diff --git a/example/policies/classification.md b/example/policies/classification.md index 6a201aa3..d0025a15 100644 --- a/example/policies/classification.md +++ b/example/policies/classification.md @@ -66,7 +66,7 @@ a. When classifying information, the level of confidentiality is determined by: +-------------------+------------------+---------------------------+---------------------------+ | Restricted | Restricted | Unauthorized access to | Information is available | | | | information may cause | to a specific group of | -| | | considerable damage to | employees and authhorized | +| | | considerable damage to | employees and authorized | | | | the business and/or | third parties. | | | | the organization's | | | | | reputation. | | diff --git a/example/policies/conduct.md b/example/policies/conduct.md index a5857e43..ced6535c 100644 --- a/example/policies/conduct.md +++ b/example/policies/conduct.md @@ -44,7 +44,7 @@ majorRevisions: a. *Corruption* - i. Employees are discouraged from accepting gifts from clients or partners. Briberies are prohibited for the benefit of any external or internal party. + i. Employees are discouraged from accepting gifts from clients or partners. Bribery is prohibited for the benefit of any external or internal party. a. *Job duties and authority* diff --git a/example/policies/datacenter.md b/example/policies/datacenter.md index db832fbf..996577e9 100644 --- a/example/policies/datacenter.md +++ b/example/policies/datacenter.md @@ -22,7 +22,7 @@ a. This policy defines the policies and rules governing data centers and secure # Policy -a. The following locations are classified by the organization as secure areas and are goverened by this policy: +a. The following locations are classified by the organization as secure areas and are governed by this policy: i. [list all data center locations and secure areas under the organization’s control] diff --git a/example/policies/incident.md b/example/policies/incident.md index 0815fd64..11ac509d 100644 --- a/example/policies/incident.md +++ b/example/policies/incident.md @@ -104,7 +104,7 @@ a. The ISM must take all necessary steps to resolve the incident and recover inf i. Disclosures (parties to which the details of this incident were disclosed to, such as customers, vendors, law enforcement, etc.) -a. After an incident has been resolved, the ISM must conduct a post mortem that includes root cause analysis and documentation any lessons learned. +a. After an incident has been resolved, the ISM must conduct a postmortem that includes root cause analysis and documentation any lessons learned. a. Depending on the severity of the incident, the Chief Executive Officer (CEO) may elect to contact external authorities, including but not limited to law enforcement, private investigation firms, and government organizations as part of the response to the incident. diff --git a/example/policies/risk.md b/example/policies/risk.md index e6587632..a4e587a4 100644 --- a/example/policies/risk.md +++ b/example/policies/risk.md @@ -93,8 +93,8 @@ Table 3: Description of Consequence Levels and Criteria +-----------------+-----------------+--------------------------------------------------------------+ | High | 2 | Either existing security controls are not in place or | | | | ineffective; there is a high probability of the risk being | -| | | realized. Incidents have a high likelihood of occuring in the| -| | | future. | +| | | realized. Incidents have a high likelihood of occurring in | +| | | the future. | +-----------------+-----------------+--------------------------------------------------------------+ | | | | +-----------------+-----------------+--------------------------------------------------------------+ diff --git a/internal/render/pandoc.go b/internal/render/pandoc.go index 055d5fbc..dadfc729 100644 --- a/internal/render/pandoc.go +++ b/internal/render/pandoc.go @@ -38,7 +38,7 @@ func dockerPandoc(outputFilename string, errOutputCh chan error) { pwd, err := os.Getwd() if err != nil { - errOutputCh <- errors.Wrap(err, "unable to get workding directory") + errOutputCh <- errors.Wrap(err, "unable to get working directory") return } diff --git a/internal/theme/themes_bindata.go b/internal/theme/themes_bindata.go index e9184ef3..60e5c6d5 100644 --- a/internal/theme/themes_bindata.go +++ b/internal/theme/themes_bindata.go @@ -1206,8 +1206,8 @@ func complySoc2TemplatesIndexAce() (*asset, error) { // It returns an error if the asset could not be found or // could not be loaded. func Asset(name string) ([]byte, error) { - cannonicalName := strings.Replace(name, "\\", "/", -1) - if f, ok := _bindata[cannonicalName]; ok { + canonicalName := strings.Replace(name, "\\", "/", -1) + if f, ok := _bindata[canonicalName]; ok { a, err := f() if err != nil { return nil, fmt.Errorf("Asset %s can't read by error: %v", name, err) @@ -1232,8 +1232,8 @@ func MustAsset(name string) []byte { // It returns an error if the asset could not be found or // could not be loaded. func AssetInfo(name string) (os.FileInfo, error) { - cannonicalName := strings.Replace(name, "\\", "/", -1) - if f, ok := _bindata[cannonicalName]; ok { + canonicalName := strings.Replace(name, "\\", "/", -1) + if f, ok := _bindata[canonicalName]; ok { a, err := f() if err != nil { return nil, fmt.Errorf("AssetInfo %s can't read by error: %v", name, err) @@ -1321,13 +1321,13 @@ var _bindata = map[string]func() (*asset, error){ // b.png // then AssetDir("data") would