Actually fix spelling of recommendations

I obviously have no idea how to spell this word
This commit is contained in:
Kent 'picat' Gruber 2020-11-05 11:13:14 -05:00
parent ef4c2f40d7
commit 2c62e82143
4 changed files with 7 additions and 7 deletions

View File

@ -12,9 +12,9 @@ description: >-
## Security Models
Requirements and reccomendations for operating a secure Consul deployment may vary drastically depending on your
Requirements and recommendations for operating a secure Consul deployment may vary drastically depending on your
intended workloads, operating system, and environment. You can find detailed information about the various personas,
reccomendations, requirements, and threats [here](/docs/security/security-models).
recommendations, requirements, and threats [here](/docs/security/security-models).
## ACLs

View File

@ -3,7 +3,7 @@ layout: docs
page_title: Consul Core Security Model
sidebar_title: Core
description: >-
Security model including requirements, recomendations, and threats for the core Consul product.
Security model including requirements, recommendations, and threats for the core Consul product.
---
## Overview

View File

@ -8,7 +8,7 @@ description: >-
## Overview
Requirements and recomendations for operating a secure Consul deployment may vary drastically depending on your
Requirements and recommendations for operating a secure Consul deployment may vary drastically depending on your
intended workloads, operating system, and environment. Consul is not secure by default, but can be configured to satisfy
the security requirements for a wide-range of use cases from local developer environments without any configuration to
container orchestrators in-production with ACL authorization, and mTLS authentication.
@ -16,7 +16,7 @@ container orchestrators in-production with ACL authorization, and mTLS authentic
### Core
The core Consul product provides several options for enabling encryption, authentication, and authorization
controls for a cluster. You can read more about the various personas, recomendations, requirements, and threats
controls for a cluster. You can read more about the various personas, recommendations, requirements, and threats
[here](/docs/security/security-models/core).
### NIA
@ -24,4 +24,4 @@ controls for a cluster. You can read more about the various personas, recomendat
[Network Infrastructure Automation](/docs/nia) (NIA) enables dynamic updates to network infrastructure devices triggered
by service changes. Both the core Consul product's configuration and the configuration for the `consul-terraform-sync`
daemon used by NIA can affect the security of your deploymnet. You can read more about the various personas,
recomendations, requirements, and threats [here](/docs/security/security-models/nia).
recommendations, requirements, and threats [here](/docs/security/security-models/nia).

View File

@ -3,7 +3,7 @@ layout: docs
page_title: Consul NIA Security Model
sidebar_title: Network Infrastructure Automation <sup>Tech Preview</sup>
description: >-
Security model including requirements, recomendations, and threats for Consul Network Infrastructure Automation (NIA).
Security model including requirements, recommendations, and threats for Consul Network Infrastructure Automation (NIA).
---
## Overview