diff --git a/en/aws/cloudtrail/cloudtrail-bucket-private.md b/en/aws/cloudtrail/cloudtrail-bucket-private.md
index fc083929b..da0ed69f3 100644
--- a/en/aws/cloudtrail/cloudtrail-bucket-private.md
+++ b/en/aws/cloudtrail/cloudtrail-bucket-private.md
@@ -15,16 +15,18 @@
| **Recommended Action** | Set the S3 bucket access policy for all CloudTrail buckets to only allow known users to access its files. |
## Detailed Remediation Steps
-1. Log into the AWS Management Console.
+1. Log in to the AWS Management Console.
2. Select the "Services" option and search for "CloudTrail".
-3. In the "Dashboard" panel click on "View trails" button.
-4. Select the "trail" that needs to be verified under "Name" column.
-5. Scroll down and under the "Storage location" option check the S3 bucket used to store log data.
+3. In the "Dashboard" panel click on the desired trail from the list under "Trails" to get to its configuration page.
+4. Click on "Edit" under "General details".
+5. Scroll down and under the "Storage location" option check the S3 bucket name which stores the log data.
6. Go to "Services" and search for "S3" to go into S3 buckets dashboard.
-7. Select the "S3 bucket" used to store data log in CloudTrail and check the "Access" option. If "Access" shows "Public" than bucket is publicly accessible
-8. Click on "Edit Public Access Settings" to configure the S3 Bucket access.
-9. Click on the checkboxes shown under "Manage public Access control lists (ACLs)" and "Manage public bucket policies" to make the S3 bucket private.
-10. Select the "S3 bucket" used by CloudTrail and click on "Permissions" tab.
-11. Select the "Access Control List" from the menu and search for any group with the name "Everyone" and make sure this group has no checkboxes enabled. If this group has one or more checkboxes enabled than the selected S3 bucket is publicly accessible.
-12. Check the "Access for other AWS accounts" on the selected S3 bucket for known users.
-13. S3 buckets access policy for all "CloudTrail buckets" have access allow only to known users now.
+7. Select the "S3 bucket" which is used to store data log in CloudTrail and check the "Access" option. If "Access" shows "Objects can be public" than bucket is publicly accessible
+8. Click on the Bucket name to get into its configuration page.
+9. Click on the "Permissions" tab and scroll down to "Block public access (bucket settings)" and click "Edit".
+10. Select the checkbox "Block all public access" shown under "Block public access (bucket settings)" to make the S3 bucket private.
+11. Click on "save changes" to save the settings.
+12. On the permissions tab scroll down to "Access control list (ACL)" to check the access for other AWS accounts on the selected S3 bucket for known users. Click "Edit" to add permissions for accounts as desired.
+13. On the "Edit access control list (ACL)" page click on "Add grantee" button to grant access to other AWS accounts as desired.
+14. Under "Access for other AWS accounts" paste the Canonical ID of the desired AWS account and check desired permissions. Review and click "Save changes".
+15. Repeat steps 4 to 14 for all other Cloudtrail trails.
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/.DS_Store b/resources/aws/cloudtrail/cloudtrail-bucket-private/.DS_Store
new file mode 100644
index 000000000..cd55eea96
Binary files /dev/null and b/resources/aws/cloudtrail/cloudtrail-bucket-private/.DS_Store differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step10.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step10.png
index 43d90f266..00f15e579 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step10.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step10.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step11.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step11.png
index 8195437ad..243908bda 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step11.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step11.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step12.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step12.png
index 3dec3cb18..084f0039e 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step12.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step12.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step13.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step13.png
new file mode 100644
index 000000000..392ea0af0
Binary files /dev/null and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step13.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step14.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step14.png
new file mode 100644
index 000000000..7dc949ad6
Binary files /dev/null and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step14.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step2.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step2.png
index 8740edf75..64eaeb803 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step2.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step2.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step3.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step3.png
index 8d971d64f..69f753eeb 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step3.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step3.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step4.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step4.png
index 8e9be4341..d074b9129 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step4.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step4.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step5.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step5.png
index 2b98b744d..a00d59a68 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step5.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step5.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step6.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step6.png
index 90c3882f9..a47e2566c 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step6.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step6.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step7.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step7.png
index 94d867c26..3fd418c9c 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step7.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step7.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step8.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step8.png
index f3bfcaeac..63216ac6c 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step8.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step8.png differ
diff --git a/resources/aws/cloudtrail/cloudtrail-bucket-private/step9.png b/resources/aws/cloudtrail/cloudtrail-bucket-private/step9.png
index 106202dbc..0ffa8dfdc 100644
Binary files a/resources/aws/cloudtrail/cloudtrail-bucket-private/step9.png and b/resources/aws/cloudtrail/cloudtrail-bucket-private/step9.png differ