Cyber Security Inspection Guide
Cyber Security Inspection Guide
CYBER SECURITY
CORNERSTONE: Security
INSPECTION BASES: See IMC 0308 Attachment 6, “Basis Document for Security
Cornerstone of the Reactor Oversight Process”
SAMPLE REQUIREMENTS:
The estimated time to complete the inspection procedure direct inspection effort is 70 hours
(with a range of 63 to 77 hours) per site and will consist of one week of direct inspection effort
with contractor support. This inspection is planned to be conducted as a team inspection. The
team shall consist of two regional inspectors and two contractors. (The hours described in this
section only includes inspector hours)
When a licensee elects to demonstrate an authentic and realistic performance and function test
of the cyber security network configuration, the opportunity could provide inspectors a more
efficient way to evaluate the licensee’s defensive architecture and selected program elements.
If the inspectors conclude that the licensee provided an effective, acceptable performance, and
function test, then the inspection may consist of one inspector, and two contractors for one
week. This resource reduction occurs because the satisfactory performance and function test
provides reasonable assurance of site cyber security protection in the inspection areas identified
in this procedure. As a result, the estimated time to complete the inspection procedure direct
inspection effort shall be 42 hours per site, (7 hours for performance and function test
observation applicable to the site and 35 hours for on site inspection with an overall range of 37
to 47 hours per site).
The inspection of the minimum number of inspection requirements will constitute completion of
one sample and this procedure. This inspection requirement range for completion is as follows:
minimum of three inspection requirements, nominal four inspection requirements, and
maximum, based on unusual circumstance, or special considerations, five inspection
The frequency at which this inspection activity is to be conducted is one week biennially (once
every 2 years).
01.01 To provide assurance that the licensee’s digital computer and communication systems
and networks associated with safety, security, or emergency preparedness (SSEP) functions
are adequately protected against cyber-attacks in accordance with Title 10 of the Code of
Federal Regulations (10 CFR) 73.54 and the U.S. Nuclear Regulatory Commission (NRC)
approved cyber security plan (CSP).
01.02 To verify that CSP changes and reports are in accordance with 10 CFR 50.54(p).
02.01 Background
Evaluation of the CSP implementation occurred in three distinct phases prior to development of
this cyber security baseline inspection. Initial inspections in accordance with Temporary
Instruction 2201/004, “Inspection of Implementation of Interim Cyber Security Milestones 1-7,”
verified licensees established a qualified cyber security assessment team, identified all critical
systems and critical digital assets (CDAs), effectively implemented a network architecture to
separate higher cyber security levels from lower levels as described in their CSP, established
controls for portable media, and mobile devices, expanded their insider mitigation program to
include personnel associated with cyber security assets, and implemented controls for CDAs to
the most important systems.
The second phase of inspections verified that licensees implemented effective corrective
actions for performance deficiencies identified during the Milestones 1 to 7 inspections.
The final phase of inspections, starting in 2017, verified licensees had fully implemented their
cyber security programs. The full implementation inspections were conducted using
Inspection Procedure (IP) 71130.10P, “Cyber Security.” Prior to and during the full
implementation inspections, additional guidance was developed and issued based on lessons
learned from oversight program implementation. Nuclear Energy Institute (NEI) NEI 13-10,
“Cyber Security Control Assessments,” Revision 6, streamlined the process for addressing
the application of cyber security controls to many CDAs. Industry issued addendums to NEI
08-09, “Cyber Security Plan for Nuclear Power Reactors,” Revision 6, to clarify the
requirements for implementing controls while the NRC performed the full implementation
inspections. In addition, industry continued efforts to clarify the process for identification of
digital assets identified as critical in the emergency planning and balance of plant (BOP)
areas, as the guidance in NEI 10-04, “Identifying Systems and Assets Subject to the Cyber
Security Rule,” and NEI 13-10 changed.
Throughout this procedure, the term “high assurance” is used in alignment with the
Commission policy statement that high assurance is equivalent to reasonable assurance of
02.02 Guidance
The inspection process should focus on evaluating changes to the program, critical systems,
and CDAs. These critical systems include, but are not limited to, plant systems, equipment,
communication systems, networks, offsite communications, or support systems, or equipment
that perform, or are associated with, SSEP functions. Systems and programs that have been
added or modified since the last inspection will be reviewed as part of the current inspection. If
changes to the program have not been implemented, then the inspector should select at least
three systems, including one safety-related, or important-to-safety system, and one security
system, to review their current implementation.
