from the offie and testing person who knows the combination no longer requires it                  stations of Underwriters' Laboratories, Inc located at the as a result of termination or reassignment of duties. This              following addreses: 207 East Okle Street, Odcag, ill. 60611;
CFR Part 73 requirements, such as equipment, personnel, procedures, and personnel practices, to include the way in which each element interacts with and effects other elements (RG
would assure that only those Individuals actually                        333 Plnpften Road, North1kok., 1IL 60062; 1285 Waft required to gain access would know the combination.                      Whitman Road, Melille, I, N.Y. 11746; 1655 Scott BouevUrd, Santa Clara. Calif. 95050.
5.76 , "Physical Protection Programs at Nuclear Power Reactors
"). shackle-The movable part of a padlock that does the fastening.


strikeplate-A metal plate designed to be secured to the door frame and accept the lock, bolt, or latchwhen the door is closed.
Losing the combination of a manipulation.                          IC6pies may be- obtained from busizess service centers of proof, wdl-dsigned lock in a high-rated door is an                      the General Services Adnin,          Reglonal Omca located in expemive dtlation. This can be prevented by keeping a                  tih follwtg ili:            =      Miq,lieNew York, N.Y.;
record of the combination in another location which is                   Washin0om, D.C.; Ft. WWOmTex birce. Cob.; S&Ps
                                                                        :ranchc, Calif.; Atlanta, Ca.


surreptitious entry-Gaining entry through a locked device or security container in such a manner tha t  evidence of the act will not be readily discernible during normal operation of the locking unit or during inspection by a qualified person.
G"C          IVI; Kaxua City, Me as secure as the place protected by the lock.                            Los Arspim Calif.; Settile. Wash.


UL-Underwriters Laboratories, Inc. This for-profit national testing laboratory tests and lists or labe ls various categories of equipment for safety and reliability. It also publishes standards for a wide range of products, including security products
5.I12.2
.   
RG 5.12, Rev. 1, Page
25  REFERENCES
3  1. U.S. Code of Federal Regulations (CFR), "Domestic Licensing of Production and Utilization Facilities,"
Part 50, Title 10, "Energy." 
  2. CFR , "Licenses, Certifications and Approvals for Nuclear Power Plants
," Part 5 2 , Title 10, "Energy." 
  3. CFR , "Domestic Licensing of Special Nuclear Material ," Part 70, Title 10, "Energy."
  4. CFR, "Licensing Requirements for the Independent Storage of Spent Nuclear Fuel Independent Storage of Spent Nuclear Fuel, High
-Level Waste, and Reactor
-Related Greater than Class C Waste ," Part 72, Title 10, "Energy
."  5. CFR , "Physical Protection of Plants and Materials ," Part 73, Title 10, "Energy." 
  6. CFR , "Standards for Protection Against Radiation," Part 20 , Title 10, "Energy." 


7. CFR, "Protection of Category 1 and Category 2 Quantities of Radioactive Material," Part 37, Title 10, "Energy."
terminated. ('hanging the hitting of a lock in' be                        c.   Standards and Specifications. A standard t'oi accomplished usually by changing pins, wafers, or lcvers.           key locks has been issued by Underwriters' Laboratories.
  8. CFR, "Facility Security Clearance and Safeguarding of National Security Information and Restricted Data
," Part 95, Title 10, "Energy." 
  9. NRC, Regulatory Guide (RG)
5.79, "Protection of Safeguards Information,"
Washington, DC. 10. NRC , NUREG-1964, "Access Control Systems
," Washington, DC, February
2007. (ADAMS No. ML11115A078
)  11. Lock Industry Standards and Training Council, "The Professional Locksmith Dictionary," 2012.


4  12. General Services Administration (GSA), Federal Specification FF-L-2740, "Locks, Combination Electromechanical
To case the task of a bitting change, some locks have                UL-437, "Key Locks."' and lnclud quality assurance provisions through the UL. Label Service. Interim cores that are removable for replacement by means of a special key called a "control key." If all the locks in a          Federal Specification FF-P-001480 (GSA-FSS),
," including Amendment s.5                                           
  given facility are keyed to the same.control key, the              "Padlock, Key Operated (Resistant to Opening by Force, Pick, and Bypass Techniques)," 2 covers two locks are virtually master keyed because, with the core            types of key-operated dead-bolt padlocks: the exposed removed, the problem of opening the lock is elementary.            shackle and the ..shrouded shackle. (4ility assurance provisions concerning the design, materials, and Master keying is undesirable from a security point of view because disassembly and inspection of any            qualification testing are included.


