Within the SCOTT project, the security researchers investigating specifically how to secure connected infrastructures have decided to write a general recommendation methodology for simple good practices. The document, so-called a "Security Scan", is meant to be used as a sort of checklist of basics to ensure that the most common entry points, attack vectors, and typical oversights and mistakes, are avoided and covered. While non-exhaustive and clearly oriented toward the architectures considered in the SCOTT projects, we hope that through following this simple checklist, users of the document (and infrastructure designers) can make sure that their infrastructure and systems are answering the most common security questions and concerns