IAEA N 17
IAEA N 17
IAEA N 17
Technical Guidance
Reference Manual
Computer Security
at Nuclear Facilities
This publication has been superseded by No. 17-T (Rev. 1).
Nuclear security issues relating to the prevention and detection of, and response
to, theft, sabotage, unauthorized access and illegal transfer or other malicious acts
involving nuclear material and other radioactive substances and their associated
facilities are addressed in the IAEA Nuclear Security Series of publications. These
publications are consistent with, and complement, international nuclear security
instruments, such as the amended Convention on the Physical Protection of Nuclear
Material, the Code of Conduct on the Safety and Security of Radioactive Sources,
United Nations Security Council Resolutions 1373 and 1540, and the International
Convention for the Suppression of Acts of Nuclear Terrorism.
Publications in the IAEA Nuclear Security Series are issued in the following
categories:
• Nuclear Security Fundamentals contain objectives, concepts and principles of
nuclear security and provide the basis for security recommendations.
• Recommendations present best practices that should be adopted by Member
States in the application of the Nuclear Security Fundamentals.
• Implementing Guides provide further elaboration of the Recommendations in
broad areas and suggest measures for their implementation.
• Technical Guidance publications include: Reference Manuals, with detailed
measures and/or guidance on how to apply the Implementing Guides in specific
fields or activities; Training Guides, covering the syllabus and/or manuals for
IAEA training courses in the area of nuclear security; and Service Guides, which
provide guidance on the conduct and scope of IAEA nuclear security advisory
missions.
COMPUTER SECURITY AT
NUCLEAR FACILITIES
This publication has been superseded by No. 17-T (Rev. 1).
The following States are Members of the International Atomic Energy Agency:
The Agency’s Statute was approved on 23 October 1956 by the Conference on the Statute of the
IAEA held at United Nations Headquarters, New York; it entered into force on 29 July 1957. The
Headquarters of the Agency are situated in Vienna. Its principal objective is “to accelerate and enlarge the
contribution of atomic energy to peace, health and prosperity throughout the world’’.
This publication has been superseded by No. 17-T (Rev. 1).
TECHNICAL GUIDANCE
COMPUTER SECURITY AT
NUCLEAR FACILITIES
REFERENCE MANUAL
COPYRIGHT NOTICE
All IAEA scientific and technical publications are protected by the terms of
the Universal Copyright Convention as adopted in 1952 (Berne) and as revised in
1972 (Paris). The copyright has since been extended by the World Intellectual
Property Organization (Geneva) to include electronic and virtual intellectual
property. Permission to use whole or parts of texts contained in IAEA
publications in printed or electronic form must be obtained and is usually subject
to royalty agreements. Proposals for non-commercial reproductions and
translations are welcomed and considered on a case-by-case basis. Enquiries
should be addressed to the IAEA Publishing Section at:
© IAEA, 2011
Printed by the IAEA in Austria
December 2011
STI/PUB/1527
IAEAL 11–00703
This publication has been superseded by No. 17-T (Rev. 1).
FOREWORD
The possibility that nuclear or other radioactive material could be used for
malicious purposes cannot be ruled out in the current global situation. States have
responded to this risk by engaging in a collective commitment to strengthen the
protection and control of such material and to respond effectively to nuclear
security events. States have agreed to strengthen existing instruments and have
established new international legal instruments to enhance nuclear security
worldwide. Nuclear security is fundamental in the management of nuclear
technologies and in applications where nuclear or other radioactive material is
used or transported.
Through its Nuclear Security Programme, the IAEA supports States to
establish, maintain and sustain an effective nuclear security regime. The IAEA
has adopted a comprehensive approach to nuclear security. This recognizes that
an effective national nuclear security regime builds on: the implementation of
relevant international legal instruments; information protection; physical
protection; material accounting and control; detection of and response to
trafficking in such material; national response plans; and contingency measures.
With its Nuclear Security Series, the IAEA aims to assist States in implementing
and sustaining such a regime in a coherent and integrated manner.
The IAEA Nuclear Security Series comprises Nuclear Security
Fundamentals, which include objectives and essential elements of a State’s
nuclear security regime; Recommendations; Implementing Guides; and
Technical Guidance.
Each State carries the full responsibility for nuclear security, specifically: to
provide for the security of nuclear and other radioactive material and associated
facilities and activities; to ensure the security of such material in use, storage or in
transport; to combat illicit trafficking and the inadvertent movement of such
material; and to be prepared to respond to a nuclear security event.
This publication is in the Technical Guidance category of the IAEA Nuclear
Security Series, and deals with computer security at nuclear facilities. It is based
on national experience and practices as well as publications in the fields of
computer security and nuclear security. The guidance is provided for
consideration by States, competent authorities and operators.
The preparation of this publication in the IAEA Nuclear Security Series has
been made possible by the contributions of a large number of experts from
Member States. An extensive consultation process with all Member States
included consultants meetings and open-ended technical meetings. The draft was
then circulated to all Member States for 120 days to solicit further comments and
suggestions. The comments received from Member States were reviewed and
considered in the final version of the publication.
This publication has been superseded by No. 17-T (Rev. 1).
EDITORIAL NOTE
This report does not address questions of responsibility, legal or otherwise, for acts or
omissions on the part of any person.
Although great care has been taken to maintain the accuracy of information contained in
this publication, neither the IAEA nor its Member States assume any responsibility for
consequences which may arise from its use.
The use of particular designations of countries or territories does not imply any
judgement by the publisher, the IAEA, as to the legal status of such countries or territories, of
their authorities and institutions or of the delimitation of their boundaries.
The mention of names of specific companies or products (whether or not indicated as
registered) does not imply any intention to infringe proprietary rights, nor should it be
construed as an endorsement or recommendation on the part of the IAEA.
