Proceedings of the ... International Conference on Nuclear Engineering. Book of abstracts : ICONE
Online ISSN : 2424-2934
2023.30
セッションID: 1709
会議情報

AN EFFICIENT GRADED APPROACH FOR THE DESIGN OF SECURE INSTRUMENTATION AND CONTROL SYSTEMS
Lee T. MaccaroneJacob R. JamesDaniel R. SandovalAlexandria W. HaddadMichael T. Rowland
著者情報
会議録・要旨集 認証あり

詳細
抄録

Prescriptive approaches for the cybersecurity of digital nuclear instrumentation and control (I&C) systems can be cumbersome and costly. These considerations are of particular concern for advanced reactors that implement digital technologies for monitoring, diagnostics, and control. A risk-informed performance-based approach is needed to enable the efficient design of secure digital I&C systems for nuclear power plants. This paper presents a tiered cybersecurity analysis (TCA) methodology as a graded approach for cybersecurity design. The TCA is a sequence of analyses that align with the plant, system, and component stages of design. Earlier application of the TCA in the design process provides greater opportunity for an efficient graded approach and defense-indepth.

The TCA consists of three tiers. Tier 1 is design and impact analysis. In Tier 1 it is assumed that the adversary has control over all digital systems, components, and networks in the plant, and that the adversary is only constrained by the physical limitations of the plant design. The plant’s safety design features are examined to determine whether the consequences of an attack by this cyber-enabled adversary are eliminated or mitigated. Accident sequences that are not eliminated or mitigated by security by design features are examined in Tier 2 analysis. In Tier 2, adversary access pathways are identified for the unmitigated accident sequences, and passive measures are implemented to deny system and network access to those pathways wherever feasible. Any systems with remaining susceptible access pathways are then examined in Tier 3. In Tier 3, active defensive cybersecurity architecture features and cybersecurity plan controls are applied to deny the adversary the ability to conduct the tasks needed to cause a severe consequence. Tier 3 is not performed in this analysis because of the design maturity required for this tier of analysis.

著者関連情報
© 2023 The Japan Society of Mechanical Engineers
前の記事 次の記事
feedback
Top