Skip to content

Commit 5ff288b

Browse files
committed
user -> customer
1 parent 5bfa801 commit 5ff288b

File tree

1 file changed

+2
-2
lines changed
  • changes/2020-07-14_multi-keyring-require-generation

1 file changed

+2
-2
lines changed

changes/2020-07-14_multi-keyring-require-generation/change.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ then its usefulness is limited.
6363
Customers might have a compliance requirement that all data keys MUST be generated by a specific HSM,
6464
or might want to lock down true least-privilege permissions for their AWS KMS key policies.
6565
Under the current model,
66-
users have to be very careful to make sure that they know
66+
customers have to be very careful to make sure that they know
6767
exactly where and how a given multi-keyring configuration is being used
6868
rather than being certain that it will always do the same thing no matter what.
6969

@@ -79,7 +79,7 @@ between security and usability.
7979
## Security Implications
8080

8181
Removing this flexibility might help identify potential security issues,
82-
as users might discover when upgrading their ESDK version
82+
as customers might discover when upgrading their ESDK version
8383
that data keys are not being generated as intended.
8484
Correcting this will in turn provide the opportunity
8585
to improve their security postures

0 commit comments

Comments
 (0)