diff --git a/content/en/docs/concepts/configuration/secret.md b/content/en/docs/concepts/configuration/secret.md index f83372532fc..594767af97e 100644 --- a/content/en/docs/concepts/configuration/secret.md +++ b/content/en/docs/concepts/configuration/secret.md @@ -1324,7 +1324,7 @@ have access to run a Pod that then exposes the Secret. [RBAC](/docs/reference/access-authn-authz/rbac/). - In the API server, objects (including Secrets) are persisted into {{< glossary_tooltip term_id="etcd" >}}; therefore: - - only allow cluster admistrators to access etcd (this includes read-only access); + - only allow cluster administrators to access etcd (this includes read-only access); - enable [encryption at rest](/docs/tasks/administer-cluster/encrypt-data/) for Secret objects, so that the data of these Secrets are not stored in the clear into {{< glossary_tooltip term_id="etcd" >}};