首页> 外文会议>International topical meeting on nuclear plant instrumentation, control, and human-machine interface technologies >LESSONS LEARNED FROM THE IMPLEMENTATION OF REGULATORY GUIDE 1.152, REVISION 3 AND NEEDS FOR FUTURE WORK IN THIS AREA
【24h】

LESSONS LEARNED FROM THE IMPLEMENTATION OF REGULATORY GUIDE 1.152, REVISION 3 AND NEEDS FOR FUTURE WORK IN THIS AREA

机译:从实施法规1.152,修订版3中学到的经验教训以及该领域未来工作的需求

获取原文

摘要

In July 2011, the US NRC updated Regulatory Guide 1.152 to Revision 3. The main focus of the revision was to recognize that the NRC now specifically regulates cyber security under its 10 CFR 73.54 regulation and that malicious actions taken against safety systems are no longer addressed in Part 50 or 52 licensing space. To address non-malicious safety and reliability issues Regulatory Guide 1.152 Revision 3 introduced the concepts of secure development and operational environments to provide guidance to applicants. In order for staff to reach these conclusions it is incumbent on the applicant to provide an assessment of the vulnerabilities to the secure development and operation of their digital system. Unfortunately, the NRC staff has seen a wide variety and depth of information contained in submissions. To further add complexity to this topic, the vast majority of the information submitted in support of this evaluation is normally redacted from the publicly available information under provisions of 10 CFR 2.390 which inhibits lessons learned from being readily available. With the release of IEEE Std. 7-4.3.2 - 2010, the NRC staff anticipates revising Regulatory Guide 1.152 to Revision 4 in order to provide an endorsement of the applicable portions of that standard. The updated standard incorporates much of the NRC's interim staff guidance developed to clarify the staff's positions. In addition, staff would like to pursue developing guidance on the performance and documentation of secure development and operation vulnerability analyses. Additional guidance is also needed regarding application of the criteria to pre-developed systems. Staff believes these efforts should be of benefit to both the staff and future applicants.
机译:2011年7月,美国NRC更新了修订版3的法规指南1.152。该修订版的主要重点是认识到NRC现在根据其10 CFR 73.54法规专门监管网络安全,并且不再解决针对安全系统采取的恶意措施。在第50或52部分的许可空间中。为了解决非恶意的安全性和可靠性问题,《法规指南》 1.152修订版3引入了安全开发和操作环境的概念,以为申请人提供指导。为了使工作人员得出这些结论,申请人有责任对其数字系统的安全开发和操作的漏洞进行评估。不幸的是,NRC的工作人员看到了呈件中包含的各种信息和深度信息。为了进一步增加该主题的复杂性,根据10 CFR 2.390的规定,为支持此评估而提交的绝大多数信息通常都是从公开信息中删除的,这阻碍了所汲取的教训的随时获得。随着IEEE标准的发布。 7-4.3.2-2010年,NRC工作人员期望修订第4版的法规指南1.152,以认可该标准的适用部分。更新后的标准纳入了NRC制定的大部分临时工作人员指南,以阐明工作人员的职位。此外,工作人员希望就安全开发和操作漏洞分析的性能和文档寻求开发指导。在将标准应用于预开发系统方面,还需要其他指导。工作人员认为,这些努力应该对工作人员和将来的申请人都有利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号