summaryrefslogtreecommitdiffstats
path: root/security-blueprint/part-5/0_Abstract.md
diff options
context:
space:
mode:
Diffstat (limited to 'security-blueprint/part-5/0_Abstract.md')
-rw-r--r--security-blueprint/part-5/0_Abstract.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/security-blueprint/part-5/0_Abstract.md b/security-blueprint/part-5/0_Abstract.md
index 4cbd17a..e724321 100644
--- a/security-blueprint/part-5/0_Abstract.md
+++ b/security-blueprint/part-5/0_Abstract.md
@@ -15,12 +15,12 @@ to deal with, we must:
- Manage user capabilities (_Users_ part).
- Manage application permissions and policies (_AGLFw_ part).
-<!-- note -->
+<!-- section-note -->
The tools and concepts used to meet these needs are only examples. Any other
tool that meets the need can be used.
-<!-- endnote -->
+<!-- end-section-note -->
In AGL, as in many other embedded systems, different security mechanisms settle
in the core layers to ensure isolation and data privacy. While the Mandatory