Skip to content

Commit 0538806

Browse files
Update README.md
typos
1 parent 500c823 commit 0538806

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

security/README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,20 +18,20 @@ The Technology Engineering Security Specialists team provides end-end Oracle sec
1818
### Oracle Blogs
1919

2020
- [Native Cloud Security Services or Heterogeneous Tools?](https://blogs.oracle.com/cloudsecurity/post/native-cloud-security-services-or-heterogeneous-tools)
21-
- Read this article to hear our experts view on “I’m deploying workloads in Oracle Cloud Infrastructure (OCI) but I already have several, existing security tools. Should I use those, which can monitor all my different cloud environments, not just OCI, or should I use OCI-native security services?”
21+
- Read this article to hear our expert's view on “I’m deploying workloads in Oracle Cloud Infrastructure (OCI) but I already have several, existing security tools. Should I use those, which can monitor all my different cloud environments, not just OCI, or should I use OCI-native security services?”
2222
- [Quick tip 8: Managing authentication through sign-on policies](https://blogs.oracle.com/cloudsecurity/post/quick-tip-8-managing-authentication-through-signon-policies)
23-
- This article is on IAM but focusing on authentication. Sign-on policies control how users are challenged to authenticate and under what circumstances they’re allowed to access integrated applications.
23+
- This article is on IAM but focuses on authentication. Sign-on policies control how users are challenged to authenticate and under what circumstances they’re allowed to access integrated applications.
2424
- [A huge step forward for Security Zones in Oracle Cloud Infrastructure](https://blogs.oracle.com/cloudsecurity/post/a-huge-step-forward-for-security-zones-in-oci)
25-
- Oracle announced custom Security Zones, which, as the name suggests, enables you to customise the security zone policies (referred to as recipes), disabling rules that are not appropriate for your deployments.
25+
- Oracle announced custom Security Zones, which, as the name suggests, enables you to customize the security zone policies (referred to as recipes), disabling rules that are not appropriate for your deployments.
2626

2727
### OCI Architecture Center
2828

29-
- [Enhance user experience by deploying your custom sign-in application on OKE](https://docs.oracle.com/en/solutions/enhance-ux-custom-signin-app-oke/index.html)
30-
- You can display your organization's own URL during employee sign in instead of using the cloud service provider's standard URL by hosting your custom sign-in application in your own domain.
29+
- [Enhance the user experience by deploying your custom sign-in application on OKE](https://docs.oracle.com/en/solutions/enhance-ux-custom-signin-app-oke/index.html)
30+
- You can display your organization's own URL during employee sign-in instead of using the cloud service provider's standard URL by hosting your custom sign-in application in your own domain.
3131
- [OCVS Security - Data Protection](https://docs.oracle.com/en/solutions/oci-security-ocvs/index.html#GUID-A59FC475-6C3B-4589-8151-4ED088E4AC91)
3232
- This reference architecture describes the integration options for Oracle Cloud VMware Solution with OCI Data Protection layer and security services to address the requirements for running critical and sensitive workloads.
3333
- [Connect Oracle Data Safe to Exadata and Autonomous Databases](https://docs.oracle.com/en/solutions/data-safe-exadata-adb/index.html)
34-
- This reference architecture highlights the different ways you can connect Exadata and Autonomous databases to Oracle Data Safe. It also describes the security measurements you need take to provide a safe deployment of a connection to a specific target database.
34+
- This reference architecture highlights the different ways you can connect Exadata and Autonomous databases to Oracle Data Safe. It also describes the security measures you need to take to provide a safe deployment of a connection to a specific target database.
3535

3636
### Cloud Coaching Webinars - [Oracle Learning Library YouTube](https://www.youtube.com/@OracleLearning)
3737

0 commit comments

Comments
 (0)