From cbb2a07a6db51b1fd725288add22c0cf876447cd Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:13:54 -0400 Subject: [PATCH 1/9] spelling: authorized --- example/policies/classification.md | 2 +- themes/comply-soc2/policies/classification.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/example/policies/classification.md b/example/policies/classification.md index 6a201aa..d0025a1 100644 --- a/example/policies/classification.md +++ b/example/policies/classification.md @@ -66,7 +66,7 @@ a. When classifying information, the level of confidentiality is determined by: +-------------------+------------------+---------------------------+---------------------------+ | Restricted | Restricted | Unauthorized access to | Information is available | | | | information may cause | to a specific group of | -| | | considerable damage to | employees and authhorized | +| | | considerable damage to | employees and authorized | | | | the business and/or | third parties. | | | | the organization's | | | | | reputation. | | diff --git a/themes/comply-soc2/policies/classification.md b/themes/comply-soc2/policies/classification.md index 6a201aa..d0025a1 100644 --- a/themes/comply-soc2/policies/classification.md +++ b/themes/comply-soc2/policies/classification.md @@ -66,7 +66,7 @@ a. When classifying information, the level of confidentiality is determined by: +-------------------+------------------+---------------------------+---------------------------+ | Restricted | Restricted | Unauthorized access to | Information is available | | | | information may cause | to a specific group of | -| | | considerable damage to | employees and authhorized | +| | | considerable damage to | employees and authorized | | | | the business and/or | third parties. | | | | the organization's | | | | | reputation. | | From 0623758de6fe0d763dfe95fc1812ac94fa82eb38 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:16:37 -0400 Subject: [PATCH 2/9] spelling: bribery is --- example/policies/conduct.md | 2 +- themes/comply-soc2/policies/conduct.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/example/policies/conduct.md b/example/policies/conduct.md index a5857e4..ced6535 100644 --- a/example/policies/conduct.md +++ b/example/policies/conduct.md @@ -44,7 +44,7 @@ majorRevisions: a. *Corruption* - i. Employees are discouraged from accepting gifts from clients or partners. Briberies are prohibited for the benefit of any external or internal party. + i. Employees are discouraged from accepting gifts from clients or partners. Bribery is prohibited for the benefit of any external or internal party. a. *Job duties and authority* diff --git a/themes/comply-soc2/policies/conduct.md b/themes/comply-soc2/policies/conduct.md index a5857e4..ced6535 100644 --- a/themes/comply-soc2/policies/conduct.md +++ b/themes/comply-soc2/policies/conduct.md @@ -44,7 +44,7 @@ majorRevisions: a. *Corruption* - i. Employees are discouraged from accepting gifts from clients or partners. Briberies are prohibited for the benefit of any external or internal party. + i. Employees are discouraged from accepting gifts from clients or partners. Bribery is prohibited for the benefit of any external or internal party. a. *Job duties and authority* From b5ec31e9e37fb68ccb73286eae64f7ed71e6ff32 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:16:57 -0400 Subject: [PATCH 3/9] spelling: canonical --- internal/theme/themes_bindata.go | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/internal/theme/themes_bindata.go b/internal/theme/themes_bindata.go index e9184ef..34956ca 100644 --- a/internal/theme/themes_bindata.go +++ b/internal/theme/themes_bindata.go @@ -1206,8 +1206,8 @@ func complySoc2TemplatesIndexAce() (*asset, error) { // It returns an error if the asset could not be found or // could not be loaded. func Asset(name string) ([]byte, error) { - cannonicalName := strings.Replace(name, "\\", "/", -1) - if f, ok := _bindata[cannonicalName]; ok { + canonicalName := strings.Replace(name, "\\", "/", -1) + if f, ok := _bindata[canonicalName]; ok { a, err := f() if err != nil { return nil, fmt.Errorf("Asset %s can't read by error: %v", name, err) @@ -1232,8 +1232,8 @@ func MustAsset(name string) []byte { // It returns an error if the asset could not be found or // could not be loaded. func AssetInfo(name string) (os.FileInfo, error) { - cannonicalName := strings.Replace(name, "\\", "/", -1) - if f, ok := _bindata[cannonicalName]; ok { + canonicalName := strings.Replace(name, "\\", "/", -1) + if