From f30d7edf84de62f0e3f44740e183382900ac24c1 Mon Sep 17 00:00:00 2001 From: Gabriel Casals Date: Fri, 25 Aug 2023 15:10:04 +0000 Subject: [PATCH] GITBOOK-873: Fixing links /Sec policy --- .../data-retention-and-disposal.md | 2 +- .../security/security-policy/internal-controls-policy.md | 2 +- .../security/security-policy/network-security.md | 2 +- .../security/security-policy/secure-data-transfer.md | 2 +- .../security/security-policy/secure-development.md | 6 +----- .../security-policy/vulnerability-and-patch-management.md | 2 +- departments-operations/security/security-policy.md | 4 ++-- .../business-continuity-and-disaster-recovery.md | 2 +- 8 files changed, 9 insertions(+), 13 deletions(-) diff --git a/departments-and-operations/security/security-policy/data-classification-and-management/data-retention-and-disposal.md b/departments-and-operations/security/security-policy/data-classification-and-management/data-retention-and-disposal.md index e626d97..fed5e95 100644 --- a/departments-and-operations/security/security-policy/data-classification-and-management/data-retention-and-disposal.md +++ b/departments-and-operations/security/security-policy/data-classification-and-management/data-retention-and-disposal.md @@ -10,6 +10,6 @@ The purpose of this Data Retention Policy is to establish guidelines for the app ## Policy -[Data retention and disposal policy](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/data-classification-and-management/data-retention-and-disposal) is available to all employees and contractors within our internal handbook[.](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/data-classification-and-management/data-retention-and-disposal) +[Data retention and disposal policy](http://127.0.0.1:5000/s/-M7iRWz196Rdn-5pW5QY/security/policies/security-policy/data-classification-and-management/data-retention-and-disposal) is available to all employees and contractors within our internal handbook[.](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/data-classification-and-management/data-retention-and-disposal) ## diff --git a/departments-and-operations/security/security-policy/internal-controls-policy.md b/departments-and-operations/security/security-policy/internal-controls-policy.md index 9c2b708..c4ee1bc 100644 --- a/departments-and-operations/security/security-policy/internal-controls-policy.md +++ b/departments-and-operations/security/security-policy/internal-controls-policy.md @@ -10,4 +10,4 @@ The objective of our internal control policy is to establish and maintain effect ## Policy -[Internal Controls policy](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/internal-controls-policy) is available to all employees and contractors within our internal handbook. +[Internal Controls policy](http://127.0.0.1:5000/s/-M7iRWz196Rdn-5pW5QY/security/policies/security-policy/internal-controls-policy) is available to all employees and contractors within our internal handbook. diff --git a/departments-and-operations/security/security-policy/network-security.md b/departments-and-operations/security/security-policy/network-security.md index 25acea7..40fdbc2 100644 --- a/departments-and-operations/security/security-policy/network-security.md +++ b/departments-and-operations/security/security-policy/network-security.md @@ -10,7 +10,7 @@ The purpose of the network security policy is to establish guidelines and respon ## Policy -[Network security policy](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/network-security) is available to all employees and contractors within our internal handbook. +[Network security policy](http://127.0.0.1:5000/s/-M7iRWz196Rdn-5pW5QY/security/policies/security-policy/network-security) is available to all employees and contractors within our internal handbook. diff --git a/departments-and-operations/security/security-policy/secure-data-transfer.md b/departments-and-operations/security/security-policy/secure-data-transfer.md index 978c429..cad0344 100644 --- a/departments-and-operations/security/security-policy/secure-data-transfer.md +++ b/departments-and-operations/security/security-policy/secure-data-transfer.md @@ -10,4 +10,4 @@ The purpose of Secure Data transfer policy is to establish guidelines and proced ## Policy -[Secure Data Transfer policy](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/secure-data-transfer) +[Secure Data Transfer