Skip to main content

Nuclear Power Plant Response to the Cyber Threat

Our nation’s commercial nuclear power plants take the cyber threat seriously.  Our industry has been developing and implementing cyber security programs since shortly after the events of September 11, 2001.  The industry’s efforts culminated in a binding industry initiative to implement a cyber security program consistent with the guidance in a document endorsed by the NRC as an acceptable method for establishing a cyber security program.  All plants implemented this program by mid-2008.

The U.S. Nuclear Regulatory Commission (NRC) is a strong regulator in this area.  The NRC’s efforts to create a cyber security regulatory framework for the plants began shortly after September 11, 2001.  The NRC issued orders after September 11 that required power reactor licensees to implement interim compensatory measures to enhance cyber security at their sites. These security measures required an assessment sufficient to provide protection against the cyber threats at the time of the orders. Subsequently, the NRC amended the Design Basis Treat requirements to include cyber attacks.  In 2009 the NRC ammended their extensive physical protection program regulations to include specific requirements for a cyber security program to protect systems that, if compromised, would adversely impact safety, security or emergency preparedness.

So what does all of this mean?  What have the plants actually done to implement cyber security protective measures in response to the cyber threat?

Every plant submitted a cyber security plan to the NRC that describes how the plant will implement their cyber security program.  The NRC has reviewed and approved each of these plans.

Each plant also submitted an implementation schedule describing the interim milestone actions toward full implementation of the cyber security program.  The NRC has reviewed and approved each of these schedules.  The interim milestones of the schedule prioritize key activities designed to address the most prominent cyber threats to these facilities.

By December 31, 2012, each U.S. nuclear power plant has:
  • Isolated key control systems using either air-gaps or robust hardware based isolation devices. As a result, the key safety, security, and power generation equipment at the plants are protected from any network based cyber attacks originating outside the plant.
  • Enhanced and implemented robust controls over the use of portable media and equipment.  Where devices like thumb drives, CD’s, and laptops are used to interface with plant equipment, measures are in place to minimize the cyber threat.  These measures include such actions as: minimizing the use of devices that are not maintained at the plant; virus scanning devices both before and after being connected to plant equipment; and, implementing additional measures where the source of the data or device originates outside the plant.  As a result, the plants are well protected from attacks like Stuxnet, that propagated through the use of portable media.
  • Enhanced defenses against the insider threat.  Training and insider mitigation programs have been enhanced to include cyber attributes.  Individuals who work with digital plant equipment are subject to increased security screening, cyber security training, and behavioral observation.
  • Implemented cyber security controls to protect equipment deemed most essential for the protection of the public health and safety.  While full implementation of cyber security controls for all digital equipment requiring protection will take some time, plants have prioritized the implementation to cover the assets most essential to the public health and safety.
  • Implemented measures to maintain the effectiveness of the implemented portions of the program.  These measures include maintaining the equipment described above in the plant configuration management program, ensuring changes to the equipment are performed in a controlled way.  A cyber security impact analysis is performed before making changes to the equipment.  The effectiveness of implemented cyber security controls is periodically assessed, and enhancements made where necessary.  Vulnerability assessments are performed to ensure the cyber security posture of the equipment is maintained.
This week the NRC began inspecting plant’s implementation of these milestones.

The balance of the implementation of the cyber security program is ongoing.  And I look forward to keeping the readers of the blog up-to-speed on advancements.

No cyber security program will be 100% perfect.  These interim measures well position the plants to ensure that the public health and safety are maintained, and that the sites will reliably continue to make their significant contribution to the nation’s electrical supply.

Comments

Unknown said…
Hi Bill, nice post. One comment I like to make is that it is easy to write a cyber security concept, but it is so much more difficult to actually implement the program and make the security happen at the system level. I would like to know, what the NRC finds appropriated enough and what SSP will be approved and what the standert's will be used.
Anonymous said…
"....the NRC amended the Design Basis Treat requirements to include cyber attacks."

Cyber TREATS are much better than cyber THREATS....

Happy Valentine’s day x

Mr Pedant
Unknown said…
Hi Bill,

I am working on a research report for the nuclear cyber security industry and was hoping I could briefly get your input on a few questions I had. If so, I can call you at your NEI work number.

Best,
Rehan

Popular posts from this blog

Fluor Invests in NuScale

You know, it’s kind of sad that no one is willing to invest in nuclear energy anymore. Wait, what? NuScale Power celebrated the news of its company-saving $30 million investment from Fluor Corp. Thursday morning with a press conference in Washington, D.C. Fluor is a design, engineering and construction company involved with some 20 plants in the 70s and 80s, but it has not held interest in a nuclear energy company until now. Fluor, which has deep roots in the nuclear industry, is betting big on small-scale nuclear energy with its NuScale investment. "It's become a serious contender in the last decade or so," John Hopkins, [Fluor’s group president in charge of new ventures], said. And that brings us to NuScale, which had run into some dark days – maybe not as dark as, say, Solyndra, but dire enough : Earlier this year, the Securities Exchange Commission filed an action against NuScale's lead investor, The Michael Kenwood Group. The firm "misap...

Wednesday Update

From NEI’s Japan micro-site: NRC, Industry Concur on Many Post-Fukushima Actions Industry/Regulatory/Political Issues • There is a “great deal of alignment” between the U.S. Nuclear Regulatory Commission and the industry on initial steps to take at America’s nuclear energy facilities in response to the nuclear accident in Japan, Charles Pardee, the chief operating officer of Exelon Generation Co., said at an agency briefing today. The briefing gave stakeholders an opportunity to discuss staff recommendations for near-term actions the agency may take at U.S. facilities. PowerPoint slides from the meeting are on the NRC website. • The International Atomic Energy Agency board has approved a plan that calls for inspectors to evaluate reactor safety at nuclear energy facilities every three years. Governments may opt out of having their country’s facilities inspected. Also approved were plans to maintain a rapid response team of experts ready to assist facility operators recoverin...

Nuclear Utility Moves Up in Credit Ratings, Bank is "Comfortable with Nuclear Strategy"

Some positive signs that nuclear utilities can continue to receive positive ratings even while they finance new nuclear plants for the first time in decades: Wells Fargo upgrades SCANA to Outperform from Market Perform Wells analyst says, "YTD, SCG shares have underperformed the Regulated Electrics (total return +2% vs. +9%). Shares trade at 11.3X our 10E EPS, a modest discount to the peer group median of 11.8X. We view the valuation as attractive given a comparatively constructive regulatory environment and potential for above-average long-term EPS growth prospects ... Comfortable with Nuclear Strategy. SCG plans to participate in the development of two regulated nuclear units at a cost of $6.3B, raising legitimate concerns regarding financing and construction. We have carefully considered the risks and are comfortable with SCG’s strategy based on a highly constructive political & regulatory environment, manageable financing needs stretched out over 10 years, strong partners...