licensing topical report nedo-33295, revision 2, ' esbwr ...the cyber security program plan...

55
MFN 10-267 Enclosure 2 GEH Licensing Topical Report NEDO-33295 " ESBWR - Cyber Security Program Plan" Revision 2 Public version

Upload: others

Post on 30-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

MFN 10-267

Enclosure 2

GEH Licensing Topical ReportNEDO-33295 " ESBWR - Cyber Security Program Plan"

Revision 2

Public version

Page 2: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

0 HITACHIGE Hitachi Nuclear Energy

NEDO-33295Revision 2

Class IDRF 0000-0074-4841

September 2010

Licensing Topical Report

ESBWR - CYBER SECURITY PROGRAM PLAN

Copyright 2007, 2010 GE-Hitachi Nuclear Energy Americas LLC

All Rights Reserved

Page 3: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

PUBLIC INFORMATION NOTICE

This is a public version of NEDE-33295P, Rev 2, from which the proprietary information hasbeen removed. Portions of the document that have been removed are indicated by white spacewithin double square brackets, as shown here [[ ]].

IMPORTANT NOTICE REGARDING THE CONTENTS OF THIS REPORT

Please Read Carefully

The information contained in this document is furnished as reference to the NRC Staff for thepurpose of obtaining NRC approval of the ESBWR Certification and implementation. The onlyundertakings of GEH with respect to information in this document are contained in contractsbetween GEH and participating utilities, and nothing contained in this document shall beconstrued as changing those contracts. The use of this information by anyone other than that forwhich it is intended is not authorized; and with respect to any unauthorized use, GEH makes norepresentation or warranty, and assumes no liability as to the completeness, accuracy, orusefulness of the information contained in this document.

11

Page 4: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Table of Contents

1. Introduction .................................................................................................................................. I1. 1 O v erv iew .......................................................................................................................................... 11.2 Purpose and Scope ............................................................................................................................ 11.3 (D e leted ) ........................................................................................................................................... 21.4 (D e leted ) ........................................................................................................................................... 21.5 (D eleted ) ........................................................................................................................................... 21.6 (D e leted ) ........................................................................................................................................... 21.7 GEH ESBW R Licensing Position .................................................................................................... 2

1.7.1 (Deleted) ................................................................................................................................. 21.7.2 (Deleted) .................................................................................. .............................................. 2

1.8 Acronym s, Abbreviations, and Definitions ...................................................................................... 22. Regulatory Requirem ents, Guidelines, and Industry Standards .................................................. 3

2.1 Supporting Documents ..................................................................................................................... 32.2 Codes and Standards ........................................................................................................................ 3

2.2.1 Regulatory Guide and Interim Staff Guidance ....................................................................... 32.2.2 NUREG ................................................................................................................................... 32.2.3 Branch Technical Positions ..................................................................................................... 32.2.4 Nuclear Energy Institute (NEI) ............................................................................................... 32.2.5 Code of Federal Regulations (CFR) ........................................................................................ 32.2.6 Institute of Electrical and Electronics Engineers (IEEE) ........................................................ 4

2.3 Supplem ental Docum ents ................................................................................................................. 42 .4 (D eleted ) ........................................................................................................................................... 4

3. Program M anagem ent .................................................................................................................. 53.1 Roles and Responsibilities ................................................................................................................ 53.2 Policies and Procedures .................................................................................................................... 63.3 ESBW R Cyber Security Defensive M odel ....................................................................................... 73.4 Training and Awareness ................................................................................................................... 8

3.4.1 User Awareness Training ........................................................................................................ 93.4.2 Specialized Cyber Security Training ...................................................................................... 9

3.5 Contingency and Disaster Recovery Plans ....................................................................................... 93.6 Periodic Threat and Vulnerability Review ....................................................................................... 93.7 Cyber Security Assessm ent (CySA) Report ..................................................................................... 9

4. Planning Phase ........................................................................................................................... 114.1 Identification of Critical Digital Assets .......................................................................................... 11

4. 1.1 Grouping of Digital Devices ................................................................................................. 114.1.2 Comm unication Pathways .................................................................................................... 11

4.2 Identification of Security Capabilities ............................................................................................ 134.3 Developm ent of List of Vulnerabilities .......................................................................................... 134.4 Technologies for Cyber Security .................................................................................................... 13

5. Requirem ents Phase ................................................................................................................... 165.1 Developm ent of Requirem ents for System Architecture ................................................................ 165.2 Development of Requirem ents for Network Architecture .............................................................. 165 .3 (D e leted ) ......................................................................................................................................... 175.4 System Configurations ................................................................................................................... 175.5 Interfaces ........................................................................................................................................ 175.6 Software .......................................................................................................................................... 175.7 Verification and Validation ............................................................................................................ 18

6. D esign Phase .............................................................................................................................. 18

iii

Page 5: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

6.1 Design of Physical and Logical Access .......................................................................................... 196.2 Data Communication with Other Networks ................................................................................... 19

6 .2 .1 In terfaces ............................................................................................................................... 196.2.2 Securing the Cyber Security Defensive M odel Security Levels ........................................... 20

7. Implem entation Phase ................................................................................................................ 207 .1 C o d e D esign ................................................................................................................................... 2 17.2 Identification and Evaluation of Proprietary Systems .................................................................... 217.3 Cyber Security Program Plan Coordination with SM PM and SQAPM ......................................... 21

8 . T e st P h a se .................................................................................................................................. 2 1

9. Installation Phase ....................................................................................................................... 22

10. Operations and M aintenance Phase ......................................................................................... 2310. 1 Change M anagement .................................................................................................................... 2310.2 Patch M anagement ....................................................................................................................... 2310.3 Contingency and Disaster Recovery Plans ................................................................................... 2410.4 Periodic Threat and Vulnerability Review ................................................................................... 2410.5 M aintenance Procedures ............................................................................................................... 24

11. Retirem ent Phase ..................................................................................................................... 24

12. Quality Assurance .................................................................................................................... 24

13. Incident Response and Recovery Plan ..................................................................................... 25APPENDIX A : Definitions ............................................................................................................ 26

APPENDIX B: Cyber Security Program Plan Conform ance Review ........................................... 36

APPENDIX C: Acronym s and Abbreviations ............................................................................... 40

APPENDIX D: ESBWR Distributed Control and Information System (DCIS) Functional

N etwork Diagram ................................................................................................................... 43

iv

Page 6: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

List of Tables

No tables.

