From 6d3cd5249e36969e0f169ebeebafe01159b192d4 Mon Sep 17 00:00:00 2001 From: Loann Le <84412881+taoism4504@users.noreply.github.com> Date: Tue, 9 Aug 2022 15:09:49 -0700 Subject: [PATCH] modified wording (#16655) --- website/content/docs/internals/architecture.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/content/docs/internals/architecture.mdx b/website/content/docs/internals/architecture.mdx index 6bef5ce7c..38bb9e508 100644 --- a/website/content/docs/internals/architecture.mdx +++ b/website/content/docs/internals/architecture.mdx @@ -16,7 +16,7 @@ The diagram below illustrates the intricacies and distinct components of Vault. [![Architecture Overview](/img/layers.png)](/img/layers.png) -Vault’s encryption layer, referred to as the _barrier_, is responsible for encrypting and decrypting Vault data. When the Vault server starts, it writes data to its storage backend. Since the storage backend resides outside the barrier, it’s considered untrusted so Vault will encrypt the data before it sends them to the storage backend. This mechanism ensures that if an unauthorized attacker attempts to access the storage backend, the data cannot be compromised since it remains encrypted, until Vault decrypts the data. The storage backend provides a durable data persistent layer where data is secured and available across server restarts. +Vault’s encryption layer, referred to as the _barrier_, is responsible for encrypting and decrypting Vault data. When the Vault server starts, it writes data to its storage backend. Since the storage backend resides outside the barrier, it’s considered untrusted so Vault will encrypt the data before it sends them to the storage backend. This mechanism ensures that if a malicious attacker attempts to gain access to the storage backend, the data cannot be compromised since it remains encrypted, until Vault decrypts the data. The storage backend provides a durable data persistent layer where data is secured and available across server restarts. When a Vault server is started, it begins in a _sealed_ state. Before any operation can be performed on Vault, it must be _unsealed_. This is done by