From 6964037d88b1ab236b141a469faf257a785bfe97 Mon Sep 17 00:00:00 2001 From: Sourav Kumar Date: Fri, 6 Jan 2023 15:03:29 +0530 Subject: [PATCH] Some typo --- 2023/day03.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/2023/day03.md b/2023/day03.md index e74ff00..723a8d5 100644 --- a/2023/day03.md +++ b/2023/day03.md @@ -61,11 +61,11 @@ An attack map might look something like this with a key explaining what each num From this map we might consider there to be a denial of service or some malicious insider attack and access to S3 bucket to prevent the application saving data or causing it to save bad data. -This map then is never final, in the same way that your application continouly moves forward through feedback, this attack map also needs to be tested against, which provides feedback which in turn means the security posture is strengthend against these attacks. You could call this "Continuous Response" in the Security Feedback loop. +This map then is never final, in the same way that your application continuously moves forward through feedback, this attack map also needs to be tested against, which provides feedback which in turn means the security posture is strengthened against these attacks. You could call this "Continuous Response" in the Security Feedback loop. -At a bare minimum we should be following a good, better, best model to better the security posture. +At a bare minimum, we should be following a good, better, best model to better the security posture. -- **Good** - Identify security design contraints and controls that need to be built into the software to reduce an attack. +- **Good** - Identify security design constraints and controls that need to be built into the software to reduce an attack. - **Better** - Prioritise and build security in for issues found later in the software cycle. @@ -91,4 +91,4 @@ Security is a design constraint - albeit an inconvenient one. - [Cloud Advocate - DevSecOps Pipeline CI Process - Real world example!](https://www.youtube.com/watch?v=ipe08lFQZU8&list=PLsKoqAvws1pvg7qL7u28_OWfXwqkI3dQ1&index=7&t=204s) -See you on [Day 4](day04.md) \ No newline at end of file +See you on [Day 4](day04.md)