Skip to content
This repository has been archived by the owner on Jan 23, 2025. It is now read-only.

Commit

Permalink
chore(docs): Address typos (#1413)
Browse files Browse the repository at this point in the history
  • Loading branch information
testwill authored Aug 4, 2023
1 parent 0d4c4b5 commit aa6bb16
Show file tree
Hide file tree
Showing 5 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion avd_docs/azure/database/AVD-AZU-0018/docs.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
SQL Server sends alerts for threat detection via email, if there are no email addresses set then mitigation will be delayed.

### Impact
Nobody will be prompty alerted in the case of a threat being detected
Nobody will be promptly alerted in the case of a threat being detected

<!-- DO NOT CHANGE -->
{{ remediationActions }}
Expand Down
2 changes: 1 addition & 1 deletion avd_docs/google/compute/AVD-GCP-0067/docs.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
Secure boot helps ensure that the system only runs authentic software.

### Impact
Unable to verify digital signature of boot components, and unable to stop the boot process if verificaiton fails.
Unable to verify digital signature of boot components, and unable to stop the boot process if verification fails.

<!-- DO NOT CHANGE -->
{{ remediationActions }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ func TestCheckEnableAllRegions(t *testing.T) {
expected bool
}{
{
name: "AWS CloudTrail not enabled accross all regions",
name: "AWS CloudTrail not enabled across all regions",
input: cloudtrail.CloudTrail{
Trails: []cloudtrail.Trail{
{
Expand All @@ -32,7 +32,7 @@ func TestCheckEnableAllRegions(t *testing.T) {
expected: true,
},
{
name: "AWS CloudTrail enabled accross all regions",
name: "AWS CloudTrail enabled across all regions",
input: cloudtrail.CloudTrail{
Trails: []cloudtrail.Trail{
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ var CheckThreatAlertEmailSet = rules.Register(
Service: "database",
ShortCode: "threat-alert-email-set",
Summary: "At least one email address is set for threat alerts",
Impact: "Nobody will be prompty alerted in the case of a threat being detected",
Impact: "Nobody will be promptly alerted in the case of a threat being detected",
Resolution: "Provide at least one email address for threat alerts",
Explanation: `SQL Server sends alerts for threat detection via email, if there are no email addresses set then mitigation will be delayed.`,
Links: []string{},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ var CheckEnableShieldedVMSecureBoot = rules.Register(
Service: "compute",
ShortCode: "enable-shielded-vm-sb",
Summary: "Instances should have Shielded VM secure boot enabled",
Impact: "Unable to verify digital signature of boot components, and unable to stop the boot process if verificaiton fails.",
Impact: "Unable to verify digital signature of boot components, and unable to stop the boot process if verification fails.",
Resolution: "Enable Shielded VM secure boot",
Explanation: `Secure boot helps ensure that the system only runs authentic software.`,
Links: []string{
Expand Down

0 comments on commit aa6bb16

Please sign in to comment.