You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/book/src/developer/providers/security-guidelines.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ There are several critical areas that any infrastructure provider implementer mu
6
6
-**Ensuring secure access to VMs** for troubleshooting, with proper authentication methods.
7
7
-**Controlling manual operations** performed on cloud infrastructure targeted by the provider.
8
8
-**Housekeeping** of the cloud infrastructure, ensuring timely cleanup and garbage collection of unused resources.
9
-
-**Securing Machine's bootstrap data** ensuring protection oversensitive data that might be included in it.
9
+
-**Securing Machine's bootstrap data** ensuring protection of oversensitive data that might be included in it.
10
10
11
11
The following list outlines high-level security recommendations. It is a community-maintained resource, and everyone’s contributions are essential to continuously improve and adapt these best practices. Each provider implementer is responsible for translating these recommendations to fit the context of their specific cloud provider:
12
12
@@ -26,4 +26,4 @@ The following list outlines high-level security recommendations. It is a communi
26
26
Any cloud resource not linked to a cluster after a fixed configurable period, created by cloud credentials, should be automatically deleted or marked for garbage collection to avoid resource sprawl.
27
27
28
28
6.**Securing Machine's bootstrap data**:
29
-
Bootstrap data are usually stored in machine's metadata, and they might contain sensitive data, like e.g. Cluster secrets, user credentials, ssh certificates etc. It is important to ensure protections of those metadata, or if not possible, to clean up them immediately after machine bootstrap.
29
+
Bootstrap data are usually stored in machine's metadata, and they might contain sensitive data, like e.g. Cluster secrets, user credentials, ssh certificates etc. It is important to ensure protection of this metadata, or if not possible, to clean it up immediately after machine bootstrap.
0 commit comments