Skip to content

Commit 0875da5

Browse files
Revert cloud-native hyphenation changes to follow CNCF style guide in cloud-native-security.md
This update reverts my earlier hyphenation changes ("cloud-native" → "cloud native") to align with the CNCF style guide, which standardizes the unhyphenated form "cloud native." All other grammar, clarity, and punctuation improvements from the original PR have been kept, as they were confirmed acceptable by reviewers. No semantic content was changed. Thank you for the guidance!
1 parent 92ca58e commit 0875da5

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

content/en/docs/concepts/security/cloud-native-security.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,25 +7,25 @@ weight: 10
77
hide_summary: true
88

99
description: >
10-
Concepts for keeping your cloud-native workload secure.
10+
Concepts for keeping your cloud native workload secure.
1111
---
1212

13-
Kubernetes is based on a cloud-native architecture and draws on advice from the
13+
Kubernetes is based on a cloud native architecture and draws on advice from the
1414
{{< glossary_tooltip text="CNCF" term_id="cncf" >}} about good practices for
15-
cloud-native information security.
15+
cloud native information security.
1616

1717
Read on for an overview of how Kubernetes is designed to help you deploy a
18-
secure cloud-native platform.
18+
secure cloud native platform.
1919

20-
## Cloud-native information security
20+
## Cloud native information security
2121

2222
{{< comment >}}
2323
There are localized versions available of this whitepaper; if you can link to one of those
2424
when localizing, that's even better.
2525
{{< /comment >}}
2626

2727
The CNCF [white paper](https://github.com/cncf/tag-security/blob/main/community/resources/security-whitepaper/v2/CNCF_cloud-native-security-whitepaper-May2022-v2.pdf)
28-
on cloud-native security defines security controls and practices that are
28+
on cloud native security defines security controls and practices that are
2929
appropriate to different _lifecycle phases_.
3030

3131
## _Develop_ lifecycle phase {#lifecycle-phase-develop}
@@ -52,7 +52,7 @@ To achieve this, you can:
5252
- Ensure the security of the supply chain for container images you execute.
5353
- Ensure the security of the supply chain for the cluster and other components
5454
that execute your application. For example, this might include an external
55-
database that your cloud-native application uses for persistence.
55+
database that your cloud native application uses for persistence.
5656

5757
To achieve this, you can:
5858

@@ -206,10 +206,10 @@ logs are both tamper-proof and confidential.
206206

207207
## {{% heading "whatsnext" %}}
208208

209-
### Cloud-native security {#further-reading-cloud-native}
209+
### Cloud native security {#further-reading-cloud-native}
210210

211211
* CNCF [white paper](https://github.com/cncf/tag-security/blob/main/community/resources/security-whitepaper/v2/CNCF_cloud-native-security-whitepaper-May2022-v2.pdf)
212-
on cloud-native security.
212+
on cloud native security.
213213
* CNCF [white paper](https://github.com/cncf/tag-security/blob/f80844baaea22a358f5b20dca52cd6f72a32b066/supply-chain-security/supply-chain-security-paper/CNCF_SSCP_v1.pdf)
214214
on good practices for securing a software supply chain.
215215
* [Fixing the Kubernetes clusterf\*\*k: Understanding security from the kernel up](https://archive.fosdem.org/2020/schedule/event/kubernetes/) (FOSDEM 2020)

0 commit comments

Comments
 (0)