首页> 外文会议>INMM annual meeting >CONFIGURATION MANAGEMENT OF DBT-CREDITED SECURITY FEATURES AND SECURITY AREAS AT THE Y-12 NATIONAL SECURITY COMPLEX
【24h】

CONFIGURATION MANAGEMENT OF DBT-CREDITED SECURITY FEATURES AND SECURITY AREAS AT THE Y-12 NATIONAL SECURITY COMPLEX

机译:Y-12国家安全机构中DBT认证的安全功能和安全区域的配置管理

获取原文

摘要

Like all National Nuclear Security Administration(NNSA)facilities,the Y-12 National Security Complex(Y-12)is one the best-protected sites in the world.With the actions being taken by Y-12 in response to DOE Order 470.3a“Design Basis Threat(DBT)Policy,”the introduction of new technologies and methodologies into the design and construction of new and modified security features is an essential component to sustaining significant levels of security improvements.These security enhancements at Y-12,along with the consolidation of special nuclear materials through investments in newly constructed“purpose-built”facilities,are being implemented according to aggressive schedules.The NNSA Y-12 Site Office(YSO)and Y-12 Safeguards and Security(S&S) Managers recognized the importance of ensuring that 1.DBT analyses conclusions were appropriately developed and documented,2.engineered design outputs were confirmed as meeting the design basis intent,and 3.the new and modified systems are maintained and properly operated within established requirements.As a result,a configuration management(CM)process with integrated work control processes was recognized as essential to the effective lifecycle management of key engineered security features.Institutional CM processes had been developed,implemented, and refined at Y-12 since the early 1990s to help ensure that nuclear facilities were operated within their approved safety authorization bases.Because of the proven rigor,discipline,and time-tested effectiveness of this process,a decision was made to develop and implement a mirror process for application to Y-12 security systems and security areas.This paper provides an overview of the overall CM process as tailored and implemented to Y-12 security systems and security areas.The paper covers application,system boundary descriptions and credited engineered features,change control process,equivalent component evaluations,temporary modifications and compensatory measures,and assessment methodologies.The implementation method,sequence of implementation,and the graded approach to CM application are also discussed.
机译:与所有国家核安全局(NNSA)设施一样,Y-12国家安全中心(Y-12)是世界上受保护最好的站点之一。Y-12响应美国能源部470.3a号令采取了行动。 “设计基准威胁(DBT)政策”将新技术和方法引入新的和经过修改的安全功能的设计和构建中,是维持显着水平的安全改进的重要组成部分。这些Y-12的安全增强功能以​​及通过对新建的“专用”设施进行投资来整合特殊核材料的计划正在按照严格的时间表进行。NNSA Y-12站点办公室(YSO)和Y-12保障与安保(S&S)经理认识到了重要性确保1.DBT分析结论得到适当的开发和记录; 2。确认工程设计的输出满足设计基础的意图; 3。维护新的和修改的系统,并因此,具有集成工作控制流程的配置管理(CM)流程被认为对关键工程安全功能的有效生命周期管理至关重要。Y机构的CM流程已得到开发,实施和完善自1990年代初以来-12年来一直致力于确保核设施在其批准的安全授权基础内运行。由于该过程的严格性,纪律性和经过时间考验的有效性,因此决定制定并实施镜像过程。应用于Y-12安全系统和安全领域。本文概述了针对Y-12安全系统和安全领域量身定制和实施的整个CM流程。本文涵盖了应用程序,系统边界描述和可靠的设计功能,变更控制过程,等效组件评估,临时修改和补偿措施以及评估方法还讨论了实现方法,实现顺序以及CM应用的分级方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号