policy](http://127.0.0.1:5000/s/-M7iRWz196Rdn-5pW5QY/security/policies/security-policy/secure-data-transfer) diff --git a/departments-and-operations/security/security-policy/secure-development.md b/departments-and-operations/security/security-policy/secure-development.md index a715dcd..8a41076 100644 --- a/departments-and-operations/security/security-policy/secure-development.md +++ b/departments-and-operations/security/security-policy/secure-development.md @@ -12,8 +12,4 @@ The purpose of the secure development policy is to ensure that our software deve ## Policy -[Secure Development Policy](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/secure-development) - -\ - - +[Secure Development Policy](http://127.0.0.1:5000/s/-M7iRWz196Rdn-5pW5QY/security/policies/security-policy/secure-development) diff --git a/departments-and-operations/security/security-policy/vulnerability-and-patch-management.md b/departments-and-operations/security/security-policy/vulnerability-and-patch-management.md index 002873b..1f59a20 100644 --- a/departments-and-operations/security/security-policy/vulnerability-and-patch-management.md +++ b/departments-and-operations/security/security-policy/vulnerability-and-patch-management.md @@ -6,4 +6,4 @@ The policy outlines the procedures for detecting, assessing vulnerabilities, and ## Policy -Available at this [link](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/vulnerability-and-patch-management). +Available at this [link](http://127.0.0.1:5000/s/-M7iRWz196Rdn-5pW5QY/security/policies/security-policy/vulnerability-and-patch-management). diff --git a/departments-operations/security/security-policy.md b/departments-operations/security/security-policy.md index fa75065..1d23a71 100644 --- a/departments-operations/security/security-policy.md +++ b/departments-operations/security/security-policy.md @@ -12,11 +12,11 @@ Do you want a short summary? You can find a [security one-pager here!](https://d Because we all must follow our security policies, we have set up a Zoho Sign term that must be filled out and signed by all Rocketeers. -* [Policy Acknowledgment,](https://sign.zoho.com/signform?form\_link=234b4d535f495623d7afa605b2c4f12ecea8c219fde51f54332f67b4dacec1104dff6619576027ca9bb31be732284cc8fa4601fcd081cf3d616fb616760bf4d69625a87df702dd0b) an acknowledgment of our current policies. Mandatory to complete all employees and contractors. +* [Policy Acknowledgment,](https://sign.zoho.com/signform?form\_link=234b4d535f495623d7afa605b2c4f12ecea8c219fde51f54332f67b4dacec1104dff6619576027ca9bb31be732284cc8fa4601fcd081cf3d616fb616760bf4d69625a87df702dd0b) an acknowledgment of our current policies. Mandatory to all employees and contractors. And to set yourself up securely, please follow the guidelines and fill out the form provided in the link below:: -* [Security configuration](https://docs.google.com/forms/d/e/1FAIpQLSffmdQUSHaE2WWX6UHo8BAqT6VM0ijBPxyWwJCkmgeRvSpvkA/viewform?usp=sf\_link) a checklist to set up a basic secure configuration of your tools. Mandatory to complete all employees and contractors. +* [Security configuration](https://docs.google.com/forms/d/e/1FAIpQLSffmdQUSHaE2WWX6UHo8BAqT6VM0ijBPxyWwJCkmgeRvSpvkA/viewform?usp=sf\_link) a checklist to set up a basic secure configuration of your tools. Mandatory to all employees and contractors. {% hint style="info" %} If you have already signed it during the onboarding training, no need to sign again. diff --git a/departments-operations/security/security-policy/business-continuity-and-disaster-recovery.md b/departments-operations/security/security-policy/business-continuity-and-disaster-recovery.md index 6201c50..cdc3a5a 100644 --- a/departments-operations/security/security-policy/business-continuity-and-disaster-recovery.md +++ b/departments-operations/security/security-policy/business-continuity-and-disaster-recovery.md @@ -24,5 +24,5 @@ The components and steps necessary for ensuring continuity of Rocket.Chat servic ## Policy -For details, check our [Business Continuity and Disaster Recovery policy](https://app.gitbook.com/o/-M41dOPtnjO7qK6KCyrt/s/-M7iRWz196Rdn-5pW5QY/\~/changes/1876/security/security-policies/security-policy/business-continuity-and-disaster-recovery) in the internal handbook +For details, check our [Business Continuity and Disaster Recovery policy](http://127.0.0.1:5000/s/-M7iRWz196Rdn-5pW5QY/security/policies/security-policy/business-continuity-and-disaster-recovery) in the internal handbook