diff --git a/docs/cloud-native-security/kspm-get-started.asciidoc b/docs/cloud-native-security/kspm-get-started.asciidoc index 9ef78eb193..7f05da0d61 100644 --- a/docs/cloud-native-security/kspm-get-started.asciidoc +++ b/docs/cloud-native-security/kspm-get-started.asciidoc @@ -128,14 +128,14 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y Follow AWS's https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa[EKS Best Practices] documentation to use the https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html[IAM Role to Kubernetes Service-Account] (IRSA) feature to get temporary credentials and scoped permissions. -During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*. +IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*. [discrete] [[kspm-use-instance-role]] ==== Option 2 - Use default instance role Follow AWS's https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2] documentation to create an IAM role using the IAM console, which automatically generates an instance profile. -During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*. +IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*. [discrete] [[kspm-use-keys-directly]] diff --git a/docs/serverless/cloud-native-security/get-started-with-kspm.mdx b/docs/serverless/cloud-native-security/get-started-with-kspm.mdx index 539aee4fe2..f94a28d0d6 100644 --- a/docs/serverless/cloud-native-security/get-started-with-kspm.mdx +++ b/docs/serverless/cloud-native-security/get-started-with-kspm.mdx @@ -130,14 +130,18 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y Follow AWS's [EKS Best Practices](https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa) documentation to use the [IAM Role to Kubernetes Service-Account](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) (IRSA) feature to get temporary credentials and scoped permissions. -During setup, do not fill in any option in the "Setup Access" section. Instead click **Save and continue**. + +During setup, do not fill in any option in the "Setup Access" section. Click **Save and continue**. +
#### Option 2 - Use default instance role Follow AWS's [IAM roles for Amazon EC2](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html) documentation to create an IAM role using the IAM console, which automatically generates an instance profile. + During setup, do not fill in any option in the "Setup Access" section. Click **Save and continue**. +