V

Page 7: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

List of Figures

Figure 3.3-1. Cyber Security Defensive Model Level Diagram ............................................... 7Figure 4-la. ESBWR Cyber Security Process Overview ....................................................... 14Figure 4-lb. ESBWR Cyber Security Process Overview ....................................................... 15

vi

Page 8: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Changes from Previous Revision

Item Section Details of ChangeI Title Page Removed designation as security related information IAW Reg Guide 1.152

Rev 2

2 1.2 Deleted triple parentheses surrounding second paragraph beneath section 1.2IAW Reg Guide 1.152 Rev 2

3 1.7 Removed proprietary markings surrounding paragraph beneath section 1.7IAW Reg Guide 1.152 Rev 2

4 Appendix A Deleted triple parentheses surrounding the definitions of the terms CriticalDigital Asset and Critical System; removed designation of page 28 as securityrelated information IAW Reg Guide 1.152 Rev 2

5 Appendix A Deleted triple parentheses surrounding the definition of the term Important toSafety; removed designation of page 30 as security related information IAWReg Guide 1.152 Rev 2

6 Appendix A Deleted triple parentheses surrounding and added proprietary brackets aroundthe definitions of the terms Nuclear Significant and Operational ControlSystems; removed designation of page 32 as security related information IAWReg Guide 1.152 Rev 2

7 Appendix B Deleted proprietary brackets around Item 3 under Regulatory Guides lAWReg Guide 1.152 Rev 2

8 Appendix D Updated Figure to match ESBWR DCD Figure 7.1-1.

vii

Page 9: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

1. INTRODUCTION

1.1 Overview

The Cyber Security Program Plan (CySPP) defines the requirements for the development andmanagement of an effective cyber security program for GE Hitachi Nuclear Energy (GEH) andits ESBWR product. This document is a top-tier design basis and high-level implementationguide for the ESBWR Cyber Security Program, per Regulatory Guide (RG) 1.152 [2.2.1 (1)].

1.2 Purpose and Scope

The purpose of this document is to provide guidance for developing the ESBWR Cyber SecurityProgram (CySP) for critical digital assets (CDAs) within the GEH scope of supply.

CDAs include digital devices, systems, and networks that, if compromised, could adverselyimpact the safety, security, or emergency preparedness and response functions of nuclear powerfacilities. CDA are identified via the assessment described in Appendix C "Identification ofCritical Digital Assets" of NUREG/CR-6847 [2.2.2(1)].

[[

1 of 43

Page 10: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

1.3 (Deleted)

1.4 (Deleted)

1.5 (Deleted)

1.6 (Deleted)

1.7 GEH ESBWR Licensing Position

GEH commits to comply with RG 1.152 [2.2.1(1)], Criteria for Use of Computers in SafetySystems of Nuclear Power Plants, and with BTP HICB-14 [2.2.3(1)], Guidance on SoftwareReviews for Digital Computer-Based Instrumentation and Control Systems, within the GEHscope of supply. While GEH's CySPP and CySP may be used to demonstrate compliance toaspects of 10 CFR 73.54 [2.2.5(4)], this is the responsibility of the Combined Operating License(COL) applicant to demonstrate compliance, not GEH.

1.7.1 (Deleted)

1.7.2 (Deleted)

1.8 Acronyms, Abbreviations, and Definitions

Acronyms and abbreviations are defined in Appendix C. Definitions for terms used in this Planare provided in Appendix A.

2 of 43

Page 11: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

2. REGULATORY REQUIREMENTS, GUIDELINES, AND INDUSTRYSTANDARDS

This section includes applicable supporting and supplemental documents; requirements, guides,and codes and standards. Supporting documents provide the input requirements to this plan.Supplemental documents are used in conjunction with this plan.

2.1 Supporting Documents

The following supporting documents are used as the controlling documents in the production ofthis Plan:

(1) ESBWR Design Control Document (DCD), Chapter 7, Instrumentation and Control (I&C)Systems, 26A6642AW

(2) (Deleted)

2.2 Codes and Standards

The following codes and standards are applicable to the activities specified within this plan.

2.2.1 Regulatory Guide and Interim Staff Guidance

(1) RG 1.152-2006, Criteria for Use of Computers in Safety Systems of Nuclear Power Plants

(2) Digital Instrumentation and Controls Interim Staff Guidance Task Working Group #4(DI&C-ISG-04), Highly-Integrated Control Rooms-Communications Issues (HICRc),Revision 0, September2007, Section 1

2.2.2 NUREG

(1) NUREG/CR-6847, PNNL-14766, Cyber Security Self-Assessment Method for U.S.Nuclear Power Plants, October 2004

(2) (Deleted)

(3) (Deleted)

(4) (Deleted)

2.2.3 Branch Technical Positions

(1) NUREG-0800, Standard Review Plan, Chapter 7, BTP HICB-14, R4, Guidance onSoftware Reviews for Digital Computer-Based Instrumentation and Control Systems

2.2.4 Nuclear Energy Institute (NEI)

(1) NEI 04-04, Cyber Security Program for Power Reactors, Revision 1, November 18, 2005

2.2.5 Code of Federal Regulations (CFR)

(1) 10 CFR 2.390, Public Inspections, Exemptions, Request for Withholding

(2) 10 CFR 50, Domestic Licensing of Production and Utilization Facilities

3 of 43

Page 12: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

(3) 10 CFR 73.55, Requirements for Physical Protection of Licensed Activities in NuclearPower Reactors Against Radiological Sabotage

(4) 10 CFR 73.54, Protection of Digital Computer and Communication Systems and Networks

2.2.6 Institute of Electrical and Electronics Engineers (IEEE)

(1) IEEE 603-1991 including correction sheet dated January 30, 1995, IEEE Standard Criteriafor Safety Systems for Nuclear Power Generating Stations

(2) IEEE 7-4.3.2-2003, IEEE Standard Criteria for Digital Computers in Safety Systems ofNuclear Power Generating Stations

2.3 Supplemental Documents

Supplemental documents are subject to revision to remain current with GEH internal procedures,and do not require the CySPP to be updated when they are revised. The following supplementaldocuments are used in conjunction with this document:

(1) ESBWR Software Quality Assurance Program Manual, NEDE-33245P

(2) ESBWR Software Management Program Manual, NEDE-33226P

(3) ESBWR Safeguards Assessment Report, NEDE-3339 1 P

(4) ESBWR Man-Machine Interface System and Human Factors Engineering ImplementationPlan, NEDE-33217P

2.4 (Deleted)

(1) (Deleted)

4 of 43'

Page 13: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

3. PROGRAM MANAGEMENT

This section describes the management components needed to lay the foundations for aneffective cyber security program, including the specific roles and responsibilities assigned tocarry out the program. Cyber security program management ensures that necessary cybersecurity issues are addressed programmatically within the ESBWR cyber security policies andprocedures to achieve a reasonable level of risk for the ESBWR product.

3.1 Roles and ResponsibilitiesI'l

5 of 43

Page 14: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

3.2 Policies and Procedures

Security is both a form of protection (e.g. a safeguard such as a firewall) and a softwarecharacteristic; it is an important consideration during the development of software products.Policies and procedures are applied to prevent contamination of the software products withviruses, trojan horses, or other nefarious intrusions throughout the software life cycle of thesoftware product. Effective and manageable cyber security programs are built upon policies andprocedures. These policies and procedures will be created and kept with the policies andprocedures developed throughout the life of the CySP.[[l

6 of 43

Page 15: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

3.3 ESBWR Cyber Security Defensive Model

The Cyber Security Defensive Model is used to evaluate and support the ESBWR's overall cybersecurity defensive strategy.

Figure 3.3-1. Cyber Security Defensive Model Level Diagram

7 of 43

Page 16: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

3.4 Training and Awareness

11

8 of 43

Page 17: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

1]3.4.1 User Awareness Training

Er

3.4.2 Specialized Cyber Security Training

Er

1]

3.5 Contingency and Disaster Recovery PlansEr

3.6 Periodic Threat and Vulnerability ReviewEr

3.7 Cyber Security Assessment (CySA) Report

E[

9 of 43

Page 18: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

10 of 43

Page 19: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

4. PLANNING PHASE

Figure 4-la and Figure 4-lb, "ESBWR Cyber Security Process Overview," shows how cybersecurity is integrated into the software development lifecycle process. The softwaredevelopment process is described in the SQAPM [2.3(1)] and SMPM [2.3(2)]. Cyber security-related tasks that supplement the SQAPM [2.3(1)] and SMPM [2.3(2)] are described withinSections 4, 5, 6, 7, 8, 9, 10, and 11. Input and output documents are representative of the type ofdocument to be used or produced; the actual document types and names may vary according tothe requirements of the SQAPM [2.3(1)] and SMPM [2.3(2)]. The process flow has beensimplified to show the overall relationship between process steps. Complex informational flowpatterns, which may exist between process steps, are not shown because these details aredeveloped later as part of project-specific cyber security programs.

4.1 Identification of Critical Digital Assets

[[

4.1.1 Grouping of Digital Devices

4.1.2 Communication Pathways

Er

11 of 43

Page 20: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

12 of 43

Page 21: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

4.2 Identification of Security CapabilitiesEr

4.3 Development of List of Vulnerabilities

Er

4.4 Technologies for Cyber Security

Er

11

13)of 43

Page 22: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

[1Figure 4-1a. ESBWR Cyber Security Process Overview

14 of 43

Page 23: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Figure 4-lb. ESBWR Cyber Security Process Overview

15 of 43

Page 24: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

5. REQUIREMENTS PHASE

The cyber security requirements for each of the CDAs identified in the planning phase need to bedeveloped as part of the overall system requirements, following RG 1.152, Section 2.2,Requirements Phase [2.2.1(1)]. This strategy will also help in determining the approach forincorporating protective measures into these systems in adherence to the GEH ESBWR CyberSecurity Defensive Model.

Ti

The following sections describe the various areas of requirements development.

5.1 Development of Requirements for System Architecture

5.2 Development of Requirements for Network Architecture

[[

16 of 43

Page 25: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

1]

5.3 (Deleted)

5.4 System Configurations

Systems will require configuration while being designed, installed, maintained, or in production.The configuration of any CDA can affect the security of that particular device.

5.5 Interfaces

The access to any system is the interface that is connected to external resources. Each interfaceon a system will need to have its functional requirements reviewed.[[I

5.6 Software

The use of commercial-off-the-shelf (COTS) software and previously developed software (PDS)will be a very common solution for vendors, partners, and GEH.

17 of 43

Page 26: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

11

5.7 Verification and Validation

Security is also a software characteristic, and therefore it is an important consideration during thedevelopment of software products. The verification and validation of the design documentationand outputs will follow the SQAPM, Section 5, Software Verification and Validation Plan[2.3(1)] for safety-related and other designated software.[[

6. DESIGN PHASE

This section describes the creation of the system based on the requirements. The design phaseincorporates the objectives of the ESBWR as a whole and on the individual system securitylevel. The requirements will be translated into specific design criteria.

[[

18 of 43

Page 27: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

6.1 Design of Physical and Logical Access

The analysis has been completed and the list of critical digital assets has been made in theplanning and requirements phases.

Er

6.2 Data Communication with Other Networks

6.2.1 Interfaces

The interface of each critical digital asset is the entry point for command and control of thatsystem.

Er

19 of 43

Page 28: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

6.2.2 Securing the Cyber Security Defensive Model Security Levels

Each security level of the Cyber Security Defensive Model requires its own methods of securingthe information and systems that reside on that security level.

E[

1]

7. IMPLEMENTATION PHASE

This section is focused on implementation of the secure design for creation of secure hardwareand software.Er

11

20 of 431

Page 29: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

7.1 Code Design

Planning, Requirements and Design phases have led to this step.E[

7.2 Identification and Evaluation of Proprietary Systems

As noted in RG 1.152, Subsection 2.4.2, Development Activities [2.2.1(1)], COTS systems maybe proprietary and generally unavailable for review.

Er

7.3 Cyber Security Program Plan Coordination with SMPM and SQAPM

Er

8. TEST PHASE

Testing shall be conducted in the SQAPM [2.3(1)] and SMPM [2.3(2)] to verify and validate thatthe cyber security requirements are correctly and completely designed and implemented in theCDAs.

Er

21 of 43

Page 30: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

9. INSTALLATION PHASE

11

22 of 43

Page 31: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

10. OPERATIONS AND MAINTENANCE PHASE

The operations and maintenance phase is the responsibility of both GEH, under this Plan andwithin the GEH scope of supply, and the licensee, under the licensee specific cyber security plan.[[

10.1 Change Management

Change management processes follow GEH procedural and licensing commitments, asapplicable, for maintaining both licensing basis and configuration control as described in theSQAPM [2.3(1)] and SMPM [2.3(2)].[[

10.2 Patch Management

Patch management processes support life cycle management by providing a systematic approachfor maintaining system's current software revision security levels and firmware from the vendor,as required.

E[

23 of 43 )

Page 32: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

10.3 Contingency and Disaster Recovery PlansI[[

1]

10.4 Periodic Threat and Vulnerability ReviewE[

10.5 Maintenance Procedures

During the system life cycle, when component or system maintenance or surveillance testing isperformed, the component or system must be restored to full security condition during the returnto service process.

[[1

11. RETIREMENT PHASE

The purpose of the Retirement Phase is to remove the existing software product from theoperating environment. An effective continuing program, within GEH scope of supply, shallconsider the retirement phase and procedures shall be in place to address proper retirement ofCDAs and disposal of media and resident software in a controlled manner.

[r

12. QUALITY ASSURANCE

Er

24 of 43

Page 33: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

13. INCIDENT RESPONSE AND RECOVERY PLAN

1]

25 of 43

Page 34: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

APPENDIX A: DEFINITIONS

This section defines the terms and abbreviations generally used in reference to cyber security. Anumber of these terms and definitions are used within this document. This list is to be used as areference for the creation of the supporting documents. This is not an inclusive list of tenris andmay be updated at anytime. The list should be considered a subset of current cyber securityprograms.

Term Derinition

Access The ability and means to communicate with or otherwise interactwith a system in order to use system resources.

Access Control The protection of system resources against unauthorized access; aprocess by which use of system resources is regulated according to asecurity policy and is permitted by only authorized entities (users,programs, processes, or other systems) according to that policy. [1]

Accountability The property of a system (including its system resources) that ensuresthat the actions of a system entity may be traced uniquely to thatentity, which can be held responsible for its actions. [1]

Application A software program that performs specific functions initiated by auser command or a process event and that can be executed withoutaccess to system control, monitoring, or administrative privileges.[2]

Area A subset of a site's physical, geographic, or logical group of assets.NOTE: An area may contain manufacturing lines, process cells,andproduction units. Areas may be connected to each other bya site local area network and may contain systems related to theoperations performed in that area.

Asset Any tangible or intangible object owned by or under the custodialduties of an organization, having either a perceived or actual value tothe organization.

Attack Assault on a system that derives from an intelligent threat, i.e., anintelligent act that is a deliberate attempt (especially in the sense of amethod or technique) to evade security services and violate thesecurity policy of a system. [1]

Authorization A right or a permission that is granted to a system entity to access asystem resource. [1]

Availability The probability that an asset will be able to fulfill its requiredfunction at a given point in time. System availability is related toreadiness for usage.

26 of 43

Page 35: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Communication Arrangement of hardware, software, and propagation media to allowSystem the transfer of messages (ISO/lEC 7498 application layer service data

units) from one application to another.

Compromise The unauthorized disclosure, modification, substitution, or use ofinformation (including plaintext cryptographic keys and other criticalsecurity parameters). [4]

Confidentiality Assurance that information is not disclosed to unauthorizedindividuals, processes, or devices. [2]

Control Equipment A class that include distributed control systems, programmable logiccontrollers, associated operator interface consoles, and field sensingand control devices used to manage and control the process

NOTE. The term also includes.field bus networks where controllogic and algorithms are executed on intelligent electronicdevices that coordinate actions with each other.

Control Network Those networks that are typically connected to equipment thatcontrols physical processes and that is time critical. (See "safetynetwork")

NOTE. The control network can be subdivided into zones, andthere can be multiple separate control networks within onecompany or site.

27 of 43

Page 36: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Countermeasure An action, device, procedure, or technique that reduces a threat, avulnerability, or an attack by eliminating or preventing it, byminimizing the harm it can cause, or by discovering and reporting itso that corrective action can be taken. [1]

Critical Digital Asset A digital device or system that plays a role in the operation ormaintenance of a critical system and can impact the properfunctioning of a critical system.

Critical System Those systems and networks associated with safety-related andimportant-to-safety functions; security functions; emergencypreparedness functions including offsite communications; andsupport systems and equipment that, if compromised, wouldadversely impact safety, security, or emergency preparednessfunctions.

Defense-In-Depth A security architecture based on the idea that any one point ofprotection may, and probably will, be defeated.

NOTE: Defense in depth implies layers of security anddetection, even on single systems, and provides the followingfeatures:

* attackers are faced with breaking through or bypassing eachlayer without being detected

* aflaw in one layer can be protected by capabilities in otherlayers

* system security becomes a set of layers within the overallnetwork security

Demilitarized Zone A perimeter network segment that is logically between internal andexternal networks. [2]

NOTE: The purpose of a demilitarized zone is to enforce theinternal network's policy/for external information exchange andto provide external, untrusted sources with restricted access toreleasable information while shielding the internal network fromoutside attacks.

NOTE: In the context of industrial automation and controlsystems, the term "internal network" is typically applied to thenetwork or segment that is the primary focus ofprotection. Forexample, a control network could be considered "internal "whenconnected to an "external" business network.

Denial of Service The prevention or interruption of authorized access to a systemresource or the delaying of system operations and functions. [1]

28 of 43

Page 37: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Distributed Control A type of control system in which the system elements are dispersedSystem but operated in a coupled manner, generally with coupling time

constants much shorter than those found in SCADA systems.

NOTE: Distributed control systems are commonly associatedwith continuous processes such as electric power

generation; oil and gas refining; chemical, pharmaceuticaland paper manufacture, as well as discrete processes such asautomobile and other goods manufacture, packaging, andwarehousing.

Emergency Emergency preparedness digital assets are limited to those digitalPreparedness Digital assets that are vital to successful implementation of the EmergencyAssets Plan. Operation of these assets is controlled by emergency plan

procedures. Commercial digital assets such as EOF HVAC controls,EOF building security systems, the commercial phone system,copiers, and fax machines are not under a configuration controlprogram and are not identified. These commercial components arenot critical to successful implementation of the Emergency Plan.

ESBWR I&C The ESBWR DCIS is subdivided into the safety-related DCIS (Q-Network DCIS) and the nonsafety-related DCIS (N-DCIS). A functional

network diagram of the ESBWR DCIS appears in Appendix D,which is a functional representation of the current design. The finalDCIS design may alter equipment locations and actual hardwarecomponents depending on the chosen DCIS vendors. Q-DCIS andN-DCIS architectures, their relationships, and their acceptancecriteria are further described in the ESBWR Design ControlDocument (DCD), Chapter 7, Section 7.1, "Introduction" [2.1 (1)].

Failure Mode and A tabular method of providing traceability from the modes by whichEffects Analysis a system may fail and the effect of that failure on the ability of the

system to perform its function, or the ability of a collection ofsystems to recover from the failure.

Field I/O Network The communications link (wired or wireless) that connects sensorsand actuators to the control equipment.

Firewall An inter-network connection device that restricts data communicationtraffic between two connected networks. [1]

NOTE: A firewall may be either an application installed on ageneral-purpose computer or a dedicated platform(appliance)which forwards or rejects/drops packets on anetwork. Typically, firewalls are used to define zone borders.Firewalls generally have rules restricting what ports are open.

29 of 43

Page 38: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Gateway A relay mechanism that attaches to two (or more) computer networksthat have similar functions but dissimilar implementations and thatenables host computers on one network to communicate with hostson the other. [1]

Geographic Site A subset of an enterprise's physical, geographic, or logical group ofassets. It may contain areas, manufacturing lines, process cells,process units, control centers, and vehicles and may be connected toother sites by a wide area network.

Important to Safety Those systems or components that support a safety system, or aredesignated as "Important to Safety" by the site procedures. [6]

NOTE: There are a number of definitions of the term "importantto safety" in various industry documents. It was determined thatmaintenance rule risk significant structures, systems, andcomponents (SSC) meet the intent of NEL 04-04. Defining theterm in this manner allows the use of work done to supportimplementation of the maintenance rule (i.e., classification andreview by the maintenance rule expert panel). This methodologyassures that "important to safety" digital assets used foraccident monitoring instrumentation, fire protection, safeshutdown, and ATWS are included in the cyber securityprogram.

Industrial A collection of personnel, hardware, and software that can affect orAutomation and influence the safe, secure, and reliable operation of an industrialControl System process.

NOTE: These systems include, but are not limited to..

* Industrial control systems, including distributed controlsystems (DCSs), programmable logic controllers (PLCs),networked electronic sensing and control, and monitoring anddiagnostic systems (In this context, process control systemsinclude basic process control system and sqfety-instrumentedsystem [SIS]functions, whether they are physically separateor integrated.)

