Skip to content

Commit 5f7579a

Browse files
committed
Acrolinx recommended updates
1 parent 1d9508c commit 5f7579a

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/operator-nexus/howto-use-azure-policy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: template-how-to
1111

1212
# Use Azure Policy to secure your Nexus resources
1313

14-
In this article, you'll learn how to use Azure Policy to secure and validate the compliance status of your Nexus resources.
14+
In this article, you can learn how to use Azure Policy to secure and validate the compliance status of your Nexus resources.
1515

1616
## Before you begin
1717

@@ -22,7 +22,7 @@ If you're new to Azure Policy, here are some helpful resources that you can use
2222

2323
##### Understanding Policy Definitions and Assignments
2424

25-
- **Policy Definitions**: These are the rules that your resources need to comply with. They can be built-in or custom.
25+
- **Policy Definitions**: The rules that your resources need to comply with. They can be built-in or custom.
2626
- **Assignments**: The process of applying a policy definition to your resources.
2727

2828
##### Steps for security enforcement
@@ -59,13 +59,13 @@ If you're new to Azure Policy, here are some helpful resources that you can use
5959
6060
## Use Azure Policy to secure your Nexus BMM resources
6161

62-
The Operator Nexus service offers a built-in policy definition that is recommended to be assigned to your Nexus BMM resources. This policy definition is called **[Preview]: Nexus compute machines should meet security baseline**. This policy definition is used to ensure that your Nexus BMM resources are configured with industry best practice security settings.
62+
The Operator Nexus service offers a built-in policy definition that is recommended to assign to your Nexus BMM resources. This policy definition is called **[Preview]: Nexus compute machines should meet security baseline**. This policy definition is used to ensure that your Nexus BMM resources are configured with industry best practice security settings.
6363

6464
- [[Preview]: Nexus compute machines should meet security baseline](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fec2c1bce-5ad3-4b07-bb4f-e041410cd8db)
6565

6666
## Use Azure Policy to secure your Nexus Kubernetes cluster resources
6767

68-
The Operator Nexus service offers a built-in policy definition that is recommended to be assigned to your Nexus Kubernetes cluster resources. This policy definition is called **[Preview]: Nexus compute cluster should meet security baseline**. This policy definition is used to ensure that your Nexus Kubernetes cluster resources are configured with industry best practice security settings.
68+
The Operator Nexus service offers a built-in policy definition that is recommended to assign to your Nexus Kubernetes cluster resources. This policy definition is called **[Preview]: Nexus compute cluster should meet security baseline**. This policy definition is used to ensure that your Nexus Kubernetes cluster resources are configured with industry best practice security settings.
6969

7070
- [[Preview]: Nexus compute cluster should meet security baseline](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fec2c1bce-5ad3-4b07-bb4f-e041410cd8db) UPDATE LINK!!!
7171

@@ -76,7 +76,7 @@ The Operator Nexus service offers a built-in policy definition that is recommend
7676

7777
## Apply and validate Policies for Nexus resources
7878

79-
Whether you are securing Nexus BMM resources or Nexus Kubernetes Clusters, the process of applying and validating policies is similar. Here's a generalized approach:
79+
Whether you're securing Nexus BMM resources or Nexus Kubernetes Clusters, the process of applying and validating policies is similar. Here's a generalized approach:
8080

8181
1. **Identify Suitable Policies**:
8282

0 commit comments

Comments
 (0)