3  Publicly available NRC published documents are available online through the NRC Library on the NRC's public Web site at http://www.nrc.gov/reading
lock In the system by a competent person provides access to all the other locks in the master-keyed system,          3.     Electric Locks and because termination of an employee who had access to a master key would require changing the bitting of all                a. General. In the most popular electric locks, a locks set for his master key. The changing of the bitting          signal generated by magnetized elements in a plastic card of a large number of locks can be costly, but the                  or by sequential activation of buttons is compared with convenience of master systems is such that there is                a stored code to activate an electrically operated door strong pressure for using them. A compromise in this                strike, in some cases the magnetic card, and pushbutton conflict between convenience and security may be to use            systems are used in coincidence. Combined card and a nonmastered set of locks for protected areas, material            pushbotton systems provide, in general, higher security access areas, vital areas, and access to vital equipment            than card-only systems.
-rm/doc-collections/
and through the NRC's Agencywide Documents Access and Management System (ADAMS) at http://www.nrc.gov/reading
-rm/adams.html. The documents can also be viewed online or printed for a fee in the NRC's Public Document Room (PDR) at 11555 Rockville Pike, Rockville, MD. For problems with ADAMS, contact the PDR staff at 301
-415-4737 or (800) 397
-4209; fax (301) 415
-3548; or e
-mail pdr.resource@nrc.gov
.  4 The lock dictionary may be found at http://www.locksmithingeducation.com/LIST_Dictionary.pdf


5  For all federal and military specifications, refer to the most current revision, which includes amendments (if applicable). Federal Specifications for locks could be found at:  http://www.navfac.navy.mil/navfac_worldwide/lock program Or Call the DoD Lock Program Technical Support Hotline:
and to permit master key sets for other less sensitive areas.                                                                          The advantages of the electric lock are isolation of the part containing the code from the It is necessary for a lock to have some                r "posed part of the lock, versatility of programming, resistance to picking and impressioning (a method used              afid ease of integration into alarm systems.
(800) 290-7607, (805) 982
-1212, DSN 551
-1212 Other federal agency websites that may contain such information:
Air Force
-  http://www.e
-publishing.af.mil/
Army - http://www.army.mil/usapa/epubs/index.html Federal Specifications
- http://www.gsa.gov/portal/content/170591


RG 5.12, Rev. 1, Page
to prepare a key by the impressions of the bitting of a lock on a blank key). In general, this resistance can be                        Magnetic card systems have some of the provided by precision machining of the mechanisms or                problems of common key locks because a lost or stolen by special design features such as side bars, odd-shaped            card can be used by an unauthorized person. Howeve%,
26  13. Underwriters Laboratories Inc. (UL), Standard UL
pins or a large number of levers.                                   reproduction of a card is more complicated than reproduction of a metal key.
768, "Standard for Combination Locks," January 6, 2006.


6  14. GSA-approved , Federal Specification for FF-L-2937, Combination Locks, Mechanical
Protection of key locks against forcible attack Pushbutton systems require memorization of can be enhanced by the use of hardened steel plates in front of the pins or side bars.                                   a few digits, usually four, and require more time to operate than the magnetic card system. Although the It is essential for a bolt of a lock to be            number of possible combinations usually is smaller than retained in the locked position by positive means (dead            in the combination lock system, quality electric bolt). In some locks, the bolt isheld in a locked position          pushbutton systems compensate for this by by a spring only. This permits. in the case of padlocks,            incorporating devices which prevent trial and error the use of appropriate rapping or shimming techniques              methods of surreptitious attack by activating an alarm and, in the case of door locks, the opportunity to                  after a number of unsuccessful attempts or by surreptitiously retract the bolt without the use of force.         introducing a delay after each unsuccessful attempt which prevents operation of the lock for a short period b. Lock Control. The security of an access                  of lime.
, including Amendments. 15. GSA, Federal Specification FF-L-2890, "Lock Extension (Pedestrian Door, Deadbolt)," including Amendmen ts. 16. GSA, Federal Specification FF-P-110, "Padlock, Changeable Combination (Resistant to Opening by Manipulation and Surreptitious Attack)," including Amendment s.   17. National Archives and Records Administration, Information Security Oversight Office, 32 CFR Parts 2001 and 2003, RIN 3095
-AB63, Implementing Directive No. 1, Classified National Security Information, Final Rule, June 25, 2010
.7  18. American National Standards Institute (ANSI) / Builders Hardware Manufacturers Association (BHMA) A156.5-2014 "Cylinders and Input Devices for Locks,"
January 24, 2014
.8  19. MIL-DTL-43607H, "Padlock, Key Operated, High Security, Shrouded Shackle," March 10, 1998, U.S. Department of Defense Military Specifications, including MIL-DTL-43607H, NOTICE
1, "Notice of Inactivation for New Design, Padlock, Key Operated, High Security, Shrouded Shackle," May
22, 2000.


