BS EN IEC 62859:2020
$142.49
Nuclear power plants. Instrumentation and control systems. Requirements for coordinating safety and cybersecurity
Published By | Publication Date | Number of Pages |
BSI | 2020 | 30 |
This document provides a framework to manage the interactions between safety and cybersecurity for nuclear power plant (NPP) systems, taking into account the current SC 45A standards addressing these issues and the specifics of nuclear I&C programmable digital systems.
NOTE In this document (as in IEC 62645), cybersecurity relates to prevention of, detection of, and reaction to malicious acts perpetrated by digital means (cyberattacks). In this context, it does not cover considerations related to non-malevolent actions and events such as accidental failures, natural events or human errors (except those degrading cybersecurity). Those aspects are of course of prime importance but they are covered by other SC 45A documents and standards, and are not considered as cybersecurity related in this document.
This document establishes requirements and guidance to:
-
integrate cybersecurity provisions in nuclear I&C architectures and systems, which are fundamentally tailored for safety;
-
avoid potential conflicts between safety and cybersecurity provisions;
-
aid the identification and the leveraging of the potential synergies between safety and cybersecurity.
This document is intended to be used for designing new NPPs, or modernizing existing NPPs, throughout I&C programmable digital systems lifecycle. It is also applicable for assessing the coordination between safety and cybersecurity of existing plants. It may also be applicable to other types of nuclear facilities.
This document addresses I&C programmable digital systems important to safety and I&C programmable digital systems not important to safety. It does not address programmable digital systems dedicated to site physical security, room access control and site security surveillance.
This document is limited to I&C programmable digital systems of NPPs, including their on-site maintenance and configuration tools.
Annex A provides a rationale for and comments about the scope definition and the document application, in particular about the exclusions and limitations previously mentioned.
This document comprises three normative clauses:
-
Clause 5 deals with the overall I&C architecture;
-
Clause 6 focuses on the system level;
-
Clause 7 deals with organizational and operational issues.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | Annex ZA(normative)Normative references to international publicationswith their corresponding European publications |
7 | English CONTENTS |
9 | FOREWORD |
11 | INTRODUCTION |
13 | 1 Scope 2 Normative references |
14 | 3 Terms and definitions |
16 | 4 Symbols and abbreviations |
17 | 5 Coordinating safety and cybersecurity at the overall architecture level 5.1 General 5.2 Fundamental and generic principles |
18 | 5.3 Thematic requirements and recommendations 5.3.1 Delineation of security zones 5.3.2 Provisions for coping with common cause failures (including diversity) |
19 | 5.3.3 Separation provisions 5.3.4 Data communications 6 Coordinating safety and cybersecurity at the individual system level 6.1 General 6.2 Fundamental and generic principles |
20 | 6.3 Safety and cybersecurity coordination during the I&C system lifecycle 6.3.1 General 6.3.2 Requirements and planning activities 6.3.3 Design activities |
21 | 6.3.4 Implementation activities 6.3.5 Verification and validation activities 6.3.6 Installation and acceptance testing activities 6.3.7 Operations and maintenance activities 6.3.8 Change management 6.3.9 Decommissioning activities |
22 | 6.4 Selected technical aspects of I&C systems constrained by safety and cybersecurity 6.4.1 General 6.4.2 Logical access control for HMIs of I&C programmable digital systems in control rooms 6.4.3 Software modification |
23 | 6.4.4 Logging and audit capability 6.4.5 Use of cryptography by I&C systems |
24 | 6.4.6 System availability and function continuity 7 Organizational and operational issues 7.1 Governance and responsibilities 7.2 Coordination between safety and cybersecurity staff during operations 7.3 Safety and cybersecurity culture 7.4 Emergency response management |
26 | Annex A (informative)Rationale for, and notes related to,the scope of this document A.1 General A.2 Inclusion of I&C programmable digital system not important to safety A.3 Exclusion of physical security, room access control and site security surveillance systems A.4 Exclusion of non-malevolent actions and events |
27 | A.5 Exclusion of development tools and platforms |
28 | Bibliography |