Programmable Logic Computers in Nuclear Power Plant Control Systems, 34916-34919 [2016-12926]

Download as PDF 34916 Proposed Rules Federal Register Vol. 81, No. 105 Wednesday, June 1, 2016 This section of the FEDERAL REGISTER contains notices to the public of the proposed issuance of rules and regulations. The purpose of these notices is to give interested persons an opportunity to participate in the rule making prior to the adoption of the final rules. NUCLEAR REGULATORY COMMISSION 10 CFR Part 73 [Docket No. PRM–73–17; NRC–2013–0214] Programmable Logic Computers in Nuclear Power Plant Control Systems Nuclear Regulatory Commission. ACTION: Petition for rulemaking; denial. AGENCY: The U.S. Nuclear Regulatory Commission (NRC) is denying a petition for rulemaking (PRM), filed by Mr. Alan Morris (petitioner) on March 14, 2013, as supplemented most recently on December 19, 2013. The petition was docketed by the NRC on February 7, 2014, and was assigned Docket No. PRM–73–17. The petitioner requested that the NRC require that his ‘‘newdesign programmable logic computers [PLCs]’’ be installed in the control systems of nuclear power plants to block malware attacks on the industrial control systems of those facilities. In addition, the petitioner requested that nuclear power plant staff be trained ‘‘in the programming and handling of the non-rewriteable memories’’ for nuclear power plants. The NRC is denying the petition because the petitioner did not present any significant new information or arguments that would support the requested changes, nor has he demonstrated that a need exists for a new regulation requiring the installation of his new-design PLCs in the control systems of NRC-licensed nuclear power plants. DATES: The docket for the petition for rulemaking PRM–73–17 is closed on June 1, 2016. ADDRESSES: Please refer to Docket ID NRC–2013–0214 when contacting the NRC about the availability of information regarding this petition. You may obtain publicly-available documents related to the petition using any of the following methods: • Federal Rulemaking Web site: Go to https://www.regulations.gov and search sradovich on DSK3TPTVN1PROD with PROPOSALS SUMMARY: VerDate Sep<11>2014 17:32 May 31, 2016 Jkt 238001 for Docket ID NRC–2013–0214. Address questions about NRC dockets to Carol Gallagher; telephone: 301–415–3463; email: Carol.Gallagher@nrc.gov. For technical questions, contact the individual listed in the FOR FURTHER INFORMATION CONTACT section of this document. • NRC’s Agencywide Documents Access and Management System (ADAMS): You may obtain publiclyavailable documents online in the ADAMS Public Documents collection at https://www.nrc.gov/reading-rm/ adams.html. To begin the search, select ‘‘ADAMS Public Documents’’ and then select ‘‘Begin Web-based ADAMS Search.’’ For problems with ADAMS, please contact the NRC’s Public Document Room (PDR) reference staff at 1–800–397–4209, 301–415–4737, or by email to pdr.resource@nrc.gov. The ADAMS accession number for each document referenced in this document (if that document is available in ADAMS) is provided the first time that a document is referenced. In addition, for the convenience of the reader, the ADAMS accession numbers are provided in a table in the section of this document entitled, Availability of Documents. • NRC’s PDR: You may examine and purchase copies of public documents at the NRC’s PDR, Room O1–F21, One White Flint North, 11555 Rockville Pike, Rockville, Maryland 20852. FOR FURTHER INFORMATION CONTACT: Natreon Jordan, Office of Nuclear Reactor Regulation, telephone: 301– 415–7410, email: Natreon.Jordan@ nrc.gov, U.S. Nuclear Regulatory Commission, Washington, DC 20555– 0001. SUPPLEMENTARY INFORMATION: I. The Petition Section 2.802 of title 10 of the Code of Federal Regulations (10 CFR), ‘‘Petition for rulemaking,’’ provides an opportunity for any interested person to petition the Commission to issue, amend, or rescind any regulation. A § 2.802 petition was filed by the petitioner on March 14, 2013, and was supplemented several times through December 19, 2013. (ADAMS Accession No. ML14016A458). On February 7, 2014 (79 FR 7406), the NRC published a notice of receipt of PRM–73–17. The petitioner requested that the NRC amend its regulations that protect digital PO 00000 Frm 00001 Fmt 4702 Sfmt 4702 computer and communication systems and networks. The petitioner requested that the NRC specifically require that ‘‘new-design programmable logic computers,’’ with his patented writeonce, read-many (WORM) media, be installed in the control systems of nuclear power plants in order to ‘‘block malware attacks on the industrial control systems of those facilities.’’ The petitioner also requested that nuclear power plant staff ‘‘be trained to maintain and secure records of all memory programming,’’ and recommended ‘‘maintenance in secure storage of programmed memories, as specified in this petition, which may be again employed, as the control systems of critical facilities are essentially steady-state.’’ The petitioner stated that the proposed action would ‘‘[r]educe impact on quality of the natural and social environments by stopping disastrous events at critical facilities.’’ The NRC staff sent a letter to the petitioner on June 12, 2014 (ADAMS Accession No. ML14120A006), asking the petitioner to provide additional information. Staff specifically asked the petitioner: • To indicate the inadequacies that he identified in the NRC’s current regulatory approach (i.e., performancebased, programmatic) and framework (i.e., NRC’s cyber security rule at § 73.54 and Regulatory Guide (RG) 5.71, ‘‘Cyber Security Programs for Nuclear Facilities’’) that would be remedied by the proposed rulemaking. Specifically, what cyber threat or vulnerability is not addressed by the current NRC regulations and guidance? • If one of the PLCs with his patented WORM media has been installed in any operating facility (nuclear or nonnuclear)? Are these PLCs alone sufficient to protect against cyber threats? What other cyber controls may be required at nuclear power plants if a PLC with his patented WORM media is installed? The petitioner responded to the NRC letter in a series of emails dated June 18, 2014, and June 19, 2014. (ADAMS Accession Nos. ML14181B296, ML14181B276, ML14181B286, and ML14181B270). Based on the petition and the petitioner’s responses to requests for additional information, the NRC staff identified three issues raised by the petitioner: E:\FR\FM\01JNP1.SGM 01JNP1 Federal Register / Vol. 81, No. 105 / Wednesday, June 1, 2016 / Proposed Rules sradovich on DSK3TPTVN1PROD with PROPOSALS Issue 1: PLCs currently installed in U.S. nuclear power plants are vulnerable to malware attacks that could negatively affect or challenge plant safety and control systems. The petitioner stated that malware can ‘‘maliciously reprogram the re-writeable memories of the present programmable logic computers’’ in the control systems of nuclear power plants. Issue 2: By using the petitioner’s patented PLC design, nuclear power plant safety and control systems would be safe from malware attacks. Issue 3: Nuclear power plant staff should be trained to maintain and secure records of all memory programming, and recommends maintenance in secure storage of programmed memories that may be again employed, as ‘‘the control systems of critical facilities are essentially steady-state.’’ The NRC staff decided not to seek public comment on PRM–73–17 because no additional information was needed for the NRC staff’s evaluation of the petitioner’s claim. II. Reasons for Denial The NRC is denying the petition because the petitioner did not present any significant new information or arguments that would support the requested changes, nor has he demonstrated a need for a new requirement for his new-design of PLCs in nuclear power plant control systems. This section provides detailed responses to the issues raised in the petition. Issue 1: PLCs that are currently installed in nuclear power plant control systems are vulnerable to malware attacks that could negatively affect or challenge plant safety and control systems. NRC Response: The NRC disagrees with Issue 1 because the petitioner does not take into account the comprehensive NRC cyber security program requirements for nuclear power plants in § 73.54. Section 73.54, ‘‘Protection of digital computer and communication systems and networks,’’ which is known as the NRC’s ‘‘cyber security rule,’’ requires licensees to protect digital systems in nuclear power plants from cyber attacks. The cyber security rule presumes that any digital system (including PLC designs) is vulnerable to various cyber attacks. The regulations in § 73.54 establish a series of performance-based requirements to ensure that the functions of digital computers, communication systems, and networks are protected from cyber attack. In particular, § 73.54(a)(1) requires nuclear power plant licensees to protect digital computers, VerDate Sep<11>2014 17:32 May 31, 2016 Jkt 238001 communications systems, and networks associated with the following: • Safety-related and important-tosafety functions; • security functions; • emergency preparedness functions, including offsite communications; and • support systems and equipment which, if compromised, would adversely impact safety, security, or emergency preparedness (SSEP) functions. As required by §§ 73.54(b)(2) and 73.55(b)(8), a nuclear power plant licensee must establish, implement, and maintain a cyber security program that protects any digital system, network, or communication system associated with SSEP functions. Licensees are required to submit their cyber security plans to NRC for review and approval. Once approved, these plans become part of the licensee’s licensing basis, and compliance with the plans is evaluated by the NRC during periodic inspections. Civil penalties may be imposed in the event that licensees are found in violation of their approved cyber security plans. The NRC-approved cyber security plans, which are implemented through the licensee’s cyber security programs, significantly reduce the possibility that a PLC installed at a nuclear power plant would be vulnerable to a malware attack that would negatively impact or challenge the plant’s safety and control systems. The NRC inspects the implementation of the licensee’s cyber security programs, at specified intervals, to confirm that they are being implemented in accordance with the NRC-approved cyber security plans. To properly understand the petitioner’s concerns, the NRC staff asked the petitioner to indicate the inadequacies he had identified in the NRC’s current regulatory approach and framework that would be remedied by the NRC’s undertaking of his proposed action. The NRC staff asked, specifically, ‘‘What cyber threat or vulnerability is not addressed by the current NRC regulations and guidance?’’ The petitioner stated ‘‘the inadequacies in the NRC’s current regulatory approach are that the regulations do not address correction for the vulnerability to corruption of the rewriteable PLC memories.’’ The NRC staff disagrees with the petitioner’s assertion because the cyber security rule does, in fact, require licensees to have the capability to detect, prevent, respond to, mitigate, and recover from cyber attacks under § 73.54(c)(2). To comply with this requirement, nuclear power plant licensees must implement an overall site defensive strategy to protect critical PO 00000 Frm 00002 Fmt 4702 Sfmt 4702 34917 digital assets (CDAs) from cyber attacks, as well as implementing operational and management security controls. Issue 2: By using the petitioner’s patented PLC design, nuclear power plant safety and control systems would be safe from malware attacks. NRC Response: The NRC staff disagrees with Issue 2 because the proposed vulnerability to malware attacks described in the petition is already addressed in the current NRC regulations. In addition, the ‘‘newdesign’’ PLCs recommended in the petition have not been proven to offer protection from cyber attacks. The approach recommended in the petition presumes that a ‘‘one size fits all’’ solution would be adequate for the wide variety of industrial control systems and safety systems used in nuclear power plants. However, it does not take into account other attacks that could be made (e.g., man-in-the-middle attacks where an attacker inserts malicious commands between the PLC and the controlled devices). The objective of the petitioner’s PLC design, which was to correct a proposed vulnerability (i.e., to ‘‘block malware attacks on the industrial control systems of those facilities’’), is already accomplished by the defense-in-depth strategy in the current regulatory framework. As required by § 73.54(c)(2), nuclear power plant licensees must design their cyber security programs to apply and maintain an integrated defense-in-depth protective strategy to ensure that licensees have the capability to detect, prevent, respond to, mitigate, and recover from cyber attacks. The approach used by nuclear power plant licensees may vary in that NRC regulations are generally not prescriptive, and allow licensees and applicants to propose different methods for meeting the requirements. To comply with the requirements in § 73.54(c)(2), licensees must implement an overall site defensive strategy to protect CDAs from cyber attacks as well as implementing operational and management security controls. Defense-in-depth strategies are a documented