10 CFR 73.54 PDF

protected area must be checked for proper authorization and visually searched § Protection of digital computer 10 CFR Ch. I (1–1–10 Edition ). industry voluntary cyber program (NEI ); 10 CFR , Cyber Security Rule; Implementation/Oversight of Interim Cyber Security Milestones. In the SRM, the Commission determined as a matter of policy that the NRC’s cyber security regulation (10 CFR ) should be interpreted to.

Author: Mishicage Kajitaur
Country: Bahrain
Language: English (Spanish)
Genre: Video
Published (Last): 12 December 2018
Pages: 469
PDF File Size: 3.83 Mb
ePub File Size: 13.58 Mb
ISBN: 215-4-53808-855-3
Downloads: 9764
Price: Free* [*Free Regsitration Required]
Uploader: Toshicage

This change would eliminate the FOCD prohibition for reactors in decommissioning. The proposed rule also would provide for the removal of the cybersecurity license condition for 10 CFR Part 50 power reactor licensees after the spent fuel decay period Decommissioning Funding Assurance: We did not do an exhaustive comparison, but the technical, operational and management requirements looked to be basically NIST plus some additional words and minor modifications.

Cyber Security, NERC Compliance, and the Nuclear Plant Challenge

To achieve reasonable compliance, each NPP must identify all of their critical digital assets CDA that, if compromised, could impact the performance of a security, safety, important to safety, or emergency preparedness SSEP system function. This new product expands DevonWay’s commitment to supplying next-generation enterprise asset management solutions.

Register now for your free, tailored, daily legal newsfeed service. The proposed rule, which is accompanied by a draft regulatory analysis and a draft environmental assessment, represents the latest step in a rulemaking process that the NRC staff commenced in Decemberwhen the Commission directed the staff to proceed with an integrated rulemaking on power reactor decommissioning in response to the increasing number of power reactors entering decommissioning.

See this small excerpt as an example:. What is the difference between a conditional and an unconditional offer? In addition, potential internal threats such as disgruntled employees releasing sensitive information to the media or taking intellectual property from the company, human errors from employees causing plant transients, or loss of configuration management are issues of significant importance to NPP management.

  LNG A NONTECHNICAL GUIDE TUSIANI PDF

1 The proposed rule would provide that the cybersecurity requirements in 10 CFR The proposed rule would provide an alternative, graded approach to the current 10 CFR Part 50 requirements for onsite and offsite radiological EP at power reactor sites. You can see the requirements in C. DevonWay has a track record of deploying systems into production at nuclear sites in just 7354, and is unique in its ability to apply change as cyber security rules continue to evolve.

Nuclear Industry Cyber Security Regulation

The proposed changes would codify a two-step graded reduction approach that recognizes that reductions in insurance amounts may be warranted commensurate with reductions in both the probability and consequences of an incident at a decommissioning reactor Foreign Ownership, Control, or Domination: Extending the plant configuration to include support for critical digital assets and providing a fully attributed cyber-security Controls Library reflecting NEI Rev.

This approach would provide four levels of emergency planning standards that coincide with significant milestones in decommissioning and which reflect the gradual reduction of the radiological risk during decommissioning: The proposed changes would allow power reactor licensees to use excess funds in their decommissioning trust funds DTFs established under 10 CFR Rather than add to that complexity with a typical enterprise-wide IT development project, plant CIOs are requesting that DevonWay configure an easy-to-use solution.

If you would like to learn how Lexology can drive your content marketing strategy forward, please email enquiries lexology. The proposed rule would change language in 10 CFR Parts 50, 72, and 73 related to physical security requirements that would apply once a power reactor enters decommissioning.

However, from our perspective, the most important aspects of the proposed rule include changes to the following areas:. Cyber security Program Management Outline. The proposed changes for decommissioning power reactors would allow for a graded approach and alternatives for physical security of the facility e. However, from our perspective, the most important aspects of the proposed rule include changes to the following areas: Your email address will not be published.

  FURMAN M-8DX PDF

Cyber Security, NERC Compliance, and the Nuclear Plant Challenge

Reply with your comment Cancel reply Your email address will not be published. The devil is always in the details. Long Story made short: Approach and implementation of information flow enforcement will be especially interesting: Discussing the new offering, Robert W. Energy in Transition General. Finally, the NRC staff noted that it intends to publish four draft guidance documents for public comment in conjunction with the proposed rule.

Given the above compliance responsibilities and the nuclear challenge articulated above, the following are the specific related challenges for NPPs today:. CyberWay further establishes DevonWay’s leadership in assisting nuclear plants to standardize ctr practical compliance solutions cfe complex regulatory issues.

Nuclear Industry Cyber Security Regulation 5.71

Login Register Follow on Twitter Search. Crr the age of many of these nuclear related control systems this could be quite a challenge.

The types of potential accidents at decommissioning reactors are substantially fewer, and the risks of radiological releases are substantially lower, relative to those at operating reactors. Additionally, within the cyber security team, ctr is required of both nuclear plant and corporate-wide cyber networks along with detailed plant systems and design experience.

This fact has prompted decommissioning licensees to request resource intensive regulatory exemptions and related license amendments. USA May 24 However, this may not always be feasible.

iPhone X