parent
9f802dffc2
commit
ef4c2f40d7
|
@ -3,7 +3,7 @@ layout: docs
|
|||
page_title: Consul Core Security Model
|
||||
sidebar_title: Core
|
||||
description: >-
|
||||
Security model including requirements, reccomendations, and threats for the core Consul product.
|
||||
Security model including requirements, recomendations, and threats for the core Consul product.
|
||||
---
|
||||
|
||||
## Overview
|
||||
|
|
|
@ -8,7 +8,7 @@ description: >-
|
|||
|
||||
## Overview
|
||||
|
||||
Requirements and reccomendations for operating a secure Consul deployment may vary drastically depending on your
|
||||
Requirements and recomendations for operating a secure Consul deployment may vary drastically depending on your
|
||||
intended workloads, operating system, and environment. Consul is not secure by default, but can be configured to satisfy
|
||||
the security requirements for a wide-range of use cases from local developer environments without any configuration to
|
||||
container orchestrators in-production with ACL authorization, and mTLS authentication.
|
||||
|
@ -16,7 +16,7 @@ container orchestrators in-production with ACL authorization, and mTLS authentic
|
|||
### Core
|
||||
|
||||
The core Consul product provides several options for enabling encryption, authentication, and authorization
|
||||
controls for a cluster. You can read more about the various personas, reccomendations, requirements, and threats
|
||||
controls for a cluster. You can read more about the various personas, recomendations, requirements, and threats
|
||||
[here](/docs/security/security-models/core).
|
||||
|
||||
### NIA
|
||||
|
@ -24,4 +24,4 @@ controls for a cluster. You can read more about the various personas, reccomenda
|
|||
[Network Infrastructure Automation](/docs/nia) (NIA) enables dynamic updates to network infrastructure devices triggered
|
||||
by service changes. Both the core Consul product's configuration and the configuration for the `consul-terraform-sync`
|
||||
daemon used by NIA can affect the security of your deploymnet. You can read more about the various personas,
|
||||
reccomendations, requirements, and threats [here](/docs/security/security-models/nia).
|
||||
recomendations, requirements, and threats [here](/docs/security/security-models/nia).
|
||||
|
|
|
@ -3,7 +3,7 @@ layout: docs
|
|||
page_title: Consul NIA Security Model
|
||||
sidebar_title: Network Infrastructure Automation <sup>Tech Preview</sup>
|
||||
description: >-
|
||||
Security model including requirements, reccomendations, and threats for Consul Network Infrastructure Automation (NIA).
|
||||
Security model including requirements, recomendations, and threats for Consul Network Infrastructure Automation (NIA).
|
||||
---
|
||||
|
||||
## Overview
|
||||
|
|
Loading…
Reference in New Issue