IAEA Nuclear Security Series No. 17-T Rev.1 Computer Security at Nuclear Facilities
International guidance for computer security at nuclear facilities published by the International Atomic Energy Agency. 14 sections covering computer security management, risk management, defense-in-depth (5 security levels), identification and authentication, access control, system integrity, audit and monitoring, communication security, supply chain security, incident response, contingency planning, personnel security, physical security integration, and assessment and testing. Provides framework for protecting instrumentation and control (I&C) systems including safety-critical systems. Applied globally through national regulatory implementations.
Controls: 92
Total Mappings: 97
Publisher: International Atomic Energy Agency (IAEA) Version: Rev.1 (2023) AC (8) AT (4) AU (4) CA (5) CM (5) CP (6) IA (5) IR (6) PE (5) PL (3) PM (6) PS (6) RA (6) SA (2) SC (9) SI (4) SR (8)
AC Access Control
| Control | Name | IAEA NSS 17-T References |
|---|---|---|
| AC-02 | Account Management | Sec 5.2Sec 5.3 |
| AC-03 | Access Enforcement | Sec 5.3 |
| AC-04 | Information Flow Enforcement | Sec 5.1Sec 5.6 |
| AC-05 | Separation Of Duties | Sec 5.3 |
| AC-06 | Least Privilege | Sec 5.3 |
| AC-07 | Unsuccessful Login Attempts | Sec 5.3 |
| AC-17 | Remote Access | Sec 5.3 |
| AC-20 | Use Of External Information Systems | Sec 5.3 |
AT Awareness and Training
AU Audit and Accountability
CA Security Assessment and Authorization
CM Configuration Management
CP Contingency Planning
| Control | Name | IAEA NSS 17-T References |
|---|---|---|
| CP-01 | Contingency Planning Policy And Procedures | Sec 8 |
| CP-02 | Contingency Plan | Sec 8 |
| CP-04 | Contingency Plan Testing And Exercises | Sec 8 |
| CP-06 | Alternate Storage Site | Sec 8 |
| CP-09 | Information System Backup | Sec 8 |
| CP-10 | Information System Recovery And Reconstitution | Sec 8 |
IA Identification and Authentication
IR Incident Response
PE Physical and Environmental Protection
PL Planning
PM Program Management
| Control | Name | IAEA NSS 17-T References |
|---|---|---|
| PM-01 | Information Security Program Plan | Sec 3 |
| PM-02 | Information Security Program Leadership Role | Sec 3 |
| PM-03 | Information Security and Privacy Resources | Sec 3 |
| PM-09 | Risk Management Strategy | Sec 3Sec 4 |
| PM-10 | Authorization Process | Sec 3 |
| PM-14 | Testing, Training, and Monitoring | Sec 11 |
PS Personnel Security
RA Risk Assessment
SA System and Services Acquisition
SC System and Communications Protection
| Control | Name | IAEA NSS 17-T References |
|---|---|---|
| SC-07 | Boundary Protection | Sec 5.1Sec 5.6 |
| SC-08 | Transmission Integrity | Sec 5.6 |
| SC-12 | Cryptographic Key Establishment And Management | Sec 5.6 |
| SC-13 | Use Of Cryptography | Sec 5.6 |
| SC-23 | Session Authenticity | Sec 5.6 |
| SC-24 | Fail in Known State | Sec 8 |
| SC-32 | System Partitioning | Sec 5.1 |
| SC-46 | Cross Domain Policy Enforcement | Sec 5.1 |
| SC-48 | Sensor Relocation | Sec 5.5 |
SI System and Information Integrity
SR Supply Chain Risk Management
| Control | Name | IAEA NSS 17-T References |
|---|---|---|
| SR-01 | Policy and Procedures | Sec 6 |
| SR-02 | Supply Chain Risk Management Plan | Sec 6 |
| SR-03 | Supply Chain Controls and Processes | Sec 6 |
| SR-05 | Acquisition Strategies, Tools, and Methods | Sec 6 |
| SR-06 | Supplier Assessments and Reviews | Sec 6 |
| SR-09 | Tamper Resistance and Detection | Sec 6 |
| SR-10 | Inspection of Systems or Components | Sec 6 |
| SR-11 | Component Authenticity | Sec 6 |