fix(metadata): Typos (#2646)

This commit is contained in:
Gabriel Pragin
2023-08-01 00:07:23 -07:00
committed by GitHub
parent c256419144
commit de4a825db8
7 changed files with 7 additions and 7 deletions

View File

@@ -21,7 +21,7 @@
"Terraform": "" "Terraform": ""
}, },
"Recommendation": { "Recommendation": {
"Text": "Enable client certificate. Mutual TLS is recommended and commonly used for business-to-business (B2B) applications. It iss used in standards such as Open Banking. API Gateway now provides integrated mutual TLS authentication at no additional cost.", "Text": "Enable client certificate. Mutual TLS is recommended and commonly used for business-to-business (B2B) applications. It is used in standards such as Open Banking. API Gateway now provides integrated mutual TLS authentication at no additional cost.",
"Url": "https://aws.amazon.com/blogs/compute/introducing-mutual-tls-authentication-for-amazon-api-gateway/" "Url": "https://aws.amazon.com/blogs/compute/introducing-mutual-tls-authentication-for-amazon-api-gateway/"
} }
}, },

View File

@@ -19,7 +19,7 @@
"Terraform": "https://docs.bridgecrew.io/docs/logging_20#terraform" "Terraform": "https://docs.bridgecrew.io/docs/logging_20#terraform"
}, },
"Recommendation": { "Recommendation": {
"Text": "Real-time monitoring can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. Enable logging for services with defined log rotation. This logs are useful for Incident Response and forensics investigation among other use cases.", "Text": "Real-time monitoring can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. Enable logging for services with defined log rotation. These logs are useful for Incident Response and forensics investigation among other use cases.",
"Url": "https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html" "Url": "https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html"
} }
}, },

View File

@@ -19,7 +19,7 @@
"Terraform": "" "Terraform": ""
}, },
"Recommendation": { "Recommendation": {
"Text": "Use a Security policy with a ciphers that are stronger as possible. Drop legacy and unsecure ciphers.", "Text": "Use a Security policy with ciphers that are as strong as possible. Drop legacy and insecure ciphers.",
"Url": "https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html" "Url": "https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html"
} }
}, },

View File

@@ -23,7 +23,7 @@
"Terraform": "" "Terraform": ""
}, },
"Recommendation": { "Recommendation": {
"Text": "Validate that the trails in CloudTrail has an arn set in the CloudWatchLogsLogGroupArn property.", "Text": "Validate that the trails in CloudTrail have an arn set in the CloudWatchLogsLogGroupArn property.",
"Url": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/send-cloudtrail-events-to-cloudwatch-logs.html" "Url": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/send-cloudtrail-events-to-cloudwatch-logs.html"
} }
}, },

View File

@@ -21,7 +21,7 @@
"Terraform": "https://docs.bridgecrew.io/docs/bc_aws_general_43#terraform" "Terraform": "https://docs.bridgecrew.io/docs/bc_aws_general_43#terraform"
}, },
"Recommendation": { "Recommendation": {
"Text": "Use a Security policy with a ciphers that are stronger as possible. Drop legacy and unsecure ciphers.", "Text": "Use a Security policy with ciphers that are as strong as possible. Drop legacy and insecure ciphers.",
"Url": "https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html#describe-ssl-policies" "Url": "https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html#describe-ssl-policies"
} }
}, },

View File

@@ -21,7 +21,7 @@
"Terraform": "https://docs.bridgecrew.io/docs/bc_aws_general_43#terraform" "Terraform": "https://docs.bridgecrew.io/docs/bc_aws_general_43#terraform"
}, },
"Recommendation": { "Recommendation": {
"Text": "Use a Security policy with a ciphers that are stronger as possible. Drop legacy and unsecure ciphers.", "Text": "Use a Security policy with ciphers that are as strong as possible. Drop legacy and insecure ciphers.",
"Url": "https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html#describe-ssl-policies" "Url": "https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html#describe-ssl-policies"
} }
}, },

View File

@@ -23,7 +23,7 @@
"Terraform": "" "Terraform": ""
}, },
"Recommendation": { "Recommendation": {
"Text": "Use the credential report to that the user and ensure the access_key_1_active and access_key_2_active fields are set to FALSE.", "Text": "Use the credential report to check the user and ensure the access_key_1_active and access_key_2_active fields are set to FALSE.",
"Url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html" "Url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html"
} }
}, },