diff --git a/website/components/io-card-container/index.tsx b/website/components/io-card-container/index.tsx index 07bef83c318..420d1cee112 100644 --- a/website/components/io-card-container/index.tsx +++ b/website/components/io-card-container/index.tsx @@ -34,42 +34,46 @@ export default function IoCardContaianer({ {description ?
{description}
: null} ) : null} - {label || cta ? ( -{description}
: null} + {media?.src ? ( + + ) : null} {cta ? (- This allows each application, service, or user to dynamically - get unique credentials to access the database(s) as well as - lease and expiration times for the credentials. This means - that the credentials will expire and reduce impact of breached - from leaked credentials. -
-- In a scenario where credentials are lost or stolen, the window - for those credentials to be valid can be reduced to almost - nothing or instant-use only. If credentials are stolen or - leaked, the same automated workflow for issuance and rotation - can also automatically revoke access and seal Vault and lock - down from outside access. -
- > - ), - cta: { - text: 'Learn more', - link: '/', - }, - }, - ]} - /> - -