SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Jason M. Hollern
Cyber Security Technical Leader
March 29-30, 2017 – Kyiv, Ukraine
Enhancing the Nuclear
Safety Culture by
Implementing a Cyber
Security Program
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.3
Why Cyber Security for Nuclear Power Plants?
The Nuclear Safety Culture and Nuclear Security Culture
Similarities
Cyber Security Relative to the Nuclear Safety Culture
Safety, Security, and Cyber Security Culture Requirements
Basic Principles Of Nuclear Cyber Security
Key Concepts
U.S.A. Challenges And Successes
Status & Next Steps in the U.S.A.
Conclusions
Agenda
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.4
Why Cyber Security for Nuclear Power Plants?
Cyber Security threats to Industrial
Control Systems (ICS), Supervisory
Control and Data Acquisition (SCADA)
Systems are real.
There have been numerous attacks
on ICS and SCADA Systems
throughout the world.
Seven (7) nuclear sector incidents
were reported to ICS-CERT in 2015.*
* ICS-Cyber Emergency Response
Team 2015 Year In Review
4
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.5
Successful attacks on ICS and SCADA equipment can be exploited
through unmitigated software and hardware vulnerabilities.
Many Critical Digital Assets (CDAs) that are used in the nuclear
power plant cannot be patched, upgraded, or fixed until a refueling
outage.
 Potentially unpatched or unmitigated for up to 24 months (or even longer)
A total of 486
vulnerabilities in
ICS/SCADA equipment
were reported to
ICS-CERT in 2015*
* ICS-CERT 2015
Year In Review
Vulnerabilities in ICS Equipment
5
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.6
Recent ICS Hacks
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.7
Cyber Security for Nuclear Power Plants
Objective: To protect digital equipment within the
nuclear power plant from cyber attacks up to and
including the Design Basis Threat (DBT) that would
adversely impact operational safety, security, or
emergency response.
I.E., protect from acts of radiological
sabotage
Ensure safety and important-to-safety
equipment is protected from malicious
cyber acts
7
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.9
Nuclear Industrial Control Systems (ICS)
 Safety Systems
• Reactor Protection System
• Emergency Core Cooling
• Safe Shutdown Systems
• Residual Heat Removal
 Balance of Plant (BOP) Systems (Important-to-
Safety)
• Turbine Control System
• Steam Generator Level Control (Feedwater)
• Fuel Handling Systems
 Emergency Preparedness
• Emergency Radio System
• Meteorological System
 Physical Security Systems
• Security Computer
• Intrusion Detection
• Security Cameras
• Vehicle Barriers
• Badging/Access Controls
Examples of Nuclear ICS
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.10
Existing Safety and Security Cultures
Similarities
Nuclear Safety Culture
 “The core values and behaviors resulting from a collective commitment
by leaders and individuals to emphasize safety over competing goals to
ensure protection of people and the environment” – US NRC
 This requires an investment by employees, management, and
stakeholders by priority, beliefs, and attitudes that a commitment to
safety practices and the issues are given a priority.
Nuclear Security Culture
 “Characteristics and attitudes in organizations and of individuals which
establish that the questions relating to protection against the theft and
other unlawful taking of nuclear material on one hand and any deliberate
act (sabotage) directed against nuclear facilities or nuclear material in
use, storage and transport on the other hand, receive the attention
warranted by their significance”
 This instills a questioning attitude in individuals and organizations at the
NPP and it prevents hostile action, theft, or deliberate acts that could
lead to protect people, both onsite and offsite, from the dangers of
radiological exposure.
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.11
Cyber Security Relative to the Safety
Culture
Development of a nuclear cyber security culture should not be
different than the process used to develop and implement the safety
and security culture.
Three Major Elements
 Commitments of Nuclear Power Plant organizations
 Commitments of managers
 Commitments of individuals*
The commitments of the organization and the management provide
the structure, framework, hierarchy, support, and tools needed for
individuals to be successful.
Commitments of the individual are the most important because they
maintain a positive attitude of ownership, maintain a level of
awareness supported by training, compliance with procedures and
rules, and maintain a questioning attitude.
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.13
Requirements in the U.S.A.
Nuclear Safety Culture
 Law in the US to establish a Nuclear Safety Culture: “will adopt a positive