20. UL , Standard UL
control system based on key locks depends on complete denial of keys to unauthorized persons. It is essential to                      It is desirable for an electric lock to have the have a record of each key and the names of individuals            capability for an easy change of combinations. The part to whom keys have been issued and to check all keys at            of the lock where the combination is set and the housing periodic intervals.                                                of the card reader (if the contents of the housing can reveal the combination) should be protected against A common weakness in mastered key systems            tampering by tamper switches connected to the alarm is the lack ot accountability of lock cylinders. To correct        system.
437, "Key Locks," March
16, 200 4.  21. American Society for Testing and Materials International (ASTM), Standard B-117 -07a, "Standard Practice for Operating Salt Spray (Fog) Apparatus," December
12, 2007.9  22. ASTM F883, "Standard Performance Specification for Padlocks," May
1, 2004.  23. GSA , Federal Specification FF-P-2827 , "Padlock, Key Operated, General Field Service," November 27, 2002.  24. MIL-DTL-29181, "Hasp, High Security, Shrouded, for High and Medium Security Padlock," U.S. Department of Defense Military Specifications, March
10, 199


===8.     ===
this situation, it would be necessary to require a control system involving the accountability of every mastered                          Generally, where electric locks are installed, a lock cylinder having the bitting in present use either for        mechanical lock is also installed as a bypass. This lock the master or, in the case of removable cores, the control        should be of a quality as discussed in the part on key key.                                                              locks in this guide.


6  Copies of UL standards may be purchased from UL, 151 Eastern Avenue, Bensenville, IL 60106;
5.12-3
  Telephone:
Toll-free:  1-888-UL33512 or 1
-888-853-3512.  Purchase information is available through the UL Website at http://ulstandards.ul.com/access
-standards/
  Or http://www.comm
-2000.com/Catalog.aspx
  7  Copies of "Classified National Security Information; Final Rule
" can be found at:
  http://www.archives.gov/isoo/policy
-documents/isoo
-implementing
-directive.html
  8  Copies of American National Standards Institute (ANSI) standards may be purchased from ANSI, 1819 L Street, NW. Washington, DC 20036, on its Web site at http://webstore.ansi.org/; telephone (202) 293
-8020; fax (202) 293
-9287; or e-mail storemanager@ansi.org.


9  Copies of ASTM standards may be purchased from ASTM, 100 Barr Harbor Drive, P.O. Box C700, West Conshohocken, PA 19428
b. Lock Control. The security ofan clectric lock    protected and vital area perimeters, and for access to system depends on strict control or combinations and       vital equipment in preference to key padlocks.
-2959; telephone 610
-832-9585. Purchase information is available through the ASTM Web site at http://www.astm.org
RG 5.12, Rev. 1, Page
27  25. UL , Standard UL 1034, "Burglary
-Resistant Electric Locking Mechanisms," February
23, 2000.  26. ANSI/BHMA A156.25
-20 1 3 , "Electrified Locking Devices," August 12, 2013
.  27. International Atomic Energy Agency (IAEA), Nuclear Security Series No. 13, "Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5)
," Vienna, Austria, 2011.


10  28. National Industrial Security Program Operators Manual (NISPOM), "DoD 52200.22
cards. The magnetic codes in the cards and the              Combination padlocks should be used on dosed vehicles combinations need to be changed whenever an employee        or containers holding SNM that are required to be having had access to them terminates or is reassigned.     locked. Combination padlocks should be three-position.
-M, dated February 28, 2006, Incorporating Change 2, May 18, 2016, section 5
-303," May 2016.


11  29. National Fire Protection Association (NFPA) Standard, "NFPA 101: Life Safety Code ," 2012.12  30. ANSI/BHMA A156.2
Strict accountability of cards Is strongly recommended.    dial type changeable-combination padlocks meeting Federal Specification FF-P-I I OF, "Padlock, Changeable c.  Standards and Specifications. There are          ('ombination (Resistant to Opening by Manipulation and currently no comprehensive standards or specifications      Surreptitious Attack)." 2 covering electric locks. The reputation of the manufacturer, the specification 'for his product. and the  3. Key locks used in lieu of combination padlocks on experience of users must be carefully considered in their    doors or gates to material access areas, in protected and selection and use.                                          vital area perimeters, and for access to vital equipment should provide a high degree of resistance to opening by
-20 0 3, "American National Standard for Bored and Preassembled Locks & Latches," July 2011.
4.    Pushbutton Mechanical Locks                          force and tamper techniques and should meet Underwrite' Laboratories UL-437, "Key Locks."'
        a. General. This is a type of combination lock utilizing mechardcal-pushbutton-activated linkages that    4., Key padlocks used in lieu of combination padlocks connect a gate with an external knob topermit opening      on doch or, ptes to material access areas, In protected of the lock. In this lock it is difficult to design in      and vital area perimeters, and for access to vital penalties for punching a wrong combination as is done in    equipment should be of nugged and sturdy construction electric locks. Therefore, it is important to have a large and designed for outdoor use if necessary, and should number of possible combinations.                            meet Interim Federal Specification FF-P-001480 (GSA
                                                            FSS), "Padlock, Key Operated (Resistant to Opening by Provisions for easy change of combinations      Force, Pick, and Bypass Techniques)."'2 are desirable. Some locks permit a new combination to be dialed in utilizing an Allen wrench when the lock is    S.       -ýtric locks should be used inside the protected open, a procedure similar to that for some combination      area a, a means of access control only If a magnetic card locks. Others require the replacement of Internal parts to  key syysezn is coupled with a pushbutton system and change the combination.                                        !' i,.d into the alarm system. This lock combination should have features that resist tampering with the combination-changing mechanism and that alarm after a The mechanical locks appear to be fairly resistant to concealed attack: however, more                set number of errors in punching the combinations is information is needed on their resistance to forcible      made.


