Skip to content

Commit c97db47

Browse files
Apply suggestions from code review
Co-authored-by: Nastasha Solomon <[email protected]>
1 parent 6084b21 commit c97db47

File tree

6 files changed

+8
-8
lines changed

6 files changed

+8
-8
lines changed

docs/cloud-native-security/cspm-get-started-aws.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This page explains how to get started monitoring the security posture of your cl
2828
[[cspm-setup]]
2929
== Set up CSPM for AWS
3030

31-
You can set up CSPM for AWS either by enrolling a single cloud account, or by enrolling an organization containing multiple accounts. Either way, first you will add the CSPM integration, then enable cloud account access. Two deployment technologies are available: agentless, and agent-based. <<cspm-aws-agentless, Agentless deployment>> allows you to collect cloud posture data without having to manage the deployment of an agent in your cloud. <<cspm-aws-agent-based, Agent-based deployment>> requires you to deploy and manage an agent in the cloud account you want to monitor.
31+
You can set up CSPM for AWS either by enrolling a single cloud account, or by enrolling an organization containing multiple accounts. Either way, first you will add the CSPM integration, then enable cloud account access. Two deployment technologies are available: agentless, and agent-based. <<cspm-aws-agentless, Agentless deployment>> allows you to collect cloud posture data without having to manage the deployment of {agent} in your cloud. <<cspm-aws-agent-based, Agent-based deployment>> requires you to deploy and manage {agent} in the cloud account you want to monitor.
3232

3333
[discrete]
3434
[[cspm-aws-agentless]]
@@ -40,9 +40,9 @@ beta::[]
4040
. Click *Add Cloud Security Posture Management (CSPM)*.
4141
. Select *AWS*, then either *AWS Organization* to onboard multiple accounts, or *Single Account* to onboard an individual account.
4242
. Give your integration a name that matches the purpose or team of the AWS account/organization you want to monitor, for example, `dev-aws-account`.
43-
. Click **Advanced options** then select **Agentless (BETA)**.
43+
. Click **Advanced options**, then select **Agentless (BETA)**.
4444
. Next, you'll need to authenticate to AWS. Two methods are available:
45-
.. Option 1: Direct access keys / CloudFormation (Recommended). Under **Preferred method** select **Direct access keys**. Expand the **Steps to Generate AWS Account Credentials** section, then follow the instructions that appear to automatically create the necessary credentials using CloudFormation.
45+
.. Option 1: Direct access keys/CloudFormation (Recommended). Under **Preferred method**, select **Direct access keys**. Expand the **Steps to Generate AWS Account Credentials** section, then follow the displayed instructions to automatically create the necessary credentials using CloudFormation.
4646
.. Option 2: Temporary keys. To authenticate using temporary keys, refer to the instructions for <<cspm-use-temp-credentials, temporary keys>>.
4747
. Once you've selected an authentication method and provided all necessary credentials, click **Save and continue** to finish deployment. Your data should start to appear within a few minutes.
4848

docs/cloud-native-security/cspm-get-started-azure.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ beta::[]
4040
. Click *Add Cloud Security Posture Management (CSPM)*.
4141
. Select *Azure*, then either *Azure Organization* to onboard your whole organization, or *Single Subscription* to onboard an individual subscription.
4242
. Give your integration a name that matches the purpose or team of the Azure subscription/organization you want to monitor, for example, `dev-azure-account`.
43-
. Click **Advanced options** then select **Agentless (BETA)**.
43+
. Click **Advanced options**, then select **Agentless (BETA)**.
4444
. Next, you'll need to authenticate to Azure by providing a **Client ID**, **Tenant ID**, and **Client Secret**. To learn how to generate them, refer to <<cspm-azure-client-secret, Service principal with client secret>>.
4545
. Once you've provided the necessary credentials, click **Save and continue** to finish deployment. Your data should start to appear within a few minutes.
4646

