...

Implementing a Consequence-Based Approach to Cyber Security William Gross

by user

on
Category: Documents
44

views

Report

Comments

Transcript

Implementing a Consequence-Based Approach to Cyber Security William Gross
Implementing a Consequence-Based
Approach to Cyber Security
William Gross
Senior Project Manager, Engineering
2016 Regulatory Information Conference
March 8, 2016 • Rockville, Maryland
Draft Revision: 20160115c
1
Driver for a Consequence Based Approach
Target Sets (Rad
Sab), 0.6%
Emergency
Preparedness (EP),
7.7%
Other,
12.2%
Security, 28.7%
Safety Related,
8.5%
Balance of Plant,
42.3%
Est. >1,000
CDAs per plant
unit
2
A System Assessment
3
1
Consequence Approach Implementation
• Provision assets based on impact of attack
• Indirect assets
- No direct impact to function, or
- Consequences mitigated prior to impact.
- Includes low impact EP and balance of plant assets
• Direct assets - those not identified as indirect
• Cyber security controls graded
4
Benefits and Future Applications
• Current approach working well for reactors:
- Achieving desired outcomes (75% or more indirect)
- Permits licensees to focus on high consequence assets
• Improvements if considered for other licensees:
- Not all functions are equally attractive to an adversary
seeking to harm the health and safety of the public
- Prioritize only those assets that if compromised would
likely result in radiological sabotage or theft of SNM
• Best - eliminate any system not directly related to
preventing sabotage, theft of SNM
5
2
Fly UP