File tree Expand file tree Collapse file tree 2 files changed +3
-3
lines changed
content/zh-cn/docs/concepts/security Expand file tree Collapse file tree 2 files changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -148,7 +148,7 @@ IBM Cloud | https://www.ibm.com/cloud/security |
148148Microsoft Azure | https://docs.microsoft.com/en-us/azure/security/azure-security |
149149Oracle Cloud Infrastructure | https://www.oracle.com/security |
150150Tencent Cloud | https://www.tencentcloud.com/solutions/data-security-and-information-protection |
151- VMware vSphere | https://www.vmware.com/security/hardening-guides |
151+ VMware vSphere | https://www.vmware.com/solutions/ security/hardening-guides |
152152
153153{{< /table >}}
154154-->
@@ -164,7 +164,7 @@ IBM 云 | https://www.ibm.com/cloud/security |
164164微软 Azure | https://docs.microsoft.com/en-us/azure/security/azure-security |
165165Oracle 云基础设施| https://www.oracle.com/security |
166166腾讯云 | https://www.tencentcloud.com/solutions/data-security-and-information-protection |
167- VMware vSphere | https://www.vmware.com/security/hardening-guides |
167+ VMware vSphere | https://www.vmware.com/solutions/ security/hardening-guides |
168168
169169{{< /table >}}
170170
Original file line number Diff line number Diff line change @@ -707,7 +707,7 @@ built-in [Pod Security Admission Controller](/docs/concepts/security/pod-securit
707707<!--
708708### What about sandboxed Pods?
709709
710- There is not currently an API standard that controls whether a Pod is considered sandboxed or
710+ There is currently no API standard that controls whether a Pod is considered sandboxed or
711711not. Sandbox Pods may be identified by the use of a sandboxed runtime (such as gVisor or Kata
712712Containers), but there is no standard definition of what a sandboxed runtime is.
713713-->
You can’t perform that action at this time.
0 commit comments