Skip to content

Commit 60d5f45

Browse files
committed
Improve readability and add TOC entry
1 parent 1133e53 commit 60d5f45

File tree

2 files changed

+7
-5
lines changed

2 files changed

+7
-5
lines changed

articles/hpc-cache/hpc-cache-security-info.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,33 +16,33 @@ This security information applies to Microsoft Azure HPC Cache. It addresses com
1616

1717
The HPC Cache Service is only accessible through your private virtual network. Microsoft cannot access your virtual network.
1818

19-
More information about connecting private networks is available [here](/security/benchmark/azure/baselines/hpc-cache-security-baseline.md).
19+
Learn more about [connecting private networks](/security/benchmark/azure/baselines/hpc-cache-security-baseline.md).
2020

2121
## Network infrastructure requirements
2222

2323
Your network needs a dedicated subnet for the Azure HPC Cache, DNS support so the cache can access storage, and access from the subnet to additional Microsoft Azure infrastructure services like NTP servers and the Azure Queue Storage service.
2424

25-
More information about network infrastructure requirements is available [here](hpc-cache-prerequisites.md#network-infrastructure).
25+
Learn more about [network infrastructure requirements](hpc-cache-prerequisites.md#network-infrastructure).
2626

2727
## Access to NFS storage
2828

2929
The Azure HPC Cache needs specific NFS configurations like outbound NFS port access to on-premises storage.
3030

31-
For details about configuring your NFS storage to work with Azure HPC Cache, refer to [this article](hpc-cache-prerequisites.md#nfs-storage-requirements).
31+
Learn more about [configuring your NFS storage](hpc-cache-prerequisites.md#nfs-storage-requirements) to work with Azure HPC Cache.
3232

3333
## Encryption
3434

3535
HPC Cache data is encrypted at rest. Encryption keys may be Azure-managed or customer-managed.
3636

37-
For more information about implementing customer-managed keys for encrypting data, see [this article](customer-keys.md).
37+
Learn more about [implementing customer-managed keys](customer-keys.md).
3838

3939
HPC Cache only supports AUTH_SYS security for NFSv3 so it’s not possible to encrypt NFS traffic between clients and the cache. If, however, data is traveling over ExpressRoute, you could [tunnel traffic with IPSEC](../virtual-wan/vpn-over-expressroute.md) for in-transit traffic encryption.
4040

4141
## Access policies based on IP address
4242

4343
You can set CIDR blocks to allow the following access control policies: none, read, read/write, and squashed.
4444

45-
See the [Access policies](access-policies.md) page for more information about configuring access based on IP addresses.
45+
Learn more how to [configure access policies](access-policies.md) based on IP addresses.
4646

4747
You can also optionally configure network security groups (NSGs) to control inbound access to the HPC Cache subnet. This restricts which IP addresses are routed to the HPC Cache subnet.
4848

articles/hpc-cache/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ items:
1717
items:
1818
- name: Security baseline
1919
href: /security/benchmark/azure/baselines/hpc-cache-security-baseline?toc=/azure/hpc-cache/toc.json
20+
- name: Security information
21+
href: hpc-cache-security-info.md
2022
- name: How-to guides
2123
items:
2224
- name: Prerequisites

0 commit comments

Comments
 (0)