SCADA for Nuclear in South Africa & Africa — A Cybersecurity‑First Playbook with ANSSI guidance

A practical guide to secure, resilient nuclear SCADA: governance, IEC 62443 zones & conduits, NNR & IAEA expectations, and ANSSI’s ICS best practices.

Contents

  1. Why this matters now
  2. Regulatory & standards landscape
  3. What makes nuclear SCADA different
  4. OT threat picture
  5. Reference architecture
  6. 12 controls that work
  7. Program & governance
  8. Where ANSSI fits
  9. 90‑day implementation roadmap
  10. FAQ

Why this matters now

Nuclear facilities depend on deterministic, high‑availability control systems. A cyber incident that degrades availability, integrity, or operator trust can escalate into safety risk, production loss, and regulatory non‑compliance. Across Africa, utilities and EPCs are modernizing OT, extending plant lifetimes, and planning for future capacity—making robust OT cybersecurity essential.

The regulatory & standards landscape (Africa / South Africa)

References: NNR · IAEA · IEC · ANSSI

What makes nuclear SCADA different

  1. Safety is paramount: security controls must not compromise deterministic operation, trip setpoints, or human‑machine interface reliability.
  2. Long lifecycles & heterogeneity: mixed generations of PLC/DCS/SIS, patching constraints, and legacy protocols—so compensating controls matter.
  3. Tight regulation: regulators expect a programmatic approach, defense‑in‑depth, and protection of critical digital assets (CDAs).

OT threats we actually see

Reference architecture aligned to IEC 62443

1) Segmentation with zones & conduits

  • Separate Enterprise IT, Site DMZ, Plant DMZ, Operations (SCADA/DCS), and SIS into distinct zones.
  • Use monitored conduits (firewalls, data diodes, brokered services) with strict allow‑lists and protocol break‑points.

2) Plant & Operations DMZs

  • Terminate remote access, patch/content staging, anti‑malware updates, and historian replication in DMZ layers—not directly in control zones.

3) SIS isolation

  • Physically/logically isolate Safety Instrumented Systems; prefer one‑way telemetry; avoid shared admin paths with BPCS/SCADA.

4) Deterministic communications

  • Strict allow‑listing at L3/L4 and deep inspection for industrial protocols where feasible; time‑bounded remote sessions.

5) Trusted time & logging

  • Signed, centralized logs and secure time sources for forensics and compliance evidence.

12 cybersecurity controls that work in nuclear SCADA

  1. Asset inventory & CDA identification
  2. Hardening baselines for servers/HMIs/PLCs/engineering stations
  3. Strict RBAC & least privilege; MFA for elevated and remote tasks
  4. Application allow‑listing and controlled removable media
  5. Patch & vulnerability management with maintenance windows and compensating controls
  6. Network segmentation with IEC 62443 zones/conduits and DPI firewalls
  7. Secure remote access via jump hosts and session recording
  8. Change & configuration management for logic, graphics, and setpoints
  9. Backups & golden images—offline, tested, tamper‑evident
  10. OT anomaly detection integrated with a SOC
  11. Incident response runbooks coordinated with safety procedures (graded)
  12. Competency & drills for operators, maintainers, and third parties

Program & governance model (what regulators expect)

Where ANSSI fits (and why it helps Africa)

France’s ANSSI guide for Industrial Control Systems is a practical handbook used by utilities and OEMs. It stresses executive sponsorship, a structured deployment method, and OT‑specific compensating controls—highly applicable to African operators modernizing legacy fleets or planning new build.

Read more: ANSSI — Cybersecurity for Industrial Control Systems

Implementation roadmap (first 90 days)

Weeks 0–4 — Baseline & gaps

  • Asset inventory, CDA mapping, network walk‑downs
  • Quick wins: USB lockdown, remote access hardening

Weeks 5–8 — Reference architecture

  • Zone/conduit design, DMZs, logging/time, backup scheme
  • Define SOC integration and monitoring scope

Weeks 9–12 — Hardening & evidence

  • Apply baselines & allow‑listing
  • Test disaster‑recovery and run a tabletop incident drill
  • Compile a compliance pack mapped to regulatory expectations

FAQ

Do we need IEC 62443 certification to comply?

Not necessarily. Regulators expect a risk‑based program and defense‑in‑depth. IEC 62443 provides practical methods (zones, conduits, security levels) that help meet those expectations.

Can security controls disrupt deterministic operations?

Controls must be engineered for OT: staged updates, protocol break‑points, and allow‑listing reduce risk while protecting availability and integrity.

Where should remote access terminate?

At DMZ jump hosts with strong authentication, least privilege, and session recording—never directly inside control zones.