Skip to content

Conversation

@JustinCappos
Copy link
Contributor

I think this is a really contrived example. I'd welcome a different example that doesn't sound so silly.

I think this is a really contrived example.   I'd welcome a different example that doesn't sound so silly.

Signed-off-by: Justin Cappos <justincappos@gmail.com>
Co-authored-by: Andrew Martin <sublimino@gmail.com>
Signed-off-by: Justin Cappos <justincappos@gmail.com>
Copy link
Contributor

@trumant trumant left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This paragraph doesn't seem to naturally follow from the discussion above about a "tiered model".

Perhaps this content is better placed following the ##Approach heading or further down in the document.


## What is an assessment and how does it relate to an audit

Both a security assessment and a security audit help to understand the security of a system and play different, but overlapping, roles. A security audit focuses primarily at looking for security defects in a project's implementation or a deviation from established best practices. In contrast, an assessment focuses on thinking about what a reasonable project of this type might be expected to provide in terms of security properties and potential gotchas for users.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

NIt: you are using 2 spaces following a period, whereas all other text here uses a single space following a period.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants