diff --git a/source/core/security-introduction.txt b/source/core/security-introduction.txt index 0b9fd0335b8..b116ffcfac3 100644 --- a/source/core/security-introduction.txt +++ b/source/core/security-introduction.txt @@ -125,7 +125,7 @@ Properly configured disk encryption, when used alongside good security policies that protect relevant accounts, passwords, and encryption keys, can help ensure compliance with standards, including HIPAA, PCI-DSS, and FERPA. -.. _`LUKS documentation from Red Hat`: https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html +.. _`LUKS documentation from Red Hat`: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Encryption.html .. _`Vormetric Data Security Platform`: http://www.vormetric.com/sites/default/files/sb-MongoDB-Letter-2014-0611.pdf .. _`IBM Guardium Data Encryption`: http://www-03.ibm.com/software/products/en/infosphere-guardium-data-encryption .. _`Bitlocker Drive Encryption`: http://technet.microsoft.com/en-us/library/hh831713.aspx