safety culture that is commensurate with the safety and security
significance of their activities,” (2011)
Nuclear Security Culture
 Law in the US through the U.S. Code of Federal Regulations that requires
nuclear licensees to protect the plant from malicious action that could
result in an offsite release in of radiological materials
Nuclear Cyber Security Culture
 None
 10 CFR 73.54 – Cyber Security Rule, “Protection of Digital Computer and
Communication systems and Networks” – Does not mandate an outright
Cyber Security Culture
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.14
Cyber Program Implementation Objectives
Counter the threat & comply with
regulations
► Infrastructure & Program Development
►Training and Awareness
► Vulnerability Assessment – Critical Digital
Assets
► Vulnerability Mitigation Plan
► Implement Remediations
► Maintain Program
The Threat
Threats to OT/ICS leveraging
vulnerabilities associated with 5 basic
attack vectors.
Nation State Actors (APT), Malicious
Insiders, Activists, Accidental Exposure
In the US in 2015, seven incidents were
reported in the nuclear sector.
Basic Principles of Nuclear Cyber Security
Physical Access
Wired Access
Wireless Access
Portable Media
Regulations
► May not yet be promulgated by regulator
► Basis varies by country
o United States: 10 CFR 73.54 -> US NRC RG 5.71,
NEI 13-10, and NEI 08-09
o International: IAEA Nuclear Series #17, IEC
62645, and ISO 27000 Series
Attack Vectors
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.15
Identification of digital ICS equipment in scope of cyber
security program
Employee and Vendor Training
Deterministic Network Segregation
 Do not allow remote access to ICS, production, safety, security, monitoring, etc.
systems from business networks, vendors, public, or offsite.
Portable Media Device (PMD) Protection
 Flash drives, cell phones, laptops, etc.
Application of cyber security controls
 Risk based analysis
 Consequence based analysis
Threat and Compromise Monitoring
 Processes, procedures, and infrastructure technology
 Tamper indication
 Near real-time monitoring (SIEM)
Key Strategies and Concepts
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.16
Challenges
 Centralized nuclear industry consensus on cyber security program
implementation
 Management commitment to comprehensive cyber security
program, staff, and resources
 Development of comprehensive programmatic procedures to have
repeatable results and success on the first attempt
 Assessment and ongoing monitoring program development (technical
and programmatic)
Successes
 Industry and regulator coordination through conferences, workshops,
and technical taskforces
 Interim Milestones completion, inspections, and inherent protections
U.S.A Challenges and Successes
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.17
Executive Sponsor
Cyber Security Program Owner
Cyber Security Incident Response Team (CSIRT)
Cyber Security Assessment Team (CSAT)
Cyber Security Specialists (CSS)
All Employees
Cyber Security Team and
Responsibilities
17
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.18
Plants have developed a Cyber Security
Program
 Determined the CDAs
 Deterministically segregated their control system
networks from the business networks (installed
data diodes)
 Developed a robust PMD program
 Instituted security rounds to monitor physical
tampering
 Implemented general awareness training for
cyber security and effects of cyber
compromise on critical plant systems.
Accomplishments in the U.S.A
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.19
Currently working on full implementation of their cyber
program
 Conducting cyber security assessments on CDAs
 Remediating cyber security technical/programmatic control failures
 Developing near real-time detection capabilities
 Developing training for the general employees, cyber security
staff, and workers that interface with ICS
 Develop procedures to implement technical and programmatic
cyber security controls
Regulatory inspections after 31/12/2017
Current and Future Activities in
the U.S.A.
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.20
Cyber Security for nuclear power plants is needed to combat
current ICS threats and instill and enhanced nuclear safety
culture
IT Systems and protection strategies are different from OT/ICS
Systems typically found in nuclear control system networks
The U.S.A. has implemented a program to protect Critical
Systems (Safety, Important-to-Safety, etc.) and CDAs from a
cyber attack
There is still more work to be done in the U.S.A. and
worldwide
Cyber Security is implicitly linked to nuclear safety!
Conclusions
AREVA NP
The information in this document is AREVA NP property and is intended solely for
the addressees. Reproduction and distribution are prohibited.
p.21
Questions
Implementing Cyber Security Programs to Enhance Nuclear Safety Culture