31. NRC, NUREG-2155, Rev. 1, "Implementation Guidance for 10 CFR Part 37, 'Physical Protection of Category 1 and Category 2 Quantities of Radioactive Material,'
attack.                                                     6. Pushbatton mechanical locks are not recommended for use at this time because of the lack of comprehensive b. Lock Control. Similar to other combination        standards and specifications against which the locks can locks, the combinations need to be changed when            be evaluated.
" January 2015.


32. NRC, NUREG-2166, "Physical Security Best Practices for the Protection of Risk
employees having access to the combination terminate or arereassigned.                                           7. Mechanical locks used as panic locks on emergency exit. doors within protected area perimeters should be c. Quality Assurance. There are currently no        operable only from the inside.
-Significant Radioactive Material
," May 2014. 33. NRC, Management Directive
8.4, "Management of Facility
-Specific Backfitting and Information Collection," October
2013. (ADAMS Accession No.


ML12059A460)
comprehensive standards or specifications for mechanical pushbutton locks.                               8.. Combinations, keys and locks should be controlled, protected and changed in accordance with the following
  34. NRC, NUREG
-1409, "Backfitting Guidelines," Washington, DC.


10 Copies of International Atomic Energy Agency (IAEA) documents may be obtained through its Web site http://www.IAEA.org or by writing the International Atomic Energy Agency, P.O. Box 100 Wagramer Strasse 5, A-1400 Vienna, Austria.
==C. REGULATORY POSITION==
requirements:
The following guidelines are acceptable to the                      a. Combinations of locks or padlocks on Regulatory staff for the selection and use of locks in the repositories containing SNM or used to secure gates or protection of facilities and SNM:                          doors to material access areas, in protected and vital area perimeters, and for access to vital equipment should be I. Combination locks installed in solid doors such as      known only to those authorized access to the material or those in vaults or vault-type rooms in protected areas      to the area. They should be changed when repositories should he three. or four-position dial.type changeable.     or areas are first placed in use, whenever a person combination locks meeting the Underwriters'                knowing the combination no longer requires it as a result Laboratories Standard UL-768. "Combination Locks,"          of reassignment of duties or termination, whenever the for Group I locks.'                                        combination may have been compromised, or at least twice every year. A record of the combinations of locks
2. Combination padlocks should be used when                should be kept in a location that is secured by a practicable on doors or gates to material access areas, in  combination lock.


11  Copies of the National Industrial Security Program (NISP) Operating Manual
b. Keys and cards to locks or padlocks on                a mastered system, a complete remastering of the system containers holding SNM or used to secure ptes or doors          should be conducted whenever a core, card, master or to material access areas and in protected and vital area        control key, or a lock is lost or compromised.
, which incorporates change 2 from May  18, 2016, can be found at http://www.fas.org/sgp/library/nispom/nispom2006.pdf or by contacting the Federation of American Scientists, 1725 DeSales Street NW, Suite 600 Washington, DC 20036;
e-mail fas@fas.org
; phone:  (202) 546-3300.  12  Copies of NFPA standards may be accessed through the NFPA website at http://www.nfpa.org/
or by writing National Fire Protection Association, 11 Tracy Drive, Avon, MA 02322, or Headquarters address:  National Fire Protection Association, 1 Batterymarch Park, Quincy, MA 02269.


RG 5.12, Rev. 1, Page
perimeters should be issued only to persons authorized acss to the material or to the area. Keys or cards in use            c.    A record of all locks, cores, keys, and cards should be dcecked in at the end of each shift or                should be maintained and kept in a location secured by a workday, and a log should be maintained showing keys            combination lock. A physical inventory of locks, cores.
28  BIBLIOGRAPHY
  U.S. Nuclear Regulatory Commission Documents Management Directive 12.1
, "NRC Facility Security Program, Handbook
."  Management Directive 12.6
, "NRC Sensitive Unclassified Information Security Program.