This publication has been superseded by No. 17-T (Rev. 1).
CONTENTS
1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2. Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2.1. Nuclear security and computer security objectives. . . . . 1
1.2.2. Scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3. Conditions specific to nuclear facilities . . . . . . . . . . . . . . . . . . . 3
1.4. Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5. Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.6. Key terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. MANAGEMENT SYSTEMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4. ORGANIZATIONAL ISSUES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
DEFINITIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
This publication has been superseded by No. 17-T (Rev. 1).
This publication has been superseded by No. 17-T (Rev. 1).
1. INTRODUCTION
1.1. BACKGROUND
Attention to computer security has intensified in the last decade as clear and
recurring proof of the vulnerabilities of computer systems has come to light.
Malicious exploitation of these vulnerabilities has been witnessed with growing
frequency and impact. In an increasingly complex threat scenario, the possible
occurrences of cyberterrorism as a means of attacking a State’s critical
infrastructure has prompted a number of national authorities to prepare defences
and issue new regulations. Such regulations establish computer security
requirements, which affect nuclear facilities at multiple levels and at the various
stages of operation. In parallel, information security has itself evolved rapidly,
creating a rich set of international best practices and standard documents among
which the ISO/IEC 27000 series [1–5] is rapidly achieving prominence.
The IAEA, while recognizing the core validity of the ISO 27000 series and
other standards across industries and business, wishes to focus attention on the
specific conditions affecting computer security at nuclear facilities. Thus, the
need for a publication recognizing and compiling relevant guidance and adequate
solutions was identified. This publication brings together the knowledge and
experience of specialists who have applied, tested and reviewed computer
security guidance and standards within nuclear facilities and other critical
infrastructure. It compiles and describes those special provisions, best practices
and lessons learned which apply within the nuclear discipline and puts them in
the context of a security programme consistent with other IAEA guidance and
applicable industrial standards.
1.2. OBJECTIVE
Nuclear security involves the prevention of, detection of, and response to,
criminal or intentional, unauthorized acts involving or directed at nuclear
material, other radioactive material, associated facilities, or associated
activities, and other intentional acts that could directly or indirectly produce
harmful consequences to persons, property, society or to the environment.
Computer security plays an increasingly vital role in ensuring that these
objectives are achieved. Thus, this publication will address the establishment and
improvement of programmes to protect those computer systems, networks and
1
This publication has been superseded by No. 17-T (Rev. 1).
other digital systems that are critical for the safe and secure operation of the
facility and for preventing theft, sabotage and other malicious acts.
All other systems required for the operation of the facility, or any support or
business system whose unauthorized modification or change could compromise
the security posture or operability will be covered by extending the provisions in
this publication to those systems.
In this context, malicious acts involving computer systems and relevant to
nuclear security may be grouped as:
1.2.2. Scope
2
This publication has been superseded by No. 17-T (Rev. 1).
1.4. STRUCTURE
1.5. METHODOLOGY
3
This publication has been superseded by No. 17-T (Rev. 1).
need and the advantage of integrating computer security within the overarching
facility security plans from the beginning.
Successful protection of computer systems may be achieved by adapting
the best practice methods and tools developed within the wider computer security
community while taking into account the specificities of the nuclear industry.
The following logical process, described in detail in Section 5, highlights
how a nuclear facility can develop, implement, maintain and improve computer
security:
4
This publication has been superseded by No. 17-T (Rev. 1).
5
This publication has been superseded by No. 17-T (Rev. 1).
.
This publication has been superseded by No. 17-T (Rev. 1).
Part I
MANAGEMENT GUIDE
This publication has been superseded by No. 17-T (Rev. 1).
.
This publication has been superseded by No. 17-T (Rev. 1).
2. REGULATORY AND
MANAGEMENT CONSIDERATIONS
This section highlights the core components of the high level framework for
computer security in nuclear facilities. In particular, it addresses issues relevant to
the legislative and regulatory bodies as well as to facilities’ management and
security strategy. Figure 1 shows a simplified visualization of the hierarchy of
normative instruments relevant to the establishment and implementation of a
computer security programme in a nuclear facility.
A key role of the State is in establishing the legal framework for nuclear
security as well as for computer security in general. These should, when
9
This publication has been superseded by No. 17-T (Rev. 1).
The regulatory body should take relevant legislation into account in its
guidance and make available to operators the tools and the means for correctly
interpreting and implementing legal obligations. Regulators could also select or
indicate relevant guidance of reference such as ISO standards or IAEA
publications.
The activities of regulators in relation to computer security should
explicitly recognize the objective of protection against the theft of nuclear
material and sabotage resulting in possible radiological release. Therefore,
regulations for nuclear security and safety should also be considered when
preparing regulations on computer security.
10
This publication has been superseded by No. 17-T (Rev. 1).
It is advisable that State regulatory bodies (where more than one body is
involved) collaborate to achieve harmonized views on necessary requirements to
be placed.
The State regulatory bodies could, at a minimum, provide a high level
statement of computer security regulatory requirements. More detailed regulatory
requirements could also include provisions for:
11
This publication has been superseded by No. 17-T (Rev. 1).
cross-cutting discipline that has interactions with all other areas of security in a
nuclear facility.
All provisions in this publication should be implemented with constant
regard to the greater framework of the SSP. The SSP should likewise be designed
taking into consideration computer security from its inception.
It is also management’s responsibility to ensure proper coordination of
the various disciplines of security and integration of computer security at the
appropriate level.
12
This publication has been superseded by No. 17-T (Rev. 1).
Computer security policy and the associated plan are discussed in greater
detail in Section 5.
13
This publication has been superseded by No. 17-T (Rev. 1).
durability, specific controls in place against the most prevalent threats at the
present time do not guarantee protection against tomorrow’s threats.
