diff --git a/README.md b/README.md index d0ed943..f288b39 100644 --- a/README.md +++ b/README.md @@ -226,7 +226,7 @@ role_arn = arn:aws:iam::911111111111:role/Ec2Route53Access source_profile = default ``` -Alternatively, instead of having roles which are assumed, you can also configure the `.aws/credentials` file to have a list of profiles and assocaited keys with scoped access. +Alternatively, instead of having roles which are assumed, you can also configure the `.aws/credentials` file to have a list of profiles and associated keys with scoped access. Once your AWS configuration has been set with all the accounts in your AWS environment, you can then run the tool using the following command: @@ -250,4 +250,4 @@ See also the list of [contributors](https://github.com/assetnote/ghostbuster/con ## License -GNU Affero General Public License \ No newline at end of file +GNU Affero General Public License diff --git a/README.rst b/README.rst index 55583dd..74e27b9 100644 --- a/README.rst +++ b/README.rst @@ -279,7 +279,7 @@ An example configuration looks like this: Alternatively, instead of having roles which are assumed, you can also configure the ``.aws/credentials`` file to have a list of profiles and -assocaited keys with scoped access. +associated keys with scoped access. Once your AWS configuration has been set with all the accounts in your AWS environment, you can then run the tool using the following command: