Skip to content

Commit 7bd031f

Browse files
authored
Add missing links (#1496)
## Description <!-- ID for Jira ticket e.g [SPE-1234] --> :ticket: N/A <!-- Add a brief description of changes here. Include any other necessary relevant links --> - Fix reported missing links in WAF secure data doc <!-- Help your reviewer understand the type of review you need by selecting the scope and urgency. --> ### Requested review scope: - [x] Content touched by the PR _only_ (typos, clarifications, tips) - [ ] Code test (command and code block changes) - [ ] Flow and language near changes (new/rearranged steps) - [ ] Review everything (rewrites, major changes) ### Review urgency: - [x] ASAP (bug fixes, broken content, imminent releases) - [ ] 3 days (small changes, easy reviews) - [ ] 1 week (default) - [ ] Best effort (very non-urgent) <!-- Fill out only the appropriate checklist for your type of feature (or both if necessary) and delete the other one! --> ## All updates: <!-- This section is mandatory for all PRs: --> I have: - [ ] Verified that all status checks have passed - [ ] Verified that preview environment has successfully deployed - [x] Verified appropriate `label` applied (`hcp` + `product name`) - [x] Added all required reviewers (code owners and external) [SPE-1234]: https://hashicorp.atlassian.net/browse/SPE-1234?atlOrigin=eyJpIjoiNWRkNTljNzYxNjVmNDY3MDlhMDU5Y2ZhYzA5YTRkZjUiLCJwIjoiZ2l0aHViLWNvbS1KU1cifQ
2 parents 683564a + cbec1f8 commit 7bd031f

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

content/well-architected-framework/docs/docs/secure-systems/data/protect-data-at-rest.mdx

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,18 +27,17 @@ For example, you can use Vault to issue your CI/CD pipeline dynamic credentials
2727

2828
HashiCorp resources:
2929

30-
- Learn to use Vault dynamic secrets
31-
- Learn to use versioned key/value secrets engine
32-
- Read how to retrieve CI/CD secrets from Vault.
33-
- Read the Vault's Key/Value (KV) secrets engine documentation
34-
- Enable transparent data encryption for Microsoft SQL with Vault
30+
- [Learn to use Vault dynamic secrets](/vault/tutorials/db-credentials)
31+
- [Learn to use versioned key/value secrets engine](/vault/tutorials/secrets-management/versioned-kv)
32+
- [Securely store secrets for CI/CD pipelines](/well-architected-framework/secure-systems/secure-applications/ci-cd-secrets)
33+
- [Vault Key/Value (KV) secrets engine documentation](/vault/docs/secrets/kv/kv-v2)
34+
- [Enable transparent data encryption for Microsoft SQL with Vault](/vault/docs/platform/mssql)
3535

3636
External resources:
3737

3838
- [Bank of New York Mellon Investigated for Lost Data Tape](https://www.bankinfosecurity.com/bank-new-york-mellon-investigated-for-lost-data-tape-a-862)
3939
- [What are cloud leaks?](https://www.upguard.com/blog/what-are-cloud-leaks)
40-
- Advanced Encryption Standard and Galois Counter Mode
41-
- Why you should use ephemeral credentials
40+
- [NIST Block Cipher Techniques](https://csrc.nist.gov/projects/block-cipher-techniques/bcm/current-modes)
4241

4342
## Next steps
4443

0 commit comments

Comments
 (0)