diff --git a/docs/attack-techniques/AWS/aws.persistence.iam-create-backdoor-role.md b/docs/attack-techniques/AWS/aws.persistence.iam-create-backdoor-role.md index 60685045..ce60d8ac 100755 --- a/docs/attack-techniques/AWS/aws.persistence.iam-create-backdoor-role.md +++ b/docs/attack-techniques/AWS/aws.persistence.iam-create-backdoor-role.md @@ -67,7 +67,7 @@ which generates a finding when a role can be assumed from a new AWS account or p - Identify a call to CreateRole closely followed by AttachRolePolicy with an administrator policy. -- Identify a call to CreateRole that contains an assumeRolePolicyDocument in the requestParameters that allows access from an external AWS account. Sample event: +- Identify a call to CreateRole that contains an assumeRolePolicyDocument in the requestParameters that allows access from an external AWS account. Sample event: ``` {