The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear material and other radioactive material that is under regulatory control, and associated facilities and activities, the results of this identification and assessment are expressed as a design basis threat or representative threat statement describing the intentions and capabilities of potential adversaries against which the materials and associated facilities and activities are to be protected. An Implementing Guide was issued in 2009 under the title of Development, Use and Maintenance of the Design Basis Threat which was updated and revised. The result of this revision is the current publication. It provides a step-by-step methodology for conducting a national nuclear security threat assessment including both physical and computer security aspects, and for the development, use and maintenance of design basis threats and representative threat statements.
Author(s): International Atomic Energy Agency
Series: IAEA Nuclear Security Series
Publisher: IAEA
Year: 2021
Language: English
Pages: 39
City: Vienna
1. INTRODUCTION
Background
Objective
Scope
Structure
2. NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND THE USE OF A RISK INFORMED APPROACH
Risk informed approach and threat statements
Potential adversaries and their attributes and characteristics
Information security considerations
3. OVERVIEW OF THE PROCESS OF DEVELOPMENT, USE AND MAINTENANCE OF THE VALIDITY OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION, DESIGN BASIS THREATS, AND REPRESENTATIVE THREAT STATEMENTS
4. ROLES AND RESPONSIBILITIES
State
Competent authorities
Operators
5. CONDUCT OF A NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT
Input: Collection of relevant threat information
Analysis of relevant threat information
Output: National nuclear security threat assessment documentation
6. DEVELOPMENT OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS
Regulatory approaches and threat statements
Developing a design basis threat
Screening the national nuclear security threat assessment documentation
Collating adversary attributes and characteristics
Adjusting collated adversary attributes and characteristics to take account of policy factors
Tailoring adversary attributes and characteristics to specific facilities and activities
Finalizing and establishing the design basis threat
Developing a representative threat statement
Threats within and beyond the design basis threat
7. USE OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS
Performance based regulatory approach
Prescriptive regulatory approach
Combined approach
Developing attack scenarios
8. MAINTENANCE OF THE VALIDITY AND REVIEW OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION AND OF THREAT STATEMENTS
Responding to new and emerging threats
AppendixA MODEL DESIGN BASIS THREAT
REFERENCES
GLOSSARY