Skip to content

Commit 9df3f15

Browse files
bzarboni1iMichaela
authored andcommitted
chore: fix spelling errors #275
1 parent fa7d4d2 commit 9df3f15

File tree

6 files changed

+14
-14
lines changed

6 files changed

+14
-14
lines changed

src/examples/ap/xml/ifa_assessment-plan-example.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@
5252
</description>
5353
</step>
5454
<step uuid="3d0297de-e47b-4360-b9c3-cf5c425f86cd">
55-
<title>Obtain Applcation Access Provided by Product Team</title>
55+
<title>Obtain Application Access Provided by Product Team</title>
5656
<description>
5757
<p>The assessor will obtain non-privileged account credentials with the PAO
5858
staff role to test this role in the application does not permit excessive

src/examples/ar/xml/ifa_assessment-results-example.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@
145145
<remarks>
146146
<p>The assessor's security automation platform analyzed all roles specific to the
147147
GoodRead Product Team, not those managed by the Office of Information
148-
Technology. The <code>IFA-GoodRead-SystemEnginer</code> role in their respective
148+
Technology. The <code>IFA-GoodRead-SystemEngineer</code> role in their respective
149149
AwesomeCloud account permitted use of the following high-risk actions.</p>
150150
<ul>
151151
<li>awesomecloud:auditlog:DeleteAccountAuditLog</li>
@@ -188,7 +188,7 @@
188188
Regardless of the extent and duration of a potential incident, such a
189189
configuration greatly increases the risk of an insider threat if there were
190190
likely to a potential insider threat in the GoodRead Product Team.</p>
191-
<p>If such an insider threat existed and acted with this misconfigruatio, the
191+
<p>If such an insider threat existed and acted with this misconfigruation, the
192192
resulting event could cause significant financial and reputational risk to IFA's
193193
Administrator, executive staff, and the agency overall.</p>
194194
</statement>

src/examples/poam/xml/ifa_plan-of-action-and-milestones.xml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@
3838
<remarks>
3939
<p>The assessor's security automation platform analyzed all roles specific to the
4040
GoodRead Product Team, not those managed by the Office of Information Technology.
41-
The <code>IFA-GoodRead-SystemEnginer</code> role in their respective AwesomeCloud
41+
The <code>IFA-GoodRead-SystemEngineer</code> role in their respective AwesomeCloud
4242
account permitted use of the following high-risk actions.</p>
4343
<ul>
4444
<li>awesomecloud:auditlog:DeleteAccountAuditLog</li>
@@ -75,15 +75,15 @@
7575
<mitigating-factor uuid="401c15c9-ad6b-4d4a-a591-7d53a3abb3b6">
7676
<description>
7777
<p>The GoodRead application is designed and implemented to only allow access to the
78-
administrative functions for those with PAO staff fole via the VPN via network
78+
administrative functions for those with PAO staff role via the VPN via network
7979
configuration between the IFA Enterprise Support Systems and the GoodRead
8080
AwesomeCloud account. Additionally, the load balanacer configuration only allows
8181
access to view shortlinks from the public internet.</p>
8282
</description>
8383
</mitigating-factor>
8484
<deadline>2024-01-01T05:00:00-04:00</deadline>
8585
<response uuid="d28873f7-0a45-476d-9cd3-1d2ec0b8bca1" lifecycle="planned">
86-
<title>IFA-GOODREAD-RISK1-RESPONSE: IFA GoodRead Prouct Team Response</title>
86+
<title>IFA-GOODREAD-RISK1-RESPONSE: IFA GoodRead Product Team Response</title>
8787
<description>
8888
<p>The GoodRead Product Team does not have sufficient personnel and budget to
8989
implement the required changes in their use of the Django Framework and its
@@ -100,7 +100,7 @@
100100
<description>
101101
<p>The owner, ISSO, and product team of the GoodRead Project intend to complete
102102
the necessary development between September 2023 and December 2023. Whether
103-
or not the necessary development for remedation is complete, the product
103+
or not the necessary development for remediation is complete, the product
104104
team's project manager will submit the final annual report. They will
105105
identify this work item and whether it has been completed.</p>
106106
</description>
@@ -129,7 +129,7 @@
129129
duration of a potential incident, such a configuration greatly increases the risk of
130130
an insider threat if there were likely to a potential insider threat in the GoodRead
131131
Product Team.</p>
132-
<p>If such an insider threat existed and acted with this misconfigruatio, the resulting
132+
<p>If such an insider threat existed and acted with this n, the resulting
133133
event could cause significant financial and reputational risk to IFA's
134134
Administrator, executive staff, and the agency overall.</p>
135135
</statement>
@@ -143,9 +143,9 @@
143143
</characterization>
144144
<deadline>2023-06-23T17:00:00-04:00</deadline>
145145
<response uuid="4676b126-ba6d-40cc-9dc8-f2aa677b03ee" lifecycle="planned">
146-
<title>IFA-GOODREAD-RISK1-RESPONSE: IFA GoodRead Prouct Team Response</title>
146+
<title>IFA-GOODREAD-RISK1-RESPONSE: IFA GoodRead Product Team Response</title>
147147
<description>
148-
<p>The GoodRead Product Team does not have siginficant mitigations or compensating
148+
<p>The GoodRead Product Team does not have significant mitigations or compensating
149149
controls to counter this risk, even if likelihood is low. The IFA CISO has cited
150150
ongoing guidance that potential insider threat risks be prioritized above
151151
alternative categories of risk for this quarter. Additionally, there is
@@ -177,7 +177,7 @@
177177
<title>Update Django Framework Configuration to Disable Default Admin Panel</title>
178178
<description>
179179
<p>Budget and technical staff are needed to re-design and re-implement a part of the
180-
GoodRead application's use of a web appplication programming framework to mitigate
180+
GoodRead application's use of a web application programming framework to mitigate
181181
the risk of low privilege users directly modifying the database of this application.
182182
This application is a high-visibility service and integral to future operations of
183183
the IFA Office of Public Affairs and its staff.</p>

