diff --git a/docs/attack-techniques/AWS/aws.persistence.iam-create-backdoor-role.md b/docs/attack-techniques/AWS/aws.persistence.iam-create-backdoor-role.md
index 60685045..ce60d8ac 100755
--- a/docs/attack-techniques/AWS/aws.persistence.iam-create-backdoor-role.md
+++ b/docs/attack-techniques/AWS/aws.persistence.iam-create-backdoor-role.md
@@ -67,7 +67,7 @@ which generates a finding when a role can be assumed from a new AWS account or p
- Identify a call to CreateRole
closely followed by AttachRolePolicy
with an administrator policy.
-- Identify a call to CreateRole
that contains an assumeRolePolicyDocument in the requestParameters that allows access from an external AWS account. Sample event:
+- Identify a call to CreateRole
that contains an assumeRolePolicyDocument
in the requestParameters
that allows access from an external AWS account. Sample event:
```
{