mirror of https://github.com/hashicorp/consul
Actually fix spelling of recommendations
I obviously have no idea how to spell this wordpull/9106/head
parent
2d0be0c7a0
commit
8c2f2ca806
|
@ -12,9 +12,9 @@ description: >-
|
||||||
|
|
||||||
## Security Models
|
## Security Models
|
||||||
|
|
||||||
Requirements and reccomendations for operating a secure Consul deployment may vary drastically depending on your
|
Requirements and recommendations for operating a secure Consul deployment may vary drastically depending on your
|
||||||
intended workloads, operating system, and environment. You can find detailed information about the various personas,
|
intended workloads, operating system, and environment. You can find detailed information about the various personas,
|
||||||
reccomendations, requirements, and threats [here](/docs/security/security-models).
|
recommendations, requirements, and threats [here](/docs/security/security-models).
|
||||||
|
|
||||||
## ACLs
|
## ACLs
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@ layout: docs
|
||||||
page_title: Consul Core Security Model
|
page_title: Consul Core Security Model
|
||||||
sidebar_title: Core
|
sidebar_title: Core
|
||||||
description: >-
|
description: >-
|
||||||
Security model including requirements, recomendations, and threats for the core Consul product.
|
Security model including requirements, recommendations, and threats for the core Consul product.
|
||||||
---
|
---
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
|
|
|
@ -8,7 +8,7 @@ description: >-
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
|
|
||||||
Requirements and recomendations for operating a secure Consul deployment may vary drastically depending on your
|
Requirements and recommendations for operating a secure Consul deployment may vary drastically depending on your
|
||||||
intended workloads, operating system, and environment. Consul is not secure by default, but can be configured to satisfy
|
intended workloads, operating system, and environment. Consul is not secure by default, but can be configured to satisfy
|
||||||
the security requirements for a wide-range of use cases from local developer environments without any configuration to
|
the security requirements for a wide-range of use cases from local developer environments without any configuration to
|
||||||
container orchestrators in-production with ACL authorization, and mTLS authentication.
|
container orchestrators in-production with ACL authorization, and mTLS authentication.
|
||||||
|
@ -16,7 +16,7 @@ container orchestrators in-production with ACL authorization, and mTLS authentic
|
||||||
### Core
|
### Core
|
||||||
|
|
||||||
The core Consul product provides several options for enabling encryption, authentication, and authorization
|
The core Consul product provides several options for enabling encryption, authentication, and authorization
|
||||||
controls for a cluster. You can read more about the various personas, recomendations, requirements, and threats
|
controls for a cluster. You can read more about the various personas, recommendations, requirements, and threats
|
||||||
[here](/docs/security/security-models/core).
|
[here](/docs/security/security-models/core).
|
||||||
|
|
||||||
### NIA
|
### NIA
|
||||||
|
@ -24,4 +24,4 @@ controls for a cluster. You can read more about the various personas, recomendat
|
||||||
[Network Infrastructure Automation](/docs/nia) (NIA) enables dynamic updates to network infrastructure devices triggered
|
[Network Infrastructure Automation](/docs/nia) (NIA) enables dynamic updates to network infrastructure devices triggered
|
||||||
by service changes. Both the core Consul product's configuration and the configuration for the `consul-terraform-sync`
|
by service changes. Both the core Consul product's configuration and the configuration for the `consul-terraform-sync`
|
||||||
daemon used by NIA can affect the security of your deploymnet. You can read more about the various personas,
|
daemon used by NIA can affect the security of your deploymnet. You can read more about the various personas,
|
||||||
recomendations, requirements, and threats [here](/docs/security/security-models/nia).
|
recommendations, requirements, and threats [here](/docs/security/security-models/nia).
|
||||||
|
|
|
@ -3,7 +3,7 @@ layout: docs
|
||||||
page_title: Consul NIA Security Model
|
page_title: Consul NIA Security Model
|
||||||
sidebar_title: Network Infrastructure Automation <sup>Tech Preview</sup>
|
sidebar_title: Network Infrastructure Automation <sup>Tech Preview</sup>
|
||||||
description: >-
|
description: >-
|
||||||
Security model including requirements, recomendations, and threats for Consul Network Infrastructure Automation (NIA).
|
Security model including requirements, recommendations, and threats for Consul Network Infrastructure Automation (NIA).
|
||||||
---
|
---
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
|
|
Loading…
Reference in New Issue