Commit 4c64234e authored by Santeri Toikka's avatar Santeri Toikka
Browse files

Fixed spelling

parent 345298da
Loading
Loading
Loading
Loading
+8 −8
Original line number Diff line number Diff line
@@ -795,7 +795,7 @@ In addition, the managed device can have a configuration port, management API, f
- **[REQ-AUTH-6]:** All access to administrative interfaces, control functions, and sensitive operations shall be subject to strong authentication of users, services, or integrated components.
- **[REQ-AUTH-7]:** Privileged interfaces shall be protected with [5.2.4 State-of-the-art cryptographic libraries].

<mark>TODO: define usage of machine credentials better, consider the cli over ssh controlled nms scenario</mark>
<mark>TODO: define usage of machine credentials better, consider the cli over ssh controlled scenario</mark>

### 5.2.7 Remote Data Processing Systems

@@ -1466,7 +1466,7 @@ There are three different types of assessments used in this document.
**Objective:** Prevent compromised managed element to hide its behaviour.<br/>
**Preparation:**

1.  Have the NMS product initialised and available with the default configuration.
1.  Have the product initialised and available with the default configuration.
2.  Create required authentication credentials for the test.
3.  Prepare an import data set, that represents natural collected values from the target.
4.  Create a copy of the import data set and modify the values.
@@ -1514,7 +1514,7 @@ There are three different types of assessments used in this document.
**Objective:** Metrics storage consumes alot of storage, and also affects persons privacy as rarely the data is deleted on demand.<br/>
**Preparation:**

1.  Have the NMS product initialised and available with the default configuration and required credentials.
1.  Have the product initialised and available with the default configuration and required credentials.

**Activities:**

@@ -1563,7 +1563,7 @@ There are three different types of assessments used in this document.

**Preparation:**

1.  Have the NMS product initialised and available with the default configuration and required credentials.
1.  Have the product initialised and available with the default configuration and required credentials.
2.  Have the managed element initialised and available with the default configuration and required credentials.

**Activities:**
@@ -1584,8 +1584,8 @@ There are three different types of assessments used in this document.
**Objective:** Bad availability can be a indication of compromise.<br/>
**Preparation:**

1.  Have the NMS product initialised and available with the default configuration and required credentials.
1.  Have the managed element initialised and available with the default configuration and required credentials.
1.  Have the product initialised and available with the default configuration and required credentials.
2.  Have the managed element initialised and available with the default configuration and required credentials.

**Activities:**

@@ -1688,7 +1688,7 @@ There are three different types of assessments used in this document.
**Objective:**
**Preparation:**

1.  Have the NMS product initialised and available with the default configuration and required credentials.
1.  Have the product initialised and available with the default configuration and required credentials.

**Activities:**

@@ -1710,7 +1710,7 @@ There are three different types of assessments used in this document.
**Objective:** <br/>
**Preparation:**

1.  Have the NMS product initialised and available with the default configuration and required credentials.
1.  Have the product initialised and available with the default configuration and required credentials.

**Activities:**