Understanding and Designing for Nuclear Material Security: Practical Approaches

Table of Contents

Nuclear material security represents one of the most critical challenges facing the global community in the 21st century. The protection of nuclear materials and facilities from theft, sabotage, unauthorized access, and malicious acts is essential not only for national security but also for international peace and stability. As nuclear technology continues to expand for peaceful purposes—including energy generation, medical applications, and scientific research—the imperative to implement robust security measures has never been more urgent. This comprehensive guide explores the fundamental principles, practical approaches, and design considerations necessary for establishing and maintaining effective nuclear material security systems.

The Global Framework for Nuclear Material Security

Responsibility for nuclear security rests entirely with each State. However, the international community has developed a comprehensive legal and regulatory framework to guide nations in protecting nuclear materials and facilities. The international regulatory framework for nuclear security relies mainly on the Convention on Physical Protection of Nuclear Material (CPPNM) and its Amendment; the Code of Conduct on the Safety and Security of Radioactive Sources (Code of Conduct) and its Guidance on the Import and Export of Radioactive Sources; the Safeguards Agreements and their Additional Protocols; the Nuclear Terrorism Convention; and the United Nations Security Council resolutions 1540 and 1373.

The Amendment to the CPPNM makes it legally binding for States Parties to protect nuclear facilities and material in peaceful domestic use, storage and transport. This expanded scope reflects the evolving understanding of nuclear security threats and the need for comprehensive protection measures throughout the entire lifecycle of nuclear materials.

The International Atomic Energy Agency (IAEA) plays a central role in promoting nuclear security worldwide. The organization has developed the Nuclear Security Series, a comprehensive collection of publications that provide guidance on all aspects of nuclear security. These publications range from fundamental principles to detailed technical guidance on specific security measures and technologies.

Understanding Nuclear Security Threats

Effective nuclear material security begins with a thorough understanding of potential threats. Nuclear security is defined as “the prevention of, detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities or associated activities.” These threats can manifest in various forms, each requiring specific countermeasures and protective strategies.

Categories of Adversaries

Adversaries posing a threat to nuclear materials and facilities can be separated into three classes—outsider, insider, and outsider in collusion with insider. Each category presents unique challenges for security system designers:

External Threats: Outside adversaries may attempt to gain unauthorized access to nuclear facilities or materials through force, stealth, or deception. These actors might range from terrorist organizations seeking to acquire nuclear materials for weapons development to criminal groups interested in theft for financial gain. These threats could manifest using the tactics of deceit, force, or stealth while infiltrating into facilities.

Insider Threats: Insiders are one or more individuals with authorized access to nuclear facilities or nuclear material who could attempt unauthorized removal or sabotage, or who could aid an external adversary to do so. Insider threats are particularly challenging because these individuals already possess legitimate access credentials, knowledge of security systems, and familiarity with facility operations. They may exploit their positions to bypass security measures or provide critical information to external adversaries.

Combined Threats: The most sophisticated and dangerous scenarios involve collusion between insiders and external adversaries. This combination leverages insider knowledge and access with external resources and capabilities, creating a formidable challenge for security systems.

Design Basis Threat

A cornerstone of effective nuclear security is the development of a Design Basis Threat (DBT). The national DBT recognizes these categories of adversaries and their capabilities as a comprehensive aspect of nuclear threat analysis. The DBT is a detailed characterization of the adversaries against which a physical protection system must be designed to protect. It includes information about adversary capabilities, motivations, tactics, and resources.

On the basis of the national Design Basis Threat, every facility prepares its own DBT for which it designs a Physical Protection System and gets concurrence from the nuclear regulator. This approach ensures that security measures are tailored to the specific threats facing each facility while maintaining consistency with national security standards. The DBT is reviewed when a very prominent and probable change in the threat scenario occurs.

Fundamental Principles of Physical Protection Systems

The physical protection system (PPS) at a nuclear facility consists of a range of nuclear security measures involving personnel, procedures and equipment. These systems are designed based on several fundamental principles that have been developed and refined over decades of experience in nuclear security.

Defense in Depth

Defense in depth is a fundamental security concept that involves implementing multiple layers of protection. Physical protection systems must employ defense in depth and follow a graded approach, increasing or decreasing with the potential threat to various materials and systems. This layered approach ensures that if one security measure fails or is compromised, additional barriers and controls remain in place to prevent unauthorized access or malicious acts.