Contenu connexe

Similaire à Implementing Cyber Security Programs to Enhance Nuclear Safety Culture

Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...IJNSA Journal
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.rNASAPMC
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...David Sweigert
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA AdamAdler10
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxbagotjesusa
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookDavid Sweigert
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandHighervista
 
Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Yury Chemerkin
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™CPaschal
 
Addressing cyber security
Addressing cyber securityAddressing cyber security
Addressing cyber securityFemi Ashaye
 
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfWHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfFas (Feisal) Mosleh
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 

Similaire à Implementing Cyber Security Programs to Enhance Nuclear Safety Culture (20)

Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.r
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
 
SARMA TALLARICO6-11
SARMA TALLARICO6-11SARMA TALLARICO6-11
SARMA TALLARICO6-11
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security Handbook
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarland
 
Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 
Addressing cyber security
Addressing cyber securityAddressing cyber security
Addressing cyber security
 
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfWHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
 
Safety Reports Series Nº 111
Safety Reports Series Nº 111Safety Reports Series Nº 111
Safety Reports Series Nº 111
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 

Plus de НАЕК «Енергоатом»

Підсумки роботи ДП «НАЕК «Енергоатом» за 5 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 5 місяці 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за 5 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 5 місяці 2020 рокуНАЕК «Енергоатом»
 
Підсумки роботи ДП «НАЕК «Енергоатом» за 4 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 4 місяці 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за 4 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 4 місяці 2020 рокуНАЕК «Енергоатом»
 
Антикорупційна програма ДП «НАЕК «Енергоатом»
Антикорупційна програма ДП «НАЕК «Енергоатом»Антикорупційна програма ДП «НАЕК «Енергоатом»
Антикорупційна програма ДП «НАЕК «Енергоатом»НАЕК «Енергоатом»
 
Підсумки роботи ДП «НАЕК «Енергоатом» за І квартал 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за І квартал 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за І квартал 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за І квартал 2020 рокуНАЕК «Енергоатом»
 
Журнал "Енергоатом України" №2 (49) 2020, серпень-лютий
Журнал "Енергоатом України" №2 (49) 2020, серпень-лютийЖурнал "Енергоатом України" №2 (49) 2020, серпень-лютий
Журнал "Енергоатом України" №2 (49) 2020, серпень-лютийНАЕК «Енергоатом»
 
Підсумки роботи ДП «НАЕК «Енергоатом» за 2 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 2 місяці 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за 2 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 2 місяці 2020 рокуНАЕК «Енергоатом»
 
Звіт про управління ДП «НАЕК «Енергоатом» за 2019 рік
Звіт про управління ДП «НАЕК «Енергоатом» за 2019 рікЗвіт про управління ДП «НАЕК «Енергоатом» за 2019 рік
Звіт про управління ДП «НАЕК «Енергоатом» за 2019 рікНАЕК «Енергоатом»
 
Підсумки роботи ДП «НАЕК «Енергоатом» за січень 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за січень 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за січень 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за січень 2020 рокуНАЕК «Енергоатом»
 
Підсумки роботи НАЕК «Енергоатом» за 2019 рік
Підсумки роботи НАЕК «Енергоатом» за 2019 рікПідсумки роботи НАЕК «Енергоатом» за 2019 рік
Підсумки роботи НАЕК «Енергоатом» за 2019 рікНАЕК «Енергоатом»
 
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 рокуНАЕК «Енергоатом»
 
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 рокуНАЕК «Енергоатом»
 
Підсумки роботи НАЕК «Енергоатом» за 10 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 10 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 10 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 10 місяців 2019 рокуНАЕК «Енергоатом»
 
Підсумки роботи НАЕК «Енергоатом» за 9 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 9 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 9 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 9 місяців 2019 рокуНАЕК «Енергоатом»
 
Підсумки роботи НАЕК «Енергоатом» за 8 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 8 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 8 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 8 місяців 2019 рокуНАЕК «Енергоатом»
 
Переможці та фіналісти дитячо-юнацького конкурсу творчості «Енергоатом: роби...
Переможці та фіналісти дитячо-юнацького конкурсу творчості «Енергоатом:  роби...Переможці та фіналісти дитячо-юнацького конкурсу творчості «Енергоатом:  роби...
Переможці та фіналісти дитячо-юнацького конкурсу творчості «Енергоатом: роби...НАЕК «Енергоатом»
 
Нефінансовий звіт НАЕК «Енергоатом» за 2018 рік
Нефінансовий звіт НАЕК «Енергоатом» за 2018 рікНефінансовий звіт НАЕК «Енергоатом» за 2018 рік
Нефінансовий звіт НАЕК «Енергоатом» за 2018 рікНАЕК «Енергоатом»
 
Як перемогти у тендері НАЕК «Енергоатом»: 17 практичних порад
Як перемогти у тендері НАЕК «Енергоатом»: 17 практичних порадЯк перемогти у тендері НАЕК «Енергоатом»: 17 практичних порад
Як перемогти у тендері НАЕК «Енергоатом»: 17 практичних порадНАЕК «Енергоатом»
 
