Skip to content

Commit feb9e27

Browse files
sethmlarsonezio-melottihugovk
authored
Apply suggestions from code review
Co-authored-by: Ezio Melotti <ezio.melotti@gmail.com> Co-authored-by: Hugo van Kemenade <1324225+hugovk@users.noreply.github.com>
1 parent 96e381d commit feb9e27

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

developer-workflow/psrt.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ If a code signing certificate is reported as "compromised" or "malware signed wi
101101
the Python Security Response Team must request the following information from the reporter:
102102

103103
* Checksum(s) of binaries signed by certificate.
104-
* Signature(s) of binaries signed by ceritificate.
104+
* Signature(s) of binaries signed by certificate.
105105

106106
To avoid unnecessary user confusion and churn around revoking code signing certificates,
107107
any reports **must be verifiable independently by the PSRT before taking destructive
@@ -115,11 +115,11 @@ take investigative steps to verify the report, such as:
115115
* Checking the Azure Pipelines and Azure Trusted Signing audit logs for signs of compromise.
116116

117117
If any signs of compromise or incorrectly signed binaries are discovered by the PSRT, only
118-
will certificates be revoked and an advisory published.
118+
then will certificates be revoked and an advisory published.
119119
If compromise is reported, the following non-destructive actions can be taken by the PSRT without
120120
verifying the reported information as a precaution, if relevant:
121121

122-
* Rotating secrets associated with code signing (``TrustedSigningSecret`` for Azure Trusted Publishing)
122+
* Rotating secrets associated with code signing (``TrustedSigningSecret`` for Azure Trusted Publishing).
123123
* Resetting passwords for accounts with access to signing certificates.
124124

125125
Template responses

0 commit comments

Comments
 (0)