diff --git a/en/aws/s3/s3-bucket-all-users-policy.md b/en/aws/s3/s3-bucket-all-users-policy.md
index 3a6e55cf5..7f3cf0050 100644
--- a/en/aws/s3/s3-bucket-all-users-policy.md
+++ b/en/aws/s3/s3-bucket-all-users-policy.md
@@ -15,15 +15,12 @@
| **Recommended Action** | Remove wildcard principals from the bucket policy statements. |
## Detailed Remediation Steps
-1. Log into the AWS Management Console.
+1. Log in to the AWS Management Console.
2. Select the "Services" option and search for S3.
3. Scroll down the left navigation panel and choose "Buckets".
4. Select the "Bucket" that needs to be verified and click on its identifier(name) from the "Bucket name" column.
5. Click on the "Permissions" tab on the top menu.
-6. Check the "Bucket Policy" option under "Properties" abd check the "Effect" and "Principal" value.If the "Effect" element value is set to "Allow" and the "Principal" element value is set to everyone ( * ) then the selected S3 bucket is publicly accessible.
-7. Repeat steps number 2 - 6 to verify other S3 buckets in the region.
-8. Select the publicly accessible S3 bucket that needs to configure and click on the "Permissions" tab and click on the "Bucket Policy" option.
-9. In the "Bucket Policy" option either remove the public accessibility by deleting the policy for the selected S3 bucket. Click on the "Delete" option at the top and click on "Delete" button on the "Delete Bucket Policy" tab.
-10. In order to limit the public accessibility replace the Principal element current value with the Amazon Resource Name (ARN) ( e.g. { "AWS": "arn:aws:iam::102604298007:role/aws-elasticbeanstalk-ec2-role" } ) of the AWS account that should have access to the selected S3 bucket.
-11. Click on the save button at the top to make the necessary changes.
-12. Repeat steps number 8 - 11 to remove wildcard principals for other S3 buckets.
+6. Check the "Bucket Policy" option under "Permissions" and check the "Effect" and "Principal" value. If the "Effect" element value is set to "Allow" and the "Principal" element value is set to everyone ( * ) then the selected S3 bucket is publicly accessible.
+7. Under the "Bucket policy" click "Edit" and replace the Principal element current value with the Amazon Resource Name (ARN) ( e.g. { "AWS": "arn:aws:iam::102604298007:role/aws-elasticbeanstalk-ec2-role" } ) of the AWS account that should have access to the selected S3 bucket.
+8. Click on the "Save changes" to make the necessary changes.
+9. Repeat steps number 4-8 to remove wildcard principals for other S3 buckets.
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step10.png b/resources/aws/s3/s3-bucket-all-users-policy/step10.png
deleted file mode 100644
index 0c9cb81c2..000000000
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step10.png and /dev/null differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step11.png b/resources/aws/s3/s3-bucket-all-users-policy/step11.png
deleted file mode 100644
index 484278a55..000000000
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step11.png and /dev/null differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step2.png b/resources/aws/s3/s3-bucket-all-users-policy/step2.png
index 0423e0358..0d0b185ed 100644
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step2.png and b/resources/aws/s3/s3-bucket-all-users-policy/step2.png differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step3.png b/resources/aws/s3/s3-bucket-all-users-policy/step3.png
index d2277621e..404e5b8fb 100644
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step3.png and b/resources/aws/s3/s3-bucket-all-users-policy/step3.png differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step4.png b/resources/aws/s3/s3-bucket-all-users-policy/step4.png
index 4fee57d32..38ac5cd6b 100644
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step4.png and b/resources/aws/s3/s3-bucket-all-users-policy/step4.png differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step5.png b/resources/aws/s3/s3-bucket-all-users-policy/step5.png
index 38176f405..c6bb9650e 100644
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step5.png and b/resources/aws/s3/s3-bucket-all-users-policy/step5.png differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step6.png b/resources/aws/s3/s3-bucket-all-users-policy/step6.png
index 9c12c76bf..3d62ed7ee 100644
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step6.png and b/resources/aws/s3/s3-bucket-all-users-policy/step6.png differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step7.png b/resources/aws/s3/s3-bucket-all-users-policy/step7.png
new file mode 100644
index 000000000..07ca19ead
Binary files /dev/null and b/resources/aws/s3/s3-bucket-all-users-policy/step7.png differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step8.png b/resources/aws/s3/s3-bucket-all-users-policy/step8.png
index 90f6c8471..08fc8f313 100644
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step8.png and b/resources/aws/s3/s3-bucket-all-users-policy/step8.png differ
diff --git a/resources/aws/s3/s3-bucket-all-users-policy/step9.png b/resources/aws/s3/s3-bucket-all-users-policy/step9.png
deleted file mode 100644
index 0ff53bdba..000000000
Binary files a/resources/aws/s3/s3-bucket-all-users-policy/step9.png and /dev/null differ