collection of complementary and redundant security controls that establish multiple layers of protection to safeguard CDAs. Under a defense-in-depth strategy, the failure of a single protective strategy would not result in the compromise of an SSEP function. One example of a defense-indepth strategy involves setting up multiple security boundaries to protect CDAs and networks from cyber attack. In this way, multiple protection levels must fail for a cyber attack to progress and impact a critical system or network. E:\FR\FM\01JNP1.SGM 01JNP1 34918 Federal Register / Vol. 81, No. 105 / Wednesday, June 1, 2016 / Proposed Rules Even if a failure occurred (e.g., such as through a violation of policy), or if a protection mechanism was bypassed (e.g., by a new virus that is not yet identified as a cyber attack), other mechanisms would still be in place to detect and respond to a cyber attack on a CDA, to mitigate the impacts of the cyber attack, and to recover normal operations of the CDA and its system before an adverse impact could happen. In addition to the fact that a need has not been justified for use of the petitioner’s new-design PLCs, the approach recommended in the petition has not been proven by the petitioner to be effective in preventing cyber attacks. Based on email correspondence, the petitioner states that the proposed ‘‘new-design programmable logic computers’’ currently are not used in any facility (nuclear or otherwise). As such, the petitioner was unable to present any evidence that his PLCs would be effective in preventing cyber attacks. Furthermore, no information was provided by the petitioner as to how the ‘‘new-design programmable logic computers’’ would comply with the requirements in § 73.54 for use in the safety systems and control systems of a nuclear power plant. Issue 3: Nuclear power plant licensee staff should be trained to maintain and secure records of all memory programming, and recommends maintenance in secure storage of programmed memories that may be again employed, as ‘‘the control systems of critical facilities are essentially steady-state.’’ NRC Response: The NRC staff disagrees with Issue 3 because the petition does not take into account the awareness and training requirements each nuclear power plant licensee must perform as part of their comprehensive cyber security program as required in § 73.54. Under § 73.54(d)(1), each licensee is required to ensure, as part of its cyber security program, that appropriate facility personnel, including contractors, are aware of the cyber security requirements and receive the necessary training to perform their assigned duties and responsibilities. As an example, licensees may comply with the awareness and training requirements by performing the following actions: • Develop, disseminate, and periodically review and update the site cyber security training and awareness plan. This plan defines the purpose, scope, roles, responsibilities, and management commitment to provide high assurance that individuals have received training to properly perform their job functions; • Perform gap analyses in areas where additional training is needed in cyber security; • Establish measures to determine whether cyber security policies and procedures are being followed, and if not, determine whether a training or awareness issue is the cause and develop measures to be taken to correct the deficiency; • Develop, disseminate, and periodically review and update procedures that are used to facilitate and maintain the cyber security training and awareness program; and • Implement training and awareness security controls. In addition, § 73.54(d)(3) requires each nuclear power plant licensee, as part of its cyber security program, to evaluate all modifications to assets identified in § 73.54(a)(1) (i.e. systems with SSEP functions) before their implementation. This ensures that the cyber security performance objectives are maintained. As stated above, the NRC inspects licensee cyber security programs, at specified intervals, to confirm that the programs are being implemented in accordance with the NRC-approved cyber security plans. III. Conclusion The NRC has reviewed the petition and appreciates the concerns raised by the petitioner. For the reasons described in Section II, ‘‘Reasons for Denial,’’ of this document, the NRC is denying the petition under § 2.802. The petitioner did not present any significant new information or arguments, as part of this petition, that would support the requested changes, nor has the petitioner demonstrated that a need exists for a new provision requiring use of the petitioner’s new-design PLCs. IV. Availability of Documents The documents identified in the following table are available to interested persons as indicated. For more information on accessing ADAMS, see the ADDRESSES section of this document. ADAMS Accession number/ Federal Register citation Date Document January 2010 ............................................ March 14, 2013, as supplemented through December 19, 2013. January 27, 2014 ...................................... ........................................... ........................................... ........................................... ........................................... Regulatory Guide 5.71; ‘‘Cyber Security Programs for Nuclear Facilities’’ ................. Petition for Rulemaking from Mr. Alan Morris Regarding Programmable Logic Computers in Nuclear Power Plant Control Systems. Letter to Petitioner Enclosing Federal Register Notice—Receipt of Petition for Rulemaking. Federal Register Notice—Receipt of Petition for Rulemaking ................................... Letter to Petitioner; ‘‘PRM–73–17 Cyber Malware Attacks on Programmable Logic Computers’’. E-mail from Petitioner; ‘‘PRM–73–17’’ ......................................................................... E-mail from Petitioner; ‘‘RE: PRM–73–17’’ .................................................................. E-mail from Petitioner; ‘‘RE: PRM–73–17’’ .................................................................. E-mail from Petitioner; ‘‘RE: PRM–73–17’’ .................................................................. 17:32 May 31, 2016 PO 00000 February 7, 2014 ...................................... June 12, 2014 ........................................... sradovich on DSK3TPTVN1PROD with PROPOSALS June June June June 18, 18, 18, 19, 2014 2014 2014 2014 VerDate Sep<11>2014 Jkt 238001 Frm 00003 Fmt 4702 Sfmt 9990 E:\FR\FM\01JNP1.SGM 01JNP1 ML090340159 ML14016A458 ML13308A385 79 FR 7406 ML14120A006 ML14181B296 ML14181B276 ML14181B286 ML14181B270 Federal Register / Vol. 81, No. 105 / Wednesday, June 1, 2016 / Proposed Rules Dated at Rockville, Maryland, this 25th day of May, 2016. For the Nuclear Regulatory Commission. Annette L. Vietti-Cook, Secretary of the Commission. [FR Doc. 2016–12926 Filed 5–31–16; 8:45 am] BILLING CODE 7590–01–P DEPARTMENT OF TRANSPORTATION Federal Aviation Administration 14 CFR Parts 11, 404, 405, 420, 431, 435, 437, 460 [Docket No.: FAA–2016–6761; Notice No. 16–03] RIN 2120–AK76 Updates to Rulemaking and Waiver Procedures and Expansion of the Equivalent Level of Safety Option Federal Aviation Administration (FAA), DOT. ACTION: Notice of proposed rulemaking (NPRM). AGENCY: This action would streamline and improve commercial space transportation regulations’ general rulemaking and petition procedures by reflecting current practice; reorganizing the regulations for clarity and flow; and allowing petitioners to file their petitions to the FAA’s Office of Commercial Space Transportation electronically. Further, it would expand the option to satisfy commercial space transportation requirements by demonstrating an equivalent level of safety. These changes are necessary to ensure the regulations are current, accurate, and are not unnecessarily burdensome. The intended effect of these changes is to improve the clarity of the regulations and reduce burden on the industry and on the FAA. DATES: Send comments on or before August 1, 2016. ADDRESSES: Send comments identified by docket number FAA–2016–6761 using any of the following methods: • Federal eRulemaking Portal: Go to https://www.regulations.gov and follow the online instructions for sending your comments electronically. • Mail: Send comments to Docket Operations, M–30; U.S. Department of Transportation (DOT), 1200 New Jersey Avenue SE., Room W12–140, West Building Ground Floor, Washington, DC 20590–0001. • Hand Delivery or Courier: Take comments to Docket Operations in Room W12–140 of the West Building Ground Floor at 1200 New Jersey Avenue SE., Washington, DC, between sradovich on DSK3TPTVN1PROD with PROPOSALS SUMMARY: VerDate Sep<11>2014 17:32 May 31, 2016 Jkt 238001 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. • Fax: Fax comments to Docket Operations at 202–493–2251. Privacy: In accordance with 5 U.S.C. 553(c), DOT solicits comments from the public to better inform its rulemaking process. DOT posts these comments, without edit, including any personal information the commenter provides, to www.regulations.gov, as described in the system of records notice (DOT/ALL– 14 FDMS), which can be reviewed at www.dot.gov/privacy. Docket: Background documents or comments received may be read at https://www.regulations.gov at any time. Follow the online instructions for accessing the docket or go to the Docket Operations in Room W12–140 of the West Building Ground Floor at 1200 New Jersey Avenue SE., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. FOR FURTHER INFORMATION CONTACT: For questions concerning this proposed rule, contact Shirley McBride, AST–300, Office of Commercial Space Transportation, Federal Aviation Administration, 800 Independence Avenue SW., Washington, DC 20591; telephone (202) 267–7470; email Shirley.McBride@faa.gov. SUPPLEMENTARY INFORMATION: Authority for This Rulemaking The Commercial Space Launch Act of 1984, as amended and re-codified at 51 U.S.C. 50901–50923 (the Act), authorizes the Department of Transportation and thus the FAA, through delegations, to oversee, license, and regulate commercial launch and reentry activities, and the operation of launch and reentry sites as carried out by U.S. citizens or within the United States. 51 U.S.C. 50904, 50905. The Act directs the FAA to exercise this responsibility consistent with public health and safety, safety of property, and the national security and foreign policy interests of the United States. 51 U.S.C. 50905. The Act directs the FAA to regulate only to the extent necessary to protect the public health and safety, safety of property, and national security and foreign policy interests of the United States. 51 U.S.C. 50901(a)(7). The FAA is also responsible for encouraging, facilitating, and promoting commercial space launches by the private sector. 51 U.S.C. 50903. I. Background The Office of Commercial Space Transportation (AST) was established under the Act as part of the Office of the Secretary of Transportation within the PO 00000 Frm 00004 Fmt 4702 Sfmt 4702 34919 Department of Transportation. In 1988, the general rulemaking and petition procedures, under the authority of the Act, were codified in 14 CFR, chapter III, part 404. In November 1995, AST was transferred to the FAA as the agency’s only space-related line of business. The FAA’s general rulemaking and petition procedures, for which the agency follows public rulemaking procedures under the Administrative Procedure Act, 5 U.S.C. 553, reside in 14 CFR chapter I, part 11. When AST became part of the FAA, the general rulemaking and petition procedures in part 404 were not conformed to those in part 11 to remove duplicate and outdated information, or to clarify those provisions that apply specifically to the FAA’s commercial space transportation regulations. The proposed rule would update parts 404 and 11 to remove duplicate information from part 404 and add appropriate cross references between part 11 and part 404. In addition, the proposal would update part 404 to reflect current practice, clarify the requirements, and add an option to submit petitions to AST electronically. Currently, the option to satisfy a commercial space transportation regulation by demonstrating an ‘‘equivalent level of safety’’ is limited to part 417 1 and to some specific sections of chapter III. This restricts the FAA’s flexibility in approving launch and reentry related activities where the operator can convincingly demonstrate that an alternative approach to the requirements of chapter III provides an equivalent level of safety. This proposal would expand the equivalent level of safety option so that it applies more broadly to chapter III requirements for both launch and reentry activities. The current title of part 405 is ‘‘Investigations and Enforcement.’’ However, part 405 does not relate to investigations. To avoid confusion, the FAA proposes to revise the title of part 405 to a title more descriptive of its contents, namely, ‘‘Compliance and Enforcement.’’ II. Discussion of the Proposal 1. General Rulemaking Procedures (Part 11) The general rulemaking and petition procedures for commercial space transportation regulations, 14 CFR 1 See § 417.1(g): Equivalent level of safety. The requirements of this part apply to a launch operator and the launch operator’s launch unless the launch operator clearly and convincingly demonstrates that an alternative approach provides an equivalent level of safety. E:\FR\FM\01JNP1.SGM 01JNP1

