Measures

M01

Read More

FencesAndWalls

M03

Read More

CameraSurveillance

M02

Read More

MotionDetectors

M04

Read More

Patrols

M05

Read More

FloodProtection

M06

Read More

BarredWindows

M07

Read More

BinaryContacts

M08

Read More

SecureDoorsAndWindows

M09

Read More

EntranceAccessControl

M10

Read More

SecureLocks

M11

Read More

DiscreetAppearance

M12

Read More

SupervisionOfExternals

M13

Read More

SmokeDetectors

M14

Read More

ContainmentStructures

M15

Read More

RawWaterPipelineProtection

M16

Read More

SourceWaterQualityControl

M17

Read More

WatershedProtection

M18

Read More

InflowAndBackflowPrevention

M19

Read More

FiltersInAerationProcesses

M20

Read More

PressureAndFlowSensors

M21

Read More

OscillationSensors

M22

Read More

ValvePositionSensors

M23

Read More

LevelSensors

M24

Read More

AutomatedValveControl

M25

Read More

OperatingParameterSurveillance

M26

Read More

ProcedureForPersonnelChanges

M27

Read More

EmployeesTrainings

M28

Read More

SecurityCheckOfEmployees

M29

Read More

EmergencyPlans

M30

Read More

RedundantAssetsAndInfrastructures

M31

Read More

DistributedEnergySupply

M32

Read More

EmergencyGenerators

M33

Read More

AdditionalStorageCapacity

M34

Read More

WaterIntakeAdaption

M35

Read More

WaterQualityOnlineSurveillance

M36

Read More

WaterTreatmentControl

M37

Read More

WaterQualityOfflineSurveillance

M38

Read More

MonitoringAndControlOfDistributionSystem

M39

Read More

WaterNetworkInterventionsForWaterSupplyRecovery

M40

Read More

AdditivesQualityCheck

M41

Read More

InfrastructureAndAssetInspections

M42

Read More

InformationSecurityGuidelines

M43

Read More

InformationSecurityManagementSystem

M44

Read More

PasswordSecurity

M45

Read More

TwoFactorAuthentification

M46

Read More

RestrictedAccesToITSytem

M47

Read More

NonManipulationConnectionTool

M48

Read More

CryptographicProcesses

M49

Read More

DataBackups

M50

Read More

NetworkSeparation

M51

Read More

AppropriateLayingOfWires

M52

Read More

ServerRoomSetup

M53

Read More

MirroredSCADA

M54

Read More

DataIntegrityCheck

M55

Read More

MalwareProtectionGuidelines

M56

Read More

MalwareProtectionSoftware

M57

Read More

PatchAndChangeManagement

M58

Read More

NetworkTrafficAnalysis

M59

Read More

SecurityOfWirelessNetworks

M60

Read More

SoftwareManagement

M61

Read More

MobileDeviceUsageRules

M62

Read More

DeletionAndDestructionOfDataCarriers

M63

Read More

SecureOutsourcing

M64

Read More

Documentation

M65

Read More

IdentificationClassificationAndRiskAssessmentTool

Measures

Measure ID Name
M01 FencesAndWalls
M03 CameraSurveillance
M02 MotionDetectors
M04 Patrols
M05 FloodProtection
M06 BarredWindows
M07 BinaryContacts
M08 SecureDoorsAndWindows
M09 EntranceAccessControl
M10 SecureLocks
M11 DiscreetAppearance
M12 SupervisionOfExternals
M13 SmokeDetectors
M14 ContainmentStructures
M15 RawWaterPipelineProtection
M16 SourceWaterQualityControl
M17 WatershedProtection
M18 InflowAndBackflowPrevention
M19 FiltersInAerationProcesses
M20 PressureAndFlowSensors
M21 OscillationSensors
M22 ValvePositionSensors
M23 LevelSensors
M24 AutomatedValveControl
M25 OperatingParameterSurveillance
M26 ProcedureForPersonnelChanges
M27 EmployeesTrainings
M28 SecurityCheckOfEmployees
M29 EmergencyPlans
M30 RedundantAssetsAndInfrastructures
M31 DistributedEnergySupply
M32 EmergencyGenerators
M33 AdditionalStorageCapacity
M34 WaterIntakeAdaption
M35 WaterQualityOnlineSurveillance
M36 WaterTreatmentControl
M37 WaterQualityOfflineSurveillance
M38 MonitoringAndControlOfDistributionSystem
M39 WaterNetworkInterventionsForWaterSupplyRecovery
M40 AdditivesQualityCheck
M41 InfrastructureAndAssetInspections
M42 InformationSecurityGuidelines
M43 InformationSecurityManagementSystem
M44 PasswordSecurity
M45 TwoFactorAuthentification
M46 RestrictedAccesToITSytem
M47 NonManipulationConnectionTool
M48 CryptographicProcesses
M49 DataBackups
M50 NetworkSeparation
M51 AppropriateLayingOfWires
M52 ServerRoomSetup
M53 MirroredSCADA
M54 DataIntegrityCheck
M55 MalwareProtectionGuidelines
M56 MalwareProtectionSoftware
M57 PatchAndChangeManagement
M58 NetworkTrafficAnalysis
M59 SecurityOfWirelessNetworks
M60 SoftwareManagement
M61 MobileDeviceUsageRules
M62 DeletionAndDestructionOfDataCarriers
M63 SecureOutsourcing
M64 Documentation
M65 IdentificationClassificationAndRiskAssessmentTool