diff --git a/docs/modules/ROOT/pages/support/data-privacy.adoc b/docs/modules/ROOT/pages/support/data-privacy.adoc index f16b8ebc..ea4d949e 100644 --- a/docs/modules/ROOT/pages/support/data-privacy.adoc +++ b/docs/modules/ROOT/pages/support/data-privacy.adoc @@ -20,6 +20,6 @@ When you create an application, {ProductName} stores the link to your GitHub rep With {ProductName}, you can use build and deployment secrets to secure your environments and store sensitive data such as your credentials, API and encryption keys, access tokens, and more. We store secrets using AWS Secrets Manager. -*Note:* Use secrets to store sensitive data. Do not enter any sensitive data in environment variables because App Studio stores such variables in a public GitOps repository. To create secrets, see link:https://redhat-appstudio.github.io/docs.appstudio.io/Documentation/main/how-to-guides/configuring-builds/proc_creating-secrets-for-your-builds[Creating secrets for your builds]. +*Note:* Use secrets to store sensitive data. Do not enter any sensitive data in environment variables because {ProductName} stores such variables in a public GitOps repository. To create secrets, see link:https://redhat-appstudio.github.io/docs.appstudio.io/Documentation/main/how-to-guides/configuring-builds/proc_creating-secrets-for-your-builds[Creating secrets for your builds]. // TODO add more secrets links when published \ No newline at end of file