When preparing, planning, and conducting this inspection, the inspector(s) may need additional
guidance in implementation requirements. The inspector(s) should review Security Frequently
Asked Questions (SFAQs) related to cyber security requirements in advance of inspections. If
the inspector requires policy interpretation or program clarification, then they should use the
Cyber Security Issues Forum (SIF) process. Findings and issues related to this IP shall be
processed through the SIF.
Verify that digital computer and communication systems and networks associated with SSEP
functions are adequately protected against cyber-attack. Verify that the licensee is maintaining
a cyber security program in accordance with its CSP and 10 CFR 73.54. The inspector will
consider the following inspection requirements when developing the inspection plan and
identifying the inspection sample.
Note for Completion: Sections 03.01 to 03.05 constitute the areas in this procedure that include
the inspection requirements. If a licensee develops performance testing or performance metrics
as described in Section 03.06, and found satisfactory through review by the inspector, then
identified sections should be evaluated as complete, and the inspection should focus on the
remaining areas not demonstrated by the performance testing or metrics, as described in this
IP. Section 03-06 and associated documents mentioned below shall describe the standards for
determining satisfactory demonstration.
Review the process established by the licensee to conduct ongoing monitoring and
assessments. Verify that the licensee conducts assessments required by the CSP.
The inspection of this control should be evaluated as complete, based on the
successful conduct of license performance testing.
Ongoing monitoring and assessment activities are performed to verify that the cyber
security controls implemented for CDAs remain in place. The monitoring and
assessment activities are a based on a representative sample of controls. Security
assessments verify security-related activities and actions occur at the frequency
specified in security controls or within the evaluated alternate control frequency.
Specific Guidance:
The effectiveness analysis (i.e., NEI 08-09, Section 4.4.3.1, “Effectiveness Analysis”)
ensures that the cyber security controls are implemented correctly, operating as
intended, and continue to provide high assurance that CDAs are protected against
cyber-attacks up to and including the design-basis threat (DBT). The analysis is based
on a representative sample of CDAs, controls, and program elements. Reviews of the
cyber security program and controls include, but are not limited to, periodic audits of the
physical security program, security plans, implementing procedures, cyber security
programs; safety/security interface activities, and the testing, maintenance, and
calibration program as it relates to cyber security.
Specific Guidance:
Verify that the licensee maintained the defensive architecture, its capability to detect, to
respond to, and to recover from cyber-attacks, as described by the CSP. The
inspection of this control should be evaluated as complete, based on the successful
conduct of license performance testing.
Specific Guidance:
Verify that the licensee maintains controls and elements to ensure boundary protection
for the cyber security levels and ensures that integrity of data is maintained. These
protections can include host intrusion protection for devices and network intrusion
detection/prevention for their network flows. Portions of the inspection of this control
should be evaluated as complete, based on the successful conduct of license
performance testing.
Specific Guidance:
Verify that the licensee has analyzed digital computer and communications systems
and networks and identified those assets that must be protected against cyber-attacks
to preserve the intended function of plant systems, structures, and components within
Verify that the licensee maintained the implemented security controls to provide high
assurance that the CDAs are continuously protected against cyber-attacks.
Specific Guidance:
Verify that the licensee is verifying and validating that the implemented security controls
are implemented correctly, operating as intended, and continuing to provide high
assurance that CDAs are protected against cyber-attacks up to and including the DBT.
Verify that the licensee has established access controls, and authentication and user-
identification capabilities. Portions of the inspection of this control should be evaluated
as complete, based on the successful conduct of license performance testing.
Specific Guidance:
The licensee has established policies and procedures as required by the CSP (e.g., NEI
08-09, Appendix D, Section 1, “Access Control,” and Section 4, “Identification and
Authentication” or Regulatory Guide 5.71, Appendix B.4, “Identification and
Authentication”). The licensee also has policies and procedures for the periodic review
of the access authorization list.
Verify that the licensee has continued to control portable media and mobile devices in
accordance with the CSP. The inspection of this control should be evaluated as
complete, based on the successful conduct of license performance testing.
