10 CFR 73.54 PDF


protected area must be checked for proper authorization and visually searched § Protection of digital computer 10 CFR Ch. I (1–1–10 Edition ). industry voluntary cyber program (NEI ); 10 CFR , Cyber Security Rule; Implementation/Oversight of Interim Cyber Security Milestones. In the SRM, the Commission determined as a matter of policy that the NRC’s cyber security regulation (10 CFR ) should be interpreted to.

Author: Dalkree Gasida
Country: Ecuador
Language: English (Spanish)
Genre: Photos
Published (Last): 6 August 2004
Pages: 125
PDF File Size: 17.4 Mb
ePub File Size: 6.26 Mb
ISBN: 237-5-97289-170-4
Downloads: 29440
Price: Free* [*Free Regsitration Required]
Uploader: Akizilkree

Long Story made short: In addition, potential internal threats such as disgruntled employees releasing sensitive information to the media or taking intellectual property from the company, human errors from employees causing plant transients, or loss of configuration management are issues of significant importance to NPP management. Approach and implementation of information flow enforcement will be especially interesting:. My saved default Read later Folders shared with you.

Your email address will not be published. The proposed rule also would provide for the removal of the cybersecurity license condition for 10 CFR Part 50 power reactor licensees after the spent fuel decay period Decommissioning Funding Assurance: CyberWay further establishes DevonWay’s leadership in assisting nuclear plants to standardize on practical compliance solutions for complex regulatory issues.

Secondly, the Commission considered and, as appropriate, incorporated the 12 factors identified in the Energy Policy Act of We will be attending the NEI Cyber Security Implementation Workshop in Baltimore on Januarywhere we will conduct software demonstrations and answer questions to help program managers assess their readiness for developing cyber security plans.


Leave a Reply Cancel reply Your email address will not be published. However, this may not always be feasible.

Cyber Security, NERC Compliance, and the Nuclear Plant Challenge

Popular articles from this firm Contract Corner: Register now for your free, tailored, daily legal newsfeed service. Share Facebook Twitter Linked In. This change would eliminate the FOCD prohibition for reactors in decommissioning. Follow us on social media Facebook Twitter LinkedIn. The challenge will then be implementing this plan.

DevonWay Announces New Cyber Security Response for Nuclear Power Plants – DevonWay

This is significant because if the Standard is revised, without proper technical considerations to the unique NPP operational environment, this could place burdensome and problematic operational challenges to the NPP simply to meet NERC compliance once it becomes effective.

Finally, the NRC staff noted that it intends to publish four draft guidance documents for public comment in conjunction with the proposed rule. The key sections is C: DevonWay has a track record of deploying systems into production at nuclear sites in just days, and is unique in its ability to apply change as cyber security rules continue to evolve.

This approach would provide four levels of emergency planning standards that coincide with significant milestones in decommissioning and which reflect the gradual reduction of the radiological risk during decommissioning: The proposed changes for decommissioning power reactors would allow for a graded approach and alternatives for physical security of the facility e.

Regulatory Position because it enumerates the specific elements a Cyber Security Plan should entail. Rather than add to that complexity vfr a typical enterprise-wide IT development project, plant CIOs are requesting that DevonWay configure an easy-to-use solution.


Nuclear Industry Cyber Security Regulation

The devil is always in the details. We have collaborated with several of our respected customers to help ensure that CyberWay can be easily and quickly configured to meet the requirements of single-unit plants and fleets alike, even as the rules and regulations evolve. This new product expands DevonWay’s commitment to supplying next-generation enterprise asset management solutions.

One or two experienced and highly skilled cyber security staff members should have expertise in all of these areas along with knowledge of industry best practices and operations experience. Your email address will not be published. What is the difference between a conditional and an unconditional offer?

To achieve reasonable compliance, each NPP must identify all of their critical digital assets CDA that, if compromised, could impact the performance of a security, safety, important to safety, or emergency preparedness SSEP system function. The proposed rule would provide an alternative, graded approach to the current 10 CFR Part 50 requirements for onsite and offsite radiological EP at power reactor sites.

Hats off to the drafting team though on a good effort and necessary document. Additionally, within the cyber 733.54 team, knowledge is required of both nuclear plant and corporate-wide cyber networks along with detailed plant systems and design experience.