Skip to content

Commit c1ae63f

Browse files
committed
Suggested improvements, and spelling corrections
1 parent 2bc6246 commit c1ae63f

File tree

4 files changed

+13
-10
lines changed

4 files changed

+13
-10
lines changed

src/assets/YAML/default/CultureAndOrganization/Process.yaml

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,15 +58,18 @@ Culture and Organization:
5858
comments: ""
5959
Definition of simple BCDR practices for critical components:
6060
uuid: c72da779-86cc-45b1-a339-190ce5093171
61+
description:
62+
A _Business Continuity and Disaster Recovery_ (BCDR) is a plan and a process
63+
that helps a business to return to normal operations if a disaster occurs.
6164
risk:
62-
In case of an emergency, like a power outage, DR actions to perform are
63-
not clear. This leads to reaction and remediation delays.
65+
If the disaster recovery actions are not clear, you risk slow reaction and remediation delays.
66+
This applies to cyber attacks as well as natural emergencies, such as a power outage.
6467
measure:
6568
By understanding and documenting a business continuity and disaster
6669
recovery (BCDR) plan, the overall availability of systems and applications
6770
is increased. Success factors like responsibilities, Service Level Agreements,
6871
Recovery Point Objectives, Recovery Time Objectives or Failover must be fully
69-
documented and understood.
72+
documented and understood by the people involved in the recovery.
7073
difficultyOfImplementation:
7174
knowledge: 4
7275
time: 3

src/assets/YAML/default/Implementation/ApplicationHardening.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,10 @@ Implementation:
5555
risk:
5656
The generation of interpreter directives from user-provided data poses difficulties and can introduce vulnerabilities to injection attacks.
5757
measure: |
58-
Implementing contextualized encoding fpr the next interpreter, such as employing object-relational mapping tools
58+
Implementing contextualized encoding for the next interpreter, such as employing object-relational mapping tools
5959
or utilizing prepared statements, nearly removes the threat of injection vulnerabilities.
6060
61-
Also take into account a a secure by default UI framework, which performs automatic contextual encoding of outputs with potential malicious user input (e.g. angular).
61+
Also take into account a secure by default UI framework, which performs automatic contextual encoding of outputs with potential malicious user input (e.g. angular).
6262
difficultyOfImplementation:
6363
knowledge: 2
6464
time: 2

src/assets/YAML/default/Implementation/InfrastructureHardening.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -510,12 +510,12 @@ Implementation:
510510
uuid: ad23be9c-5661-4f1f-81a3-5a5dc7061629
511511
risk:
512512
Evil actors might be able to perform a man in the middle attack and sniff
513-
confidential information (e.g. authentication factors like passwords)
513+
confidential information (e.g. authentication factors like passwords).
514514
measure: |-
515515
By using encryption at the edge of traffic in transit, it is impossible
516516
or at least harder to sniff credentials or information being outside of the organization.
517517
518-
Useage of standard protocols like HTTPS is recommended.
518+
Using standard secure protocols like HTTPS is recommended.
519519
difficultyOfImplementation:
520520
knowledge: 2
521521
time: 2

src/assets/YAML/default/TestAndVerification/Consolidation.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Test and Verification:
2323
dependsOn:
2424
- uuid:38d1bd10-7b5f-4ae1-868c-0ec813285425 # Fix based on severity
2525
#- uuid:3260a15f-2df0-4173-8790-f11de2cb525a # Access applications accessibility TODO
26-
- uuid:2a44b708-734f-4463-b0cb-86dc46344b2f #iventory of apps
26+
- uuid:2a44b708-734f-4463-b0cb-86dc46344b2f # Inventory of production components
2727
implementation:
2828
references:
2929
samm2:
@@ -141,7 +141,7 @@ Test and Verification:
141141
As false positive occur during each test, all vulnerabilities might be
142142
ignored. Specially, if tests are automated an run daily.
143143
measure: |-
144-
Findings from security tests must be triaged and outcomes persistend/documented to:
144+
Findings from security tests must be triaged and outcomes persisted/documented to:
145145
- Prevent re-analysis of known issues in subsequent test runs
146146
- Track accepted risks vs false positives
147147
- Enable consistent decision-making across teams
@@ -228,7 +228,7 @@ Test and Verification:
228228
- 8.8
229229
- 5.25
230230
tags: ["vuln-action", "defect-management"]
231-
comments: ""#
231+
comments: ""
232232
Treatment of defects with severity high or higher:
233233
uuid: 44f2c8a9-4aaa-4c72-942d-63f78b89f385
234234
risk: Vulnerabilities with severity high or higher are not visible.

0 commit comments

Comments
 (0)