Specific Guidance:
Licensees utilize portable media and mobile devices to update software and manage
changes to CDAs. Verify that licensees have established policies and procedures that
describe the control, update, and use of portable media, and mobile devices. Mobile
devices should be hardened in accordance with the requirements of the CSP.
Verify that the licensee performs a security impact analysis prior to making changes to
CDAs to manage the cyber risk resulting from the changes. Portions of the inspection
of this control should be evaluated as complete, based on the successful conduct of
license performance testing.
Specific Guidance:
Verify that the licensee has implemented appropriate supply chain and services
acquisition controls for replacement CDAs.
Specific Guidance:
Since many replacements for CDAs will be purchased off-the-shelf, a review of supply
chain and acquisition controls should be performed, and the replacement CDAs should
be hardened. This review should factor in the classification of the CDA and the risk to
the plant.
Verify that any changes to the CSP did not reduce the safeguards effectiveness of the
plan. Changes to the CSP can be made according to the requirements of
10 CFR 50.54(p). Verify that the licensee performs activities in accordance with their
implementing procedures.
The licensee will have a change procedure and licensing basis administrative controls
for changing their CSP. Further, the CSP required that the licensee develop
implementing procedures. Review of the procedures can be conducted for controls
such as password requirements, testing control procedures, hardening guidelines,
control of portable media, and any common, or administrative control.
Verify that the licensee established an incident response process, including contingency
plans, and procedures. Verify that the licensee properly evaluated and responded to
cyber security incidents, including effectively implementing their reporting requirements.
Specific Guidance:
If a cyber security incident occurred, ensure that the licensee took effective actions to
ensure that the functions of CDAs are not adversely impacted and that the licensee
implemented appropriate corrective actions.
c. Review Training
Verify that the licensee has established training as described in the CSP.
Specific Guidance:
Verify that appropriate facility personnel, including contractors, are aware of cyber
security requirements, and receive the training necessary to perform their assigned
duties, and responsibilities.
Verify that the licensee is identifying issues related to the cyber security program at an
appropriate threshold, entering them in the CAP, and resolving the issues for a selected
sample of problems associated with the cyber security program.
The CSP specifies that the licensee will use the site CAP to:
1. track, trend, correct, and prevent recurrence of cyber security failures and
deficiencies, and
2. evaluate and manage cyber risks.
a. Performance Testing
This section is optional, and is not part of the inspection requirements, unless the option
is elected to be implemented by the licensee. If elected, the sample takes the place of
inspection requirements 03.01.a, 03-01b, 03.02.a, and 03.02.e. Additionally, the
performance testing demonstration and information reported shall take the place of
portions of 03.02.b, 03.02.d, 03.03a, and 03.03.b inspection requirements as
determined by the type and scope of the testing. If the performance testing and
licensee submitted performance testing information demonstrate successful
implementation of these performance requirements, then the inspection of the
successfully demonstrated inspection requirements should be evaluated as complete,
in order to focus on areas not previously demonstrated. If the performance testing does
not properly demonstrate the fidelity of the cyber controls, then the inspection
procedure should be completed to assess these controls.
If the licensee elects to demonstrate performance and function test(s), verify that the
performance, and function testing reflects the on-site cyber system physical
configuration, and performance. If the answer to the following are both “yes”, then the
inspector may determine that the demonstration of the performance and function test is
adequate.
1. In accordance with the CSP, licensees are required to collect data, to document
results, and to evaluate the effectiveness of existing cyber security programs, and
cyber security controls. Did the licensee submit information that describes, and
documents results of its performance testing assessment program as part of the
request for information (RFI) submission?
2. Was the cyber-attack performance and functional test authentic and realistic?
Specifically, the virtual network test configuration had to reasonably match the
site-specific computer network configuration(s) and the cyber-attack testing
performed, and realistically challenged the virtual network.
Specific Guidance:
The observed performance test will be conducted at least 120 days before the
start of the first on-site week of inspection. Records or reports of completed
If multiple facilities want to credit a single testing facility, the licensee shall
adequately demonstrate that the tested configuration accurately represents the
network configurations and defensive architectures at the respective sites.
