diff --git a/content/en/docs/concepts/security/multi-tenancy.md b/content/en/docs/concepts/security/multi-tenancy.md index caf764eb00..57d8f1710d 100644 --- a/content/en/docs/concepts/security/multi-tenancy.md +++ b/content/en/docs/concepts/security/multi-tenancy.md @@ -286,7 +286,7 @@ workloads running in a shared cluster. Running workloads in a sandbox environmen insulate the host from container escapes, where an attacker exploits a vulnerability to gain access to the host system and all the processes/files running on that host. -Virtual machines and userspace kernels are 2 popular approaches to sandboxing. The following +Virtual machines and userspace kernels are two popular approaches to sandboxing. The following sandboxing implementations are available: * [gVisor](https://gvisor.dev/) intercepts syscalls from containers and runs them through a @@ -514,4 +514,4 @@ project provides an implementation of virtual control planes. #### Other implementations * [Kamaji](https://github.com/clastix/kamaji) -* [vcluster](https://github.com/loft-sh/vcluster) \ No newline at end of file +* [vcluster](https://github.com/loft-sh/vcluster)