Skip to content

Commit cbec1f8

Browse files
Add missing links
1 parent 1794111 commit cbec1f8

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

content/well-architected-framework/docs/docs/secure-systems/data/protect-data-at-rest.mdx

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,18 +27,17 @@ For example, you can use Vault to issue your CI/CD pipeline dynamic credentials
2727

2828
HashiCorp resources:
2929

30-
- Learn to use Vault dynamic secrets
31-
- Learn to use versioned key/value secrets engine
32-
- Read how to retrieve CI/CD secrets from Vault.
33-
- Read the Vault's Key/Value (KV) secrets engine documentation
34-
- Enable transparent data encryption for Microsoft SQL with Vault
30+
- [Learn to use Vault dynamic secrets](/vault/tutorials/db-credentials)
31+
- [Learn to use versioned key/value secrets engine](/vault/tutorials/secrets-management/versioned-kv)
32+
- [Securely store secrets for CI/CD pipelines](/well-architected-framework/secure-systems/secure-applications/ci-cd-secrets)
33+
- [Vault Key/Value (KV) secrets engine documentation](/vault/docs/secrets/kv/kv-v2)
34+
- [Enable transparent data encryption for Microsoft SQL with Vault](/vault/docs/platform/mssql)
3535

3636
External resources:
3737

3838
- [Bank of New York Mellon Investigated for Lost Data Tape](https://www.bankinfosecurity.com/bank-new-york-mellon-investigated-for-lost-data-tape-a-862)
3939
- [What are cloud leaks?](https://www.upguard.com/blog/what-are-cloud-leaks)
40-
- Advanced Encryption Standard and Galois Counter Mode
41-
- Why you should use ephemeral credentials
40+
- [NIST Block Cipher Techniques](https://csrc.nist.gov/projects/block-cipher-techniques/bcm/current-modes)
4241

4342
## Next steps
4443

0 commit comments

Comments
 (0)