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ beta::[]
4040
. Click *Add Cloud Security Posture Management (CSPM)*.
4141
. Select *GCP*, then either *GCP Organization* to onboard your whole organization, or *Single Account* to onboard an individual account.
4242
. Give your integration a name that matches the purpose or team of the GCP subscription/organization you want to monitor, for example, `dev-gcp-account`.
43-
. Click **Advanced options** then select **Agentless (BETA)**.
43+
. Click **Advanced options**, then select **Agentless (BETA)**.
4444
. Next, you'll need to authenticate to GCP. Expand the **Steps to Generate GCP Account Credentials** section, then follow the instructions that appear to automatically create the necessary credentials using Google Cloud Shell.
4545
. Once you've provided the necessary credentials, click **Save and continue** to finish deployment. Your data should start to appear within a few minutes.
4646

docs/serverless/cloud-native-security/cspm-get-started-azure.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ You can set up CSPM for Azure by by enrolling an Azure organization (management
4343
. Click **Add Cloud Security Posture Management (CSPM)**.
4444
. Select **Azure**, then either **Azure Organization** to onboard your whole organization, or **Single Subscription** to onboard an individual subscription.
4545
. Give your integration a name that matches the purpose or team of the Azure subscription/organization you want to monitor, for example, `dev-azure-account`.
46-
. Click **Advanced options** then select **Agentless (BETA)**.
46+
. Click **Advanced options**, then select **Agentless (BETA)**.
4747
. Next, you'll need to authenticate to Azure by providing a **Client ID**, **Tenant ID**, and **Client Secret**. To learn how to generate them, refer to <DocLink slug="/serverless/security/cspm-get-started-azure" section="cspm-azure-client-secret"> Service principal with client secret </DocLink>.
4848
. Once you've provided the necessary credentials, click **Save and continue** to finish deployment. Your data should start to appear within a few minutes.
4949

docs/serverless/cloud-native-security/cspm-get-started-gcp.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ You can set up CSPM for GCP either by enrolling a single project, or by enrollin
4343
1. Click **Add Cloud Security Posture Management (CSPM)**.
4444
1. Select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Account** to onboard an individual account.
4545
1. Give your integration a name that matches the purpose or team of the GCP subscription/organization you want to monitor, for example, `dev-gcp-account`.
46-
1. Click **Advanced options** then select **Agentless (BETA)**.
46+
1. Click **Advanced options**, then select **Agentless (BETA)**.
4747
1. Next, you'll need to authenticate to GCP. Expand the **Steps to Generate GCP Account Credentials** section, then follow the instructions that appear to automatically create the necessary credentials using Google Cloud Shell.
4848
1. Once you've provided the necessary credentials, click **Save and continue** to finish deployment. Your data should start to appear within a few minutes.
4949

docs/serverless/cloud-native-security/cspm-get-started.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ You can set up CSPM for AWS either by enrolling a single cloud account, or by en
4343
. Click *Add Cloud Security Posture Management (CSPM)*.
4444
. Select *AWS*, then either *AWS Organization* to onboard multiple accounts, or *Single Account* to onboard an individual account.
4545
. Give your integration a name that matches the purpose or team of the AWS account/organization you want to monitor, for example, `dev-aws-account`.
46-
. Click **Advanced options** then select **Agentless (BETA)**.
46+
. Click **Advanced options**, then select **Agentless (BETA)**.
4747
. Next, you'll need to authenticate to AWS. Two methods are available:
4848
.. Option 1: Direct access keys / CloudFormation (Recommended). Under **Preferred method** select **Direct access keys**. Expand the **Steps to Generate AWS Account Credentials** section, then follow the instructions that appear to automatically create the necessary credentials using CloudFormation.
4949
.. Option 2: Temporary keys. To authenticate using temporary keys, refer to the instructions for <DocLink slug="/serverless/security/cspm-get-started" section="option-3-temporary-security-credentials">Temporary keys</DocLink>

0 commit comments

Comments
 (0)