Skip to content

Commit

Permalink
Apply suggestions from code review
Browse files Browse the repository at this point in the history
Co-authored-by: Tabitha Sable <51767484+tabbysable@users.noreply.github.com>
Co-authored-by: Anshuman Tripathi <anshuman.tripathi305@gmail.com>
  • Loading branch information
3 people authored Feb 16, 2024
1 parent fc9f380 commit 9a51f85
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion content/en/docs/concepts/security/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ define [policies](#policies) that can form part of how you manage information se

### Control plane protection

A key security mechanism for any Kubernetes is to
A key security mechanism for any Kubernetes cluster is to
[control access to the Kubernetes API](/docs/concepts/security/controlling-access).

You can define [encryption at rest](/docs/tasks/administer-cluster/encrypt-data/)
Expand Down
4 changes: 2 additions & 2 deletions content/en/docs/concepts/security/cloud-native-security.md
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ To achieve this, you can:
Ensure appropriate restrictions on what can be deployed, who can deploy it,
and where it can be deployed to.
You can enforce measures from the _distribute_ phase, such as verifying the
cryptographic identity of container image artefacts.
cryptographic identity of container image artifacts.

When you deploy Kubernetes, you also set the foundation for your
applications' runtime environment: a Kubernetes cluster (or
Expand Down Expand Up @@ -125,7 +125,7 @@ the runtime(s) that you choose meet your information security needs.
To protect your compute at runtime, you can:

1. Enforce [Pod security standards](/docs/concepts/security/pod-security-standards/)
for applications, based on the level of trust you have in them.
for applications, to help ensure they run with only the necessary privileges.
1. Run a specialized operating system on your nodes that is designed specifically
for running containerized workloads. This is typically based on a read-only
operating system (_immutable image_) that provides only the services
Expand Down

0 comments on commit 9a51f85

Please sign in to comment.