Within the SCOTT project, the security researchers investigating specifically how to secure connected infrastructures have decided to write a general recommendation methodology for simple good practices. The document, so-called a "Security Scan", is meant to be used as a sort of checklist of basics to ensure that the most common entry points, attack vectors, and typical oversights and mistakes, are avoided and covered. While non-exhaustive and clearly oriented toward the architectures considered in the SCOTT projects, we hope that through following this simple checklist, users of the document (and infrastructure designers) can make sure that their infrastructure and systems are answering the most common security questions and concerns.
https://cyberwatching.eu/projects/978/scott/project-white-papers/securit...
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use