Skip to content
The Algorithm
The Algorithm/Knowledge Base/NRC 10 CFR 73.54 Nuclear Cybersecurity Requirements
Energy & Infrastructure

NRC 10 CFR 73.54 Nuclear Cybersecurity Requirements

The NRC's binding cybersecurity rule for nuclear power plants, requiring defense-in-depth protection for digital assets that could affect radiological safety and security functions.

What You Need to Know

Title 10 CFR Part 73.54, "Protection of Digital Computer and Communication Systems and Networks," promulgated by the US Nuclear Regulatory Commission (NRC) in 2009 and implemented through NRC Regulatory Guide 5.71 (2010), is the primary cybersecurity regulation for commercial nuclear power plants. The rule requires licensees to establish, implement, and maintain a Cybersecurity Plan that provides high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks. The scope covers any digital asset that could adversely affect the performance of safety systems (10 CFR 50.55a), security systems (10 CFR 73), emergency preparedness systems, and support systems and equipment that, if compromised, could adversely impact these critical systems. These are collectively called Critical Digital Assets (CDAs).

NRC Reg. Guide 5.71 establishes a defense-in-depth and diversity (D3) architecture with eight security levels (Level 0 through Level 7), where Level 4 is the most critical (Safety and Important to Safety systems) and Level 7 represents corporate IT. The cardinal rule of nuclear cybersecurity is the unidirectional data flow requirement: Level 4 systems must not have any communication pathways to less-secure levels; data can only flow outward (from Level 4 to Level 3) via hardware data diodes. No IP connectivity, no wireless, no portable media without written procedures and monitoring. Any digital maintenance port (RS-232, USB, Ethernet maintenance port) on a CDA is itself a CDA and must be protected with physical locks, audit logging, and authorized-use-only procedures. Portable media introduced to any CDA system must be scanned on a dedicated, isolated scanning station before connection.

The NRC cybersecurity inspection program (Inspection Procedure 71130.10) evaluates licensee compliance through periodic inspections that examine: the CDA inventory and its completeness; implementation of the eight defense levels; cyber incident response procedures; supply chain controls for CDA components; and training records. A Cyber Security Assessment Team (CSAT) inspection can result in Severity Level III or IV violations for deficiencies in CDA protection. The NRC's 10 CFR 73.77 requires licensees to report cyber attacks that affect or could affect the performance of any safety, security, or emergency preparedness function within one hour of discovery — the most stringent incident reporting timeline of any US critical infrastructure sector. New reactor designs (AP1000, SMRs) must address cybersecurity in their Design Control Document (DCD) as part of the combined license (COL) application.

How We Handle It

We support nuclear licensees in developing and implementing NRC Reg. Guide 5.71-compliant Cybersecurity Plans, performing CDA inventories and boundary analyses, designing Level 0–4 defense-in-depth architectures with hardware-enforced unidirectional controls, and preparing for NRC CSAT inspections. Our team includes specialists with nuclear cybersecurity implementation experience across both operating and new reactor programs.

Services
Service
Compliance Infrastructure
Service
Regulatory Intelligence
Service
Managed Infrastructure
Related Frameworks
10 CFR 73.54
NRC Reg. Guide 5.71
NIST SP 800-82
IEC 62443
DECISION GUIDE

Compliance-Native Architecture Guide

Design principles and a structured checklist for building software that is compliant by default — not compliant by retrofit. Covers data architecture, access controls, audit trails, and vendor due diligence.

§

Compliance built at the architecture level.

Deploy a team that knows your regulatory landscape before they write their first line of code.

Start the conversation
Related
Service
Compliance Infrastructure
Service
Regulatory Intelligence
Service
Managed Infrastructure & Cloud Operations
Related Framework
10 CFR 73.54
Related Framework
NRC Reg. Guide 5.71
Related Framework
NIST SP 800-82
Platform
ALICE Compliance Engine
Service
Compliance Infrastructure
Engagement
Surgical Strike (Tier I)
Why Switch
vs. Accenture
Get Started
Start a Conversation
Engage Us