Agencies

[Federal Register Volume 81, Number 105 (Wednesday, June 1, 2016)]
[Proposed Rules]
[Pages 34916-34919]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-12926]


========================================================================
Proposed Rules
                                                Federal Register
________________________________________________________________________

This section of the FEDERAL REGISTER contains notices to the public of 
the proposed issuance of rules and regulations. The purpose of these 
notices is to give interested persons an opportunity to participate in 
the rule making prior to the adoption of the final rules.

========================================================================


Federal Register / Vol. 81, No. 105 / Wednesday, June 1, 2016 / 
Proposed Rules

[[Page 34916]]



NUCLEAR REGULATORY COMMISSION

10 CFR Part 73

[Docket No. PRM-73-17; NRC-2013-0214]


Programmable Logic Computers in Nuclear Power Plant Control 
Systems

AGENCY: Nuclear Regulatory Commission.

ACTION: Petition for rulemaking; denial.

-----------------------------------------------------------------------

SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is denying a 
petition for rulemaking (PRM), filed by Mr. Alan Morris (petitioner) on 
March 14, 2013, as supplemented most recently on December 19, 2013. The 
petition was docketed by the NRC on February 7, 2014, and was assigned 
Docket No. PRM-73-17. The petitioner requested that the NRC require 
that his ``new-design programmable logic computers [PLCs]'' be 
installed in the control systems of nuclear power plants to block 
malware attacks on the industrial control systems of those facilities. 
In addition, the petitioner requested that nuclear power plant staff be 
trained ``in the programming and handling of the non-rewriteable 
memories'' for nuclear power plants. The NRC is denying the petition 
because the petitioner did not present any significant new information 
or arguments that would support the requested changes, nor has he 
demonstrated that a need exists for a new regulation requiring the 
installation of his new-design PLCs in the control systems of NRC-
licensed nuclear power plants.

DATES: The docket for the petition for rulemaking PRM-73-17 is closed 
on June 1, 2016.