The responsible State authority should periodically issue a threat evaluation
including threats to the security of computer systems and information on current
attack vectors related to the security of computer systems used at nuclear
facilities. A typical tool used to determine threat levels and as a basis for
developing a security posture is the design basis threat (DBT, see Section 6.3.1).
It is vital that facilities maintain an active and ongoing threat
assessment, which is regularly briefed to management and operations.
Section 6 contains a detailed, but non-exhaustive, description of potential
sources of attack and associated attack mechanisms relevant to nuclear facilities,
and methodologies used to evaluate and identify threats.
3. MANAGEMENT SYSTEMS
14
This publication has been superseded by No. 17-T (Rev. 1).
15
This publication has been superseded by No. 17-T (Rev. 1).
The processes above should be seen as ongoing activities that run through
all phases of system life cycles. The specifics of implementation should be
detailed in the computer security plan discussed in Section 5.
4. ORGANIZATIONAL ISSUES
The sections that follow detail the minimum requirements for management
and the specialist staff needed to establish and maintain a computer security
programme successfully.
4.1.1. Management
16
This publication has been superseded by No. 17-T (Rev. 1).
17
This publication has been superseded by No. 17-T (Rev. 1).
18
This publication has been superseded by No. 17-T (Rev. 1).
19
This publication has been superseded by No. 17-T (Rev. 1).
— Computer systems are maintained to ensure that they are secure and
operated in accordance with computer security baseline and procedures.
— Management are fully committed to and supportive of security initiatives.
20
This publication has been superseded by No. 17-T (Rev. 1).
Part II
IMPLEMENTATION GUIDE
This publication has been superseded by No. 17-T (Rev. 1).
.
This publication has been superseded by No. 17-T (Rev. 1).
— Enforceable;
— Achievable;
— Auditable.
23
This publication has been superseded by No. 17-T (Rev. 1).
24
This publication has been superseded by No. 17-T (Rev. 1).
As stated in Section 2.3, the CSP should be operated and maintained within
the framework of the facility’s overall protection plan. The facility specific
computer security plan should be developed in close consultation with physical
protection, safety, operations and IT specialists. The CSP must be regularly
reviewed and updated to reflect security events from any domain of security and
operational experience from the site security system.
The physical security plan and the CSP should complement each other.
Computerized assets have physical access control requirements and likewise,
electronic compromise can lead to degradation or loss of certain physical
protection functions. Attack scenarios may well include the coordination of both
electronic and physical attack. The teams in charge of the physical security plan
and of the CSP should inform each other and coordinate their efforts to ensure
consistency of plans during the development and review process.
25
This publication has been superseded by No. 17-T (Rev. 1).
The completeness of each step is a crucial prerequisite for the next steps.
A comprehensive analysis of computer systems in a nuclear facility
includes:
— Functions/tasks and operational modes of all existing computerized
systems;
— Identification of relevant interconnections, including power supplies;
— Dataflow analysis, to determine what communicates with what, and how
and why;
— Procedures that initiate communication, frequency of communication and
protocols;
— Computer systems and equipment location;
— Analysis of user groups;
— Ownership (for data and computerized systems);
— Corresponding security level (see Section 5.5, graded approach).
It is assumed that much of the information needed for the analysis would
already be available, but it should be collated and organized. Sources of relevant
information include system specifications and documentation.
26
This publication has been superseded by No. 17-T (Rev. 1).
plant equipment
a
In this context, an ‘item’ is a structure, system or component.
FIG. 4. Plant equipment in terms of safety function.
with safety and security. Other computer functions may be a concern in terms of
support to these functions, of possible compromise of security through secondary
or indirect effects or of overall plant productivity.
Below is a non-exhaustive list of computer systems that can be found at
nuclear facilities, and are relevant to the objectives of this guidance. They are
separately classified according to their safety importance and security
importance. Both of these classifications should be taken into account when
defining the appropriate security level to apply (Section 5.5) and in the risk
assessment analysis (Section 6.2). Note also that some functions clearly overlap
both as safety and security concerns.
Plant equipment
• Safety systems
27
This publication has been superseded by No. 17-T (Rev. 1).
• Control systems for functions that are not important to safety (e.g.
demineralization)
Non-plant equipment
— Office automation
• Work permit and work order systems: Systems that provide coordination
of work activities to provide a sound working environment.
• Engineering and maintenance systems: Systems that handle details of
plant operation, maintenance and technical support.
• Configuration management systems: Systems intended to keep track of
plant configuration including models, versions and parts installed at the
nuclear facility.
• Document management systems: Systems used to store and retrieve plant
information, e.g. drawings, minutes of meetings.
• Intranet: System that allows access to all plant documentation — both
technical and administrative — on a need to know basis. The access is
normally read only.
— External connectivity
28
This publication has been superseded by No. 17-T (Rev. 1).
29
This publication has been superseded by No. 17-T (Rev. 1).
5.5.2. Zones
Zones are a logical and physical concept for grouping computer systems for
administration, communication and application of protective measures. The zone
model allows computers with the same or similar importance concerning safe and
secure operation of the plant to be grouped together for administration and
application of protective measures.
The application of a zone model should comply with the following
guidelines:
— Each zone comprises systems that have the same or comparable importance
for the facility’s security and safety;
— Systems belonging to one zone have similar demands for protective
measures;
— Different computer systems belonging to one zone build a trusted area for
internal communication within that zone;
— Zone borders require decoupling mechanisms for data flow built on zone
dependent policies;
— Zones can be partitioned into subzones to improve the configuration.
30
This publication has been superseded by No. 17-T (Rev. 1).
