You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,9 +36,9 @@ If you\'re new to zero trust architecture, or this is the first time you are re
36
36
37
37
For **board level readers** read the [introduction to zero trust](Introduction-to-Zero-trust.md) and the overview of the principles on this page.
38
38
39
-
For **technical readers** and **cyber security professionals**all sections are relevant, but we encourage you to read the key concepts and terminology before you jump into reading the principles in detail.
39
+
For **technical readers** and **cyber security professionals**all sections are relevant, but we encourage you to read the key concepts and terminology before you jump into reading the principles in detail.
40
40
41
-
**Product vendors and open source projects**can use this guidance to aid the development of zero trust architecture products and services.
41
+
**Product vendors and open source projects**can use this guidance to aid the development of zero trust architecture products and services.
0 commit comments