src/examples/ssp/xml/ifa_ssp-example.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -252,7 +252,7 @@
252252
<p>The IFA GoodRead application and infrastructure are composed as designed and implemented with lease privilege for the elements of this system.</p>
253253
<p>For the IFA GoodRead application, the custom application is designed and implemented on top of the Django Framework to enforce least privilege. The application has a role for IFA Public Affairs Officers and one for the developers for privileged permissions, respectively. Only the latter can access or change administrative and security configurations and related data.</p>
254254
<p>The Django Framework and Django REST Framework (DRF), by default, allows any user with the <code>is_staff</code> role attribute to access administrative functions in an application using the framework. IFA GoodRead developers have disabled this behavior, relying on the custom roles identified in the relevant section.</p>
255-
<p>For the IFA GoodRead database, the system account and accredentials for the application to read and write to the system datastore has specific read and write authorization for specific tables. This database service account does not have full administrative permissions to add, modify, or delete all respective tables. For the production environment, only the IFA GoodRead developer has a dedicated account with equivalent permissions. Only local network socket access, within in the Linux server, is permitted by host firewall configuration. Remote access, privileged or unprivileged, is not allowed remotely and the system engineer must locally authenticate for access.</p>
255+
<p>For the IFA GoodRead database, the system account and credentials for the application to read and write to the system datastore has specific read and write authorization for specific tables. This database service account does not have full administrative permissions to add, modify, or delete all respective tables. For the production environment, only the IFA GoodRead developer has a dedicated account with equivalent permissions. Only local network socket access, within in the Linux server, is permitted by host firewall configuration. Remote access, privileged or unprivileged, is not allowed remotely and the system engineer must locally authenticate for access.</p>
256256
<p>For the RedHat Linux server upon which the IFA GoodRead application is deployed in this system, only the system engineer has a non-privileged user to log in remotely via the SSH protocol to perform ad-hoc inspection, monthly log review as required by policy and procedure, and emergency debugging of the system. Privileged system administration operations may only be performed with the <code>sudo</code> subsystem which requires a password, two-factor authentication, and has enhanced logging of all commands executed. The system engineer must log in remotely and then use <code>sudo</code> to elevate privileges. Remote access with the privileged account is prohibited by configuration and attempts are logged.</p>
257257
<p>For this remote SSH access, least privilege is additionally enforced by allowing this access via a specific network zone in the IFA GoodRead AwesomeCloud account accessible to only the system engineer via IFA's VPN solution, which requires the system engineer use a dedicated account with their own password and two-factor authentication token.</p>
258258
<p>For cloud account and API access to reconfigure the Linux server and its load balancer, administrative access is only allowed for the system engineer via a special AwesomeCloud IAM role. The authentication and authorization for this role is controlled by an integration with the organization's single sign-on solution. This solution will only be accessible and correctly execute for them when they are on the VPN with their account with traffic forwarded to the appropriate network zone in the IFA GoodRead account in AwesomeCloud. It will not work the developer or any staff users of the application.</p>

src/examples/ssp/xml/oscal_leveraged-example_ssp.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ Cust-A Cust-B Cust-C
180180
<provided uuid="11111111-0000-4000-9009-002001001001">
181181
<description>
182182
<p>Consumer-appropriate description of what a leveraging system may
183-
inherite from THIS SYSTEM in the context of satisfying
183+
inherit from THIS SYSTEM in the context of satisfying
184184
satisfaction of AC-2, part a.</p>
185185
</description>
186186
<responsible-role role-id="poc-for-customers">

src/examples/ssp/xml/oscal_leveraging-example_ssp.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ Cust-A Cust-B Cust-C
155155
<component uuid="22222222-0000-4000-9001-000000000003" type="appliance">
156156
<title>Access Control Appliance</title>
157157
<description>
158-
<p>An access control virtual appliance, wich performs XYZ functions.</p>
158+
<p>An access control virtual appliance that performs XYZ functions.</p>
159159
</description>
160160
<prop name="implementation-point" value="internal" />
161161
<prop name="virtual" value="yes" />

0 commit comments

Comments
 (0)