Generic level
For applicable systems and levels, the following generic measures should
be applied:
31
This publication has been superseded by No. 17-T (Rev. 1).
Level 1
1
A virtual private network (VPN) is a network constructed using public communication
means to connect nodes, with encryption and other security mechanisms to ensure that only
authorized users can access the network and that the data cannot be intercepted.
2
Transmission Control Protocol/Internet Protocol — data transmission protocols.
3
Some Member States feel strongly that exceptions should not be allowed in any case.
32
This publication has been superseded by No. 17-T (Rev. 1).
— Measures to ensure the integrity and availability of the systems are typically
explained as a part of the safety cases.
— No remote maintenance access is allowed.
— Physical access to systems is strictly controlled.
— The number of staff given access to the systems is limited to an absolute
minimum.
— The two person rule is applied to any approved modifications made within
the computer systems.
— All activities should be logged and monitored.
— Every data entry to the systems is approved and verified on a case by case
basis.
— Strict organizational and administrative procedures apply to any
modifications, including hardware maintenance, updates and software
modifications.
Level 2
— Only an outward, one way networked flow of data is allowed from level 2
to level 3 systems. Only necessary acknowledgment messages or controlled
signal messages can be accepted in the opposite (inward) direction (e.g. for
TCP/IP).
— Remote maintenance access may be allowed on a case by case basis, and for
a defined working period. When used, it must be protected with strong
measures, and users must respect a defined security policy (contractual).
— The number of staff given access to the systems is kept to a minimum, with
a precise distinction between users and administrative staff.
— Physical connections to the systems should be strictly controlled.
— All reasonable measures to ensure the integrity and availability of the
systems have been taken.
— Vulnerability assessment involving actions on the systems may lead to plant
or process instability, and should therefore only be considered using test
beds, spare systems, during factory acceptance tests or during long planned
outages.
33
This publication has been superseded by No. 17-T (Rev. 1).
Level 3
Level 4
— Only approved and qualified users are allowed to make modifications to the
systems.
— Access to the Internet from level 4 systems may be given to users provided
adequate protective measures are applied.
— Security gateways are implemented to protect this level from uncontrolled
traffic from external company or site networks, and to allow specific
activities which are controlled.
— Physical connections to systems should be controlled.
— Remote maintenance access is allowed and controlled; the remote computer
and user must respect a defined security policy, contractually specified and
controlled.
34
This publication has been superseded by No. 17-T (Rev. 1).
Level 5
— Only approved and qualified users are allowed to make modifications to the
systems.
— Access to the Internet from level 5 systems is allowed provided adequate
protective measures are applied.
— Remote external access is allowed for authorized users provided that
appropriate controls are in place.
The section below presents the basic concepts used in risk management for
computer systems. Risk management is relevant at all stages of the facility's
systems life cycle, including design, development, operations and maintenance.
Section 6.2 offers an overview of the steps needed in a comprehensive risk
35
This publication has been superseded by No. 17-T (Rev. 1).
management methodology. Sections 6.3 and 6.4 focus on stages where the
nuclear industry presents specific features.
Risk in the computer security context is the potential that a given threat will
exploit vulnerabilities of an asset or group of assets and thereby cause harm to the
organization. It is measured in terms of a combination of the likelihood of an
event and the severity of its consequences.
Figure 6 is a flow chart showing the multiple interconnections between the
concepts of threat, vulnerability and risk [16].
FIG. 6. Security concepts and relationship (adapted from ISO 13335-1 2004 [16]).
36
This publication has been superseded by No. 17-T (Rev. 1).
37
This publication has been superseded by No. 17-T (Rev. 1).
Malicious Code
Morphing
High “Stealth”/Advanced
Scanning Techniques
Attack Sophistication
Zombies
Network Management Diagnostics Distributed Attack Tools
Sweepers WWW Attacks
Back Doors Automated Probes/Scans
GUI
Disabling Audits Packet Spoofing
Sniffers
Hijacking Sessions Attackers
Exploiting Known Vulnerabilities
Password Cracking
Self-Replicating Code
Low Password Guessing
4
LIPSON, H.F., Tracking and Tracing Cyber-Attacks: Technical Challanges and Global
Policy Issues, Special Report CMS/SEI-2002-SR-009 (2000) 10.
38
This publication has been superseded by No. 17-T (Rev. 1).
Depending on the objectives or aims of the attack, the attacker will try to
exploit different system vulnerabilities. Such attacks can lead to:
39
TABLE 1. INTERNAL THREATS
40
Attacker Resources Time Tools Motivation
Covert agent Facilitated ‘social engineering’. Varied, but generally Existing access, knowledge of Theft of business information,
System access at some level. cannot devote long programming and system architecture: technology secrets, personal
System documentation and hours. — Possible knowledge of existing information.
expertise available. passwords; Economic gain (information
— Possibility to insert specifically selling to competitors).
crafted backdoors and/or Trojans; Blackmail.
— Possible external expertise support.
Disgruntled Medium/strong resources. Varied, but generally Existing access, knowledge of Revenge, havoc, chaos.
employee/user System access at some level. cannot devote long programming and system architecture. Theft of business information.
System documentation and hours. Possible knowledge of existing Embarrass employer/other
expertise available on specific passwords. employee.
business and operations Ability to insert ‘kiddie’ tools or scripts Degrade public image or
systems. (potentially more elaborate if they have confidence.
specific computer skills).
This publication has been superseded by No. 17-T (Rev. 1).
TABLE 2. EXTERNAL THREATS
Recreational Varied skills, but generally limited. Lots of time, not very patient. Generally available scripts Fun, status.
hacker Little knowledge of the system and tools. Target of opportunity.
outside of public information. Some tool development Exploitation of ‘low hanging
possible. fruits’.