The defense-in-depth strategy typically includes several concentric layers of protection, starting from the facility perimeter and extending inward to the most sensitive areas. Each layer incorporates detection, delay, and response capabilities, creating multiple opportunities to identify and interrupt adversary actions before they can achieve their objectives.

The Graded Approach

The U.S. Nuclear Regulatory Commission (NRC) and its licensees use a graded approach for physical protection, consistent with the significance of the facilities or material to be protected. This principle recognizes that not all nuclear materials and facilities pose the same level of risk. Security measures should be proportionate to the potential consequences of theft or sabotage.

Materials are typically categorized based on their potential use in nuclear weapons or radiological dispersal devices. Higher-category materials require more stringent security measures, while lower-risk materials may be protected with less intensive controls. This approach allows for efficient allocation of security resources while maintaining appropriate protection levels across all nuclear activities.

Key Functions: Detection, Delay, and Response

The physical protection system (PPS) of any facility depends on a proper combination of three factors: technology, procedures, and security personnel. These elements work together to fulfill the three essential functions of any effective physical protection system:

Detection: Detection is a process in a physical protection system that begins with sensing a potentially malicious or otherwise unauthorized act and that is completed with the assessment of the cause of the alarm. Detection systems must be capable of identifying unauthorized activities quickly and reliably, distinguishing between genuine threats and false alarms. Modern detection systems incorporate various technologies, including motion sensors, video surveillance, access control systems, and radiation detection equipment.

Delay: Access delay is the element of a physical protection system designed to increase adversary penetration time for entry into and/or exit from the nuclear facility. Delay mechanisms provide critical time for security forces to respond to detected intrusions. Physical barriers such as fences, walls, doors, locks, and vaults serve as delay elements. The effectiveness of delay measures is measured in the time they add to an adversary’s timeline, allowing response forces to arrive before the adversary can complete their objective.

Response: The response function involves the deployment of security personnel or law enforcement to interrupt and neutralize adversary actions. A uniformed individual armed with a firearm whose primary duty is the protection of nuclear material against theft, the protection of a plant against radiological sabotage, or both. Response capabilities must be sufficient to counter the Design Basis Threat, with adequate training, equipment, and procedures to handle various scenarios.

Designing Effective Physical Protection Systems

This publication provides comprehensive detailed guidance for States, competent authorities and operators on how to implement the recommendations and implementing guidance of existing IAEA Nuclear Security Series publications for an effective physical protection system (PPS) for nuclear facilities and nuclear materials in use and storage. It provides further technical detail on how to design and evaluate a PPS, with respect to the selection and integration of appropriate, effective physical protection measures (including equipment).

Risk Assessment and Threat Analysis

The foundation of any effective physical protection system is a comprehensive risk assessment. This process involves identifying potential threats, assessing vulnerabilities, and evaluating the consequences of successful attacks. Risks in nuclear power plants are studied according to three principles: the threat of the adversary, the vulnerability of defence equipment and the criticality of nuclear materials and nuclear facilities.

Risk assessment should be an ongoing process, regularly updated to reflect changes in the threat environment, facility operations, and available security technologies. The assessment must consider both external and internal threats, as well as the potential for collusion between insiders and external adversaries.

Physical Protection Zones

Physical Protection Areas graded to provide defense-in-depth with barriers and controls for the Exclusion Area, Protected Area, Vital Area, and Material Access Area. Each zone serves a specific purpose in the overall security architecture:

  • Exclusion Area: The outermost boundary of the facility, typically marked by fencing or natural barriers, where public access is restricted
  • Protected Area: An area within the exclusion area that contains nuclear materials or vital equipment, with controlled access points and enhanced surveillance
  • Vital Area: The protection system must establish a vital area to define a boundary around nuclear personnel, equipment and materials in nuclear facilities. These are areas containing equipment or materials whose sabotage could directly or indirectly lead to unacceptable radiological consequences
  • Material Access Area: The most restricted zone, where nuclear materials are stored or processed, with the highest level of access control and monitoring

Technology Integration

Modern physical protection systems leverage a wide array of technologies to enhance detection, delay, and response capabilities. Physical protection systems subject matter experts use specialized facilities to develop new and evaluate currently available physical and cyber security technologies. Science-based, unbiased findings help inform U.S. and international partners seeking effective, cost-efficient security designs that address current and emerging threats.

Intrusion Detection Systems: Intrusion Detection to notify the site’s security force of a potential intruder. Modern systems employ various sensor technologies, including microwave, infrared, fiber optic, and video analytics. These systems must be carefully designed to minimize false alarms while maintaining high detection probability.

Assessment Systems: Intrusion Alarm Assessment to distinguish between false or nuisance alarms and actual intrusions and to initiate response. Video surveillance systems with advanced analytics capabilities allow security personnel to quickly verify the cause of alarms and determine appropriate responses. High-resolution cameras, thermal imaging, and intelligent video analysis enhance assessment capabilities in various environmental conditions.

Access Control Systems: Electronic access control systems manage and monitor entry to protected areas. These systems typically incorporate multiple authentication factors, such as identification cards, biometric readers, and personal identification numbers. Access control systems maintain detailed logs of all entry and exit events, providing valuable data for security analysis and investigations.

Physical Barriers: Barriers serve as critical delay elements in physical protection systems. These include perimeter fencing, vehicle barriers, reinforced doors, bullet-resistant glass, and vault structures. The selection and design of barriers must consider the Design Basis Threat and the required delay time to allow for effective response.

System Integration and Coordination

An effective physical protection system requires seamless integration of all security elements. Detection systems must communicate with assessment capabilities, which in turn must trigger appropriate response protocols. The coordination between the guards and response forces during a nuclear security event should be regularly exercised. In addition, other facility personnel should be trained and prepared to act in full coordination with the guards, response forces and other response teams for implementation of the plans.

Central alarm stations serve as the nerve center of integrated security systems, receiving and processing information from all detection and assessment systems. Security personnel in these facilities must be trained to interpret alarm data, coordinate response activities, and communicate with law enforcement and emergency services when necessary.

Personnel Security and Nuclear Security Culture

While technology plays a crucial role in nuclear material security, human factors remain equally important. Personnel security measures and the development of a strong nuclear security culture are essential components of any comprehensive security program.

Personnel Screening and Vetting

Given the serious threat posed by insiders, rigorous personnel screening and vetting processes are essential. These processes typically include background investigations, psychological evaluations, financial reviews, and ongoing monitoring. Individuals granted access to nuclear materials or sensitive information must demonstrate trustworthiness and reliability.

Personnel security programs should implement the principle of “need to know,” ensuring that individuals have access only to the information and materials necessary for their assigned duties. Regular re-evaluation of personnel with access to sensitive areas helps identify potential security concerns before they can be exploited.

Training and Qualification

Security personnel require comprehensive training to effectively operate and maintain physical protection systems. Training programs should cover system operation, threat recognition, response procedures, and emergency protocols. Training courses and technical exchanges in collaboration with operators, regulators, and researchers around the world.

Regular drills and exercises are essential for maintaining readiness and identifying weaknesses in security procedures. These exercises should simulate realistic scenarios based on the Design Basis Threat, testing the coordination between detection, delay, and response elements.

Developing Nuclear Security Culture

Nuclear security culture plays an important role in ensuring that individuals, organizations and institutions remain vigilant and that sustained measures are taken to prevent and combat the threat of sabotage. A strong security culture goes beyond compliance with regulations and procedures; it represents a fundamental commitment to security at all organizational levels.

Key elements of a robust nuclear security culture include leadership commitment, individual responsibility and accountability, continuous improvement, and open communication about security concerns. Organizations should foster an environment where personnel feel empowered to report security issues without fear of reprisal and where security considerations are integrated into all decision-making processes.

Evaluating Physical Protection System Effectiveness

Ensuring that the PPS is operating as designed is crucial for the security of the nuclear material and of the facility itself. Regular evaluation of physical protection systems is essential to verify that they continue to meet performance requirements and can effectively counter the Design Basis Threat.

Performance Testing

Performance testing is testing of the physical protection measures and the physical protection system to determine whether they are implemented as designed; adequate for the proposed natural, industrial, and threat environments; and in compliance with established performance requirements. This testing should be conducted regularly and whenever significant changes are made to the security system or facility operations.

Performance testing is used to validate the ability of a PPS to meet performance requirements, but it may also be necessary when a prescribed measure has to meet a technical criterion or specification. Testing methodologies include component testing, system testing, and integrated system evaluations.

Scenario Analysis and Path Analysis

Scenarios are hypothetical sets of conditions and sequences of events constructed for the purpose of PPS evaluations. A scenario analysis is the process of using paper models, tabletop exercises, two dimensional and three dimensional computer simulations, and other evaluation methods to evaluate these scenarios.