and cards, users, in and out times, and other pertinent        keys, and cards should be conducted semiannually when inflrmation. Keys and cards should be recovered from            the locks are used for protection of facilities and reassigned or terminating personnel. Locks should be            bimonthly when the locks are used for the protection of immediately changed or cores replaced and an inventory          SNM. Unused locks, cores, keys, and cards should be conducted whenever a core, key, or card is lost or              stored in a location secured by a combination lock. A
Management Directive 12.7
r.ussing; the lock, care, key, or card has been                specific individual at each site should be named aid compromised. or unrecorded keys or cards are found. In          placed In charge of all locks, cores, keys, and cards.
, "NRC Safeguards Information Security Program
.
NUREG/CR-5929, "Locking Systems for Physical Protection and Control," November
1992.   Other Documents Executive Order 12829, "National Industrial Security Program," January
6, 1993.13                                         


13  The Executive Order 12829, January 6, 1993, "National Industrial Security Program
5 12-5}}
" may be found at http://www.archives.gov/isoo/policy
-documents/eo
-12829.html
.}}


{{RG-Nav}}
{{RG-Nav}}

Latest revision as of 10:22, 28 March 2020

General Use of Locks in Protection and Control of Facilities and Special Nuclear Materials
ML003740035
Person / Time
Issue date: 11/30/1973
From:
Office of Nuclear Regulatory Research
To:
References
RG-5.12
Download: ML003740035 (5)


November 1973 U.S. ATOMIC ENERGY COMMISSION

/

r~REGULATORY,

DIRECTORATE OF REGULATORY STANDARDS

GU IDE

REGULATORY GUIDE 5.12 GENERAL USE OF LOCKS IN THE PROTECTION AND CONTROL OF

FACILITIES AND SPECIAL NUCLEAR MATERIALS

A. INTRODUCTION

are diffieult to pick or manipulate, no lock can claim to Gmearnaiipuation proof." Because of the large variety of'

Paragraph 50.34c) of 10 CFR Part 50, "Licensing Iocks' ivailable, it is necessary to subdivide the discussion of* Production and Utilization Facilities," requires each "`on locks into the following types:.(1) combinat~ion, (2)

application for a liccn'se to operate a production or kcy, (3) electrical, and (4) pushbutton mechanical locks.

utilization facility and paragraph 70.22(b).of* 10 CIFR The discussion of each type includes ageneral section on Part '70. "Special Nuclear Material," requires. certain advantages and disadvantages, a section on control over applications for alicense to possess or use special nuclear the locks, and a section on the applicable standards and material (SNM) to include a physical security plan to specifications.

demonstrate how thc applicant plans to meet' the physical protection requirements of 10 CFR Part 73, I.: Combinatlon Locks

"~Physical Protection of Plants and Materials."

Paragraphs 50.54(p) and 70.32(e) require existing a. General. It ~is desirable that a combination licensees licensed under Part 50 and certain licensees ,lock be designed to afford a choice of a large number of licensed under Part 70 who have noit submitted a combinations. The number of combinations is physical security plan to submit such a plan to the 'Ict.ý miincd by the'number of tumbler wheels in the lock C~ommnission for approval. Section 73.40 of 10CFR Part mechanism and the number of graduations on the dial.

73 requires that certain licensees provide. physical High-quality locks 'usually have 100 divisions on the dial protectioni against industrial sabotage and against theft and -three tumbler wheels; such a lock is capable of of SNM at the fixed sites where licensed activities 'are providing a theoretical 10'- combina13tions, which in conducted. practice .reduces to -tens of thousand

s. Sonic

'Combination locks are made with four tumbler wheels, but it is considered that the added number of Locks are acceptable devices to be used in adhering combinations. possible does not proportionally impro%0

to the physical protection requirements identified above the security of the lock and does increase the to assist in controlling access to areas, facilities, and inconvenience~of,dialing the combination.

nmaterials through doors, gates, container lids, and similar material or personnel access points, and are Iconsidered It is.desirable for a combination lock to be essential components Of a physical barrier. This guide designed'so its,combinatlion can be easily changed but at provides criteria acceptable to the Regulatory Staff for the same time be tamper resistant. The combination of the selection and use of commercially available locks in ,some locks can be changed by disassembly of' the the protection of facilities and SNM. tumbler wheel, pack and relocation of screws or pins. In

,this method the effective number or combinations possible is res'trled. Another method involves taking

B. DISCUSSION

apart, the wheet pack and resetting an insert in each whiel.'Irhis method requires, substantial skill on the part Loicks are very important components of a physical of he operaf r. The most desirable method of changing barrier. Their effectiveness, however, lies in their use in a combination isty a special key which requires minimal conjunction with other security measures su6h as training o( the' operator and provides a mn'aximumn intrusion alarm systems and seals. Although some locks number of combinations. The special key is inserted in USAEC REGULATORY GUIDES Copies of publstid iuidt may be ebtseumd by he dwo.sons t~etmmsu Ruaouloory Guides we Issued to deoscrace and make ovallgtle go I.,. pubic

~efsmsd Ill IMwUS.

Attention: Ol,.ctor Ato= WcEoe

9RmltrySedre C

Wahngton. D.C. 20545.