Militant Limited resources, but may be Attacks may be targeted at Computer skills are Conviction of saving the
opponent to financially supported through certain previously known available. world.
nuclear power secret channels. events (e.g. celebrations, Possible support from the Sway public opinion on
Access to tools of the cyber elections). hacker community. specific issues.
community. Lots of time, patient and ‘Social engineering’. Impede business operations.
Little knowledge of the system motivated.
outside of public information.
Disgruntled Limited resources if not engaged Varied and depending on the Possible knowledge of Revenge, havoc, chaos.
employee/user in a larger group of people. associated group of people. existing passwords. Theft of business
no longer May still possess system May use unmanaged former information.
employed) documentation. access. Embarrass employer/other
May use unmanaged former access. May have created system employee.
Possible ties to facility personnel. backdoors while still an Degrade public image or
employee. confidence.
‘Social engineering’.
This publication has been superseded by No. 17-T (Rev. 1).
41
TABLE 2. EXTERNAL THREATS (cont.)
42
Attacker Resources Time Tools Motivation
Organized Strong resources. Varied, but mostly short term. Scripts, home grown tools. Blackmail.
crime Employment of cyber expertise. May employ ‘hacker for Theft of nuclear material.
hire’. Extortion (financial gain).
May employ former/current Play upon financial and
employee. perception fears of business.
‘Social engineering’. Information for sale
(technical, business or
personal).
Nation State Strong resources and expertise. Varied. Teams of trained cyber Intelligence collection.
Intelligence gathering activities. experts. Building access points for
Possible training/operating Sophisticated tools. later actions.
experience on the system. May employ former/current Technology theft.
employee.
‘Social engineering’.
Terrorist Varied skills. Lots of time, very patient. Scripts, home grown tools. Intelligence collection.
Possible training/operating May employ hacker for hire. Building access points for
experience on the system. May employ former/current later actions.
employee. Chaos.
‘Social engineering’. Revenge.
Impact public opinion (fear).
This publication has been superseded by No. 17-T (Rev. 1).
This publication has been superseded by No. 17-T (Rev. 1).
All these aspects can have major consequences and impacts on the
functionality of computer systems, which may, directly or indirectly, compromise
the safety and security of the facility. When building up attack scenarios, the
technological trends and ease of access to attack technologies should be
considered. Some scenarios illustrating fictional, but realistic, attacks at a nuclear
facility are developed in Annex I.
Given the unique nature of the nuclear industry, computer security for
nuclear facilities must address concerns additional to those for computer security
for business IT networks or even comparable process control systems outside the
nuclear industry. The following sections describe some of these nuclear industry
related concerns.
43
This publication has been superseded by No. 17-T (Rev. 1).
44
This publication has been superseded by No. 17-T (Rev. 1).
45
This publication has been superseded by No. 17-T (Rev. 1).
46
This publication has been superseded by No. 17-T (Rev. 1).
47
This publication has been superseded by No. 17-T (Rev. 1).
During the original design and development of many of the existing process
control and industrial control systems and instrumentation, computer security
was not a major consideration. The recent drive for system and interprocess
connectivity, the integration of commercial off the shelf computer systems, and
the rise in malicious computer activity (i.e. hacking) has driven the need to
consider computer security as a core requirement in the procurement of new
equipment.
As a consequence, a formalization of security requirements should be done
as a part of the contractual negotiation with suppliers. The ISO document
Common Criteria (ISO 15408) [21] is a possible tool to formalize such security
requirements. Another example can be found in the attempt to define a
Procurement Language for Control Systems [22] by the US Department of
Homeland Security, which has published guidance and recommendations on
defining cyber security requirements and specific procurement language for
control system acquisition.
It is essential that the level of security of any third party and vendors is
taken into account. It is paramount that the security department works closely
with the contracts department to ensure that the security provisions are
incorporated in each contract.
Contracts are often awarded to external entities by organizations in the
nuclear industry; some of these contracts will entail the contracting companies
holding protectively marked information or assets on their own premises. Unless
the award of such a contract and its subsequent management follow stringent
rules, the protectively marked information and assets associated with the contract
could risk compromise or unauthorized disclosure.
In view of the above factors, it is important that the responsible
management of each site/organization in the nuclear industry maintain a close
working relationship with the contracting company in order to ensure that
essential security aspects are addressed throughout the development and
implementation of the contract, and during final handover.
48
This publication has been superseded by No. 17-T (Rev. 1).
49
This publication has been superseded by No. 17-T (Rev. 1).
.
This publication has been superseded by No. 17-T (Rev. 1).
REFERENCES
[1] INTERNATIONAL ELECTROTECHNICAL COMMISSION, Information Technology
— Security Techniques — Information Security Management Systems — Overview and
Vocabulary, ISO/IEC 27000:2009, ISO, Geneva (2009).
[2] INTERNATIONAL ELECTROTECHNICAL COMMISSION, Information Technology
— Information Security Management Systems — Requirements, ISO/IEC 27001:2005,
ISO, Geneva (2005).
[3] INTERNATIONAL ELECTROTECHNICAL COMMISSION, Information Technology
— Code of Practice for Information Security Management, ISO/IEC 27002:2005, ISO,
Geneva (2005).
[4] INTERNATIONAL ELECTROTECHNICAL COMMISSION, Information Technology
— Security Techniques — Information Security Risk Management,
ISO/IEC 27005:2008, ISO, Geneva (2008).
[5] INTERNATIONAL ELECTROTECHNICAL COMMISSION, Information Technology
— Security Techniques — Requirements for Bodies Providing Audit and Certification
of Information Security Management Systems, ISO/IEC 27006:2007, ISO, Geneva
(2007).
[6] COUNCIL OF EUROPE, Convention on Cybercrime, ETS No. 185, COE, Strasbourg
(2001).
