Scenario-based training for nuclear power plants based on actual nuclear plant cyber incidents

May 5, 2015

There have been more than 500 actual control system cyber incidents globally in multiple industries. The International Atomic Energy Agency (IAEA) has tasked me to select 3 of the more than 30 nuclear-plant cyber incidents and identify what really happened, what controls were violated, and what policies and guidelines would be needed to prevent or mitigate the incidents. The selected incidents were not identified as cyber, had significant impact on plant operations, and were not network-based but affected the control systems.

There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber. Several years ago, Marshall Abrams from MITRE and myself performed a project for NIST to review selected control system cyber incidents to understand what really happened, what security controls were violated, and what controls could have prevented or mitigated the events. The analysis done for NIST on the Olympic Pipeline Company gasoline pipeline rupture led to determining the PG&E San Bruno natural gas pipeline rupture was also control system cyber. The International Atomic Energy Agency (IAEA) has tasked me to select 3 of the more than 30 nuclear-plant cyber incidents and present similar findings the week of June 1st in Vienna – what really happened, what controls were violated, and what policies and guidelines would be needed to prevent or mitigate the incidents. The selected incidents are very important as they have the following characteristics:

-        They were not identified as cyber

-        They had significant impact on plant operations including forced shutdowns, loss-of-off-site power, and loss of control of a turbine

-        They were not network-based but affected the control systems

-        Existing cyber security guidance including NRC guidance did not address them

-        They affected other industries besides nuclear

This type of information is critical in developing appropriate control system cyber security awareness, training, policies, procedures, and technologies for any industry.

Joe Weiss

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...