ADDRESSES: Please refer to Docket ID NRC-2013-0214 when contacting the 
NRC about the availability of information regarding this petition. You 
may obtain publicly-available documents related to the petition using 
any of the following methods:
     Federal Rulemaking Web site: Go to https://www.regulations.gov and search for Docket ID NRC-2013-0214. Address 
questions about NRC dockets to Carol Gallagher; telephone: 301-415-
3463; email: Carol.Gallagher@nrc.gov. For technical questions, contact 
the individual listed in the FOR FURTHER INFORMATION CONTACT section of 
this document.
     NRC's Agencywide Documents Access and Management System 
(ADAMS): You may obtain publicly-available documents online in the 
ADAMS Public Documents collection at https://www.nrc.gov/reading-rm/adams.html. To begin the search, select ``ADAMS Public Documents'' and 
then select ``Begin Web-based ADAMS Search.'' For problems with ADAMS, 
please contact the NRC's Public Document Room (PDR) reference staff at 
1-800-397-4209, 301-415-4737, or by email to pdr.resource@nrc.gov. The 
ADAMS accession number for each document referenced in this document 
(if that document is available in ADAMS) is provided the first time 
that a document is referenced. In addition, for the convenience of the 
reader, the ADAMS accession numbers are provided in a table in the 
section of this document entitled, Availability of Documents.
     NRC's PDR: You may examine and purchase copies of public 
documents at the NRC's PDR, Room O1-F21, One White Flint North, 11555 
Rockville Pike, Rockville, Maryland 20852.

FOR FURTHER INFORMATION CONTACT: Natreon Jordan, Office of Nuclear 
Reactor Regulation, telephone: 301-415-7410, email: 
Natreon.Jordan@nrc.gov, U.S. Nuclear Regulatory Commission, Washington, 
DC 20555-0001.

SUPPLEMENTARY INFORMATION:

I. The Petition

    Section 2.802 of title 10 of the Code of Federal Regulations (10 
CFR), ``Petition for rulemaking,'' provides an opportunity for any 
interested person to petition the Commission to issue, amend, or 
rescind any regulation. A Sec.  2.802 petition was filed by the 
petitioner on March 14, 2013, and was supplemented several times 
through December 19, 2013. (ADAMS Accession No. ML14016A458). On 
February 7, 2014 (79 FR 7406), the NRC published a notice of receipt of 
PRM-73-17. The petitioner requested that the NRC amend its regulations 
that protect digital computer and communication systems and networks. 
The petitioner requested that the NRC specifically require that ``new-
design programmable logic computers,'' with his patented write-once, 
read-many (WORM) media, be installed in the control systems of nuclear 
power plants in order to ``block malware attacks on the industrial 
control systems of those facilities.'' The petitioner also requested 
that nuclear power plant staff ``be trained to maintain and secure 
records of all memory programming,'' and recommended ``maintenance in 
secure storage of programmed memories, as specified in this petition, 
which may be again employed, as the control systems of critical 
facilities are essentially steady-state.'' The petitioner stated that 
the proposed action would ``[r]educe impact on quality of the natural 
and social environments by stopping disastrous events at critical 
facilities.''
    The NRC staff sent a letter to the petitioner on June 12, 2014 
(ADAMS Accession No. ML14120A006), asking the petitioner to provide 
additional information. Staff specifically asked the petitioner:
     To indicate the inadequacies that he identified in the 
NRC's current regulatory approach (i.e., performance-based, 
programmatic) and framework (i.e., NRC's cyber security rule at Sec.  
73.54 and Regulatory Guide (RG) 5.71, ``Cyber Security Programs for 
Nuclear Facilities'') that would be remedied by the proposed 
rulemaking. Specifically, what cyber threat or vulnerability is not 
addressed by the current NRC regulations and guidance?
     If one of the PLCs with his patented WORM media has been 
installed in any operating facility (nuclear or non-nuclear)? Are these 
PLCs alone sufficient to protect against cyber threats? What other 
cyber controls may be required at nuclear power plants if a PLC with 
his patented WORM media is installed?
    The petitioner responded to the NRC letter in a series of emails 
dated June 18, 2014, and June 19, 2014. (ADAMS Accession Nos. 
ML14181B296, ML14181B276, ML14181B286, and ML14181B270).
    Based on the petition and the petitioner's responses to requests 
for additional information, the NRC staff identified three issues 
raised by the petitioner:

[[Page 34917]]

    Issue 1: PLCs currently installed in U.S. nuclear power plants are 
vulnerable to malware attacks that could negatively affect or challenge 
plant safety and control systems. The petitioner stated that malware 
can ``maliciously reprogram the re-writeable memories of the present 
programmable logic computers'' in the control systems of nuclear power 
plants.
    Issue 2: By using the petitioner's patented PLC design, nuclear 
power plant safety and control systems would be safe from malware 
attacks.
    Issue 3: Nuclear power plant staff should be trained to maintain 
and secure records of all memory programming, and recommends 
maintenance in secure storage of programmed memories that may be again 
employed, as ``the control systems of critical facilities are 
essentially steady-state.''
    The NRC staff decided not to seek public comment on PRM-73-17 
because no additional information was needed for the NRC staff's 
evaluation of the petitioner's claim.

