diff --git a/Enumeration/AWS.md b/Enumeration/AWS.md
index 22522dd..7cb100f 100644
--- a/Enumeration/AWS.md
+++ b/Enumeration/AWS.md
@@ -55,7 +55,8 @@ If the ACL is set to
Permissions are granted directly through user accounts or indirectly through
roles the user has joined.
-![users and groups](./include/iam-intro-users-and-groups.diagram.png)
+
+
Gaining access to important roles like maintenance opens the door to higher permissions.
An always unique AWS Account ID has a length of 12 digits.
@@ -90,7 +91,7 @@ Policy evaluation can be found in the [AWS docs](https://docs.aws.amazon.com/IAM
The following graph is taken from the documentation, it shows the evaluation
logic inside an account
-
+
Policies like `assume-role` and `switch-role` can lead to the gain of roles
with higher permissions