From 796b07e2c72265bca0575a59b15e7ba695dc9411 Mon Sep 17 00:00:00 2001 From: Joonas Somero Date: Wed, 3 Dec 2025 08:40:15 +0200 Subject: [PATCH] Indicate broken link with FIXME --- docs/data/datasets/best-encryption-practices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/data/datasets/best-encryption-practices.md b/docs/data/datasets/best-encryption-practices.md index c4262d0ccc..01842f8c91 100644 --- a/docs/data/datasets/best-encryption-practices.md +++ b/docs/data/datasets/best-encryption-practices.md @@ -301,7 +301,7 @@ file and directory names are encrypted. [https://docs.aws.amazon.com/AmazonS3/latest/dev/security-best-practices.html](https://docs.aws.amazon.com/AmazonS3/latest/dev/security-best-practices.html){ target=_blank } [^6]: Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 [https://cloudsecurityalliance.org/artifacts/security-guidance-v4](https://cloudsecurityalliance.org/artifacts/security-guidance-v4){ target=_blank } -[^7]: Katakri 2015 — Tietoturvallisuuden auditointityökalu viranomaisille +[^7]: FIXME Katakri 2015 — Tietoturvallisuuden auditointityökalu viranomaisille [https://www.defmin.fi/files/3165/Katakri_2015_Tietoturvallisuuden_auditointityokalu_viranomaisille.pdf)](https://www.defmin.fi/files/3165/Katakri_2015_Tietoturvallisuuden_auditointityokalu_viranomaisille.pdf){ target=_blank } [^8]: NIST Recommendation for Password-Based Key Derivation. Part 1: Storage Applications [https://doi.org/10.6028/NIST.SP.800-132](https://doi.org/10.6028/NIST.SP.800-132){ target=_blank }