[7] INTERNATIONAL ATOMIC ENERGY AGENCY, The Management System for
Facilities and Activities, IAEA Safety Standards Series No. GS-R-3, IAEA, Vienna
(2002).
[8] INTERNATIONAL ATOMIC ENERGY AGENCY, Application of the Management
System for Facilities and Activities, IAEA Safety Standards Series No. GS-G-3.1,
IAEA, Vienna (2006).
[9] INTERNATIONAL ATOMIC ENERGY AGENCY, Nuclear Security Culture, IAEA
Nuclear Security Series No. 7, IAEA, Vienna (2008).
[10] INTERNATIONAL ATOMIC ENERGY AGENCY, Physical Protection Objectives and
Fundamental Principles, Resolution GOV/2001/41, IAEA, Vienna (2001).
[11] The Physical Protection of Nuclear Material and Nuclear Facilities,
INFCIRC/225/Rev.4 (Corrected), IAEA, Vienna (1999).
[12] INTERNATIONAL ATOMIC ENERGY AGENCY, Guidance and Considerations for
the Implementation of INFCIRC/225/Rev.4, The Physical Protection of Nuclear
Material and Nuclear Facilities, IAEA-TECDOC-967 (Rev.1), IAEA, Vienna (2000).
[13] INTERNATIONAL ATOMIC ENERGY AGENCY, Instrumentation and Control
Systems Important to Safety in Nuclear Power Plants, IAEA Safety Standards Series
No. NS-G-1.3, IAEA, Vienna (2002).
[14] INTERNATIONAL ATOMIC ENERGY AGENCY, Software for Computer Based
Systems Important to Safety in Nuclear Power Plants, IAEA Safety Standards Series
No. NS-G-1.1, IAEA, Vienna (2000).
[15] INTERNATIONAL ATOMIC ENERGY AGENCY, IAEA Safety Glossary:
Terminology Used in Nuclear Safety and Radiation Protection — 2007 Edition, IAEA,
Vienna (2007).
51
This publication has been superseded by No. 17-T (Rev. 1).
52
This publication has been superseded by No. 17-T (Rev. 1).
BIBLIOGRAPHY
AMERICAN NATIONAL STANDARDS INSTITUTE, INTERNATIONAL SOCIETY FOR
AUTOMATION, Security Technologies for Industrial Automation and Control System,
ANSI/ISA-TR99.00.01-2007, ANSI, Washington DC, (2007).
NUCLEAR ENERGY INSTITUTE, Cyber Security Plan for Nuclear Power Reactors,
NEI 08-09 (Rev. 5), NEI, Washington DC (2010).
53
This publication has been superseded by No. 17-T (Rev. 1).
.
This publication has been superseded by No. 17-T (Rev. 1).
Annex I
As described in Section 6.3, the nature and form of computer based attacks,
all of which must be guarded against, can vary significantly. While the attacks
may be of different types, the consequences at a high level include:
— Target identification;
— Reconnaissance;
— System access/compromise;
— Attack execution;
— Covering of tracks to maintain deniability.
55
This publication has been superseded by No. 17-T (Rev. 1).
— ‘Social engineering’;
— Web searches for public information;
— Dumpster diving;
— War dialling, war driving;
— Email attacks — ‘phishing’1 to gain network access, key loggers;
— Installation of software or devices on host machines —via disk, memory
stick or CD;
— Eavesdropping on password entry or access code entry (manual, audio or
video surveillance).
1
‘Phishing’ refers to attempts to fraudulently acquire sensitive information, such as
user names, passwords and credit card details, by masquerading as a trustworthy entity in an
electronic communication.
56
This publication has been superseded by No. 17-T (Rev. 1).
Once card and codes are obtained, the attacker uses the acquired
information for organizational activity to enter the facility inconspicuously as a
person delivering equipment parts.
Goal of the attack — to sabotage a nuclear power plant and prevent the
immediate restart of the plant.
In this example, during a shutdown period a subcontractor is conducting
tests on the feedwater control system. The contractor installs a remote access
point for monitoring and testing the system from his office. After the contractor
completes work the access point remains mistakenly in place.
The attacker has collected plant information that identifies the
subcontractor as a prior worker at the plant and a prime target for information
regarding the plant. The attacker conducts an email ‘phishing’ attack against the
subcontractor’s office and implants a root kit in the system, which gives
administrative controls. The attacker thus gains access to the contractors’
computer network and discovers the test plans from the plant and also the remote
access port which has not been disabled by the plant.
With this information, the attacker is able to conduct a denial of service
(DoS)2 attack on the feedwater control system by flooding the network with
traffic causing system failure. The system was designed to process only minimal
traffic load.
Once the attacker has gained access, mapped the network and identified the
communications protocol, he conducts the attack. The attack results in the loss of
response on the feedwater control system that causes manual scramming of the
2
Denial of service (DoS) is the prevention of authorized access to a system resource or
the delaying of system operations and functions.
57
This publication has been superseded by No. 17-T (Rev. 1).
plant. The reason for the feedwater control system malfunction cannot be
immediately determined and the plant remains shut down for investigation.
3
Radio frequency identification: A technology used for identification and tracking
using radio waves.
58
This publication has been superseded by No. 17-T (Rev. 1).
Annex II
Entities Elements
The first step is to outline the technical, business and regulatory context of
the study. In particular, an information system is based on essential elements,
functions and information that constitute the added value of the information
system for the organization.
1
Methods to achieve information systems security:
http://www.ssi.gouv.fr/site_rubrique113.html
59
This publication has been superseded by No. 17-T (Rev. 1).
Expression of sensitivities
Output: Sensitivities.