II. Reasons for Denial

    The NRC is denying the petition because the petitioner did not 
present any significant new information or arguments that would support 
the requested changes, nor has he demonstrated a need for a new 
requirement for his new-design of PLCs in nuclear power plant control 
systems. This section provides detailed responses to the issues raised 
in the petition.
    Issue 1: PLCs that are currently installed in nuclear power plant 
control systems are vulnerable to malware attacks that could negatively 
affect or challenge plant safety and control systems.
    NRC Response: The NRC disagrees with Issue 1 because the petitioner 
does not take into account the comprehensive NRC cyber security program 
requirements for nuclear power plants in Sec.  73.54. Section 73.54, 
``Protection of digital computer and communication systems and 
networks,'' which is known as the NRC's ``cyber security rule,'' 
requires licensees to protect digital systems in nuclear power plants 
from cyber attacks. The cyber security rule presumes that any digital 
system (including PLC designs) is vulnerable to various cyber attacks. 
The regulations in Sec.  73.54 establish a series of performance-based 
requirements to ensure that the functions of digital computers, 
communication systems, and networks are protected from cyber attack. In 
particular, Sec.  73.54(a)(1) requires nuclear power plant licensees to 
protect digital computers, communications systems, and networks 
associated with the following:
     Safety-related and important-to-safety functions;
     security functions;
     emergency preparedness functions, including offsite 
communications; and
     support systems and equipment which, if compromised, would 
adversely impact safety, security, or emergency preparedness (SSEP) 
functions.
    As required by Sec. Sec.  73.54(b)(2) and 73.55(b)(8), a nuclear 
power plant licensee must establish, implement, and maintain a cyber 
security program that protects any digital system, network, or 
communication system associated with SSEP functions. Licensees are 
required to submit their cyber security plans to NRC for review and 
approval. Once approved, these plans become part of the licensee's 
licensing basis, and compliance with the plans is evaluated by the NRC 
during periodic inspections. Civil penalties may be imposed in the 
event that licensees are found in violation of their approved cyber 
security plans. The NRC-approved cyber security plans, which are 
implemented through the licensee's cyber security programs, 
significantly reduce the possibility that a PLC installed at a nuclear 
power plant would be vulnerable to a malware attack that would 
negatively impact or challenge the plant's safety and control systems. 
The NRC inspects the implementation of the licensee's cyber security 
programs, at specified intervals, to confirm that they are being 
implemented in accordance with the NRC-approved cyber security plans.
    To properly understand the petitioner's concerns, the NRC staff 
asked the petitioner to indicate the inadequacies he had identified in 
the NRC's current regulatory approach and framework that would be 
remedied by the NRC's undertaking of his proposed action. The NRC staff 
asked, specifically, ``What cyber threat or vulnerability is not 
addressed by the current NRC regulations and guidance?'' The petitioner 
stated ``the inadequacies in the NRC's current regulatory approach are 
that the regulations do not address correction for the vulnerability to 
corruption of the rewriteable PLC memories.'' The NRC staff disagrees 
with the petitioner's assertion because the cyber security rule does, 
in fact, require licensees to have the capability to detect, prevent, 
respond to, mitigate, and recover from cyber attacks under Sec.  
73.54(c)(2). To comply with this requirement, nuclear power plant 
licensees must implement an overall site defensive strategy to protect 
critical digital assets (CDAs) from cyber attacks, as well as 
implementing operational and management security controls.
    Issue 2: By using the petitioner's patented PLC design, nuclear 
power plant safety and control systems would be safe from malware 
attacks.
    NRC Response: The NRC staff disagrees with Issue 2 because the 
proposed vulnerability to malware attacks described in the petition is 
already addressed in the current NRC regulations. In addition, the 
``new-design'' PLCs recommended in the petition have not been proven to 
offer protection from cyber attacks.
    The approach recommended in the petition presumes that a ``one size 
fits all'' solution would be adequate for the wide variety of 
industrial control systems and safety systems used in nuclear power 
plants. However, it does not take into account other attacks that could 
be made (e.g., man-in-the-middle attacks where an attacker inserts 
malicious commands between the PLC and the controlled devices). The 
objective of the petitioner's PLC design, which was to correct a 
proposed vulnerability (i.e., to ``block malware attacks on the 
industrial control systems of those facilities''), is already 
accomplished by the defense-in-depth strategy in the current regulatory 
framework. As required by Sec.  73.54(c)(2), nuclear power plant 
licensees must design their cyber security programs to apply and 
maintain an integrated defense-in-depth protective strategy to ensure 
that licensees have the capability to detect, prevent, respond to, 
mitigate, and recover from cyber attacks. The approach used by nuclear 
power plant licensees may vary in that NRC regulations are generally 
not prescriptive, and allow licensees and applicants to propose 
different methods for meeting the requirements. To comply with the 
requirements in Sec.  73.54(c)(2), licensees must implement an overall 
site defensive strategy to protect CDAs from cyber attacks as well as 
implementing operational and management security controls.
    Defense-in-depth strategies are a documented collection of 
complementary and redundant security controls that establish multiple 
layers of protection to safeguard CDAs. Under a defense-in-depth 
strategy, the failure of a single protective strategy would not result 
in the compromise of an SSEP function. One example of a defense-in-
depth strategy involves setting up multiple security boundaries to 
protect CDAs and networks from cyber attack. In this way, multiple 
protection levels must fail for a cyber attack to progress and impact a 
critical system or network.

