Skip to content

Commit 74130ea

Browse files
committed
Update: Add documentation on how logical IDs are generated during synthesis
1 parent d4e0cf6 commit 74130ea

File tree

5 files changed

+937
-410
lines changed

5 files changed

+937
-410
lines changed

v2/best-practices-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ By modifying permissions for the roles assumed during deployment, you can manage
5757

5858
#### Modify the security credentials and roles used during deployment<a name="best-practices-security-permissions-deployments-creds"></a>
5959

60-
The roles and bootstrap resources that are used during deployments are determined by the CDK stack synthesizer that you use\. To modify this behavior, you can customize synthesis\. For more information, see [Configure and customize CDK stack synthesis](configure-synth.md)\.
60+
The roles and bootstrap resources that are used during deployments are determined by the CDK stack synthesizer that you use\. To modify this behavior, you can customize synthesis\. For more information, see [Configure and perform CDK stack synthesis](configure-synth.md)\.
6161

6262
#### Considerations for granting least privilege access<a name="best-practices-security-permissions-deployments-least"></a>
6363

0 commit comments

Comments
 (0)