10 CFR 73.54 PDF

protected area must be checked for proper authorization and visually searched § Protection of digital computer 10 CFR Ch. I (1–1–10 Edition ). industry voluntary cyber program (NEI ); 10 CFR , Cyber Security Rule; Implementation/Oversight of Interim Cyber Security Milestones. In the SRM, the Commission determined as a matter of policy that the NRC’s cyber security regulation (10 CFR ) should be interpreted to.

Author: Tojataur Yozshumi
Country: Luxembourg
Language: English (Spanish)
Genre: Environment
Published (Last): 12 March 2005
Pages: 378
PDF File Size: 19.56 Mb
ePub File Size: 14.24 Mb
ISBN: 582-2-52593-454-6
Downloads: 36981
Price: Free* [*Free Regsitration Required]
Uploader: Sasho

This new product expands DevonWay’s commitment to supplying next-generation enterprise asset management solutions. The proposed rule would provide that the cybersecurity requirements in 10 CFR DevonWay products are quick to 733.54 and modify, and they integrate easily with systems of record.

In order to insure compliance with NRC requirements, NPPs have committed to full implementation of their site cyber security plan over the period Unlike most software providers, who maintain a rigid code base with brittle interfaces to third-party systems of record, DevonWay builds applications that anticipate change. See this small excerpt as an example:. The challenge will then be implementing this plan.

Follow Please login to follow content. For example, the final rule contains provisions related to multiple, coordinated groups of attackers, suicide attacks and cyber threats. We did not do an exhaustive comparison, but the technical, operational and management requirements looked to be basically NIST plus some additional cr and minor modifications. Rather than add to that complexity with a typical enterprise-wide IT development project, plant CIOs are requesting that DevonWay configure an easy-to-use solution.

NRC Staff Seeks Commission Approval to Publish Proposed Decommissioning Rule Changes – Lexology

As noted in SECY, the proposed rule includes changes in three areas that would apply to operating reactor licensees: Certain NRC decommissioning regulations, however, do not specifically account for this important cr between shutdown and operating plants. Given the age of many of these nuclear related control systems this could be quite a challenge.


One or two experienced and highly skilled cyber security staff members should have expertise in all of these areas along with knowledge of industry best practices and operations experience. USA May 24 Register now for your free, 733.54, daily legal newsfeed service. What is the difference between a conditional and an unconditional offer? Share Facebook Twitter Linked In. Comments There have been several developments in Cyber Security for Nuclear Power in the past few weeks.

This approach would provide four levels of emergency planning standards that coincide with significant milestones in decommissioning and which reflect the gradual reduction of the radiological risk during decommissioning: The proposed rule, which is accompanied by a draft regulatory analysis 110 a draft environmental assessment, represents the latest step in a rulemaking process that the NRC staff commenced in Decemberwhen the Commission directed the staff to proceed with an integrated rulemaking on power reactor decommissioning in response to the increasing number of power reactors entering decommissioning.

Nuclear Industry Cyber Security Regulation 5.71

Follow us on social media Facebook Twitter LinkedIn. Secondly, the Commission considered and, as appropriate, incorporated the 12 factors identified in the Energy Policy Act of Long Story made short: In addition, potential internal threats such as disgruntled employees releasing sensitive information to the media or taking intellectual property from the company, human errors from 7354 causing plant transients, or loss of configuration management are issues of cr importance to NPP management.

Over the last sixteen years we have helped many asset owners and vendors improve the security and reliability of their ICS, and our S4 events are an opportunity for technical experts and thought leaders to connect and move the ICS community forward. The proposed rule would change language in 10 CFR Parts 50, 72, and 73 related to physical security requirements that would apply once a power reactor enters decommissioning.


If you would like to learn how Lexology can drive your content marketing strategy forward, please email enquiries lexology. Hats off to the drafting team though on a good effort and necessary document. Approach and implementation of information flow enforcement will be especially interesting: Login Register Follow on Twitter Search.

Cyber Security, NERC Compliance, and the Nuclear Plant Challenge

However, from our perspective, the most important aspects of the proposed rule include 73.544 to the following areas:.

This fact has prompted decommissioning licensees to request resource intensive regulatory exemptions and related license amendments.

You still have to meet the requirements by compensating controls. DevonWay has a track record of deploying systems into production at nuclear sites in just days, and is unique in its ability to apply change as cyber security rules continue to evolve. We will be attending the NEI Cyber Security Implementation Workshop in Baltimore on Januarywhere we will conduct software demonstrations and answer questions to help program managers assess their readiness for developing 733.54 security plans.

Your email address will not be published. Energy in Transition General. This is significant because if the Standard is revised, without proper technical considerations to the unique NPP operational environment, this could place burdensome and problematic operational challenges to the NPP simply to meet NERC compliance once it ctr effective.

My saved default Read later Folders shared with you. However, from our perspective, the most important aspects of the proposed rule include changes to the following areas: