NRC Compliance

NRC Compliance
Bastille NRC Compliance

NRC Regulatory Compliance

How Bastille's Wireless Threat Detection Fulfills NRC RG 5.71 Cyber Security Programs for Nuclear Power Reactors

Security Control How Bastille Delivers Compliance
Critical Asset Protection
Critical Digital Assets Protection
3.1.3
Protects autonomous and interconnected CDAs with continuous RF monitoring to detect unauthorized wireless devices and internal threats that could compromise isolated systems.
Real-time Detection Internal Threat Protection
Continuous Monitoring & Detection
Continuous Monitoring
A.4.1
Provides automated near real-time cybersecurity management by continuously scanning for rogue assets and verifying baseline configurations.
24/7 Automated Monitoring Rogue Asset Detection
Wireless Intrusion Detection
B.1.17
Exceeds weekly scan requirements with continuous 24/7 monitoring for unauthorized wireless access points, enabling immediate alerts and response.
Continuous Scanning Instant Alerts
Insecure & Rogue Connections
B.1.18
Surpasses monthly verification requirements with real-time detection of unauthorized vendor connections, modems, and wireless threats.
Real-time Verification Vendor Connection Detection
Access Control & Policy Enforcement
Access Control Policy
B.1.1
Enforces wireless access restrictions and detects policy violations by providing visibility into all wireless activity and identifying rogue connections.
Policy Enforcement Violation Detection
Mobile Device Control
B.1.19
Monitors and controls PMMD access to CDAs by detecting and locating wireless devices, ensuring devices remain within assigned security levels.
Device Tracking Security Level Enforcement
Threat Detection & Response
Protocol Security
B.1.16
Identifies open or insecure wireless protocols that could be exploited, supporting implementation of additional security precautions.
Protocol Analysis Vulnerability Identification
Information Flow Protection
B.1.4
Delivers near real-time detection of unauthorized information flows via wireless channels, supporting rapid response capabilities.
Data Exfiltration Detection Rapid Response
Component Inventory
C.1.19
Automatically detects unauthorized hardware with wireless capabilities and integrates with security infrastructure for automated response.
Automated Detection Integration Ready
Monitoring Tools & Techniques
C.3.4
Provides plantwide cyber surveillance for wireless networks, supporting real-time event analysis and anomaly detection across critical infrastructure.
Plantwide Coverage Anomaly Detection Covert Channel Detection