Skip to content

Commit e564461

Browse files
committed
fixup! Fix small mistakes
Signed-off-by: Hannes Baum <[email protected]>
1 parent f68ee02 commit e564461

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

Standards/scs-0216-v1-high-security-setup.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Nevertheless, a provider (or even a customer) needs to take action in order to a
1515
hardened, secure cluster due to the myriad of configurations possible. This is especially
1616
the case since Kubernetes ships with insecure features and configurations out of the box,
1717
which will need to be mitigated by an administrator with the proper knowledge.
18-
Hardened, secure Kubernetes clusters are desirable regardless of the possible threat model,
18+
Hardened, secure Kubernetes clusters are desirable regardless of the possible threat model,
1919
since higher security doesn't necessarily mean higher complexity in this case.
2020

2121
## Motivation
@@ -111,7 +111,7 @@ Multiple policies can be setup to limit and control the capabilities of workload
111111
especially in order to prevent malicious actors from exploiting obvious faults or even to
112112
just prevent incorrectly configured workloads from overusing resources.
113113

114-
An easy way to do this would be Resource Limiting on a cluster. This can be done on a per-namespace
114+
An easy way to do this would be Resource Limiting on a cluster. This can be done on a per-namespace
115115
basis and can prevent the overuse of resources or even prevent the creation of too many pods, services or volumes.
116116

117117
It is also possible to change the security context of a pod, which changes different settings of a pod, like

0 commit comments

Comments
 (0)