968e67547a
- Revised "What is Nomad" copy - Added "Key Features" section with links to task drivers & device plugins with lift-and-shift from README - Added "Who Uses Nomad" section with users, talks, blog posts - Removed Hadoop YARN, Docker Swarm, HTCondor from comparisons - Revamped Guides section - Inserted "Installing Nomad", "Upgrading", "Integrations" as persistent in Guides navbar - Split Installing Nomad into two paths for users (one for Sandbox with "Quickstart", one for Production) - Surfaced "Upgrading" and "Integrations" section from documentation - Changed "Job Lifecycle" section into "Deploying & Managing Applications" - Reworked "Operations" into "Operating Nomad" - Reworked "Security" into "Securing Nomad" - Segmented Namespaces, Resource Quotas, Sentinel into "Governance & Policy" subsection - Reworked "Spark integration" into its own "Analytical Workloads" section
16 lines
363 B
Markdown
16 lines
363 B
Markdown
---
|
|
layout: "guides"
|
|
page_title: "Security"
|
|
sidebar_current: "guides-security"
|
|
description: |-
|
|
Learn how to use Nomad safely and securely in a multi-team setting.
|
|
---
|
|
|
|
# Security
|
|
|
|
The Nomad Security section provides best practices and
|
|
guidance for securing Nomad in an enterprise environment.
|
|
|
|
Please
|
|
navigate the appropriate sub-sections for more information.
|