diff --git a/.github/workflows/build-docs.yml b/.github/workflows/build-docs.yml new file mode 100644 index 00000000..2befa157 --- /dev/null +++ b/.github/workflows/build-docs.yml @@ -0,0 +1,28 @@ +name: "Pull Request Docs Check" +on: +- pull_request + +jobs: + docs: + runs-on: ubuntu-latest + steps: + - name: Check out repository code + uses: actions/checkout@v3 + - name: Install prerequisites + run: | + sudo apt-get --allow-releaseinfo-change update -y && sudo apt-get install -y tox + - name: Building RM in HTML + run: | + cd doc/ref_model + echo "---------------------------------------------------------------------------------------" + echo "---------------------------------- Building RM in HTML --------------------------------" + echo "---------------------------------------------------------------------------------------" + tox -e docs + echo "Building RM in html was successful! " + - name: Store html build result + uses: actions/upload-artifact@v3 + with: + name: rm-html + path: | + doc/ref_model/build + diff --git a/doc/ref_model/chapters/chapter07.rst b/doc/ref_model/chapters/chapter07.rst index e02f9d24..6f9585eb 100644 --- a/doc/ref_model/chapters/chapter07.rst +++ b/doc/ref_model/chapters/chapter07.rst @@ -1053,8 +1053,8 @@ In Australia, the telecommunication sector is regulated by the The ACCC is responsible for the economic regulation of the communications sector, including telecommunications and the National Broadband Network (NBN), broadcasting and content sectors. -From the cloud services security perspective, the Australian Cyber Security Centre (ACSC) produced -`Information Security Manual (ISM) `__, +From the cloud services security perspective, the Australian Cyber Security Centre (ACSC) produced `Information Security +Manual (ISM) `__, is of particular importance. The purpose of the ISM is to outline a cyber security framework that organisations can apply, using their risk management framework, to protect their information and systems from cyber threats. The ISM is intended for Chief Information Security Officers, Chief Information Officers, cyber security professionals and