Skip to content

Commit aec6ea4

Browse files
authored
Update secret.md
Remove prepended URLs and re-word to avoid use of "we".
1 parent 8044b0d commit aec6ea4

File tree

1 file changed

+3
-3
lines changed
  • content/en/docs/concepts/configuration

1 file changed

+3
-3
lines changed

content/en/docs/concepts/configuration/secret.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,10 @@ also creates some Secrets.
2828
Kubernetes Secrets are, by default, stored as unencrypted base64-encoded
2929
strings. By default they can be retrieved - as plain text - by anyone with API
3030
access, or anyone with access to Kubernetes' underlying data store, etcd. In
31-
order to safely use Secrets, we recommend you (at a minimum):
31+
order to safely use Secrets, it is recommended you (at a minimum):
3232

33-
1. [Enable Encryption at Rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/) for Secrets.
34-
2. [Enable RBAC rules that restrict reading and writing the Secret](https://kubernetes.io/docs/reference/access-authn-authz/authorization/). Be aware that secrets can be obtained implicitly by anyone with the permission to create a Pod.
33+
1. [Enable Encryption at Rest](/docs/tasks/administer-cluster/encrypt-data/) for Secrets.
34+
2. [Enable or configure RBAC rules](/docs/reference/access-authn-authz/authorization/) that restrict reading and writing the Secret. Be aware that secrets can be obtained implicitly by anyone with the permission to create a Pod.
3535
{{< /caution >}}
3636

3737
<!-- body -->

0 commit comments

Comments
 (0)