How to Win a Tender of NNEGC "Energoatom": 17 practical advices
How to Win a Tender of NNEGC "Energoatom": 17 practical advicesHow to Win a Tender of NNEGC "Energoatom": 17 practical advices
How to Win a Tender of NNEGC "Energoatom": 17 practical advicesНАЕК «Енергоатом»
 
Підсумки роботи НАЕК «Енергоатом» за 7 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 7 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 7 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 7 місяців 2019 рокуНАЕК «Енергоатом»
 
Підсумки роботи ДП «НАЕК «Енергоатом» за І півріччя 2019 року
Підсумки роботи ДП «НАЕК «Енергоатом» за І півріччя 2019 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за І півріччя 2019 року
Підсумки роботи ДП «НАЕК «Енергоатом» за І півріччя 2019 рокуНАЕК «Енергоатом»
 

Plus de НАЕК «Енергоатом» (20)

Підсумки роботи ДП «НАЕК «Енергоатом» за 5 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 5 місяці 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за 5 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 5 місяці 2020 року
 
Підсумки роботи ДП «НАЕК «Енергоатом» за 4 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 4 місяці 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за 4 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 4 місяці 2020 року
 
Антикорупційна програма ДП «НАЕК «Енергоатом»
Антикорупційна програма ДП «НАЕК «Енергоатом»Антикорупційна програма ДП «НАЕК «Енергоатом»
Антикорупційна програма ДП «НАЕК «Енергоатом»
 
Підсумки роботи ДП «НАЕК «Енергоатом» за І квартал 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за І квартал 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за І квартал 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за І квартал 2020 року
 
Журнал "Енергоатом України" №2 (49) 2020, серпень-лютий
Журнал "Енергоатом України" №2 (49) 2020, серпень-лютийЖурнал "Енергоатом України" №2 (49) 2020, серпень-лютий
Журнал "Енергоатом України" №2 (49) 2020, серпень-лютий
 
Підсумки роботи ДП «НАЕК «Енергоатом» за 2 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 2 місяці 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за 2 місяці 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за 2 місяці 2020 року
 
Звіт про управління ДП «НАЕК «Енергоатом» за 2019 рік
Звіт про управління ДП «НАЕК «Енергоатом» за 2019 рікЗвіт про управління ДП «НАЕК «Енергоатом» за 2019 рік
Звіт про управління ДП «НАЕК «Енергоатом» за 2019 рік
 
Підсумки роботи ДП «НАЕК «Енергоатом» за січень 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за січень 2020 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за січень 2020 року
Підсумки роботи ДП «НАЕК «Енергоатом» за січень 2020 року
 
Підсумки роботи НАЕК «Енергоатом» за 2019 рік
Підсумки роботи НАЕК «Енергоатом» за 2019 рікПідсумки роботи НАЕК «Енергоатом» за 2019 рік
Підсумки роботи НАЕК «Енергоатом» за 2019 рік
 
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
 
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 11 місяців 2019 року
 
Підсумки роботи НАЕК «Енергоатом» за 10 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 10 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 10 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 10 місяців 2019 року
 
Підсумки роботи НАЕК «Енергоатом» за 9 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 9 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 9 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 9 місяців 2019 року
 
Підсумки роботи НАЕК «Енергоатом» за 8 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 8 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 8 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 8 місяців 2019 року
 
Переможці та фіналісти дитячо-юнацького конкурсу творчості «Енергоатом: роби...
Переможці та фіналісти дитячо-юнацького конкурсу творчості «Енергоатом:  роби...Переможці та фіналісти дитячо-юнацького конкурсу творчості «Енергоатом:  роби...
Переможці та фіналісти дитячо-юнацького конкурсу творчості «Енергоатом: роби...
 
Нефінансовий звіт НАЕК «Енергоатом» за 2018 рік
Нефінансовий звіт НАЕК «Енергоатом» за 2018 рікНефінансовий звіт НАЕК «Енергоатом» за 2018 рік
Нефінансовий звіт НАЕК «Енергоатом» за 2018 рік
 
Як перемогти у тендері НАЕК «Енергоатом»: 17 практичних порад
Як перемогти у тендері НАЕК «Енергоатом»: 17 практичних порадЯк перемогти у тендері НАЕК «Енергоатом»: 17 практичних порад
Як перемогти у тендері НАЕК «Енергоатом»: 17 практичних порад
 
