mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 21:46:22 +01:00
OCPBUGS-46020: Fixed link in Location section of Proxy cert doc
This commit is contained in:
committed by
openshift-cherrypick-robot
parent
38404cd886
commit
ec8a7167b3
@@ -6,18 +6,13 @@
|
||||
|
||||
= Choosing what to harden in {op-system}
|
||||
ifdef::openshift-origin[]
|
||||
The link:https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html[{op-system-base} Security Hardening] guide describes how you should approach security for any
|
||||
{op-system-base} system.
|
||||
The link:https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html[{op-system-base} Security Hardening] guide describes how you should approach security for any {op-system-base} system.
|
||||
endif::[]
|
||||
ifdef::openshift-enterprise,openshift-webscale,openshift-aro[]
|
||||
The link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/security_hardening/index#scanning-container-and-container-images-for-vulnerabilities_scanning-the-system-for-security-compliance-and-vulnerabilities[{op-system-base} 8 Security Hardening] guide describes how you should approach security for any
|
||||
{op-system-base} system.
|
||||
The link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html-single/security_hardening/index#scanning-container-and-container-images-for-vulnerabilities_scanning-the-system-for-security-compliance-and-vulnerabilities[{op-system-base} 9 Security Hardening] guide describes how you should approach security for any {op-system-base} system.
|
||||
endif::[]
|
||||
|
||||
Use this guide to learn how to approach cryptography, evaluate
|
||||
vulnerabilities, and assess threats to various services.
|
||||
Likewise, you can learn how to scan for compliance standards, check file
|
||||
integrity, perform auditing, and encrypt storage devices.
|
||||
Use this guide to learn how to approach cryptography, evaluate vulnerabilities, and assess threats to various services.
|
||||
Likewise, you can learn how to scan for compliance standards, check file integrity, perform auditing, and encrypt storage devices.
|
||||
|
||||
With the knowledge of what features you want to harden, you can then
|
||||
decide how to harden them in {op-system}.
|
||||
With the knowledge of what features you want to harden, you can then decide how to harden them in {op-system}.
|
||||
|
||||
@@ -64,9 +64,7 @@ The user-provided trust bundle is represented as a config map. The config map is
|
||||
|
||||
Complete proxy support means connecting to the specified proxy and trusting any signatures it has generated. Therefore, it is necessary to let the user specify a trusted root, such that any certificate chain connected to that trusted root is also trusted.
|
||||
|
||||
If using the RHCOS trust bundle, place CA certificates in `/etc/pki/ca-trust/source/anchors`.
|
||||
|
||||
See link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/using-shared-system-certificates_security-hardening[Using shared system certificates] in the Red Hat Enterprise Linux documentation for more information.
|
||||
If you use the {op-system} trust bundle, place CA certificates in `/etc/pki/ca-trust/source/anchors`. For more information, see link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/securing_networks/using-shared-system-certificates_securing-networks[Using shared system certificates] in the {op-system-base-full} _Securing networks_ document.
|
||||
|
||||
== Expiration
|
||||
|
||||
|
||||
Reference in New Issue
Block a user