Path analysis examines the various routes an adversary might take to reach target materials or sabotage critical systems. Analysts can more easily evaluate PPS with larger facilities and more intricate adversary paths with the help of the multi-path analysis algorithm. This analysis helps identify vulnerabilities and optimize the placement of detection, delay, and response elements.

Probability of Interruption

The model combines detection, delay, response and communication values to calculate the probability of interruption. The analysis of the physical protection system effectiveness is based on the determination of the probability of interruption and the probability of neutralization of the adversary using several models or calculation codes.

The probability of interruption represents the likelihood that security forces will detect an intrusion and respond in time to prevent the adversary from completing their objective. This metric depends on the effectiveness of detection systems, the delay time provided by physical barriers, and the response time of security forces. Regular evaluation of these parameters helps ensure that the physical protection system maintains adequate performance levels.

Security During Transport of Nuclear Materials

Kumar specifically focuses on the challenge of transporting nuclear and radiological materials safely. The transport of nuclear materials presents unique security challenges, as materials must be protected while in transit through areas that may not be under the direct control of the facility operator.

Transport Security Measures

During international transport of nuclear material, particularly Category 1 material, the responsibility for physical protection measures should be the subject of written arrangements accepted by the states concerned. The relevant competent authority of the shipping, receiving, and transit states, and the flag state of the conveyance should establish specific measures to ensure the continued integrity of the shipment, and to ensure that responsibility for response planning and capabilities is defined and fulfilled.

Transport security typically involves multiple layers of protection, including secure packaging, armed escorts, tracking systems, and communication capabilities. Transport routes should be carefully planned to minimize risks, and contingency plans must be in place to address potential security incidents during transit.

Secure transport containers are designed to resist unauthorized access and provide containment in the event of accidents. These containers incorporate tamper-indicating devices and may include active tracking systems that allow real-time monitoring of shipment location and status.

Contingency Planning and Response to Nuclear Security Events

Contingency (emergency) plans to respond to unauthorized removal of nuclear material or sabotage of nuclear facilities or nuclear material, or attempts thereof, should be prepared and appropriately exercised by all licence holders and authorities concerned. The authority should ensure that the operator prepares contingency plans to effectively counter the threat assessment or design basis threat taking actions of response forces into consideration.

Emergency Response Planning

Comprehensive contingency plans are essential for responding effectively to nuclear security events. These plans should address various scenarios, including attempted theft, sabotage, and insider threats. The operator’s contingency plan should be approved by the State’s competent authority as a part of the security plan.

Emergency response plans must clearly define roles and responsibilities, establish communication protocols, and outline procedures for coordinating with external agencies. Plans should be regularly tested through drills and exercises to ensure that all personnel understand their responsibilities and can execute them effectively under stress.

Coordination with External Agencies

In addition, local, State, and Federal agencies may provide offsite assistance, as necessary. Effective response to serious nuclear security events often requires coordination with law enforcement, emergency services, and other government agencies. Memoranda of understanding and mutual aid agreements should be established in advance to facilitate rapid and effective response.

Regular joint exercises with external response agencies help ensure that all parties understand their roles and can work together effectively during actual emergencies. These exercises also provide opportunities to identify and address potential coordination challenges before they arise in real situations.

The authors also identify new technologies and practices to mitigate threats to facilities and materials. The field of nuclear security continues to evolve, with new technologies and approaches being developed to address emerging threats and enhance protection capabilities.

Advanced Detection Technologies

Emerging detection technologies include advanced radiation detection systems, artificial intelligence-powered video analytics, and sophisticated sensor networks. These technologies offer improved detection capabilities while reducing false alarm rates, allowing security personnel to focus on genuine threats.

Machine learning algorithms can analyze patterns of behavior and identify anomalies that may indicate security concerns. These systems can process vast amounts of data from multiple sensors and cameras, providing security personnel with actionable intelligence and early warning of potential threats.

Cyber Security Integration

As physical protection systems become increasingly reliant on digital technologies, cyber security has emerged as a critical concern. Modern security systems must be protected against cyber attacks that could disable detection systems, manipulate access controls, or compromise surveillance capabilities.

Integrated cyber-physical security approaches recognize that physical and cyber security are interconnected and must be addressed holistically. Security architectures should incorporate defense-in-depth principles for both physical and cyber domains, with multiple layers of protection and continuous monitoring for both physical intrusions and cyber threats.

