Skip to content

Commit 4a3d9e4

Browse files
authored
Update rbac-good-practices.md
Fix typos on page "Role Based Access Control Good Practices"
1 parent 114fa30 commit 4a3d9e4

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ In cases where a workload requires powerful permissions, consider the following
5656
[Taints and Toleration](/docs/concepts/scheduling-eviction/taint-and-toleration/),
5757
[NodeAffinity](/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity), or
5858
[PodAntiAffinity](/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity)
59-
to ensure pods don't run alongside untrusted or less-trusted Pods. Pay especial attention to
59+
to ensure pods don't run alongside untrusted or less-trusted Pods. Pay special attention to
6060
situations where less-trustworthy Pods are not meeting the **Restricted** Pod Security Standard.
6161

6262
### Hardening
@@ -130,8 +130,8 @@ reading data from other containers, and abusing the credentials of system servic
130130

131131
You should only allow access to create PersistentVolume objects for:
132132

133-
- users (cluster operators) that need this access for their work, and who you trust,
134-
- the Kubernetes control plane components which creates PersistentVolumes based on PersistentVolumeClaims
133+
- Users (cluster operators) that need this access for their work, and who you trust.
134+
- The Kubernetes control plane components which creates PersistentVolumes based on PersistentVolumeClaims
135135
that are configured for automatic provisioning.
136136
This is usually setup by the Kubernetes provider or by the operator when installing a CSI driver.
137137

0 commit comments

Comments
 (0)