[[Page 34918]]

Even if a failure occurred (e.g., such as through a violation of 
policy), or if a protection mechanism was bypassed (e.g., by a new 
virus that is not yet identified as a cyber attack), other mechanisms 
would still be in place to detect and respond to a cyber attack on a 
CDA, to mitigate the impacts of the cyber attack, and to recover normal 
operations of the CDA and its system before an adverse impact could 
happen.
    In addition to the fact that a need has not been justified for use 
of the petitioner's new-design PLCs, the approach recommended in the 
petition has not been proven by the petitioner to be effective in 
preventing cyber attacks. Based on email correspondence, the petitioner 
states that the proposed ``new-design programmable logic computers'' 
currently are not used in any facility (nuclear or otherwise). As such, 
the petitioner was unable to present any evidence that his PLCs would 
be effective in preventing cyber attacks. Furthermore, no information 
was provided by the petitioner as to how the ``new-design programmable 
logic computers'' would comply with the requirements in Sec.  73.54 for 
use in the safety systems and control systems of a nuclear power plant.
    Issue 3: Nuclear power plant licensee staff should be trained to 
maintain and secure records of all memory programming, and recommends 
maintenance in secure storage of programmed memories that may be again 
employed, as ``the control systems of critical facilities are 
essentially steady-state.''
    NRC Response: The NRC staff disagrees with Issue 3 because the 
petition does not take into account the awareness and training 
requirements each nuclear power plant licensee must perform as part of 
their comprehensive cyber security program as required in Sec.  73.54.
    Under Sec.  73.54(d)(1), each licensee is required to ensure, as 
part of its cyber security program, that appropriate facility 
personnel, including contractors, are aware of the cyber security 
requirements and receive the necessary training to perform their 
assigned duties and responsibilities. As an example, licensees may 
comply with the awareness and training requirements by performing the 
following actions:
     Develop, disseminate, and periodically review and update 
the site cyber security training and awareness plan. This plan defines 
the purpose, scope, roles, responsibilities, and management commitment 
to provide high assurance that individuals have received training to 
properly perform their job functions;
     Perform gap analyses in areas where additional training is 
needed in cyber security;
     Establish measures to determine whether cyber security 
policies and procedures are being followed, and if not, determine 
whether a training or awareness issue is the cause and develop measures 
to be taken to correct the deficiency;
     Develop, disseminate, and periodically review and update 
procedures that are used to facilitate and maintain the cyber security 
training and awareness program; and
     Implement training and awareness security controls.
    In addition, Sec.  73.54(d)(3) requires each nuclear power plant 
licensee, as part of its cyber security program, to evaluate all 
modifications to assets identified in Sec.  73.54(a)(1) (i.e. systems 
with SSEP functions) before their implementation. This ensures that the 
cyber security performance objectives are maintained. As stated above, 
the NRC inspects licensee cyber security programs, at specified 
intervals, to confirm that the programs are being implemented in 
accordance with the NRC-approved cyber security plans.

III. Conclusion

    The NRC has reviewed the petition and appreciates the concerns 
raised by the petitioner. For the reasons described in Section II, 
``Reasons for Denial,'' of this document, the NRC is denying the 
petition under Sec.  2.802. The petitioner did not present any 
significant new information or arguments, as part of this petition, 
that would support the requested changes, nor has the petitioner 
demonstrated that a need exists for a new provision requiring use of 
the petitioner's new-design PLCs.

IV. Availability of Documents

    The documents identified in the following table are available to 
interested persons as indicated. For more information on accessing 
ADAMS, see the ADDRESSES section of this document.

------------------------------------------------------------------------
                                                               ADAMS
                                                             Accession
                                                              number/
              Date                       Document             Federal
                                                             Register
                                                             citation
------------------------------------------------------------------------
January 2010...................  Regulatory Guide 5.71;      ML090340159
                                  ``Cyber Security
                                  Programs for Nuclear
                                  Facilities''.
March 14, 2013, as supplemented  Petition for Rulemaking     ML14016A458
 through December 19, 2013.       from Mr. Alan Morris
                                  Regarding Programmable
                                  Logic Computers in
                                  Nuclear Power Plant
                                  Control Systems.
January 27, 2014...............  Letter to Petitioner        ML13308A385
                                  Enclosing Federal
                                  Register Notice--
                                  Receipt of Petition
                                  for Rulemaking.
February 7, 2014...............  Federal Register             79 FR 7406
                                  Notice--Receipt of
                                  Petition for
                                  Rulemaking.
June 12, 2014..................  Letter to Petitioner;       ML14120A006
                                  ``PRM-73-17 Cyber
                                  Malware Attacks on
                                  Programmable Logic
                                  Computers''.
June 18, 2014..................  E-mail from Petitioner;     ML14181B296
                                  ``PRM-73-17''.
June 18, 2014..................  E-mail from Petitioner;     ML14181B276
                                  ``RE: PRM-73-17''.
June 18, 2014..................  E-mail from Petitioner;     ML14181B286
                                  ``RE: PRM-73-17''.
June 19, 2014..................  E-mail from Petitioner;     ML14181B270
                                  ``RE: PRM-73-17''.
------------------------------------------------------------------------



[[Page 34919]]

    Dated at Rockville, Maryland, this 25th day of May, 2016.

    For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.
[FR Doc. 2016-12926 Filed 5-31-16; 8:45 am]
 BILLING CODE 7590-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.