* Associated information systems such as advanced ormultivariable control, online optimizers, dedicated equipmentmonitors, graphical interfaces, process historians,manufacturing execution systems, and plant informationmanagement systems

• Associated internal, human, network, or machine interfacesused to provide control, safety, and manufacturing operationsfunctionality to continuous, batch, discrete, and otherprocesses

30 of 43

Page 39: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Insider A "trusted" person, employee, contractor, or supplier who hasinformation that is not generally known to the public. (See11 outsider ")

Integrity The quality of a system reflecting the logical correctness andreliability of the operating system, the logical completeness of thehardware and software implementing the protection mechanisms, andthe consistency of the data structures and occurrence of the storeddata. [2]

NOTE: In aformal security mode, integrity is often interpretedmore narrowly to mean protection against unauthorizedmodification or destruction of information.

Interception Capture and disclosure of message contents or use of traffic analysisto compromise the confidentiality of a communication system basedon message destination or origin, frequency or length oftransmission, and other communication attributes.

Interface A logical entry or exit point that provides access to the module forlogical information flows.

Intrusion Unauthorized act of compromising a system. (See "attack')

Intrusion Detection A security service that monitors and analyzes system events for thepurpose of finding, and providing real-time or near real-time warningof, attempts to access system resources in an unauthorized manner.

IP Address Inter-network address of a computer that is assigned for use by theInternet Protocol and other protocols. [I]

Local Area Network A communications network designed to connect computers and otherintelligent devices in a limited geographic area (typically less than 10kilometers). [51

Malicious Code Programs or code written for the purpose of gathering informationabout systems or users, destroying system data, providing a footholdfor further intrusion into a system, falsifying system data and reports,or providing time-consuming irritation to system operations andmaintenance personnel.

NOTE: Malicious code attacks can take the.form of viruses,worms, trojan horses, or other automated exploits.

NOTE: Malicious code is also often referred to as "malware.

31 of 43

Page 40: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Outsider A person or group not "trusted" with inside access, who may or maynot be known to the targeted organization. (See "insider")

NOTE: Outsiders may or may not have been insiders at onetime.

Penetration Successful unauthorized access to a protected system resource.

Reliability A conditional probability that a system will correctly perform (arequired function) over a specified interval (to, t), given that thesystem was performing correctly at time to. System reliability relatesto continuity of service.

Remote Access The ability to access a computer, node, or network resource locatedwithin an identified defensive level from a computer or node that isphysically located in a less secure defensive level (e.g., accessing theplant site LAN from home via a non-company computer.)

Risk An expectation of loss expressed as the probability that a particularthreat will exploit a particular vulnerability with a particularconsequence. [1]

Risk Assessment Process that systematically identifies possible vulnerabilities tovaluable system resources and threats to those resources, quantifiesloss exposures (e.g., loss potential) based on estimated frequenciesand costs of occurrence, and (optionally) recommends how toallocate resources to countermeasures to minimize total exposure.

Risk Management Process of identifying and applying countermeasures commensuratewith the value of the assets protected based on arisk assessment. [2]

Risk Mitigation A combination of countermeasures and business continuity plans.Controls

32 of 43

Page 41: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Router A gateway between two networks at OSI layer 3 and that relays anddirects data packets through that inter-network. The most commonform of router passes Internet Protocol (IP) packets. [I]

Security 0 measures taken to protect a system0 condition of a system that results from the establishment and

maintenance of measures to protect the system0 condition of system resources being free from unauthorized

access and from unauthorized or accidental change,destruction, or loss [1]

0 capability of a computer-based system to provide adequateconfidence that unauthorized persons and systems can neithermodify the software and its data nor gain access to the systemfunctions, and yet to ensure that this is not denied toauthorized persons and systems. [4]

Security Incident An adverse event in a system or network or the threat of theoccurrence of such an event. [5]

NOTE: The term "near miss " is sometimes used to describe anevent that could have been an incident under slightly differentcircumstances.

Security Intrusion Security event, or a combination of multiple security events, thatconstitutes a security incident in which an intruder gains, or attemptsto gain, access to a system (or system resource) without havingauthorization to do so. [I I

Security Level Level corresponding to the required effectiveness of countermeasuresand inherent security properties of devices and systems for a zone orconduit based on assessment of risk for the zone or conduit. [4]

33 of 43

Page 42: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Security Policy A set of rules and practices that specify or regulate how a system ororganization provides security services to protect sensitive andcritical system resources. [1]

Security Procedures Definitions of exactly how practices are implemented and executed.NOTE: Security procedures are implemented through personneltraining and actions using currently available and installedtechnology.

Security Program A program that combines aspects of managing security, ranging fromthe definition and communication of policies through implementationof best industry practices and ongoing operation and auditing.

Sensors and The end elements connected to process equipment.Actuators

Server A device or application that provides information or services to clientapplications and devices. [1]

System Software The special software designed for a specific computer system orfamily of computer systems to facilitate the operation andmaintenance of the computer system and associated programs anddata. [3]

Threat The possibility for violation of security, which exists when there is acircumstance, capability, action, or event that could breach securityand cause harm. [1]

User A person, organization entity, or automated process that accesses asystem, whether authorized to do so or not. [I]

Vulnerability A flaw or weakness in a system's design, implementation, oroperation and management that could be exploited to violate thesystem's integrity or security policy. [I]

Wide Area Network A communications network designed to connect computers over alarge distance, such as across the country or world. [3]

34 of 43

Page 43: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Term Definition

Legend:

[1] RFC 2828, Internet Security Glossary, May 2000,<http://www.faqs.org/rfcs/rfc2828.html>

[2] CNSS Instruction No. 4009, National Information Assurance Glossary, May 2003,<http://www.cnss.gov/Assets/pdf/cnssi 4009.pdf>

[3] Federal Information Processing Standards (FIPS) PUB 140-2, (2001) "SECURITYREQUIREMENTS FOR CRYPTOGRAPHIC MODULES," Section 2, Glossary ofTerms and Acronyms, U.S. National Institute of Standards and Technology.