-onlsn uset and suggestions for.

smathods, acceptabie to the. AIECRepulatory staff of implemesstinq Wecit 11a"no .4 spiosen waninthanI mmuade we encouraged amidshoulid be sen to the Sectotars, tim Comm111460's rem~lultlom. to 404ae~1 techniques musd by 1w staff on of alsoCotonissien, US. Atomic 6u.vCommission, Wedthngton. D.C. 20615, esmlueting specific problems or postulated accidmnts. or to provide guiqens. to Attention -Chilef.PublicProceedingsStff.

applicants. Regulatory Guides weanot substiwita hr mqgulshlons end N Noiipnm omth them, is not reclired. Mothoda end soltitons different fom thI wI Saoton The5guede am issued Imthe following tan broad divisions:

sheil umdswill be acceptable if tlmeylpow. a basis #or few findingi reQuisrte to m onmnen oa erit or lmcene by the Commintsion.

11wmiued I Power Rosctort 0. Products z. Remairds and Test Reactors

7. Transportaitoin

3. Fuels and Matalriela Pacilitres U. Occupat~onal Health Publasied gutdot vall be reme~nd pooodscsmly. es aopropo~ts. to accommnodate 4. Environmental end Sitime 9. Antitrust Revew"

commn"nt and somaelect no5wmnfornmotmn or esperlence. 5. Materials end Plant Protection SO.General

the hack of lhe lock case ito ,clea- the wheels from: their Combin;tlion locks can be set t) a single presenlt combinalion while a new combination Is number to simplify the daily chore ofopeni.g, but this imposed by dialing. is.a very poor practice since it reduces the se'urity olthe lock. Frequently four-wheel locks are set to only three The 'nhiaigi ii1 .*,el hocIti cans he different numbers for ease tf openin

g. This deifcats thw

'ovesIly de:rllhiilu l hy usig a tadiographic technique. purpose of the Iourth wheel but it is not considercd Rcsista*ce it'I his is o lallack is designcd into certain serious since the number of remaining combination locks by wi ilhilg nuilcials in Use munechanism that are choices is considered adequate. It is not reconinicnded

11111easily aadiogr: pMIed. V.g.. plastcS. thal one select combinations in common sequences and multiples of ten. It is also not generally recommended (Coihil a lioli locks are vulnerable to that the last number of a combination be set close to cemanpromise if the hack of the lock is readily available, zero because in some cases the lock can jam.

e.g.. when the lockable access is open. Removing the brck cover from the lock usually allows the combination c. Standards and Specificatiomn. A standard for to be determined. The combinations of some key-change three. or four-tumbler combination locks issued by locks can be changed directly when the lock is in the Underwriters' Laboratories, U,-768, "Combination open- position, while other must have the existing Locks,"' covers "combination locks designed for combination redialed to a different index when the attachment on doors of safes, cheits, vaults, and' the like access is in the open position to permit the combination to provide a means of locking the boltwork against change. The former type permits an intruder to make a unauthorized opening." Quality assurance provisions quick change of the combination to one of his own covering the description, examination, and testing of the choosing; this would permit him to enter following the product am included through the UL Label Service. A

closing of the lock and would deny entry to the user. Federal Specification issued for combination padlocks.

For these reasons it is desirable to protect the back of FF-P-IIOF, 'Padlock, Changeable Combination the lock by back plates or other devices. (Resistant to Opening by Manipulation and Surreptitious Attack),' 'Includes quality assurance provisions for High-quality combiination locks are designed design, materials, and performance testing.

for use in two basic forms: (I) in a lock case to be mounted on or into a door as a mortise or rim lock and

2. Key Locks

(2) as a padlock.

a. GeneraL As in the case of combination locks Protection against forcible attack of a mortise It is desirable for a key lock to be capable of being set elr rin-mounted lock can be increased if the lock is for a larp, number of different kiys. A high-quality provided with hardened steel plates and If the lock is six-pin lock with 10 key cutting levels per pin designed with relocking triggers or devices that deadlock potentially permits 106 different keys to be used.

the bolt or bolt-actuating mechanism. However, this large number of key cuts is not as useful as a larIp number of combinations because less Combination padlocks are not vulnerable to time.consuming techniques for defeating key locks .are the usual rapping techniques and are usually resistant to available. Nevertheless, there Is value In specifying at manipulation. However, common combination padlocks least 10 key cuts because it requires careful made of a *cast aluminum alloy are without great construction of the lock.

strength, have little resistance to forcible attack, and are not weather resistant. There are others that are weather It is important that the key 'c60 required to resistant but offer little protection against attack. open a lock (bitting of a lock) be changeable to permit changes whenever keys are lost or an employee having b. Combimtion Lock Control. The mint access to a key is reassigned to other duties or important aspect of lock control for comnbinatlon locks is the protection of the combination. It Is desirable to changb the combination of a lock every time that a 'Copvie nay be obtained from the offie and testing person who knows the combination no longer requires it stations of Underwriters' Laboratories, Inc located at the as a result of termination or reassignment of duties. This following addreses: 207 East Okle Street, Odcag, ill. 60611;

would assure that only those Individuals actually 333 Plnpften Road, North1kok., 1IL 60062; 1285 Waft required to gain access would know the combination. Whitman Road, Melille, I, N.Y. 11746; 1655 Scott BouevUrd, Santa Clara. Calif. 95050.

Losing the combination of a manipulation. IC6pies may be- obtained from busizess service centers of proof, wdl-dsigned lock in a high-rated door is an the General Services Adnin, Reglonal Omca located in expemive dtlation. This can be prevented by keeping a tih follwtg ili: = Miq,lieNew York, N.Y.;

record of the combination in another location which is Washin0om, D.C.; Ft. WWOmTex birce. Cob.; S&Ps

ranchc, Calif.; Atlanta, Ca.

G"C IVI; Kaxua City, Me as secure as the place protected by the lock. Los Arspim Calif.; Settile. Wash.

5.I12.2

terminated. ('hanging the hitting of a lock in' be c. Standards and Specifications. A standard t'oi accomplished usually by changing pins, wafers, or lcvers. key locks has been issued by Underwriters' Laboratories.

To case the task of a bitting change, some locks have UL-437, "Key Locks."' and lnclud quality assurance provisions through the UL. Label Service. Interim cores that are removable for replacement by means of a special key called a "control key." If all the locks in a Federal Specification FF-P-001480 (GSA-FSS),

given facility are keyed to the same.control key, the "Padlock, Key Operated (Resistant to Opening by Force, Pick, and Bypass Techniques)," 2 covers two locks are virtually master keyed because, with the core types of key-operated dead-bolt padlocks: the exposed removed, the problem of opening the lock is elementary. shackle and the ..shrouded shackle. (4ility assurance provisions concerning the design, materials, and Master keying is undesirable from a security point of view because disassembly and inspection of any qualification testing are included.

lock In the system by a competent person provides access to all the other locks in the master-keyed system, 3. Electric Locks and because termination of an employee who had access to a master key would require changing the bitting of all a. General. In the most popular electric locks, a locks set for his master key. The changing of the bitting signal generated by magnetized elements in a plastic card of a large number of locks can be costly, but the or by sequential activation of buttons is compared with convenience of master systems is such that there is a stored code to activate an electrically operated door strong pressure for using them. A compromise in this strike, in some cases the magnetic card, and pushbutton conflict between convenience and security may be to use systems are used in coincidence. Combined card and a nonmastered set of locks for protected areas, material pushbotton systems provide, in general, higher security access areas, vital areas, and access to vital equipment than card-only systems.

and to permit master key sets for other less sensitive areas. The advantages of the electric lock are isolation of the part containing the code from the It is necessary for a lock to have some r "posed part of the lock, versatility of programming, resistance to picking and impressioning (a method used afid ease of integration into alarm systems.

to prepare a key by the impressions of the bitting of a lock on a blank key). In general, this resistance can be Magnetic card systems have some of the provided by precision machining of the mechanisms or problems of common key locks because a lost or stolen by special design features such as side bars, odd-shaped card can be used by an unauthorized person. Howeve%,

pins or a large number of levers. reproduction of a card is more complicated than reproduction of a metal key.

Protection of key locks against forcible attack Pushbutton systems require memorization of can be enhanced by the use of hardened steel plates in front of the pins or side bars. a few digits, usually four, and require more time to operate than the magnetic card system. Although the It is essential for a bolt of a lock to be number of possible combinations usually is smaller than retained in the locked position by positive means (dead in the combination lock system, quality electric bolt). In some locks, the bolt isheld in a locked position pushbutton systems compensate for this by by a spring only. This permits. in the case of padlocks, incorporating devices which prevent trial and error the use of appropriate rapping or shimming techniques methods of surreptitious attack by activating an alarm and, in the case of door locks, the opportunity to after a number of unsuccessful attempts or by surreptitiously retract the bolt without the use of force. introducing a delay after each unsuccessful attempt which prevents operation of the lock for a short period b. Lock Control. The security of an access of lime.

control system based on key locks depends on complete denial of keys to unauthorized persons. It is essential to It is desirable for an electric lock to have the have a record of each key and the names of individuals capability for an easy change of combinations. The part to whom keys have been issued and to check all keys at of the lock where the combination is set and the housing periodic intervals. of the card reader (if the contents of the housing can reveal the combination) should be protected against A common weakness in mastered key systems tampering by tamper switches connected to the alarm is the lack ot accountability of lock cylinders. To correct system.

this situation, it would be necessary to require a control system involving the accountability of every mastered Generally, where electric locks are installed, a lock cylinder having the bitting in present use either for mechanical lock is also installed as a bypass. This lock the master or, in the case of removable cores, the control should be of a quality as discussed in the part on key key. locks in this guide.

