diff --git a/docs/cloud-native-security/kspm-get-started.asciidoc b/docs/cloud-native-security/kspm-get-started.asciidoc
index 9ef78eb193..7f05da0d61 100644
--- a/docs/cloud-native-security/kspm-get-started.asciidoc
+++ b/docs/cloud-native-security/kspm-get-started.asciidoc
@@ -128,14 +128,14 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y
Follow AWS's https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa[EKS Best Practices] documentation to use the https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html[IAM Role to Kubernetes Service-Account] (IRSA) feature to get temporary credentials and scoped permissions.
-During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*.
+IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
[discrete]
[[kspm-use-instance-role]]
==== Option 2 - Use default instance role
Follow AWS's https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2] documentation to create an IAM role using the IAM console, which automatically generates an instance profile.
-During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
+IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
[discrete]
[[kspm-use-keys-directly]]
diff --git a/docs/serverless/cloud-native-security/get-started-with-kspm.mdx b/docs/serverless/cloud-native-security/get-started-with-kspm.mdx
index 539aee4fe2..f94a28d0d6 100644
--- a/docs/serverless/cloud-native-security/get-started-with-kspm.mdx
+++ b/docs/serverless/cloud-native-security/get-started-with-kspm.mdx
@@ -130,14 +130,18 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y
Follow AWS's [EKS Best Practices](https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa) documentation to use the [IAM Role to Kubernetes Service-Account](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) (IRSA) feature to get temporary credentials and scoped permissions.
-During setup, do not fill in any option in the "Setup Access" section. Instead click **Save and continue**.
+