diff --git a/x-pack/plugins/cloud_security_posture/public/components/fleet_extensions/aws_credentials_form/aws_credentials_form.tsx b/x-pack/plugins/cloud_security_posture/public/components/fleet_extensions/aws_credentials_form/aws_credentials_form.tsx
index dc2b46dd364f..b1774547a6e6 100644
--- a/x-pack/plugins/cloud_security_posture/public/components/fleet_extensions/aws_credentials_form/aws_credentials_form.tsx
+++ b/x-pack/plugins/cloud_security_posture/public/components/fleet_extensions/aws_credentials_form/aws_credentials_form.tsx
@@ -44,8 +44,8 @@ interface AWSSetupInfoContentProps {
const AWSSetupInfoContent = ({ integrationLink }: AWSSetupInfoContentProps) => {
return (
<>
-
-
+
+
(
<>
-
-
+
+
(
<>
-
-
-
+
+
@@ -227,7 +227,6 @@ const AwsAccountTypeSelect = ({
>
)}
-
>
);
};
@@ -248,7 +247,7 @@ const GcpAccountTypeSelect = ({
@@ -274,7 +273,6 @@ const GcpAccountTypeSelect = ({
defaultMessage="Deploying to a single account is suitable for an initial POC. To ensure complete coverage, it is strongly recommended to deploy CSPM at the organization-level, which automatically connects all accounts (both current and future)."
/>
-
>
);
};
@@ -436,6 +434,13 @@ export const CspPolicyTemplateForm = memo
+ {/* Defines the name/description */}
+ updatePolicy({ ...newPolicy, [field]: value })}
+ />
+
+
{/* AWS account type selection box */}
{input.type === 'cloudbeat/cis_aws' && (
)}
- {/* Defines the name/description */}
- updatePolicy({ ...newPolicy, [field]: value })}
- />
{/* Defines the vars of the enabled input of the active policy template */}