5.12-3

b. Lock Control. The security ofan clectric lock protected and vital area perimeters, and for access to system depends on strict control or combinations and vital equipment in preference to key padlocks.

cards. The magnetic codes in the cards and the Combination padlocks should be used on dosed vehicles combinations need to be changed whenever an employee or containers holding SNM that are required to be having had access to them terminates or is reassigned. locked. Combination padlocks should be three-position.

Strict accountability of cards Is strongly recommended. dial type changeable-combination padlocks meeting Federal Specification FF-P-I I OF, "Padlock, Changeable c. Standards and Specifications. There are ('ombination (Resistant to Opening by Manipulation and currently no comprehensive standards or specifications Surreptitious Attack)." 2 covering electric locks. The reputation of the manufacturer, the specification 'for his product. and the 3. Key locks used in lieu of combination padlocks on experience of users must be carefully considered in their doors or gates to material access areas, in protected and selection and use. vital area perimeters, and for access to vital equipment should provide a high degree of resistance to opening by

4. Pushbutton Mechanical Locks force and tamper techniques and should meet Underwrite' Laboratories UL-437, "Key Locks."'

a. General. This is a type of combination lock utilizing mechardcal-pushbutton-activated linkages that 4., Key padlocks used in lieu of combination padlocks connect a gate with an external knob topermit opening on doch or, ptes to material access areas, In protected of the lock. In this lock it is difficult to design in and vital area perimeters, and for access to vital penalties for punching a wrong combination as is done in equipment should be of nugged and sturdy construction electric locks. Therefore, it is important to have a large and designed for outdoor use if necessary, and should number of possible combinations. meet Interim Federal Specification FF-P-001480 (GSA

FSS), "Padlock, Key Operated (Resistant to Opening by Provisions for easy change of combinations Force, Pick, and Bypass Techniques)."'2 are desirable. Some locks permit a new combination to be dialed in utilizing an Allen wrench when the lock is S. -ýtric locks should be used inside the protected open, a procedure similar to that for some combination area a, a means of access control only If a magnetic card locks. Others require the replacement of Internal parts to key syysezn is coupled with a pushbutton system and change the combination.  !' i,.d into the alarm system. This lock combination should have features that resist tampering with the combination-changing mechanism and that alarm after a The mechanical locks appear to be fairly resistant to concealed attack: however, more set number of errors in punching the combinations is information is needed on their resistance to forcible made.

attack. 6. Pushbatton mechanical locks are not recommended for use at this time because of the lack of comprehensive b. Lock Control. Similar to other combination standards and specifications against which the locks can locks, the combinations need to be changed when be evaluated.

employees having access to the combination terminate or arereassigned. 7. Mechanical locks used as panic locks on emergency exit. doors within protected area perimeters should be c. Quality Assurance. There are currently no operable only from the inside.

comprehensive standards or specifications for mechanical pushbutton locks. 8.. Combinations, keys and locks should be controlled, protected and changed in accordance with the following

C. REGULATORY POSITION

requirements:

The following guidelines are acceptable to the a. Combinations of locks or padlocks on Regulatory staff for the selection and use of locks in the repositories containing SNM or used to secure gates or protection of facilities and SNM: doors to material access areas, in protected and vital area perimeters, and for access to vital equipment should be I. Combination locks installed in solid doors such as known only to those authorized access to the material or those in vaults or vault-type rooms in protected areas to the area. They should be changed when repositories should he three. or four-position dial.type changeable. or areas are first placed in use, whenever a person combination locks meeting the Underwriters' knowing the combination no longer requires it as a result Laboratories Standard UL-768. "Combination Locks," of reassignment of duties or termination, whenever the for Group I locks.' combination may have been compromised, or at least twice every year. A record of the combinations of locks

2. Combination padlocks should be used when should be kept in a location that is secured by a practicable on doors or gates to material access areas, in combination lock.

b. Keys and cards to locks or padlocks on a mastered system, a complete remastering of the system containers holding SNM or used to secure ptes or doors should be conducted whenever a core, card, master or to material access areas and in protected and vital area control key, or a lock is lost or compromised.

perimeters should be issued only to persons authorized acss to the material or to the area. Keys or cards in use c. A record of all locks, cores, keys, and cards should be dcecked in at the end of each shift or should be maintained and kept in a location secured by a workday, and a log should be maintained showing keys combination lock. A physical inventory of locks, cores.

and cards, users, in and out times, and other pertinent keys, and cards should be conducted semiannually when inflrmation. Keys and cards should be recovered from the locks are used for protection of facilities and reassigned or terminating personnel. Locks should be bimonthly when the locks are used for the protection of immediately changed or cores replaced and an inventory SNM. Unused locks, cores, keys, and cards should be conducted whenever a core, key, or card is lost or stored in a location secured by a combination lock. A

r.ussing; the lock, care, key, or card has been specific individual at each site should be named aid compromised. or unrecorded keys or cards are found. In placed In charge of all locks, cores, keys, and cards.

5 12-5