diff --git a/en-US/Design.xml b/en-US/Design.xml
index ae9c7c9..d56e377 100644
--- a/en-US/Design.xml
+++ b/en-US/Design.xml
@@ -529,7 +529,7 @@ The ARN in the preceding output is different on your system.
For the sake of brevity, do not show all output to the user in all cases, but only those parts of any output that are relevant to the context that is described.
Where output is not included, place a marker to show that information is purposely excluded.
When shortening the output, use a consistent notation.
- For omitting horizontal lines of output, Red Hat uses the ...output omitted... notation, starting and ending with an ellipsis, and highlighted in italics.
+ For omitting entire horizontal lines of output, Red Hat uses the ...output omitted... notation, starting and ending with an ellipsis, and highlighted in italics.
Notation for Omitting Horizontal Output
@@ -542,7 +542,7 @@ STEP 14: COMMIT ...output omitted... localhost/nexus:latest
- For omitting vertical columns of output, use a consistent notation such as an ellipsis (...).
+ For omitting vertical columns of output, omitting partial lines of output, or to shorten long strings in output, Red Hat uses the ellipsis notation (...).
Notation for Omitting Vertical Output
diff --git a/en-US/H.xml b/en-US/H.xml
index 72342da..f3562d2 100644
--- a/en-US/H.xml
+++ b/en-US/H.xml
@@ -52,6 +52,19 @@
+
+
+ hardened
+
+
+ adj. Do not use as a general descriptor for Red Hat's software development model or to describe the value of a Red Hat subscription.
+ Use this term in the context of security, for example, reducing the attack surface by enhancing code and fixing vulnerabilities.
+ If this term is used in other contexts, then add a qualifier.
+ Always add a descriptive phrase to explain: for example, "hardened for security" or "hardened for stability".
+
+
+
+
he/she
diff --git a/en-US/S.xml b/en-US/S.xml
index 1b40ac8..fc87234 100644
--- a/en-US/S.xml
+++ b/en-US/S.xml
@@ -81,6 +81,32 @@
secure
+ Instead of stating that a product or service is "secure", describe specifically how features or qualities provide trustworthiness and resilience, and provide verifiable data where it exists.
+ When discussing security, use qualifiers to avoid making definitive or unsubstantiated claims about security.
+
+
+
+
+
+
+
+ Original text
+ Improvement
+
+
+
+
+ This [product or solution] is secure.
+ This [product or solution] enables you to [do X, Y, and Z] to improve security, by ...
+
+
+ This [product or solution] is more secure.
+ This [product or solution] is more secure through [describe the steps that are taken]; or This [product or solution] is more secure than [previous state, or competitor example with cited source].
+
+
+
+
+