diff --git a/website/pages/docs/security/index.mdx b/website/pages/docs/security/index.mdx index bff97f1aa..2ffa1004d 100644 --- a/website/pages/docs/security/index.mdx +++ b/website/pages/docs/security/index.mdx @@ -12,9 +12,9 @@ description: >- ## Security Models -Requirements and reccomendations for operating a secure Consul deployment may vary drastically depending on your +Requirements and recommendations for operating a secure Consul deployment may vary drastically depending on your intended workloads, operating system, and environment. You can find detailed information about the various personas, -reccomendations, requirements, and threats [here](/docs/security/security-models). +recommendations, requirements, and threats [here](/docs/security/security-models). ## ACLs diff --git a/website/pages/docs/security/security-models/core.mdx b/website/pages/docs/security/security-models/core.mdx index 0cee0a4d1..6cd8dede8 100644 --- a/website/pages/docs/security/security-models/core.mdx +++ b/website/pages/docs/security/security-models/core.mdx @@ -3,7 +3,7 @@ layout: docs page_title: Consul Core Security Model sidebar_title: Core description: >- - Security model including requirements, recomendations, and threats for the core Consul product. + Security model including requirements, recommendations, and threats for the core Consul product. --- ## Overview diff --git a/website/pages/docs/security/security-models/index.mdx b/website/pages/docs/security/security-models/index.mdx index 484d3d5cc..1feb44789 100644 --- a/website/pages/docs/security/security-models/index.mdx +++ b/website/pages/docs/security/security-models/index.mdx @@ -8,7 +8,7 @@ description: >- ## Overview -Requirements and recomendations for operating a secure Consul deployment may vary drastically depending on your +Requirements and recommendations for operating a secure Consul deployment may vary drastically depending on your intended workloads, operating system, and environment. Consul is not secure by default, but can be configured to satisfy the security requirements for a wide-range of use cases from local developer environments without any configuration to container orchestrators in-production with ACL authorization, and mTLS authentication. @@ -16,7 +16,7 @@ container orchestrators in-production with ACL authorization, and mTLS authentic ### Core The core Consul product provides several options for enabling encryption, authentication, and authorization -controls for a cluster. You can read more about the various personas, recomendations, requirements, and threats +controls for a cluster. You can read more about the various personas, recommendations, requirements, and threats [here](/docs/security/security-models/core). ### NIA @@ -24,4 +24,4 @@ controls for a cluster. You can read more about the various personas, recomendat [Network Infrastructure Automation](/docs/nia) (NIA) enables dynamic updates to network infrastructure devices triggered by service changes. Both the core Consul product's configuration and the configuration for the `consul-terraform-sync` daemon used by NIA can affect the security of your deploymnet. You can read more about the various personas, -recomendations, requirements, and threats [here](/docs/security/security-models/nia). +recommendations, requirements, and threats [here](/docs/security/security-models/nia). diff --git a/website/pages/docs/security/security-models/nia.mdx b/website/pages/docs/security/security-models/nia.mdx index 99d2939d9..0e83de152 100644 --- a/website/pages/docs/security/security-models/nia.mdx +++ b/website/pages/docs/security/security-models/nia.mdx @@ -3,7 +3,7 @@ layout: docs page_title: Consul NIA Security Model sidebar_title: Network Infrastructure Automation Tech Preview description: >- - Security model including requirements, recomendations, and threats for Consul Network Infrastructure Automation (NIA). + Security model including requirements, recommendations, and threats for Consul Network Infrastructure Automation (NIA). --- ## Overview