Modeling and Simulation

Advanced modeling and simulation capabilities to mirror external facilities and systems, enabling partners to add, delete, move, and test technologies for optimum performance and cost effectiveness. Sophisticated simulation tools allow security designers to test various configurations and evaluate their effectiveness against different threat scenarios without the cost and complexity of physical implementation.

The Integrated Analysis and Design Platform (IPAD) provides a fast and convenient analysis of the physical protection system. The use of IPAD gives a clear identification of the adversary’s path and vulnerable components. These tools enable continuous improvement of security systems through data-driven analysis and optimization.

Regulatory Oversight and Compliance

The NRC establishes the regulatory requirements and assesses compliance, and licensees are responsible for providing the protection. Effective regulatory oversight is essential for ensuring that nuclear facilities maintain adequate security measures and comply with established standards.

Inspection and Assessment

The starting point of the methodology is collecting information on the existing national regulatory framework, policies and guidance on which the PPS is based. Information of interest may include inspection reports, corrective actions and recommendations from previous evaluations of the PPS.

Regular inspections by regulatory authorities verify that facilities maintain required security measures and address identified deficiencies. Inspection programs should be risk-informed, focusing resources on facilities and activities that pose the greatest security concerns.

Continuous Improvement

The regime should be reviewed and updated regularly to reflect changes in the threat and advances made in the physical protection approaches, systems, and technology, and also the introduction of new types of nuclear material and nuclear facilities. Security programs must evolve to address changing threats, incorporate new technologies, and apply lessons learned from security incidents and exercises.

Feedback mechanisms should be established to capture insights from security personnel, incorporate findings from evaluations and exercises, and integrate information about emerging threats. This continuous improvement process ensures that security systems remain effective over time and adapt to evolving challenges.

Cost-Effectiveness and Resource Optimization

While security is paramount, practical considerations of cost and resource availability must be addressed. Effective security system design seeks to optimize protection while making efficient use of available resources.

Risk-Informed Approaches

Risk-informed security approaches allocate resources based on the level of risk posed by different materials, facilities, and activities. This allows organizations to focus their most intensive security measures on the highest-risk areas while maintaining appropriate protection for lower-risk activities.

Cost-benefit analysis can help identify security measures that provide the greatest risk reduction for the resources invested. However, security decisions should not be based solely on cost considerations; certain minimum security standards must be maintained regardless of cost.

Technology Selection

Rigorous, unbiased field testing of individual and systems-based commercial-off-the-shelf (COTS) security components in real-world situations, inclement weather, and harsh terrains. Careful evaluation of available technologies helps ensure that selected systems meet performance requirements while providing good value.

Life-cycle cost analysis should consider not only initial acquisition costs but also ongoing maintenance, training, and replacement expenses. Reliability and maintainability are critical factors, as security systems must function effectively over extended periods with minimal downtime.

International Cooperation and Information Sharing

It also provides for expanded cooperation between and among States regarding rapid measures to locate and recover stolen or smuggled nuclear material, mitigate any radiological consequences of sabotage, and prevent and combat related offences. Nuclear security is inherently an international concern, as threats can cross borders and security incidents in one country can have global implications.

Bilateral and Multilateral Cooperation

NNSA and its national laboratories, through decades of experience securing domestic and international nuclear material, facilities and in transport, lead international efforts to prevent the theft and sabotage of nuclear material and facilities worldwide through bilateral and multilateral capacity building, technical exchanges and innovation.

International cooperation programs facilitate the sharing of best practices, technical expertise, and lessons learned. These programs help countries develop and enhance their nuclear security capabilities, particularly in nations that are developing nuclear programs or have limited resources for security infrastructure.

Information Exchange

While security information must be carefully protected, appropriate information sharing among trusted partners can enhance overall security. Information about emerging threats, new technologies, and effective security practices can help all nations improve their protection capabilities.

International organizations such as the IAEA facilitate information exchange through conferences, training programs, and technical publications. These mechanisms allow security professionals to learn from each other’s experiences and stay informed about developments in the field.

Practical Implementation Considerations

Translating security principles and requirements into effective operational systems requires careful attention to practical implementation details.

Balancing Security and Operations

Security measures must be designed to protect nuclear materials and facilities without unduly impeding legitimate operations. Overly restrictive security procedures can reduce operational efficiency and may lead personnel to seek workarounds that compromise security. Effective security design seeks to integrate protection measures seamlessly into operational workflows.

