Skip to content

Commit ebcf4c5

Browse files
author
Michael Burke
committed
'Fedora Security Hardening' hyperlink broken
1 parent 7b23bc5 commit ebcf4c5

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

modules/security-hardening-what.adoc

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,15 @@
66

77
= Choosing what to harden in {op-system}
88
ifdef::openshift-origin[]
9-
The link:https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html[{op-system-base} Security Hardening] guide describes how you should approach security for any {op-system-base} system.
9+
For information on how to approach security for any {op-system-base} system, see the link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9#Security[Security] category in the Red{nbsp}Hat Enterprise Linux 9 documentation.
10+
11+
Use these documents to learn about managing security updates, security hardening, securing networks, and other security measures.
1012
endif::[]
1113
ifdef::openshift-enterprise,openshift-webscale,openshift-aro[]
12-
The link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html-single/security_hardening/index#scanning-container-and-container-images-for-vulnerabilities_scanning-the-system-for-security-compliance-and-vulnerabilities[{op-system-base} 9 Security Hardening] guide describes how you should approach security for any {op-system-base} system.
13-
endif::[]
14+
For information on how to approach security for any {op-system-base} system, see the link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html-single/security_hardening/index#scanning-container-and-container-images-for-vulnerabilities_scanning-the-system-for-security-compliance-and-vulnerabilities[{op-system-base} 9 Security Hardening] guide.
1415

1516
Use this guide to learn how to approach cryptography, evaluate vulnerabilities, and assess threats to various services.
1617
Likewise, you can learn how to scan for compliance standards, check file integrity, perform auditing, and encrypt storage devices.
18+
endif::[]
1719

1820
With the knowledge of what features you want to harden, you can then decide how to harden them in {op-system}.

0 commit comments

Comments
 (0)