From 8a58aab610152b7933daa85726904cb68e82f7a2 Mon Sep 17 00:00:00 2001 From: boruszak Date: Tue, 13 Sep 2022 14:27:16 -0500 Subject: [PATCH] /docs/security --- website/content/docs/security/encryption.mdx | 6 ++---- website/content/docs/security/index.mdx | 8 ++------ 2 files changed, 4 insertions(+), 10 deletions(-) diff --git a/website/content/docs/security/encryption.mdx b/website/content/docs/security/encryption.mdx index 88812feec1..fafcffdb16 100644 --- a/website/content/docs/security/encryption.mdx +++ b/website/content/docs/security/encryption.mdx @@ -1,10 +1,8 @@ --- layout: docs -page_title: Encryption +page_title: Encryption Systems description: >- - The Consul agent supports encrypting all of its network traffic. The exact - method of encryption is described on the encryption internals page. There are - two separate encryption systems, one for gossip traffic and one for RPC. +Two encryption systems protect Consul’s network communications. Learn how keys secure gossip between agents and how RPC with TLS certificates verifies the authenticity of servers and clients. --- # Encryption diff --git a/website/content/docs/security/index.mdx b/website/content/docs/security/index.mdx index 28451fd34a..ef5e80d3f0 100644 --- a/website/content/docs/security/index.mdx +++ b/website/content/docs/security/index.mdx @@ -1,12 +1,8 @@ --- layout: docs -page_title: Security +page_title: Security: Overview description: >- - Consul relies on both a lightweight gossip mechanism and an RPC system to - provide various features. Both of the systems have different security - mechanisms that stem from their designs. However, the security mechanisms of - Consul have a common goal: to provide confidentiality, integrity, and - authentication. +Security requirements and recommendations for Consul vary depending on workloads and environments. Learn how ACLs and encryption can protect access to and communication within your datacenter. --- ## Security Models