FencesAndWalls
CameraSurveillance
MotionDetectors
Patrols
FloodProtection
BarredWindows
BinaryContacts
SecureDoorsAndWindows
EntranceAccessControl
SecureLocks
DiscreetAppearance
SupervisionOfExternals
SmokeDetectors
ContainmentStructures
RawWaterPipelineProtection
SourceWaterQualityControl
WatershedProtection
InflowAndBackflowPrevention
FiltersInAerationProcesses
PressureAndFlowSensors
OscillationSensors
ValvePositionSensors
LevelSensors
AutomatedValveControl
OperatingParameterSurveillance
ProcedureForPersonnelChanges
EmployeesTrainings
SecurityCheckOfEmployees
EmergencyPlans
RedundantAssetsAndInfrastructures
DistributedEnergySupply
EmergencyGenerators
AdditionalStorageCapacity
WaterIntakeAdaption
WaterQualityOnlineSurveillance
WaterTreatmentControl
WaterQualityOfflineSurveillance
MonitoringAndControlOfDistributionSystem
WaterNetworkInterventionsForWaterSupplyRecovery
AdditivesQualityCheck
InfrastructureAndAssetInspections
InformationSecurityGuidelines
InformationSecurityManagementSystem
PasswordSecurity
TwoFactorAuthentification
RestrictedAccesToITSytem
NonManipulationConnectionTool
CryptographicProcesses
DataBackups
NetworkSeparation
AppropriateLayingOfWires
ServerRoomSetup
MirroredSCADA
DataIntegrityCheck
MalwareProtectionGuidelines
MalwareProtectionSoftware
PatchAndChangeManagement
NetworkTrafficAnalysis
SecurityOfWirelessNetworks
SoftwareManagement
MobileDeviceUsageRules
DeletionAndDestructionOfDataCarriers
SecureOutsourcing
Documentation
IdentificationClassificationAndRiskAssessmentTool