[4] Federal Information Processing Standards Publication, FIPS PUB 140-2, SecurityRequirements for Cryptographic Modules, December 2002

[5] SANS Glossary of Terms used in Security and Intrusion Detection, May 2003,<http://www.sans.org/resources/glossav.php>

[6] NEI 04-04 [2.2.4(1)]

i315 of 43

Page 44: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

APPENDIX B: CYBER SECURITY PROGRAM PLAN CONFORMANCEREVIEW

[[

Conformance DescriptionCode

[[1]

[[

I'll

Er

36 of 43

Page 45: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Appendix B - Cyber Security Program Plan Conformance Review

Item Reg Guide IEEE and Cyber Deviation Conformance JustificationIndustry Std. Security Code

Program PlanConformance

rE 1]

37 of 43

Page 46: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Appendix B - Cyber Security Program Plan Conformance Review

Item Reg Guide IEEE and Cyber Deviation Conformance JustificationIndustry Std. Security Code

Program Plan

Conformance

EL ]]

3 1.152-2006 N/A X Parts of RG 1. 152, Section 4 Licensee actions are.out.......... -------. C.......2 . ...........a~.e ..c. .p . ..d . .t..t . ... ..e.ns,......... p...o..f..t.h.......y.S...... ......

C.-2,_are scop~ed to the lice-nsee. 9 q-scpe-of th-y5pý.*.on.y;th.eCySPP does not1i~n c...p9Jo r~a. t~e. .t~h. e.s~. . .a s..

[[

E]]

38 of 43

Page 47: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Appendix B - Cyber Security Program Plan Conformance Review

Item Reg Guide IEEE and Cyber Deviation Conformance JustificationIndustry Std. Security Code

Program PlanConformance

r[

Er]

Er

Er ]]

39 of 43

Page 48: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

APPENDIX C: ACRONYMS AND ABBREVIATIONS

The following acronyms and abbreviations are used throughout this Plan.

Acronym Meaning

BTP Branch Technical Position

CDA Critical Digital Asset

CFR Code of Federal Regulations

CNSS Committee of National Security Systems

COTS Commercial-Off-The-Shelf

CRC Cyclic Redundancy Check

CySA Cyber Security Assessment

CySP Cyber Security Program

CySPP Cyber Security Program Plan

CyST Cyber Security Team

DCD Design Control Document

DCIS Distributed Control and Information System

DI&C Digital Instrumentation and Controls

DMZ Demilitarized Zone

EOF Emergency Operations Facility

ERDS Emergency Response Data System

ESBWR Economic Simplified Boiling Water Reactor

ESF Engineered Safety Feature

FAT Factory Acceptance Test

FIPS Federal Information Processing Standards

FIPS PUB Federal Information Processing Standards Publication

FMEA Failure Modes and Effects Analysis

GEH GE Hitachi Nuclear Energy

HFE Human Factors Engineering

40 of 43

Page 49: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Acronym Meaning

HICB Instrumentation and Control Branch

HVAC Heating, Ventilation, and Air Conditioning

I&C Instrumentation and Control

IEC International Electrotechnical Commission

IEEE Institute of Electrical and Electronic Engineers

ISG Interim Staff Guidance

ISO International Organization for Standardization

IT Information Technology

LAN Local area Network

LTR Licensing Topical Report

MMIS Man Machine Interface System

M&TE Measurement and Test Equipment

N-DCIS Nonsafety-related - Distributed Control and Information System

NEI Nuclear Energy Institute

NIDS Network Intrusion Detection System

NMAP Network Mapper (also Nmap)

NMS Neutron Monitoring System

NRC Nuclear Regulatory Commission

NSIR Nuclear Security and Incident Response

PDS Previously Developed Software

QA Quality Assurance

Q-DCIS Safety-related - Distributed Control and Information System

RAM Random Access Memory

RE Responsible Engineer

Reg. Regulatory

RG Regulatory Guide

41 of 43

Page 50: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Rev. 02

Acronym Meaning

RPS Reactor Protection System

SANS SysAdmin, Audit, Network, Security

SMPM Software Management Program Manual

SQAPM Software Quality Assurance Program Manual

SRP Standard Review Plan

Std Standard (used by IEEE)

V&V Verification and Validation

WAN Wide Area Network

42 of 43

Page 51: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

NEDO-33295, Re'., 02

APPENDIX D: ESBWR DISTRIBUTED CONTROL AND INFORMATION SYSTEM (DCIS) FUNCTIONAL NETWORK DIAGRAM

I

43 of 43

Page 52: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

MFN 10-267

Enclosure 3

Affidavit

Page 53: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

GE-Hitachi Nuclear Energy Americas LLC

AFFIDAVIT

I, Mark J. Colby, state as follows:

(1) I am the Manager, New Plants Engineering, GE Hitachi Nuclear Energy ("GEH"),have been delegated the function of reviewing the information described inparagraph (2) which is sought to be withheld, and have been authorized to apply forits withholding.

