Skip to content

Commit c3b54fa

Browse files
authored
Merge pull request #91125 from mburke5678/okd-update-fedora-link
[OKD] 'Fedora Security Hardening' hyperlink broken
2 parents d0c06af + ebcf4c5 commit c3b54fa

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

modules/security-hardening-what.adoc

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,15 @@
66

77
= Choosing what to harden in {op-system}
88
ifdef::openshift-origin[]
9-
The link:https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html[{op-system-base} Security Hardening] guide describes how you should approach security for any {op-system-base} system.
9+
For information on how to approach security for any {op-system-base} system, see the link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9#Security[Security] category in the Red{nbsp}Hat Enterprise Linux 9 documentation.
10+
11+
Use these documents to learn about managing security updates, security hardening, securing networks, and other security measures.
1012
endif::[]
1113
ifdef::openshift-enterprise,openshift-webscale,openshift-aro[]
12-
The link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html-single/security_hardening/index#scanning-container-and-container-images-for-vulnerabilities_scanning-the-system-for-security-compliance-and-vulnerabilities[{op-system-base} 9 Security Hardening] guide describes how you should approach security for any {op-system-base} system.
13-
endif::[]
14+
For information on how to approach security for any {op-system-base} system, see the link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html-single/security_hardening/index#scanning-container-and-container-images-for-vulnerabilities_scanning-the-system-for-security-compliance-and-vulnerabilities[{op-system-base} 9 Security Hardening] guide.
1415

1516
Use this guide to learn how to approach cryptography, evaluate vulnerabilities, and assess threats to various services.
1617
Likewise, you can learn how to scan for compliance standards, check file integrity, perform auditing, and encrypt storage devices.
18+
endif::[]
1719

1820
With the knowledge of what features you want to harden, you can then decide how to harden them in {op-system}.

0 commit comments

Comments
 (0)