modified wording (#16655)

This commit is contained in:
Loann Le 2022-08-09 15:09:49 -07:00 committed by GitHub
parent 18d336b16c
commit 6d3cd5249e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 1 additions and 1 deletions

View File

@ -16,7 +16,7 @@ The diagram below illustrates the intricacies and distinct components of Vault.
[![Architecture Overview](/img/layers.png)](/img/layers.png) [![Architecture Overview](/img/layers.png)](/img/layers.png)
Vaults encryption layer, referred to as the _barrier_, is responsible for encrypting and decrypting Vault data. When the Vault server starts, it writes data to its storage backend. Since the storage backend resides outside the barrier, its considered untrusted so Vault will encrypt the data before it sends them to the storage backend. This mechanism ensures that if an unauthorized attacker attempts to access the storage backend, the data cannot be compromised since it remains encrypted, until Vault decrypts the data. The storage backend provides a durable data persistent layer where data is secured and available across server restarts. Vaults encryption layer, referred to as the _barrier_, is responsible for encrypting and decrypting Vault data. When the Vault server starts, it writes data to its storage backend. Since the storage backend resides outside the barrier, its considered untrusted so Vault will encrypt the data before it sends them to the storage backend. This mechanism ensures that if a malicious attacker attempts to gain access to the storage backend, the data cannot be compromised since it remains encrypted, until Vault decrypts the data. The storage backend provides a durable data persistent layer where data is secured and available across server restarts.
When a Vault server is started, it begins in a _sealed_ state. Before any When a Vault server is started, it begins in a _sealed_ state. Before any
operation can be performed on Vault, it must be _unsealed_. This is done by operation can be performed on Vault, it must be _unsealed_. This is done by