(2) The information sought to be withheld is contained in Enclosure 1 of GEH letterMFN 10-267, Mr. Richard E. Kingston to U.S. Nuclear Regulatory Commission,entitled Transmittal of ESBWR License Topical Reports, NEDE-33295P, "ESBWR -Cyber Security Program Plan", Revision 2 and NED0-33295, "ESBWR - CyberSecurity Program Plan", Revision 2 dated October 13, 2010. The GEH proprietaryinformation in Enclosure 1, which is a LTR entitled NEDE-33295P, " ESBWR -Cyber Security Program Plan", Revision 2, GEH Proprietary Information - datedSeptember 2010, is delineated by a [[0Ljttep..Vi.jderline. in~j(dg eubrackets.-]]. Figures and large equation objects are identified with double squareb;racket's. before and after the object. In each case, the superscript notation {3} refersto Paragraph (3) of this affidavit, which provides the basis for the proprietarydetermination.

(3) In making this application for withholding of proprietary information of which it is theowner, GEH relies upon the exemption from disclosure set forth in the Freedom ofInformation Act ("FOIA"), 5 USC Sec. 552(b)(4), and the Trade Secrets Act,18 USC Sec. 1905, and NRC regulations 10 CFR 9.17(a)(4), and 2.390(a)(4) for"trade secrets" (Exemption 4). The material for which exemption from disclosure ishere sought also qualify under the narrower definition of "trade secret," within themeanings assigned to those terms for purposes of FOIA Exemption 4 in,respectively, Critical Mass Energqy Project v. Nuclear Requlatory Commission,975F2d871 (DC Cir. 1992), and Public Citizen Health Research Group v. FDA,704F2d 1280 (DC Cir. 1983).

(4) Some examples of categories of information which fit into the definition ofproprietary information are:

a. Information that discloses a process, method, or apparatus, including supportingdata and analyses, where prevention of its use by GEH competitors withoutlicense from GEH constitutes a competitive economic advantage over othercompanies;

b. Information which, if used by a competitor, would reduce his expenditure ofresources or improve his competitive position in the design, manufacture,shipment, installation, assurance of quality, or licensing of a similar product;

Page 54: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

c. Information which reveals aspects of past, present, or future GEHcustomer-funded development plans and programs, resulting in potentialproducts to GEH;

d. Information which discloses patentable subject matter for which it may bedesirable to obtain patent protection.

The information sought to be withheld is considered to be proprietary for thereasons set forth in paragraphs (4)a., and (4)b, above.

(5) To address 10 CFR 2.390(b)(4), the information sought to be withheld is beingsubmitted to NRC in confidence. The information is of a sort customarily held inconfidence by GEH, and is in fact so held. The information sought to be withheldhas, to the best of my knowledge and belief, consistently been held in confidenceby GEH, no public disclosure has been made, and it is not available in publicsources. All disclosures to third parties including any required transmittals to NRC,have been made, or must be made, pursuant to regulatory provisions or proprietaryagreements, which provide for maintenance of the information in confidence. Itsinitial designation as proprietary information, and the subsequent steps taken toprevent its unauthorized disclosure, are as set forth in paragraphs (6) and (7)following.

(6) Initial approval of proprietary treatment of a document is made by the manager ofthe originating component, the person most likely to be acquainted with the valueand sensitivity of the information in relation to industry knowledge, or subject to theterms under which it was licensed to GEH. Access to such documents within GEHis limited on a "need to know" basis.

(7) The procedure for approval of external release of such a document typicallyrequires review by the staff manager, project manager, principal scientist or otherequivalent authority, by the manager of the cognizant marketing function (or hisdelegate), and by the Legal Operation, for technical content, competitive effect, anddetermination of the accuracy of the proprietary designation. Disclosures outsideGEH are limited to regulatory bodies, customers, and potential customers, and theiragents, suppliers, and licensees, and others with a legitimate need for theinformation, and then only in accordance with appropriate regulatory provisions orproprietary agreements.

(8) The information identified in paragraph (2), above, is classified as proprietarybecause it identifies detailed GE ESBWR design information. GE utilized priordesign information and experience from its fleet with significant resource allocationin developing the system over several years at a substantial cost.

The development of the evaluation process along with the interpretation andapplication of the analytical results is derived from the extensive experiencedatabase that constitutes a major GEH asset.

Page 55: Licensing Topical Report NEDO-33295, Revision 2, ' ESBWR ...The Cyber Security Program Plan (CySPP) defines the requirements for the development and management of an effective cyber

(9) Public disclosure of the information sought to be withheld is likely to causesubstantial harm to GEH's competitive position and foreclose or reduce theavailability of profit-making opportunities. The information is part of GEH'scomprehensive BWR safety and technology base, and its commercial valueextends beyond the original development cost. The value of the technology basegoes beyond the extensive physical database, and analytical methodology andincludes development of the expertise to determine and apply the appropriateevaluation process. In addition, the technology base includes the value derivedfrom providing analyses done with NRC-approved methods.

The research, development, engineering, analytical and NRC review costscomprise a substantial investment of time and money by GEH.

The precise value of the expertise to devise an evaluation process and apply thecorrect analytical methodology is difficult to quantify, but it clearly is substantial.

GEH's competitive advantage will be lost if its competitors are able to use theresults of the GEH experience to normalize or verify their own process or if they areable to claim an equivalent understanding by demonstrating that they can arrive atthe same or similar conclusions.

The value of this information to GEH would be lost if the information were disclosedto the public. Making such information available to competitors without their havingbeen required to undertake a similar expenditure of resources would unfairlyprovide competitors with a windfall, and deprive GEH of the opportunity to exerciseits competitive advantage to seek an adequate return on its large investment indeveloping these very valuable analytical tools.

I declare under penalty of perjury that the foregoing affidavit and the matters statedtherein are true and correct to the best of my knowledge, information, and belief.

Executed on this 1 3 th day of October 2010.

Mark J.C AeLyGE-Hitachi Nucleaanergy Americas LLC