return []string{"foo.txt", "img"} // AssetDir("data/img") would return []string{"a.png", "b.png"} -// AssetDir("foo.txt") and AssetDir("notexist") would return an error +// AssetDir("foo.txt") and AssetDir("nonexistent") would return an error // AssetDir("") will return []string{"data"}. func AssetDir(name string) ([]string, error) { node := _bintree if len(name) != 0 { - cannonicalName := strings.Replace(name, "\\", "/", -1) - pathList := strings.Split(cannonicalName, "/") + canonicalName := strings.Replace(name, "\\", "/", -1) + pathList := strings.Split(canonicalName, "/") for _, p := range pathList { node = node.Children[p] if node == nil { @@ -1473,8 +1473,8 @@ func RestoreAssets(dir, name string) error { } func _filePath(dir, name string) string { - cannonicalName := strings.Replace(name, "\\", "/", -1) - return filepath.Join(append([]string{dir}, strings.Split(cannonicalName, "/")...)...) + canonicalName := strings.Replace(name, "\\", "/", -1) + return filepath.Join(append([]string{dir}, strings.Split(canonicalName, "/")...)...) } diff --git a/internal/ticket/scheduler.go b/internal/ticket/scheduler.go index 5ff2fdaf..55ab810b 100644 --- a/internal/ticket/scheduler.go +++ b/internal/ticket/scheduler.go @@ -86,7 +86,7 @@ func TriggerScheduled() error { } candidate := schedule.Next(triggeredAt) - // in the future? not far eonugh back yet. + // in the future? not far enough back yet. if candidate.After(time.Now().UTC()) { triggeredAt = triggeredAt.Add(-24 * time.Hour) continue diff --git a/themes/comply-soc2/policies/classification.md b/themes/comply-soc2/policies/classification.md index 6a201aa3..d0025a15 100644 --- a/themes/comply-soc2/policies/classification.md +++ b/themes/comply-soc2/policies/classification.md @@ -66,7 +66,7 @@ a. When classifying information, the level of confidentiality is determined by: +-------------------+------------------+---------------------------+---------------------------+ | Restricted | Restricted | Unauthorized access to | Information is available | | | | information may cause | to a specific group of | -| | | considerable damage to | employees and authhorized | +| | | considerable damage to | employees and authorized | | | | the business and/or | third parties. | | | | the organization's | | | | | reputation. | | diff --git a/themes/comply-soc2/policies/conduct.md b/themes/comply-soc2/policies/conduct.md index a5857e43..ced6535c 100644 --- a/themes/comply-soc2/policies/conduct.md +++ b/themes/comply-soc2/policies/conduct.md @@ -44,7 +44,7 @@ majorRevisions: a. *Corruption* - i. Employees are discouraged from accepting gifts from clients or partners. Briberies are prohibited for the benefit of any external or internal party. + i. Employees are discouraged from accepting gifts from clients or partners. Bribery is prohibited for the benefit of any external or internal party. a. *Job duties and authority* diff --git a/themes/comply-soc2/policies/datacenter.md b/themes/comply-soc2/policies/datacenter.md index db832fbf..996577e9 100644 --- a/themes/comply-soc2/policies/datacenter.md +++ b/themes/comply-soc2/policies/datacenter.md @@ -22,7 +22,7 @@ a. This policy defines the policies and rules governing data centers and secure # Policy -a. The following locations are classified by the organization as secure areas and are goverened by this policy: +a. The following locations are classified by the organization as secure areas and are governed by this policy: i. [list all data center locations and secure areas under the organization’s control] diff --git a/themes/comply-soc2/policies/incident.md b/themes/comply-soc2/policies/incident.md index 0815fd64..11ac509d 100644 --- a/themes/comply-soc2/policies/incident.md +++ b/themes/comply-soc2/policies/incident.md @@ -104,7 +104,7 @@ a. The ISM must take all necessary steps to resolve the incident and recover inf i. Disclosures (parties to which the details of this incident were disclosed to, such as customers, vendors, law enforcement, etc.) -a. After an incident has been resolved, the ISM must conduct a post mortem that includes root cause analysis and documentation any lessons learned. +a. After an incident has been resolved, the ISM must conduct a postmortem that includes root cause analysis and documentation any lessons learned. a. Depending on the severity of the incident, the Chief Executive Officer (CEO) may elect to contact external authorities, including but not limited to law enforcement, private investigation firms, and government organizations as part of the response to the incident. diff --git a/themes/comply-soc2/policies/risk.md b/themes/comply-soc2/policies/risk.md index e6587632..a4e587a4 100644 --- a/themes/comply-soc2/policies/risk.md +++ b/themes/comply-soc2/policies/risk.md @@ -93,8 +93,8 @@ Table 3: Description of Consequence Levels and Criteria +-----------------+-----------------+--------------------------------------------------------------+ | High | 2 | Either existing security controls are not in place or | | | | ineffective; there is a high probability of the risk being | -| | | realized. Incidents have a high likelihood of occuring in the| -| | | future. | +| | | realized. Incidents have a high likelihood of occurring in | +| | | the future. | +-----------------+-----------------+--------------------------------------------------------------+ | | | | +-----------------+-----------------+--------------------------------------------------------------+