How to Win a Tender of NNEGC "Energoatom": 17 practical advices
How to Win a Tender of NNEGC "Energoatom": 17 practical advicesHow to Win a Tender of NNEGC "Energoatom": 17 practical advices
How to Win a Tender of NNEGC "Energoatom": 17 practical advices
 
Підсумки роботи НАЕК «Енергоатом» за 7 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 7 місяців 2019 рокуПідсумки роботи НАЕК «Енергоатом» за 7 місяців 2019 року
Підсумки роботи НАЕК «Енергоатом» за 7 місяців 2019 року
 
Підсумки роботи ДП «НАЕК «Енергоатом» за І півріччя 2019 року
Підсумки роботи ДП «НАЕК «Енергоатом» за І півріччя 2019 рокуПідсумки роботи ДП «НАЕК «Енергоатом» за І півріччя 2019 року
Підсумки роботи ДП «НАЕК «Енергоатом» за І півріччя 2019 року
 

Dernier

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Dernier (20)

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

Implementing Cyber Security Programs to Enhance Nuclear Safety Culture

  • 1.
  • 2. Jason M. Hollern Cyber Security Technical Leader March 29-30, 2017 – Kyiv, Ukraine Enhancing the Nuclear Safety Culture by Implementing a Cyber Security Program
  • 3. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.3 Why Cyber Security for Nuclear Power Plants? The Nuclear Safety Culture and Nuclear Security Culture Similarities Cyber Security Relative to the Nuclear Safety Culture Safety, Security, and Cyber Security Culture Requirements Basic Principles Of Nuclear Cyber Security Key Concepts U.S.A. Challenges And Successes Status & Next Steps in the U.S.A. Conclusions Agenda
  • 4. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.4 Why Cyber Security for Nuclear Power Plants? Cyber Security threats to Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) Systems are real. There have been numerous attacks on ICS and SCADA Systems throughout the world. Seven (7) nuclear sector incidents were reported to ICS-CERT in 2015.* * ICS-Cyber Emergency Response Team 2015 Year In Review 4
  • 5. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.5 Successful attacks on ICS and SCADA equipment can be exploited through unmitigated software and hardware vulnerabilities. Many Critical Digital Assets (CDAs) that are used in the nuclear power plant cannot be patched, upgraded, or fixed until a refueling outage.  Potentially unpatched or unmitigated for up to 24 months (or even longer) A total of 486 vulnerabilities in ICS/SCADA equipment were reported to ICS-CERT in 2015* * ICS-CERT 2015 Year In Review Vulnerabilities in ICS Equipment 5
  • 6. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.6 Recent ICS Hacks
  • 7. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.7 Cyber Security for Nuclear Power Plants Objective: To protect digital equipment within the nuclear power plant from cyber attacks up to and including the Design Basis Threat (DBT) that would adversely impact operational safety, security, or emergency response. I.E., protect from acts of radiological sabotage Ensure safety and important-to-safety equipment is protected from malicious cyber acts 7
  • 8. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.9 Nuclear Industrial Control Systems (ICS)  Safety Systems • Reactor Protection System • Emergency Core Cooling • Safe Shutdown Systems • Residual Heat Removal  Balance of Plant (BOP) Systems (Important-to- Safety) • Turbine Control System • Steam Generator Level Control (Feedwater) • Fuel Handling Systems  Emergency Preparedness • Emergency Radio System • Meteorological System  Physical Security Systems • Security Computer • Intrusion Detection • Security Cameras • Vehicle Barriers • Badging/Access Controls Examples of Nuclear ICS
  • 9. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.10 Existing Safety and Security Cultures Similarities Nuclear Safety Culture  “The core values and behaviors resulting from a collective commitment by leaders and individuals to emphasize safety over competing goals to ensure protection of people and the environment” – US NRC  This requires an investment by employees, management, and stakeholders by priority, beliefs, and attitudes that a commitment to safety practices and the issues are given a priority. Nuclear Security Culture  “Characteristics and attitudes in organizations and of individuals which establish that the questions relating to protection against the theft and other unlawful taking of nuclear material on one hand and any deliberate act (sabotage) directed against nuclear facilities or nuclear material in use, storage and transport on the other hand, receive the attention warranted by their significance”  This instills a questioning attitude in individuals and organizations at the NPP and it prevents hostile action, theft, or deliberate acts that could lead to protect people, both onsite and offsite, from the dangers of radiological exposure.
  • 10. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.11 Cyber Security Relative to the Safety Culture Development of a nuclear cyber security culture should not be different than the process used to develop and implement the safety and security culture. Three Major Elements  Commitments of Nuclear Power Plant organizations  Commitments of managers  Commitments of individuals* The commitments of the organization and the management provide the structure, framework, hierarchy, support, and tools needed for individuals to be successful. Commitments of the individual are the most important because they maintain a positive attitude of ownership, maintain a level of awareness supported by training, compliance with procedures and rules, and maintain a questioning attitude.
