• English
  • العربية
  • 中文
  • Français
  • Русский
  • Español

You are here

Computer Security Approaches to Reduce Cyber Risks in the Nuclear Supply Chain

Non-serial Publications

English IAEA-TDL-011 ¦ 978-92-0-146922-9

130 pages ¦ 21 figures ¦ € 18.00 ¦ Date published: 2022

Download PDF (3.28 MB)

Description

Computer security in the nuclear supply chain is an important element of risk management. Nuclear facilities and operations rely upon complex networks of suppliers, vendors, and integrators to provide digital technology, services, and support. This provides a supply chain attack surface that may be exploited to compromise nuclear facilities, operations, and secure environments. Compromise of the supply chain may provide a means to circumvent computer security measures that are in place to protect these critical systems, therefore a defence-in-depth approach that involves people, processes, and technology is needed.
The purpose of this publication is to assist Member States in raising awareness of cyber risks in the nuclear supply chain and help to identify critical issues and mitigation techniques. The aim is to reduce the supply chain attack surface by providing information, good practices, and mitigation techniques through all phases of the supply chain including design, hardware and software development, testing, transportation, installation, operation, maintenance and decommissioning of nuclear computer-based systems.

More Information on reusing IAEA copyright material.

Keywords

Computer Security Approaches, Reduce Cyber Risks, Nuclear Supply Chain, Risk Management, Awareness, Critical Issues, Mitigation Techniques, Good Practices, Phases, Design, Hardware, Software Development, Testing, Transportation, Installation, Operation, Maintenance, Decommissioning, Nuclear Computer-Based Systems, Nuclear Industry, Security Measures, Business Logistics, Supply Change Management Approaches, Relationships, Customers, Suppliers, Threat Vectors, Supply Chain Life Cycle, Key Elements, Principles, Supply Chain Attack Surface, Procurement Process, Concepts, Transfer, Certifications, Information Sharing, Communications, Contract Terms, Nuclear Material, Computer Security Essentials, Source Stage, Specify Stages, Use Stage, Correct Stage

Related publications

Stay in touch

Newsletter