Reasons To Be On High Alert When Securing Nuclear Sites Through Decommissioning
Few targets present a more alarming prospect for a cyber attack than a nuclear power plant. From stolen state secrets to national blackouts and the spectre of a radiation leak, there are many disturbing possibilities.
But while we naturally think of the risk to an active facility, decommissioned sites represent a hidden cyber threat. there are good reason why decommissioned nuclear sites remain targets for cyber threats and why facilities need to ensure long-term security as they shut down.
The UK is on track to decommission nearly half of its nuclear capacity by the end of this year, and the energy landscape around the world is undergoing a similar shift. But while attention often turns to new reactors and clean energy goals, the sites being retired still carry considerable cyber risk.
It’s easy to assume the risk dissipates once a nuclear plant stops producing energy. Why is that not the case?That’s a really common assumption, but unfortunately, inactive sites are still on the radar for threat actors.
These facilities still contain incredibly valuable data such as schematics, operational records, transport plans for nuclear waste, as well as the personnel files that are common targets in any attack. There’s also a physical threat factor, as some sites still hold radiological materials that are yet to be removed.
On top of that, these facilities stay in a transitional state for decades. During that extended time, they retain many features of live critical infrastructure, while the level of staffing is reduced once energy production stops.
So, there’s plenty of motivation from a threat perspective. Nation-state actors, in particular, are very interested in anything related to nuclear operations. While attention might shift to newer projects, decommissioned sites are still very much of interest for threat actors..
It's also important to consider just how many of these sites there are – in the UK, nearly half of all nuclear facilities are scheduled for shutdown this year, for example. This is an increasingly well-understood risk in the energy industry, which is why the Government’s Nuclear Decommissioning Authority (NDA) recently moved to set up a cybersecurity hub.
So, what kind of cybersecurity challenges come up during decommissioning that might not be obvious?
There are a few that stand out. One of the biggest is the impact of downsizing. Once a site is offline, staffing and budgets naturally shrink. That’s understandable, but it also means fewer eyes on the systems and potentially less day-to-day oversight of security. The risk doesn’t go away, but active threats can become easier to miss.
Then you’ve got the technology itself. Most of these sites rely on legacy operational technology (OT) systems, such as supervisory control and data acquisition (SCADA) and programmable logic controllers (PLCs), which weren’t typically built with cybersecurity front of mind.
Such OT infrastructure is often hard to update and difficult to monitor using standard tools designed for IT networks. Even if they’re air-gapped, teams still need to extract telemetry data or push updates. That creates opportunities for unintended exposure, especially if safeguards are outdated or not rigorously followed.
Another key point is the number of external contractors involved. Decommissioning is a complex process that brings in a rotating cast of third-party specialists in and out of site. Each one likely brings their own devices, software tools and personnel, creating a larger attack surface that must be managed with rigorous access control, secure onboarding and background checks. With scaled-back teams, it’s easier for those risks to slip through the cracks.
Removable media often gets used in air-gapped environments. How can sites manage that risk effectively?
It’s a tricky one because you can’t just stop using removable media. For many of these environments, it’s the only way to transfer data or install updates in and out of air-gapped and highly segmented OT networks.
But every USB drive or external hard drive you bring could contain a potential risk. You have to assume it could carry malware, whether that’s intentional or accidental.
The good news is there are practical solutions. It starts with replacing basic antivirus scans with multi-engine scanning. Using several AV engines in parallel boosts your chances of catching advanced or hidden threats. You can also add behavioural sandboxes to see how files act in a controlled space, particularly effective in finding previously unknown threats that do not yet have an AV signature.
Then there’s Content Disarm and Reconstruction, or CDR. Rather than just flagging risky files, CDR actively sanitises all files, removing any active content while keeping the files usable. It’s a safer, more effective way to neutralise threats without disrupting work
Automated media scanning kiosks make all of this manageable at scale as again, there might be a lot of people coming and going on site, so any security processes need to be built to manage this.
Kiosks process incoming media quickly and can be linked to managed file transfer systems for secure tracking. That means facilities can stay compliant and protected without slowing things down. With decommissioning already being a long, resource-intensive project, this efficiency is really important.
What else can be done to keep these sites secure without putting unnecessary barriers in the way of progress?
That balance is really important. You don’t want security to be a bottleneck, but you also can’t afford to relax just because the site isn’t producing energy anymore. The best approach is to ensure security is part of the decommissioning process itself.
Specialist tools are really important here since many legacy OT systems aren’t compatible with traditional endpoint protection. Decommissioning projects need to ensure they have solutions that are designed to monitor activity and spot anomalies in OT systems.
Secure workflows also play a big role. Managed secure file transfer tools help you control and track data movement, while encryption and data loss prevention keep sensitive information protected.
Data diodes are another powerful tool for segmenting and controlling how and where data is able to flow inside the OT network. These are hardware devices that physically enforce a unidirectional data flow, ensuring that traffic flows only from one network to another, making it impossible to inject data or exert command and control (C2) necessary for remotely orchestrated attacks. Such controls should all be tied into the removable media data security.
In the end, the goal is to treat decommissioned sites with the same level of security rigour as operational ones. That mindset shift is key, because in the eyes of threat actors, these sites are still tantalisingly valuable and potentially vulnerable.
James Neilson is SVP International at OPSWAT
Image: Jasom Hu
You Might Also Read:
The UK Needs To Move Faster On Nuclear Energy Cybersecurity:
If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.
- Individual £5 per month or £50 per year. Sign Up
- Multi-User, Corporate & Library Accounts Available on Request
- Inquiries: Contact Cyber Security Intelligence
Cyber Security Intelligence: Captured Organised & Accessible