Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions docs/cloud-native-security/kspm-get-started.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -128,14 +128,14 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y

Follow AWS's https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa[EKS Best Practices] documentation to use the https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html[IAM Role to Kubernetes Service-Account] (IRSA) feature to get temporary credentials and scoped permissions.

During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*.
IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.

[discrete]
[[kspm-use-instance-role]]
==== Option 2 - Use default instance role
Follow AWS's https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2] documentation to create an IAM role using the IAM console, which automatically generates an instance profile.

During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.

[discrete]
[[kspm-use-keys-directly]]
Expand Down