Year
2007
Abstract
Like all National Nuclear Security Administration (NNSA) facilities, the Y-12 National Security Complex (Y-12) is one the best-protected sites in the world. With the actions being taken by Y-12 in response to DOE Order 470.3a “Design Basis Threat (DBT) Policy,” the introduction of new technologies and methodologies into the design and construction of new and modified security features is an essential component to sustaining significant levels of security improvements. These security enhancements at Y-12, along with the consolidation of special nuclear materials through investments in newly constructed “purpose-built” facilities, are being implemented according to aggressive schedules. The NNSA Y-12 Site Office (YSO) and Y-12 Safeguards and Security (S&S) Managers recognized the importance of ensuring that (1) DBT analyses conclusions were appropriately developed and documented, (2) engineered design outputs were confirmed as meeting the design basis intent, and (3) the new and modified systems are maintained and properly operated within established requirements. As a result, a configuration management (CM) process with integrated work control processes was recognized as essential to the effective lifecycle management of key engineered security features. Institutional CM processes had been developed, implemented, and refined at Y-12 since the early 1990s to help ensure that nuclear facilities were operated within their approved safety authorization bases. Because of the proven rigor, discipline, and time-tested effectiveness of this process, a decision was made to develop and implement a mirror process for application to Y-12 security systems and security areas. This paper provides an overview of the overall CM process as tailored and implemented to Y-12 security systems and security areas. The paper covers application, system boundary descriptions and credited engineered features, change control process, equivalent component evaluations, temporary modifications and compensatory measures, and assessment methodologies. The implementation method, sequence of implementation, and the graded approach to CM application are also discussed.