f, ok := _bindata[canonicalName]; ok { a, err := f() if err != nil { return nil, fmt.Errorf("AssetInfo %s can't read by error: %v", name, err) @@ -1326,8 +1326,8 @@ var _bindata = map[string]func() (*asset, error){ func AssetDir(name string) ([]string, error) { node := _bintree if len(name) != 0 { - cannonicalName := strings.Replace(name, "\\", "/", -1) - pathList := strings.Split(cannonicalName, "/") + canonicalName := strings.Replace(name, "\\", "/", -1) + pathList := strings.Split(canonicalName, "/") for _, p := range pathList { node = node.Children[p] if node == nil { @@ -1473,8 +1473,8 @@ func RestoreAssets(dir, name string) error { } func _filePath(dir, name string) string { - cannonicalName := strings.Replace(name, "\\", "/", -1) - return filepath.Join(append([]string{dir}, strings.Split(cannonicalName, "/")...)...) + canonicalName := strings.Replace(name, "\\", "/", -1) + return filepath.Join(append([]string{dir}, strings.Split(canonicalName, "/")...)...) } From 6ea185f29b738ec3dd2e73030678be87ad6092bc Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:25:01 -0400 Subject: [PATCH 4/9] spelling: enough --- internal/ticket/scheduler.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/internal/ticket/scheduler.go b/internal/ticket/scheduler.go index 5ff2fda..55ab810 100644 --- a/internal/ticket/scheduler.go +++ b/internal/ticket/scheduler.go @@ -86,7 +86,7 @@ func TriggerScheduled() error { } candidate := schedule.Next(triggeredAt) - // in the future? not far eonugh back yet. + // in the future? not far enough back yet. if candidate.After(time.Now().UTC()) { triggeredAt = triggeredAt.Add(-24 * time.Hour) continue From 358858d31686ef7f3bab90bf89d4af56fcc164ab Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:25:32 -0400 Subject: [PATCH 5/9] spelling: governed --- example/policies/datacenter.md | 2 +- themes/comply-soc2/policies/datacenter.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/example/policies/datacenter.md b/example/policies/datacenter.md index db832fb..996577e 100644 --- a/example/policies/datacenter.md +++ b/example/policies/datacenter.md @@ -22,7 +22,7 @@ a. This policy defines the policies and rules governing data centers and secure # Policy -a. The following locations are classified by the organization as secure areas and are goverened by this policy: +a. The following locations are classified by the organization as secure areas and are governed by this policy: i. [list all data center locations and secure areas under the organization’s control] diff --git a/themes/comply-soc2/policies/datacenter.md b/themes/comply-soc2/policies/datacenter.md index db832fb..996577e 100644 --- a/themes/comply-soc2/policies/datacenter.md +++ b/themes/comply-soc2/policies/datacenter.md @@ -22,7 +22,7 @@ a. This policy defines the policies and rules governing data centers and secure # Policy -a. The following locations are classified by the organization as secure areas and are goverened by this policy: +a. The following locations are classified by the organization as secure areas and are governed by this policy: i. [list all data center locations and secure areas under the organization’s control] From 5dd98fbb5530fa9a96fa9893dd73e5d5f9f8a369 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:27:52 -0400 Subject: [PATCH 6/9] spelling: nonexistent --- internal/theme/themes_bindata.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/internal/theme/themes_bindata.go b/internal/theme/themes_bindata.go index 34956ca..60e5c6d 100644 --- a/internal/theme/themes_bindata.go +++ b/internal/theme/themes_bindata.go @@ -1321,7 +1321,7 @@ var _bindata = map[string]func() (*asset, error){ // b.png // then AssetDir("data") would return []string{"foo.txt", "img"} // AssetDir("data/img") would return []string{"a.png", "b.png"} -// AssetDir("foo.txt") and AssetDir("notexist") would return an error +// AssetDir("foo.txt") and AssetDir("nonexistent") would return an error // AssetDir("") will return []string{"data"}. func AssetDir(name string) ([]string, error) { node := _bintree From 5ae523aa41606da1a5b6aaaf356adf26a13b22f7 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:28:08 -0400 Subject: [PATCH 7/9] spelling: occurring --- example/policies/risk.md | 4 ++-- themes/comply-soc2/policies/risk.md | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/example/policies/risk.md b/example/policies/risk.md index e658763..a4e587a 100644 --- a/example/policies/risk.md +++ b/example/policies/risk.md @@ -93,8 +93,8 @@ Table 3: Description of Consequence Levels and Criteria +-----------------+-----------------+--------------------------------------------------------------+ | High | 2 | Either existing security controls are not in place or | | | | ineffective; there is a high probability of the risk being | -| | | realized. Incidents have a high likelihood of occuring in the| -| | | future. | +| | | realized. Incidents have a high likelihood of occurring in | +| | | the future. | +-----------------+-----------------+--------------------------------------------------------------+ | | | | +-----------------+-----------------+--------------------------------------------------------------+ diff --git a/themes/comply-soc2/policies/risk.md b/themes/comply-soc2/policies/risk.md index e658763..a4e587a 100644 --- a/themes/comply-soc2/policies/risk.md +++ b/themes/comply-soc2/policies/risk.md @@ -93,8 +93,8 @@ Table 3: Description of Consequence Levels and Criteria +-----------------+-----------------+--------------------------------------------------------------+ | High | 2 | Either existing security controls are not in place or | | | | ineffective; there is a high probability of the risk being | -| | | realized. Incidents have a high likelihood of occuring in the| -| | | future. | +| | | realized. Incidents have a high likelihood of occurring in | +| | | the future. | +-----------------+-----------------+--------------------------------------------------------------+ | | | | +-----------------+-----------------+--------------------------------------------------------------+ From b8bb6fc9aca99bbc19fc827b451271a2427b8dcb Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:26:59 -0400 Subject: [PATCH 8/9] spelling: postmortem --- example/policies/incident.md | 2 +- themes/comply-soc2/policies/incident.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/example/policies/incident.md b/example/policies/incident.md index 0815fd6..11ac509 100644 --- a/example/policies/incident.md +++ b/example/policies/incident.md @@ -104,7 +104,7 @@ a. The ISM must take all necessary steps to resolve the incident and recover inf i. Disclosures (parties to which the details of this incident were disclosed to, such as customers, vendors, law enforcement, etc.) -a. After an incident has been resolved, the ISM must conduct a post mortem that includes root cause analysis and documentation any lessons learned. +a. After an incident has been resolved, the ISM must conduct a postmortem that includes root cause analysis and documentation any lessons learned. a. Depending on the severity of the incident, the Chief Executive Officer (CEO) may elect to contact external authorities, including but not limited to law enforcement, private investigation firms, and government organizations as part of the response to the incident. diff --git a/themes/comply-soc2/policies/incident.md b/themes/comply-soc2/policies/incident.md index 0815fd6..11ac509 100644 --- a/themes/comply-soc2/policies/incident.md +++ b/themes/comply-soc2/policies/incident.md @@ -104,7 +104,7 @@ a. The ISM must take all necessary steps to resolve the incident and recover inf i. Disclosures (parties to which the details of this incident were disclosed to, such as customers, vendors, law enforcement, etc.) -a. After an incident has been resolved, the ISM must conduct a post mortem that includes root cause analysis and documentation any lessons learned. +a. After an incident has been resolved, the ISM must conduct a postmortem that includes root cause analysis and documentation any lessons learned. a. Depending on the severity of the incident, the Chief Executive Officer (CEO) may elect to contact external authorities, including but not limited to law enforcement, private investigation firms, and government organizations as part of the response to the incident. From 678134210a32046ba6bd01853383aa3e88302fa4 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Fri, 1 Nov 2019 15:30:48 -0400 Subject: [PATCH 9/9] spelling: working --- internal/render/pandoc.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/internal/render/pandoc.go b/internal/render/pandoc.go index 055d5fb..dadfc72 100644 --- a/internal/render/pandoc.go +++ b/internal/render/pandoc.go @@ -38,7 +38,7 @@ func dockerPandoc(outputFilename string, errOutputCh chan error) { pwd, err := os.Getwd() if err != nil { - errOutputCh <- errors.Wrap(err, "unable to get workding directory") + errOutputCh <- errors.Wrap(err, "unable to get working directory") return }