Critical Infrastructure Security
,
Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
Four Principles Positioning the Nuclear Ecosystem for Long-Term Cyber Resilience

Last month, the U.K. National Cyber Security Centre in partnership with the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation and other international partners released a new guidance, titled “Secure Connectivity Principles for Operational Technology.”
See Also: On-Demand | NYDFS MFA Compliance: Real-World Solutions for Financial Institutions
Highlighting eight foundational security principles, the guidance has been designed to help organizations “mitigate exposed and insecure connectivity and protect networks from highly capable and opportunistic cyberthreat actors, including nation state-sponsored actors,” according to a CISA press release.
The advisory arrives amid rapidly intensifying IT-OT convergence – and as threat actors increasingly target OT environments as primary objectives, rather than treating OT compromise merely as a gateway into IT networks. In the past 12 months, 22% of critical infrastructure organizations suffered a security incident impacting their OT and ICSs, according to SANS Institute’s State of ICS/OT Security 2025 Survey.
The SANS survey also found that “unauthorized external access accounted for half of all incidents, yet only 13% of organizations have fully implemented advanced controls such as session recording or ICS/OT-aware access.” Notably, joint research published by Cyolo and Ponemon Institute in 2024 stated that a wide array of third-party vendors and contractors are being given remote access to OT environments. The survey also found that 73% of industrial organizations permit third-party access to OT environments, with an average of 77 third parties per organization granted such access.
From a risk perspective, this proliferation of third-party OT access provisioning is concerning because anywhere from a third to half of all critical infrastructure security breaches can be attributed to external vendors, according to SecurityScorecard research. Despite these increasing third-party remote access permissions in OT environments, the SANS survey contends that “fewer than 15% of organizations have advanced remote access controls in place.”
With state-backed espionage actors like China’s Volt Typhoon seeking to preposition themselves in critical infrastructure networks, combined with the rising threat of various Russian hacktivist groups targeting the same organizations, the new wave of nuclear energy innovators cannot ignore the security disconnect identified by the SANS survey. Although nuclear energy installations have traditionally implemented the most stringent and risk-averse cybersecurity controls relative to other critical sectors, a new generation of nuclear technologists are embracing design concepts that radically amplify the attack surface.
As novel microreactor and advanced reactor programs explore remote operations and expanded access for staff and contractors, they cannot allow security deficits in converged IT and OT network operations to undermine the future of energy. Nuclear innovators are keen on communication technologies that will enable remote operations – cloud and satellite – that interface directly with ICS and OT environments. While such approaches promise operational flexibility and efficiency, they also introduce myriad new attack paths, escalating new connectivity risks that must be addressed early through system design, licensing considerations and cybersecurity strategy.
U.S.-based cyber-physical security company InfraShield is tracking evolving OT and industrial control system attack trends for its nuclear customer base and has distilled a number of crucial security takeaways for the industry from the NCSC-led guidance. Based on NCSC’s latest guidance, four principles have emerged as most relevant to the rapidly emerging small modular reactor, or SMR, and microreactor ecosystem. Ultimately, the guidance reinforces a transition the nuclear industry is already experiencing: Cybersecurity is no longer merely a compliance requirement – it is a foundational design decision that shapes resilience, cost and long-term operability. While many of the principles align with established nuclear practices, the NCSC’s framing underscores where utilities and developers can gain a strategic advantage by making the right security choices from the outset.
Supply-Chain Influence Matters More Than Ever
Principle 1 emphasizes balancing risk and opportunity by asking a simple question: Can you influence the security controls built into your supplier’s solution? Nuclear has long understood supply-chain controls, but this becomes mission-critical for new reactor deployments where architectures are still being defined. For advanced reactors, cybersecurity baked into supplier designs avoids costly retrofits later and strengthens regulatory confidence. Early collaboration with a knowledgeable security partner can help utilities and reactor designers align system architectures with regulatory cybersecurity expectations before designs are finalized.
Adopting Modern, Secure Protocols Is Foundational Cyber Hygiene
Principle 4 of the NCSC’s guidance urges organizations to move from legacy industrial protocols to secure versions, for example, Modbus to Modbus Security and OPC DA to OPC UA. This principle serves as a timely reminder for nuclear operators. Protocol modernization is not just an IT best practice. This provision directly reduces the attack surface. Modbus – the most popular and most often exposed OT protocol – accounted for 57% of OT attacks in 2025, up from 40% in 2024, according to Forescout’s 2025 Threat Roundup report. While nuclear facilities often must wait for planned outages to implement protocol changes, incorporating these upgrades into life cycle management is a critical step in strengthening security without introducing operational disruption.
The OT Boundary Is the Front Line of Defense
Hardening the OT boundary, or Principle 5 as delineated by the NCSC, may be the most vital for SMR and microreactor defenders. The NCSC underscores that many OT systems are difficult to patch or replace, leading to the security boundary emerging as the primary defense against external threats. This directly aligns with nuclear defensive architecture principles and creates an opportunity to invest in modern, modular and replaceable boundary solutions, such as deterministic, unidirectional protections. This is where purpose-built solutions, like data diodes, can help deliver long-term security without adding operational complexity.
Microsegmentation and Visibility Are Emerging Best Practices
Principle 6 focuses on limiting the impact of compromise and specifically highlights microsegmentation as a best practice. Although U.S. nuclear regulations mandate network segmentation – but not microsegmentation or zero trust network access – the guidance highlights microsegmentation as a powerful approach to limit the impact of compromise in mixed-trust and legacy environments. Similarly, while centralized OT logging is not a nuclear mandate, the NCSC’s recommendation reflects where the industry is heading. As older OT devices are replaced, built-in logging and monitoring capabilities will increasingly be the norm.
Takeaway for Nuclear Leaders
The NCSC-led guidance doesn’t change nuclear regulations, but it signals where good cybersecurity design is headed. Utilities, SMRs and microreactors that align early with these principles will be better positioned to manage risk, control costs and support future regulatory expectations. For advanced reactors in particular, security by design will increasingly represent a competitive advantage, given the rapid pace of technological change shaping 21st-century industrial architectures.
In this environment, it is prudent to design for adaptability and composability from the outset, with engineering, operations and security stakeholders collaborating to assess how resilient and defensible their concepts will remain five, 10 and even 20 years after deployment.
