Ensure that SCADA assets are not directly connected to the Internet. Ensure that patches have been approved and deployed to SCADA systems. Anomaly detection systems to identify unexpected and/or unauthorised behaviors. Elaborate a role and permission matrix (RACI) and include intelligence (control location and activity hours).