Skip to content

Commit 98f72d6

Browse files
SirSpideyocofaigh
andauthored
docs: update name in ref arch (#97)
Co-authored-by: Conall Ó Cofaigh <[email protected]>
1 parent 7beee1c commit 98f72d6

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

reference-architectures/reference-architecture-css.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ or tile in the IBM Cloud catalog, match the title to the catalog. See
4949
https://test.cloud.ibm.com/docs/solution-as-code?topic=solution-as-code-naming-guidance.
5050
-->
5151

52-
# Core security services
52+
# IBM Cloud Essential Security and Observability Services
5353
{: #core-security-services-pattern}
5454
{: toc-content-type="reference-architecture"}
5555
{: toc-version="1.2.1"}
@@ -59,7 +59,7 @@ The IDs, such as {: #title-id} are required for publishing this reference archit
5959
the toc attributes on the H1, repeating the values from the YAML header.
6060
-->
6161

62-
This reference architecture summarizes the deployment and best practices on {{site.data.keyword.cloud_notm}} for setting core security services and their associated dependencies. {{site.data.keyword.cloud_notm}}'s core security services are crucial for ensuring robust security and compliance for cloud-based applications and data. Their primary goal is to provide a framework for secure and compliant {{site.data.keyword.cloud_notm}} workloads.
62+
This reference architecture summarizes the deployment and best practices on {{site.data.keyword.cloud_notm}} for setting essential security services and their associated dependencies. {{site.data.keyword.cloud_notm}}'s essential security services are crucial for ensuring robust security and compliance for cloud-based applications and data. Their primary goal is to provide a framework for secure and compliant {{site.data.keyword.cloud_notm}} workloads.
6363

6464
Here’s a brief overview of each service:
6565

@@ -76,7 +76,7 @@ This reference architecture showcases how these services form a foundational sec
7676
## Architecture diagram
7777
{: #architecture-diagram}
7878

79-
The following diagram represents the architecture for the core security services deployable architecture on {{site.data.keyword.cloud_notm}} and reuses the [best practices](/docs/framework-financial-services?topic=framework-financial-services-about) for {{site.data.keyword.framework-fs_full}}.
79+
The following diagram represents the architecture for the IBM Cloud Essential Security and Observability Services deployable architecture on and reuses the [best practices](/docs/framework-financial-services?topic=framework-financial-services-about) for {{site.data.keyword.framework-fs_full}}.
8080

8181
![Architecture.](core-security-services-architecture.svg "Architecture"){: caption="Figure 1. Architecture diagram" caption-side="bottom"}{: external download="core-security-services-architecture.svg"}
8282

@@ -145,5 +145,5 @@ The following table outlines the products or services used in the architecture f
145145

146146
Ensures compliance with some of the controls in the CIS IBM Cloud Foundations Benchmark profile. To view the list of added controls, follow these steps:
147147

148-
1. Go the {{site.data.keyword.cloud_notm}} [catalog](/catalog#reference_architecture){: external} and search for the Core Security Services deployable architecture.
148+
1. Go the {{site.data.keyword.cloud_notm}} [catalog](/catalog#reference_architecture){: external} and search for the IBM Cloud Essential Security and Observability Services deployable architecture.
149149
1. Click the tile for the deployable architecture to open the details. The Security & compliance tab lists all of the controls that are included in the deployable architecture.

0 commit comments

Comments
 (0)