  • 11. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.13 Requirements in the U.S.A. Nuclear Safety Culture  Law in the US to establish a Nuclear Safety Culture: “will adopt a positive safety culture that is commensurate with the safety and security significance of their activities,” (2011) Nuclear Security Culture  Law in the US through the U.S. Code of Federal Regulations that requires nuclear licensees to protect the plant from malicious action that could result in an offsite release in of radiological materials Nuclear Cyber Security Culture  None  10 CFR 73.54 – Cyber Security Rule, “Protection of Digital Computer and Communication systems and Networks” – Does not mandate an outright Cyber Security Culture
  • 12. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.14 Cyber Program Implementation Objectives Counter the threat & comply with regulations ► Infrastructure & Program Development ►Training and Awareness ► Vulnerability Assessment – Critical Digital Assets ► Vulnerability Mitigation Plan ► Implement Remediations ► Maintain Program The Threat Threats to OT/ICS leveraging vulnerabilities associated with 5 basic attack vectors. Nation State Actors (APT), Malicious Insiders, Activists, Accidental Exposure In the US in 2015, seven incidents were reported in the nuclear sector. Basic Principles of Nuclear Cyber Security Physical Access Wired Access Wireless Access Portable Media Regulations ► May not yet be promulgated by regulator ► Basis varies by country o United States: 10 CFR 73.54 -> US NRC RG 5.71, NEI 13-10, and NEI 08-09 o International: IAEA Nuclear Series #17, IEC 62645, and ISO 27000 Series Attack Vectors
  • 13. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.15 Identification of digital ICS equipment in scope of cyber security program Employee and Vendor Training Deterministic Network Segregation  Do not allow remote access to ICS, production, safety, security, monitoring, etc. systems from business networks, vendors, public, or offsite. Portable Media Device (PMD) Protection  Flash drives, cell phones, laptops, etc. Application of cyber security controls  Risk based analysis  Consequence based analysis Threat and Compromise Monitoring  Processes, procedures, and infrastructure technology  Tamper indication  Near real-time monitoring (SIEM) Key Strategies and Concepts
  • 14. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.16 Challenges  Centralized nuclear industry consensus on cyber security program implementation  Management commitment to comprehensive cyber security program, staff, and resources  Development of comprehensive programmatic procedures to have repeatable results and success on the first attempt  Assessment and ongoing monitoring program development (technical and programmatic) Successes  Industry and regulator coordination through conferences, workshops, and technical taskforces  Interim Milestones completion, inspections, and inherent protections U.S.A Challenges and Successes
  • 15. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.17 Executive Sponsor Cyber Security Program Owner Cyber Security Incident Response Team (CSIRT) Cyber Security Assessment Team (CSAT) Cyber Security Specialists (CSS) All Employees Cyber Security Team and Responsibilities 17
  • 16. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.18 Plants have developed a Cyber Security Program  Determined the CDAs  Deterministically segregated their control system networks from the business networks (installed data diodes)  Developed a robust PMD program  Instituted security rounds to monitor physical tampering  Implemented general awareness training for cyber security and effects of cyber compromise on critical plant systems. Accomplishments in the U.S.A
  • 17. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.19 Currently working on full implementation of their cyber program  Conducting cyber security assessments on CDAs  Remediating cyber security technical/programmatic control failures  Developing near real-time detection capabilities  Developing training for the general employees, cyber security staff, and workers that interface with ICS  Develop procedures to implement technical and programmatic cyber security controls Regulatory inspections after 31/12/2017 Current and Future Activities in the U.S.A.
  • 18. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.20 Cyber Security for nuclear power plants is needed to combat current ICS threats and instill and enhanced nuclear safety culture IT Systems and protection strategies are different from OT/ICS Systems typically found in nuclear control system networks The U.S.A. has implemented a program to protect Critical Systems (Safety, Important-to-Safety, etc.) and CDAs from a cyber attack There is still more work to be done in the U.S.A. and worldwide Cyber Security is implicitly linked to nuclear safety! Conclusions
  • 19. AREVA NP The information in this document is AREVA NP property and is intended solely for the addressees. Reproduction and distribution are prohibited. p.21 Questions