NRC Regulatory Compliance
How Bastille's Wireless Threat Detection Fulfills NRC RG 5.71 Cyber Security Programs for Nuclear Power Reactors
Security Control | How Bastille Delivers Compliance |
---|---|
Critical Asset Protection | |
Critical Digital Assets Protection
3.1.3
|
Protects autonomous and interconnected CDAs with continuous RF monitoring to detect unauthorized wireless devices and internal threats that could compromise isolated systems.
Real-time Detection Internal Threat Protection |
Continuous Monitoring & Detection | |
Continuous Monitoring
A.4.1
|
Provides automated near real-time cybersecurity management by continuously scanning for rogue assets and verifying baseline configurations.
24/7 Automated Monitoring Rogue Asset Detection |
Wireless Intrusion Detection
B.1.17
|
Exceeds weekly scan requirements with continuous 24/7 monitoring for unauthorized wireless access points, enabling immediate alerts and response.
Continuous Scanning Instant Alerts |
Insecure & Rogue Connections
B.1.18
|
Surpasses monthly verification requirements with real-time detection of unauthorized vendor connections, modems, and wireless threats.
Real-time Verification Vendor Connection Detection |
Access Control & Policy Enforcement | |
Access Control Policy
B.1.1
|
Enforces wireless access restrictions and detects policy violations by providing visibility into all wireless activity and identifying rogue connections.
Policy Enforcement Violation Detection |
Mobile Device Control
B.1.19
|
Monitors and controls PMMD access to CDAs by detecting and locating wireless devices, ensuring devices remain within assigned security levels.
Device Tracking Security Level Enforcement |
Threat Detection & Response | |
Protocol Security
B.1.16
|
Identifies open or insecure wireless protocols that could be exploited, supporting implementation of additional security precautions.
Protocol Analysis Vulnerability Identification |
Information Flow Protection
B.1.4
|
Delivers near real-time detection of unauthorized information flows via wireless channels, supporting rapid response capabilities.
Data Exfiltration Detection Rapid Response |
Component Inventory
C.1.19
|
Automatically detects unauthorized hardware with wireless capabilities and integrates with security infrastructure for automated response.
Automated Detection Integration Ready |
Monitoring Tools & Techniques
C.3.4
|
Provides plantwide cyber surveillance for wireless networks, supporting real-time event analysis and anomaly detection across critical infrastructure.
Plantwide Coverage Anomaly Detection Covert Channel Detection |