Stakeholder engagement during the design process helps ensure that security measures are practical and sustainable. Input from operations personnel, maintenance staff, and other facility workers can identify potential implementation challenges and help develop solutions that meet both security and operational requirements.

Maintenance and Sustainability

Security systems require ongoing maintenance to ensure continued effectiveness. Preventive maintenance programs should be established for all security equipment, with regular testing to verify proper operation. Spare parts and backup systems should be available to minimize downtime when equipment failures occur.

Documentation of security systems, procedures, and training programs is essential for maintaining institutional knowledge and ensuring consistency over time. As personnel change, comprehensive documentation helps new staff understand and properly operate security systems.

Adaptability and Flexibility

Security systems should be designed with flexibility to adapt to changing circumstances. Modular designs allow for upgrades and modifications as new technologies become available or threats evolve. Security architectures should accommodate future expansion or changes in facility operations without requiring complete redesign.

Key Recommendations for Effective Nuclear Material Security

Based on international best practices and lessons learned from decades of experience, several key recommendations emerge for organizations seeking to establish or enhance nuclear material security programs:

  • Develop a comprehensive threat assessment: Understand the full spectrum of potential threats, including external adversaries, insiders, and combined threats. Establish a Design Basis Threat that reflects realistic adversary capabilities and update it regularly.
  • Implement defense in depth: Use multiple layers of protection, ensuring that no single point of failure can compromise security. Integrate detection, delay, and response elements at each layer.
  • Apply a graded approach: Allocate security resources based on the risk posed by different materials and activities. Focus the most intensive measures on the highest-risk areas while maintaining appropriate protection throughout.
  • Integrate technology and personnel: Recognize that effective security requires both advanced technology and well-trained, motivated personnel. Invest in both technical systems and human capital.
  • Foster a strong security culture: Develop organizational values and behaviors that prioritize security at all levels. Encourage reporting of security concerns and continuous improvement.
  • Conduct regular evaluations: Test security systems through performance testing, scenario analysis, and exercises. Use evaluation results to identify weaknesses and drive improvements.
  • Plan for contingencies: Develop comprehensive emergency response plans and exercise them regularly. Establish coordination mechanisms with external response agencies.
  • Stay current with evolving threats and technologies: Monitor developments in both threat capabilities and security technologies. Update security systems to address new challenges and leverage new capabilities.
  • Engage in international cooperation: Participate in information sharing and capacity building programs. Learn from the experiences of other nations and contribute to global security efforts.
  • Ensure regulatory compliance: Maintain awareness of applicable regulations and standards. Work cooperatively with regulatory authorities to ensure compliance and address identified deficiencies.

Conclusion

Nuclear material security is a complex, multifaceted challenge that requires sustained commitment, adequate resources, and continuous attention. A single nuclear security event at a nuclear power plant anywhere in the world would have a ripple effect on the viability of the entire nuclear power industry. Preventing nuclear terrorism, material theft, and radiological sabotage is paramount to national energy security.

The principles and practices outlined in this article provide a foundation for understanding and implementing effective nuclear material security. However, each facility and situation is unique, requiring careful analysis and tailored solutions. Success depends on the integration of sound security principles, appropriate technologies, well-trained personnel, and strong organizational commitment.

As nuclear technology continues to advance and expand globally, the importance of robust security measures will only increase. Effective nuclear security enables the peaceful use of nuclear energy, which helps to advance United Nations (UN) sustainable development goals. Incorporating nuclear security concepts and technologies proactively into the next generation of nuclear energy technology and infrastructure will help buyer countries to better meet their international obligations.

By applying the comprehensive approaches described in this guide, organizations can develop and maintain physical protection systems that effectively safeguard nuclear materials and facilities against the full spectrum of threats. This not only protects individual facilities but contributes to global security and enables the continued peaceful use of nuclear technology for the benefit of humanity.

For additional information and detailed technical guidance, organizations should consult the IAEA Nuclear Security Series publications, available at https://www.iaea.org/topics/security, as well as national regulatory guidance and international best practice documents. The U.S. Nuclear Regulatory Commission also provides extensive resources on physical protection at https://www.nrc.gov/security/domestic/phys-protect. Organizations involved in nuclear security research and development, such as Sandia National Laboratories’ Nuclear Security Technology Complex (https://www.sandia.gov/nstc/), offer valuable technical expertise and testing capabilities to support security system development and evaluation.