Skip to content

Commit bc7b492

Browse files
isaacvetterkpshek
andauthored
Update docs/best-practices.md
Co-Authored-By: kpshek <[email protected]>
1 parent 5a84600 commit bc7b492

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ This page serves as best practice guidance for CDS Hooks implementers. The best
44

55
## Security
66

7-
Implementing the CDS Hooks security model requires perhaps the most thought and consideration for implementers. Security topics are never binary, are often complex, and robust implementations should factor in concepts such as risk and usability. Implementers should approach their security related development with thoughtful care.
7+
The CDS Hooks security model requires thought and consideration from implementers. Security topics are never binary, are often complex, and robust implementations should factor in concepts such as risk and usability. Implementers should approach their security related development with thoughtful care.
88

99
The CDS Hooks specifications already provides some guidance in this space. The information here is supplemental to the existing specification documentation.
1010

0 commit comments

Comments
 (0)