From e51dbbf5290d85a6f475f324d787822b17a0a125 Mon Sep 17 00:00:00 2001 From: Kent 'picat' Gruber Date: Thu, 5 Nov 2020 15:59:53 -0500 Subject: [PATCH] Soften language by replacing utilize with use --- website/pages/docs/security/security-models/core.mdx | 6 +++--- website/pages/docs/security/security-models/nia.mdx | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/website/pages/docs/security/security-models/core.mdx b/website/pages/docs/security/security-models/core.mdx index 6cd8dede83..1287314685 100644 --- a/website/pages/docs/security/security-models/core.mdx +++ b/website/pages/docs/security/security-models/core.mdx @@ -11,8 +11,8 @@ description: >- Consul enables automation of network configurations, service discovery, and secure network connectivity across any cloud or runtime. -Consul utilizes a lightweight gossip and RPC system which provides various essential features. Both of these systems -provide security mechanisms which should be utilized to enable confidentiality, integrity and authentication. +Consul uses a lightweight gossip and RPC system which provides various essential features. Both of these systems +provide security mechanisms which should be used to enable confidentiality, integrity and authentication. Using defense in depth is crucial for Consul security, and deployment requirements may differ drastically depending on your use case. Some security features for multi-tenant deployments are offered exclusively in the enterprise version. @@ -157,7 +157,7 @@ environment and adapt these configurations accordingly. environments. Consul OSS clusters always operate within the “default” namespace. - **Gossip Encryption** - A shared, base64-encoded 32-byte symmetric key is required to [encrypt Serf gossip - communication](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) within a cluster utilizing + communication](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) within a cluster using AES GCM. The key size determines which AES encryption types to use; 16, 24, or 32 bytes to select AES-128, AES-192, or AES-256 respectively. 32-byte keys are ultimately preferable and is the default size generated by the `keygen` command. This key should be diff --git a/website/pages/docs/security/security-models/nia.mdx b/website/pages/docs/security/security-models/nia.mdx index 0e83de152a..f085a4f921 100644 --- a/website/pages/docs/security/security-models/nia.mdx +++ b/website/pages/docs/security/security-models/nia.mdx @@ -9,7 +9,7 @@ description: >- ## Overview Consul Network Infrastructure Automation (NIA) enables declarative workflows to handle Day-2 network security -infrastructure tasks for network, security, and operations teams. NIA utilizes [Terraform](https://www.terraform.io/) +infrastructure tasks for network, security, and operations teams. NIA uses [Terraform](https://www.terraform.io/) to propagate Consul catalog changes, and relevant configuration to network appliances, or network APIs. ### Personas