Skip to content

Commit 48363c4

Browse files
committed
feat(storage): update
1 parent 5b2eeaf commit 48363c4

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

pages/object-storage/how-to/host-healthcare-data.mdx

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ This documentation provides the following elements:
2424

2525
- A Scaleway account logged into the [console](https://console.scaleway.com)
2626
- [Owner](/iam/concepts/#owner) status or [IAM permissions](/iam/concepts/#permission) allowing you to perform actions in the intended Organization
27-
- Signed an HDS contract with Scaleway for the garantees outlined in the [shared responsibility model](/object-storage/reference-content/storage-shared-responsibility-model/) to apply
27+
- Signed an HDS contract with Scaleway for the guarantees outlined in the [shared responsibility model](/object-storage/reference-content/storage-shared-responsibility-model/) to apply
2828

2929
## How to create a compliant bucket
3030

@@ -54,13 +54,13 @@ Your bucket is now ready to store healthcare data. Before uploading objects, ref
5454

5555
## Prohibited actions on a compliant Bucket
5656

57-
to host healthcare data, you must comply to the following requirements:
57+
to host healthcare data, you must comply with the following requirements:
5858

5959
- You must not use the [Glacier](/object-storage/concepts/#storage-classes) storage class. Refer to the [Shared responsibility model](/object-storage/reference-content/storage-shared-responsibility-model/) for more information on this requirement.
6060

6161
- You must not use [lifecycle rules](/object-storage/concepts/#lifecycle-configuration) in your compliant bucket.
6262

63-
- If you use a [customer-side encryption mechanism](#customer-side-encryption), you must no delete the bucket encryption.
63+
- If you use a [customer-side encryption mechanism](#customer-side-encryption), you must not delete the bucket encryption.
6464

6565
<Message type="important">
6666
Failure to comply with these requirements may lead to voiding compliance on the objects contained in the bucket.
@@ -72,27 +72,27 @@ Objects in a compliant bucket must be encrypted to make sure data is protected.
7272

7373
### Encryption with SSE-C
7474

75-
Scaleway's SSE-C (**S**erver-**S**ide **E**ncryption with **C**ustomer-provided keys) mechanism garantees that objects uploaded to the bucket are properly encrypted.
75+
Scaleway's SSE-C (**S**erver-**S**ide **E**ncryption with **C**ustomer-provided keys) mechanism guarantees that objects uploaded to the bucket are properly encrypted.
7676

77-
You can check that your objects are propery encrypted by performing a simple `HeadObject` operation on an encrypted object. Scaleway Object Storage will return a `400` error if SSE-C has been used to upload this object.
77+
You can check that your objects are properly encrypted by performing a simple `HeadObject` operation on an encrypted object. Scaleway Object Storage will return a `400` error if SSE-C has been used to upload this object.
7878

7979
Refer to the [dedicated documentation](/object-storage/api-cli/enable-sse-c/) for comprehensive information on how to encrypt objects using SSE-C.
8080

8181
### Customer-side encryption
8282

83-
Customer-side encryption ensures that sensitive data is protected before reaching Scaleway Object Storage, giving you control on the encryption mechanism, and keys managemnent. This method must be used in combination with [Scaleway's HDS-compliant deletion method](#deleting-objects-with-customer-side-encryption).
83+
Customer-side encryption ensures that sensitive data is protected before reaching Scaleway Object Storage, giving you control over the encryption mechanism, and keys management. This method must be used in combination with [Scaleway's HDS-compliant deletion method](#deleting-objects-with-customer-side-encryption).
8484

8585
## How to delete objects
8686

87-
Objects must be deleted in a compliant way to make sure data can not be retrieved by any means immediately afterward. When using the HDS-compliant method (using the `PutBucketEncryption` action), Scaleway encrypts your uploaded objects with a dedicated key that will be instantly deleted upon receiving a deletion request for the targeted objects.
87+
Objects must be deleted in a compliant way to make sure data cannot be retrieved by any means immediately afterward. When using the HDS-compliant method (using the `PutBucketEncryption` action), Scaleway encrypts your uploaded objects with a dedicated key that will be instantly deleted upon receiving a deletion request for the targeted objects.
8888

89-
This mechanism guarantees your objects can not be immediately retrieved, even if it takes additionnal time to process the delete of all the remaining chunks of your deleted objects.
89+
This mechanism guarantees your objects cannot be immediately retrieved, even if it takes additional time to process the delete of all the remaining chunks of your deleted objects.
9090

9191
### Deleting objects encrypted with SSE-C
9292

93-
If you use Scaleway's SSE-C to encrypt your data, using [DeleteObject](/object-storage/api-cli/object-operations/#deleteobject) is sufficient to garantee that your object is deleted in compliance with the regulatory requirements.
93+
If you use Scaleway's SSE-C to encrypt your data, using [DeleteObject](/object-storage/api-cli/object-operations/#deleteobject) is sufficient to guarantee that your object is deleted in compliance with the regulatory requirements.
9494

95-
### Deleting objects with customer-side encrpytion
95+
### Deleting objects with customer-side encryption
9696

9797
If you do not use Scaleway's SSE-C to encrypt your data, you must use Scaleway's HDS-compliant method to delete objects. You must enable bucket encryption beforehand, using the `PutBucketEncryption` operation.
9898

0 commit comments

Comments
 (0)