3. If the licensee identified issues during the performance testing, did they
appropriately categorize and correct the deficiencies? If the testing deficiency
revealed a noncompliance with the CSP, did the licensee implement appropriate
compensatory measures, prioritize the deficiency, and implement corrective
actions? Licensees are required to monitor the cyber security program through
random testing of cyber security intrusion monitoring tools, periodic functional
testing, and vulnerability scans/assessments. Therefore, the results of licensee
performance testing and areas requiring corrective action are part of normal
licensee-required self-monitoring activities and shall not be documented in the
inspection report, in accordance with NRC Enforcement Policy. [A4.4.3.2, E3.4]
b. Performance Metrics
This section is optional, and is not part of the inspection requirements, unless the option
is elected to be implemented by the licensee. If elected, the metric information provided
by the licensee, along with any data needed to validate the reported metric result,
during the RFI submission shall assist the inspection team to conduct a more efficient
inspection effort and better inform inspectors of the performance of the cyber security
program. In accordance with the CSP, licensees are required to confirm information,
document results, and evaluate the effectiveness of existing cyber security programs
and cyber security controls. [A3.1.2].
If the following metric data is provided to the inspection team during the RFI
submission, the inspection team will review the submitted information during inspection
preparation to evaluate the quality of the submitted information and gain insights into
licensee performance in these inspectable areas. The RFI submission shall be
submitted by Licensees following the guidance in the performance metrics RFI
Template which is part of the RFI package.
1. Access control
2. Flaw Remediation
• Number of security flaws not mitigated (identify the security alerts and
vulnerability assessment process, communicate vulnerability information,
correct security flaws in CDAs, and perform vulnerability scans, or
assessments of the CDA to validate that the flaw has been eliminated before
the CDA is put into production). [E3.2 and E12]. This value informs the
effectiveness of the technical evaluation and testing of recommended flaw
remediation.
• Number of incidents where malicious code was not detected at the security
boundary device entry and exit points and on the network (real-time malicious
code protection mechanisms are established, deployed, and documented for
security boundary device entry, and exit points, CDAs (if applicable),
workstations, servers, and mobile computing devices (i.e., calibrators) on the
network to detect and eradicate malicious code resulting from data
communication between systems, CDAs, removable media or other common
means; and exploitation of CDAs vulnerabilities). Number of incidents where
malicious code was not blocked from making unauthorized connections
(monitoring events on CDAs, detecting attacks on CDAs, detecting, and
blocking unauthorized connections, identifying unauthorized use of CDAs).
[E3.3 and E3.4]. This value assists in the assessment of the effectiveness of
malicious code protection controls and processes, as well as monitoring
tools, and techniques.
5. Security Functionality
• The minimum required staff was assigned, and any vacancies were filled with
fully qualified, and trained personnel. [A3.1.2]
• Number of CDAs with ports or protocols that had not been evaluated as
physically and logically secured and hardened, including firewalls and
boundary control devices that were removed. [E6]
71130.10-04 REFERENCES
10 CFR 73.54, “Protection of Digital Computer and Communication Systems and Networks”
NEI 08-09, “Cyber Security Plan for Nuclear Power Reactors,” Revision 6, (ML101180437);
Addendum 1 (ML17079A379); Addendum 2 (ML17212A634); Addendum 3 (ML17237C076);
Addendum 4, (ML17212A635), Addendum 5 (ML18226A007), Addendum 7 (ML18348B211)
NEI 10-04, “Identifying Systems and Assets Subject to the Cyber Security Rule,” Revision
2, and NRC Letter acknowledging NEI 10-04 to be acceptable for use with exceptions
(ML12180A081)
ML20126G492 - Endorsement of NEI White Paper, - Changes to NEI 10-04 and NEI 13-10
Guidance for Identifying and Protecting Digital Assets Associated with Emergency
Preparedness Functions, Dated March 2020 - Final Copy
ML20205L604 – Endorsement of NEI White Paper, “Changes to NEI 10-04 and NEI 13-10
Guidance for Identifying and protecting Digital Assets Associated with the Balance of Plant”,
Dated July 2020
ML20199M368 – NRC Review of NEI White Paper, “Changes to NEI 10-04 and NEI 13-
10 Guidance for Identifying and Protecting Digital Assets associated with Safety-
Related and Important-to-Safety Functions,” Dated July 2020
Power Point Presentation describing the inspection and development history of cyber security
(ML20324A636)
CYBER SECURITY Guidance Document for Development of the Request for Information
(RFI) and Notification Letter for Full Implementation of the Cyber Security Inspection
(ML17156A215)