lint formatting fixes
This commit is contained in:
@@ -1,13 +1,15 @@
|
||||
##### Project:
|
||||
::PROJECTNAME
|
||||
##### Project
|
||||
::PROJECT-NAME
|
||||
|
||||
##### Internal Release Number:
|
||||
##### Internal Release Number
|
||||
::X.Y.Z
|
||||
|
||||
##### Related Documents:
|
||||
##### Related Documents
|
||||
|
||||
- [Design](Design) > Design Security
|
||||
- ::LINKS TO RELEVANT STANDARDS
|
||||
- ::LINKS TO OTHER DOCUMENTS
|
||||
|
||||
---
|
||||
|
||||
### Overview
|
||||
@@ -87,7 +89,7 @@ features. Some example text is provided. Add or delete text as needed.*
|
||||
- ::Users must have certificate files on their client machine before
|
||||
they can connect to the server
|
||||
- ::Users must have physical security tokens (e.g., hasp, dongle,
|
||||
smartcard, or fingerprint reader)
|
||||
smart-card, or fingerprint reader)
|
||||
- ::Users are given roles that define their permissions. Those roles
|
||||
are:
|
||||
- ::Guest: Visitor to the site is not logged in, no permissions
|
||||
@@ -101,10 +103,10 @@ features. Some example text is provided. Add or delete text as needed.*
|
||||
- ::Each action (information display or change) requires that the
|
||||
user has a role with proper permissions
|
||||
- ::Compromised or abused accounts can be quickly disabled
|
||||
by administrators. >
|
||||
- ::Administrators can review user > permissions
|
||||
- ::Administrators can audit all a > ccesses and changes
|
||||
- ::All communications with the us > er are encrypted (e.g., SSL)
|
||||
by administrators. >
|
||||
- ::Administrators can review user > permissions
|
||||
- ::Administrators can audit all a > ccesses and changes
|
||||
- ::All communications with the us > er are encrypted (e.g., SSL)
|
||||
- ::Some communications with the user (e.g., the username
|
||||
and password) are encrypted (e.g., SSL)
|
||||
- ::Sessions are tied to a particular client IP-address so that
|
||||
@@ -131,7 +133,6 @@ features. Some example text is provided. Add or delete text as needed.*
|
||||
|
||||
### Security Checklist
|
||||
|
||||
|
||||
#### Protection of data: To what extent has this been achieved?
|
||||
|
||||
::2-4 SENTENCES
|
||||
@@ -145,6 +146,7 @@ features. Some example text is provided. Add or delete text as needed.*
|
||||
::2-4 SENTENCES
|
||||
|
||||
#### Accountability/auditing: To what extent has this been achieved?
|
||||
|
||||
::2-4 SENTENCES
|
||||
|
||||
#### Have these security mechanisms been communicated to the development team and other stakeholders?
|
||||
|
Reference in New Issue
Block a user