Threat study
Sources of Impacts
attack Vulnerabilities Entities Elements
60
This publication has been superseded by No. 17-T (Rev. 1).
— Espionage/technology thieves;
— Disgruntled employee/user (internal or external);
— Recreational hacker;
— Cyber activist;
— Organized crime;
— Nation State;
— Terrorist.
— Eavesdropping;
— Flooding/denial of service;
— Software entrapment/backdoor;
— Login/password attacks (brute force, dictionary, etc.).
Each entity has vulnerabilities that can be exploited by threat agents using
the relevant attack methods. We can therefore highlight several vulnerabilities
linked to the NPP cooling system:
61
This publication has been superseded by No. 17-T (Rev. 1).
Risks
Sources of Impacts
attack Vulnerabilities Entities Elements
Security objectives
Now determine how the essential elements can be affected by the threat
agents and their attack methods: this is the risk.
The risk represents possible damage. It arises from the fact that a threat
agent can affect the essential elements by using a given attack method to exploit
the vulnerabilities of the entities on which these elements depend.
In the example, there is a risk of sensitive information being compromised
by software entrapment arising from the possibility of creating or modifying
system commands linked to the network, which could have an impact on
material, environment, personnel safety, plant availability and public confidence.
The security objectives consist mainly in covering the vulnerabilities of
the entities representing all the retained risks. Clearly, there is no point in
protecting what is not exposed. However, as the risk potential increases, the
strength of the security objectives must also increase. These objectives therefore
constitute a perfectly adapted set of specifications.
One of the security objectives for the nuclear power plant in the example is
to protect the creation and modification of system commands linked to the
network for the cooling system.
Risks
Sources of Impacts
attack Vulnerabilities Entities Elements
Security objectives
The team in charge of implementing the approach must then produce exact
specifications of the required security functions. After this, it must demonstrate
62
This publication has been superseded by No. 17-T (Rev. 1).
63
This publication has been superseded by No. 17-T (Rev. 1).
Annex III
64
This publication has been superseded by No. 17-T (Rev. 1).
Resistance to attack
System recovery
65
This publication has been superseded by No. 17-T (Rev. 1).
66
This publication has been superseded by No. 17-T (Rev. 1).
DEFINITIONS
For the purposes of this publication, the following terms are used with
the meanings given here. These definitions may differ from usage in other
disciplines. When available, definitions are taken from existing IAEA
publications, though a few terms are used here in the specific context of
computer security. Other definitions come from international standards (e.g.
Refs [1, 15, 23] of this publication).
access control. Means to ensure that access to assets is authorized and restricted
based on business and security requirements (ISO).
67
This publication has been superseded by No. 17-T (Rev. 1).
need to know. A principle under which users, processes and systems are granted
access to only the information, capabilities and assets which are necessary
for execution of their authorized functions.
risk. The potential that a given threat will exploit the vulnerabilities of an asset,
or group of assets, and thereby cause harm to the organization. It is
measured in terms of a combination of the likelihood of an event and the
severity of its consequences.
68
This publication has been superseded by No. 17-T (Rev. 1).
69
This publication has been superseded by No. 17-T (Rev. 1).
.
This publication has been superseded by No. 17-T (Rev. 1).
@
!
'$,QIRUPDWLRQ6HUYLFHV:KLWHKRUVH5RDG0,7&+$0
7HOHSKRQH)D[
(PDLOVHUYLFH#GDGLUHFWFRPDX:HEVLWHKWWSZZZGDGLUHFWFRPDX
"!# $
-HDQGH/DQQR\DYHQXHGX5RL%%UXVVHOV
7HOHSKRQH)D[
(PDLOMHDQGHODQQR\#LQIRERDUGEH:HEVLWHKWWSZZZMHDQGHODQQR\EH
%&
%HUQDQ$VVRFLDWHV)RUEHV%OYG6XLWH/DQKDP0'86$
7HOHSKRQH)D[
(PDLOFXVWRPHUFDUH#EHUQDQFRP:HEVLWHKWWSZZZEHUQDQFRP
5HQRXI3XEOLVKLQJ&RPSDQ\/WG&DQRWHN5G2WWDZD2QWDULR.--
7HOHSKRQH)D[
(PDLORUGHUGHSW#UHQRXIERRNVFRP:HEVLWHKWWSZZZUHQRXIERRNVFRP
%'
,$($3XEOLFDWLRQVLQ&KLQHVH&KLQD1XFOHDU(QHUJ\,QGXVWU\&RUSRUDWLRQ7UDQVODWLRQ6HFWLRQ32%R[%HLMLQJ
%(%')"! %
6XZHFR&=652.OHFDNRYD3UDKD
7HOHSKRQH)D[
(PDLOQDNXS#VXZHFRF]:HEVLWHKWWSZZZVXZHFRF]
* !&
$NDWHHPLQHQ.LUMDNDXSSD32%2; .HVNXVNDWX ),1+HOVLQNL
7HOHSKRQH)D[
(PDLODNDWLODXV#DNDWHHPLQHQFRP:HEVLWHKWWSZZZDNDWHHPLQHQFRP
*%
)RUP(GLWUXH-DQVVHQ32%R[)3DULV&HGH[
7HOHSKRQH)D[
(PDLOIRUPHGLW#IRUPHGLWIU:HEVLWHKWWSZZZIRUPHGLWIU
/DYRLVLHU6$6UXHGH3URYLJQ\&DFKDQ&HGH[
7HOHSKRQH)D[
(PDLOURPXDOGYHUULHU#ODYRLVLHUIU:HEVLWHKWWSZZZODYRLVLHUIU
#$+
8129HUODJ9HUWULHEVXQG9HUODJV*PE+$P+RIJDUWHQ'%RQQ
7HOHSKRQH)D[RU
(PDLOEHVWHOOXQJ#XQRYHUODJGH:HEVLWHKWWSZZZXQRYHUODJGH
'#+
/LEURWUDGH/WG%RRN,PSRUW32%R[+%XGDSHVW
7HOHSKRQH)D[(PDLOERRNV#OLEURWUDGHKX
&
$OOLHG3XEOLVKHUV*URXSVW)ORRU'XEDVK+RXVH-1+HUHGLD0DUJ%DOODUG(VWDWH0XPEDL
7HOHSKRQH)D[
(PDLODOOLHGSO#YVQOFRP:HEVLWHKWWSZZZDOOLHGSXEOLVKHUVFRP
%RRNZHOO1LUDQNDUL&RORQ\'HOKL
7HOHSKRQH)D[
(PDLOERRNZHOO#YVQOQHW
!+
/LEUHULD6FLHQWL¿FD'RWW/XFLRGL%LDVLR³$(,28´9LD&RURQHOOL,0LODQ
7HOHSKRQHRU)D[
(PDLOLQIR#OLEUHULDDHLRXHX:HEVLWHZZZOLEUHULDDHLRXHX
This publication has been superseded by No. 17-T (Rev. 1).
