cyber security evaluation for nuclear i c systems
play

Cyber Security Evaluation for Nuclear I&C Systems Corresponding - PDF document

Transactions of the Korean Nuclear Society Virtual Spring Meeting July 9-10, 2020 Cyber Security Evaluation for Nuclear I&C Systems Corresponding to V-Model Jiye Jeong , Gyunyoung Heo Department of Nuclear Engineering, Kyung Hee


  1. Transactions of the Korean Nuclear Society Virtual Spring Meeting July 9-10, 2020 Cyber Security Evaluation for Nuclear I&C Systems Corresponding to V-Model Jiye Jeong , Gyunyoung Heo  Department of Nuclear Engineering, Kyung Hee University, 1732 Deogyeong-daero, Giheung-gu, Yongin-si, Gyeonggi-do 17104, Republic of Korea * Corresponding author: gheo@khu.ac.kr 1. Introduction specification and that it fulfills its intended purpose. And it is known to improve software quality. For that reason, Transition from conventional analog technology to Korea Institute of Nuclear Safety (KINS) has stipulated advanced digital technology is a global trend and the that V&V activities should be conducted independently instrumentation and control (I&C) devices of nuclear with regard to Institute of Electrical and Electronics power plants (NPPs) are changing from analog devices Engineers (IEEE) 1012, and the V-model has been to digital devices due to advances in digital technology selected as one method of V&V process. Figure 1 and obsolescence of analog equipment. showed V-model of digital I&C systems for Korean However, the digital technology has some challenges NPPs considering software development life cycle of such as proven reliability, common cause failure (CCF), IEEE 1012. and cyber security for nuclear I&C systems even though the digital system has several channels redundantly. In the early days of digitization of nuclear I&C systems, since the systems generally has used disconnected network from the outside, it would be safe from cyber-attacks. However, in 2010, there was a cyberattack on the Iranian nuclear facility, which named ‘Stuxnet’. In India, the control system of Kudankulam NPP was infected with a malware called ‘DTrack’, and one out of two was shut down last year [1][2]. Moreover, the increase in cyber-attacks targeting industrial control system (ICS) and the introduction of digital systems in Figure 1. V-model of nuclear I&C systems nuclear facilities mean that cyber security is no more outside safety issue, which is of utmost importance due The 2016 version of IEEE 1012 recommended that the to the characteristic of nuclear facilities handling V&V process should be done in all system, software and radiation [2]. Hence, the cyber security of digital I&C hardware with life cycle. The summary of V&V systems has been focused nowadays. activities in each phase of V-model for nuclear I&C According to the report from the Carnegie Mellon systems was described in Table 1. University Software Engineering Institute, 70% of Table 1. Summary of V&V activities of V-model security vulnerabilities is possible to occur during the design process [3]. Also, the Microsoft Corporation has Phase Description discovered that the security vulnerability is reduced by Concept Define the features, constraints and goals with more than 50% when the Security Development the users. Lifecycle (SDL) is applied from the software Requirement Define how the systems work by identifying input data, processing contents and output data. development stage [4]. Design Logically determine how to perform the Therefore, it is worth investigating the applicability of function defined in previous phase. the analyzed control items of cyber security of NPPs on From this phase, the V&V process should be the stage of each software life cycle, so called V-model divided into hardware and software. in this paper. Implementation Draw for outline and assembly in detail, and purchase components for hardware. 2. Software Life Cycle according to V-Model Coding for the control and monitoring software. Testing This step is to improve the completeness by The embedded system, a combination of hardware and finding out errors and whether the developed system meets the requirements. The test range software has increased the complexity of software in should begin with small and gradually widens order to embody the safety-related demands, and the such as unit tests, module tests and integrated importance of software is increasing as most mission- system tests. critical functions are carried out by software [5]. So, Installation After installing the system in the field, check safety-related software of nuclear I&C systems should be that there is no abnormality by test run. required for verification and validation (V&V) process Operation & This period is after commercial operation and the longest in the software life cycle. If the to improve safety and reliability. The V&V process is the Maintenance systems should be revised, the previous phases process of checking that a software system meets must be implemented.

  2. Transactions of the Korean Nuclear Society Virtual Spring Meeting July 9-10, 2020 3. Cyber Security Measures with V-model Phase Cyber security activities SDOE activities periodically as described configuration Maintenance in cyber security plans. management and In this section, the cyber security of nuclear I&C maintenance of Evaluate the impact of systems was screened out, grouped, and itemized along design design changes on with the V-model. characteristics. secure operating Frist of all, by referring IEEE 1012 (2016) with the environment. Korean regulation on cyber security for nuclear facilities, KINAC/RS-015, cyber security activities were defined at According to KINAC/RS-015, after the critical digital each phase of the V-model described in Table 2 [6]. assets (CDAs) identified and analyzed, it is proposed to Moreover, compared to SDOE(Secure Development and take 101 (one-hundred one) security measures, which are Operational Environment) activities, which are requested technical security measures, operational security by KINS RG-8.13, definition of cyber security activities measures and management security measures. The fifty of V-model satisfied requirements. cyber security measures were selected, which could directly affect system design. The others were mostly Table 2. Cyber security activities at each phase of V-model related to policies or periodic activities of audit or secure Phase Cyber security activities SDOE activities operation environment during development of systems. Concept Identify security targets Establish a safe Moreover, during installation phase and operation & and security operating maintenance phase, the activities of cyber security were requirements, and environment by not related to develop the cyber security systems. develop an in-depth evaluating potential protection strategy from sensitivity and The selected fifty measures were connected to V- cyber security risks. identifying model of software development life cycle shown as obstacles. Figure 2. Figure 2 were based on the relationship Requirement Develop cyber security Defining functional between the control items of KINAC/RS-015 and the activities plans by performance cyber security activities defined in Table 2. According to finding the requirements and vulnerabilities of system Figure 2, the technical security measures accounted for hardware, software, configuration for the largest portion, and most of the cyber security network and SDOE. activities should be finished before test phase. This environment. means that it is possible to occur cyber threats and it is Design Begin the cyber security Physical and necessary to be conducted audit and evaluation strongly design of hardware, logical approaches software and network. It to system during the requirement, design and implementation is necessary to functions, use of phase. understand the safety system difference between services, and Figure 2. Cyber security measures on V-model safety features and control of data security features. communication with other systems Create environment for should be cyber security to carry addressed. out cyber security policies described in the previous phase. Implementation Implement the cyber Identification of security for hardware undocumented and software by using code or features. the authorized tools. Also, check the effect of these Remove the unsafe or functions on the unnecessary features of safety and systems. reliability of the safety system. Testing Testing of cyber security Tests to identify such as unit test or unauthorized penetration test is pathways and conducted along with ensure system safety impact integrity. assessment. Verify that all cyber security requirements are met. The fifty cyber security measures were composed of Installation Establish a specific level forty-five for technical security measures, three for of cyber security for the operational security measures and two for management place where installed and make sure the security measures described in Table 3. system work well. Operation & Audit and evaluate the Hardware and cyber security software

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend