Skip to content

Commit 1c6f8c9

Browse files
Fix spelling errors.
(cherry picked from commit 405197b)
1 parent 2880d67 commit 1c6f8c9

File tree

11 files changed

+21
-21
lines changed

11 files changed

+21
-21
lines changed

src/assets/YAML/default/BuildAndDeployment/Build.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,12 +74,12 @@ Build and Deployment:
7474
comments: ""
7575
Pinning of artifacts:
7676
risk: Unauthorized manipulation of artifacts might be difficult to spot. For
77-
example, this may result in using images with malicious code. Also, intendend
77+
example, this may result in using images with malicious code. Also, intended
7878
major changes, which are automatically used in an image used might break the
7979
functionality.
8080
measure: Pinning of artifacts ensure that changes are performed only when intended.
8181
comment: The usage of pinning requires a good processes for patching. Therefore,
82-
choose this activity wisly.
82+
choose this activity wisely.
8383
meta:
8484
implementationGuide: Pinning artifacts in Dockerfile refers to the practice of using specific,
8585
immutable versions of base images and dependencies in your build process. Instead of using the
@@ -142,7 +142,7 @@ Build and Deployment:
142142
Signing of artifacts:
143143
risk: &execution-maliciuous Execution or usage of malicious code or data e.g. via executables, libraries or container images.
144144
measure: Digitally signing artifacts for all steps during the build and especially
145-
docker images, helps to ensure their integrity and autenticity.
145+
docker images, helps to ensure their integrity and authenticity.
146146
difficultyOfImplementation:
147147
knowledge: 2
148148
time: 2

src/assets/YAML/default/BuildAndDeployment/Deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -312,7 +312,7 @@ Build and Deployment:
312312
comments: ""
313313
Evaluation of the trust of used components:
314314
risk:
315-
Application and system components like Open Source libraies or images can have implementation flaws or deployment flaws.
315+
Application and system components like Open Source libraries or images can have implementation flaws or deployment flaws.
316316
Developers or operations might start random images in the production cluster which have malicious code or known vulnerabilities.
317317
measure:
318318
Each components source is evaluated to be trusted. For example the source, number of developers included, email configuration used by maintainers to prevent maintainer account theft, typo-squatting, ...

src/assets/YAML/default/CultureAndOrganization/EducationAndGuidance.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Culture and Organization:
2828
evidence: ""
2929
comments: ""
3030
Security Coaching:
31-
risk: Training does not change behaviour. Therefore, even if security practices are understood, it's likly that they are not performed.
31+
risk: Training does not change behaviour. Therefore, even if security practices are understood, it's likely that they are not performed.
3232
measure: By coaching teams on security topics using for example the samman coaching method, teams internalize security practices as new habits in their development process.
3333
difficultyOfImplementation:
3434
knowledge: 4
@@ -314,7 +314,7 @@ Culture and Organization:
314314
risk: Employees are not getting excited about security.
315315
measure: Good communication and transparency encourages cross-organizational
316316
support. Gamification of security is also known to help, examples include
317-
T-Shirts, mugs, cups, giftcards and 'High-Fives'.
317+
T-Shirts, mugs, cups, gift cards and 'High-Fives'.
318318
difficultyOfImplementation:
319319
knowledge: 3
320320
time: 2

src/assets/YAML/default/Implementation/ApplicationHardening.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Implementation:
6868
dependsOn:
6969
- App. Hardening Level 1 (50%)
7070
description: |
71-
To tackle the security of code developed in-house, OWASP offers an extensive collection of [Cheatsheets](https://cheatsheetseries.owasp.org/) demonstrating how to implement features securely. Moreover, the Security Knowledge Framework[1] offers an extensive library of code patterns spanning several programming languages. These patterns can be used to not only jumpstart the development process, but also do so securely.
71+
To tackle the security of code developed in-house, OWASP offers an extensive collection of [Cheatsheets](https://cheatsheetseries.owasp.org/) demonstrating how to implement features securely. Moreover, the Security Knowledge Framework[1] offers an extensive library of code patterns spanning several programming languages. These patterns can be used to not only jump-start the development process, but also do so securely.
7272
7373
[...]
7474

src/assets/YAML/default/Implementation/DevelopmentAndSourceControl.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Implementation:
44
Development and Source Control:
55
Local development linting & style checks performed:
6-
risk: Insecure or unmaintenable code base.
6+
risk: Insecure or unmaintainable code base.
77
measure: >-
88
Integrate static code analysis tools in IDEs.
99
difficultyOfImplementation:

src/assets/YAML/default/Implementation/InfrastructureHardening.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -243,7 +243,7 @@ Implementation:
243243
usefulness: 5
244244
level: 3
245245
dependsOn:
246-
- Audit of systemcalls
246+
- Audit of system events
247247
implementation:
248248
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/seccomp
249249
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/strace
@@ -360,7 +360,7 @@ Implementation:
360360
isImplemented: false
361361
evidence: ""
362362
comments: ""
363-
Baseline Hardening of the envirnoment:
363+
Baseline Hardening of the environment:
364364
risk: Using default configurations for a cluster environment leads to potential
365365
risks.
366366
measure: Harden environments according to best practices. Level 1 and
@@ -391,7 +391,7 @@ Implementation:
391391
isImplemented: false
392392
evidence: ""
393393
comments: ""
394-
Hardening of the Envirnoment:
394+
Hardening of the Environment:
395395
risk: Using default configurations for a cluster environment leads to potential
396396
risks.
397397
measure: Harden environments according to best practices. Level 2 and
@@ -452,7 +452,7 @@ Implementation:
452452
risk: Having security auditing in the same account as infrastructure and applications
453453
at the cloud provide might cause evil administrators (or threat actors taking
454454
over an account of an administrator) to alter evidence like audit logs.
455-
measure: Usage of a seperate account dedicated for security activities.
455+
measure: Usage of a separate account dedicated for security activities.
456456
difficultyOfImplementation:
457457
knowledge: 3
458458
time: 2
@@ -474,7 +474,7 @@ Implementation:
474474
risk: Evil actors might be able to perform a man in the middle attack and sniff
475475
confidential information (e.g. authentication factors like passwords)
476476
measure: By using encryption at the edge of traffic in transit, it is impossible
477-
or at least harder to sniff credentials beeing outside of the organization.
477+
or at least harder to sniff credentials being outside of the organization.
478478
difficultyOfImplementation:
479479
knowledge: 2
480480
time: 2
@@ -514,7 +514,7 @@ Implementation:
514514
isImplemented: false
515515
evidence: ""
516516
comments: ""
517-
Usage of internal encryption at tansit:
517+
Usage of internal encryption at transit:
518518
risk: Evil actors within the organization of traffic in transit might be able
519519
to perform a man in the middle attack and sniff confidential information (e.g.
520520
authentication factors like passwords)

src/assets/YAML/default/InformationGathering/Monitoring.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Information Gathering:
5252
comments: ""
5353
Audit of system events:
5454
risk: System events (system calls) trends and attacks are not detected.
55-
measure: Gathering of systemcalls.
55+
measure: Gathering of system calls.
5656
difficultyOfImplementation:
5757
knowledge: 2
5858
time: 2
@@ -227,10 +227,10 @@ Information Gathering:
227227
evidence: ""
228228
comments: ""
229229
Monitoring of costs:
230-
risk: Not monitorig costs might lead to unexpected high resource consumption
230+
risk: Not monitoring costs might lead to unexpected high resource consumption
231231
and a high invoice.
232232
measure: Implement cost budgets. Setting of an alert threshold and sending out errors when it is reached. In the
233-
best case, a second treshold with a limit is set so that the cost can not go higher.
233+
best case, a second threshold with a limit is set so that the cost can not go higher.
234234
difficultyOfImplementation:
235235
knowledge: 1
236236
time: 2

src/assets/YAML/default/TestAndVerification/Consolidation.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Test and Verification:
5959
- 5.10
6060
isImplemented: false
6161
evidence: ""
62-
comments: "The [DefectDojo-Client](https://github.com/SDA-SE/defectdojo-client/tree/master/statistic-client) generates statistics from OWASP DefectDojo and places the results in a [github repository](https://github.com/pagel-pro/cluster-image-scanner-all-results)."
62+
comments: "The [DefectDojo-Client](https://github.com/SDA-SE/defectdojo-client/tree/master/statistic-client) generates statistics from OWASP DefectDojo and places the results in a [Github repository](https://github.com/pagel-pro/cluster-image-scanner-all-results)."
6363
Generation of Patch Management Statistics:
6464
risk: Delays in patch response lead to an increased attack surface through longer exposure of known vulnerabilities.
6565
measure: Average time to patch is visualized per component/project/team.

src/assets/YAML/default/TestAndVerification/DynamicDepthForInfrastructure.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Test and Verification:
3333
leading to world open cluster management ports.
3434
measure: With the help of tools the network configuration of unintentional exposed
3535
cluster(s) are tested. To identify clusters, all subdomains might need to
36-
be identified with a tool like OWASP Amass to perform portscans based o the
36+
be identified with a tool like OWASP Amass to perform port scans based o the
3737
result.
3838
difficultyOfImplementation:
3939
knowledge: 1

src/assets/YAML/default/TestAndVerification/StaticDepthForInfrastructure.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Test and Verification:
5656
resources: 1
5757
usefulness: 4
5858
level: 4
59-
description: Subscribing to github projects and reading release notes might help. Software Composition Analysis for infrastructe might help, but is often too fine-granular.
59+
description: Subscribing to Github projects and reading release notes might help. Software Composition Analysis for infrastructure might help, but is often too fine-granular.
6060
implementation:
6161
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/https-github-com-a
6262
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/registries-like-quay

0 commit comments

Comments
 (0)