,)
0DUX]HQ&RPSDQ\/WG1LKRQEDVKLFKRPH&KXRNX7RN\R
7HOHSKRQH)D[
(PDLOMRXUQDO#PDUX]HQFRMS:HEVLWHKWWSZZZPDUX]HQFRMS
)"! %-*.-
.,16,QF,QIRUPDWLRQ%XVLQHVV'HSW6DPKR%OGJQG)ORRU<DQJ-DHGRQJ6HR&KR*6HRXO
7HOHSKRQH)D[:HEVLWHKWWSZZZNLQVUHNU
'!&
'H/LQGHERRP,QWHUQDWLRQDOH3XEOLFDWLHV%90$GH5X\WHUVWUDDW$1/%=+DDNVEHUJHQ
7HOHSKRQH )D[
(PDLOERRNV#GHOLQGHERRPFRP:HEVLWHKWWSZZZGHOLQGHERRPFRP
0DUWLQXV1LMKRII,QWHUQDWLRQDO.RUDDOURRG32%R[&==RHWHUPHHU
7HOHSKRQH)D[
(PDLOLQIR#QLMKRIIQO:HEVLWHKWWSZZZQLMKRIIQO
6ZHWVDQG=HLWOLQJHUEY32%R[6=/LVVH
7HOHSKRQH)D[
(PDLOLQIRKR#VZHWVQO:HEVLWHKWWSZZZVZHWVQO
(!&
'$,QIRUPDWLRQ6HUYLFHV:KLWHKRUVH5RDG0,7&+$0$XVWUDOLD
7HOHSKRQH)D[
(PDLOVHUYLFH#GDGLUHFWFRPDX:HEVLWHKWWSZZZGDGLUHFWFRPDX
!-/
&DQNDUMHYD=DOR]EDGG.RSLWDUMHYD6,/MXEOMDQD
7HOHSKRQH)D[
(PDLOLPSRUWERRNV#FDQNDUMHYD]VL:HEVLWHKWWSZZZFDQNDUMHYD]VLXYR]
)
'tD]GH6DQWRV6$F-XDQ%UDYR$(0DGULG
7HOHSKRQH)D[
(PDLOFRPSUDV#GLD]GHVDQWRVHVFDUPHOD#GLD]GHVDQWRVHVEDUFHORQD#GLD]GHVDQWRVHVMXOLR#GLD]GHVDQWRVHV
:HEVLWHKWWSZZZGLD]GHVDQWRVHV
&. #&-$
7KH6WDWLRQHU\2I¿FH/WG,QWHUQDWLRQDO6DOHV$JHQF\32%R[1RUZLFK15*1
7HOHSKRQH RUGHUV HQTXLULHV )D[
(PDLO RUGHUV ERRNRUGHUV#WVRFRXN HQTXLULHV ERRNHQTXLULHV#WVRFRXN:HEVLWHKWWSZZZWVRFRXN
2QOLQHRUGHUV
'(/7$,QW%RRN:KROHVDOHUV/WG$OH[DQGUD5RDG$GGOHVWRQH6XUUH\.734
(PDLOLQIR#SURIERRNVFRP:HEVLWHKWWSZZZSURIERRNVFRP
%RRNVRQWKH(QYLURQPHQW
(DUWKSULQW/WG32%R[6WHYHQDJH6*73
7HOHSKRQH)D[
(PDLORUGHUV#HDUWKSULQWFRP:HEVLWHKWWSZZZHDUWKSULQWFRP
& -
'HSW,5RRP'&)LUVW$YHQXHDWWK6WUHHW1HZ<RUN1<86$
81 7HOHSKRQHRU)D[
(PDLOSXEOLFDWLRQV#XQRUJ:HEVLWHKWWSZZZXQRUJ
&-*$ %
%HUQDQ$VVRFLDWHV)RUEHV%OYG6XLWH/DQKDP0'
7HOHSKRQH)D[
(PDLOFXVWRPHUFDUH#EHUQDQFRPÂ:HEVLWHKWWSZZZEHUQDQFRP
5HQRXI3XEOLVKLQJ&RPSDQ\/WG3URFWRU$YH2JGHQVEXUJ1<
7HOHSKRQH WROOIUHH )D[ WROOIUHH
(PDLORUGHUGHSW#UHQRXIERRNVFRP:HEVLWHKWWSZZZUHQRXIERRNVFRP
11-34841
This publication has been superseded by No. 17-T (Rev. 1).
RE LAT E D P UB LI CAT I ONS
www.iaea.org/books
This publication has been superseded by No. 17-T (Rev. 1).