diff --git a/2023.md b/2023.md index 226a822..79982ea 100644 --- a/2023.md +++ b/2023.md @@ -82,7 +82,7 @@ Or contact us via Twitter, my handle is [@MichaelCade1](https://twitter.com/Mich - [✔️] 🏃 31 > [Runtime network protections and policies](2023/day31.md) - [✔️] 🏃 32 > [Vulnerability and patch management](2023/day32.md) - [✔️] 🏃 33 > [Application runtime and network policies](2023/day33.md) -- [] 🏃 34 > [Runtime access control](2023/day34.md) +- [✔️] 🏃 34 > [Runtime access control](2023/day34.md) ### Secrets Management diff --git a/2023/day34.md b/2023/day34.md index 3d43570..f0d68de 100644 --- a/2023/day34.md +++ b/2023/day34.md @@ -1,4 +1,4 @@ -# Runtime access control and monitoring +# Runtime access control Runtime access control is crucial in a computer system because it helps ensure the security and integrity of a computer system cluster and the applications running on it. A computer system is a complex system with many moving parts, and it is essential to control access to these components to prevent unauthorized access or malicious activities.