diff --git a/docs/00-initial-setup/README.md b/docs/00-initial-setup/README.md
index fd87a951..5ab1e229 100644
--- a/docs/00-initial-setup/README.md
+++ b/docs/00-initial-setup/README.md
@@ -92,6 +92,7 @@ If you are working in your own AWS account, follow the steps below to launch a C
Region| Code | Launch
------|------|-------
+ AP Southeast (Sydney) | ap-southeast-2 | [](https://console.aws.amazon.com/cloudformation/home?region=ap-southeast-2#/stacks/new?stackName=Secure-Serverless&templateURL=https://s3.amazonaws.com/wildrydes-us-east-1/Security/init-template.yml)
EU (Ireland) | eu-west-1 | [](https://console.aws.amazon.com/cloudformation/home?region=eu-west-1#/stacks/new?stackName=Secure-Serverless&templateURL=https://s3.amazonaws.com/wildrydes-us-east-1/Security/init-template.yml)
US West (Oregon) | us-west-2 | [](https://console.aws.amazon.com/cloudformation/home?region=us-west-2#/stacks/new?stackName=Secure-Serverless&templateURL=https://s3.amazonaws.com/wildrydes-us-east-1/Security/init-template.yml)
US East (N. Virginia) | us-east-1 | [](https://console.aws.amazon.com/cloudformation/home?region=us-east-1#/stacks/new?stackName=Secure-Serverless&templateURL=https://s3.amazonaws.com/wildrydes-us-east-1/Security/init-template.yml)
@@ -381,11 +382,18 @@ In addition to the lambda code, the configurations for Lambda function and the R
After doing this, it's time to test your API locally using SAM Local.
-1. On the **right panel**, click on **AWS Resources**.
+1. On the **top right**, click on the cog.
+
+1. In the **Preferences Menu**, open **AWS settings**
+
+
+1. Untoggle the AWS Toolkit
+
+1. On the **right panel**, click on **AWS Resources**.
-1. You should see a folder tree with the name *Local Functions (1)*.
+1. You should now see a folder tree with the name *Local Functions (1)*.
1. Select **UnicornPartsFunction** under the `src` folder
1. Once you have selected the function, click on the dropdown on the panel on the top, and select **Run APIGateway Local**
diff --git a/docs/00-initial-setup/images/0D-aws-preferences.png b/docs/00-initial-setup/images/0D-aws-preferences.png
new file mode 100755
index 00000000..a009e9ed
Binary files /dev/null and b/docs/00-initial-setup/images/0D-aws-preferences.png differ
diff --git a/docs/00-initial-setup/images/0D-aws-settings.png b/docs/00-initial-setup/images/0D-aws-settings.png
new file mode 100755
index 00000000..7d435c39
Binary files /dev/null and b/docs/00-initial-setup/images/0D-aws-settings.png differ
diff --git a/docs/00-initial-setup/images/0D-aws-toolkit.png b/docs/00-initial-setup/images/0D-aws-toolkit.png
new file mode 100755
index 00000000..916be38f
Binary files /dev/null and b/docs/00-initial-setup/images/0D-aws-toolkit.png differ
diff --git a/docs/01-add-authentication/README.md b/docs/01-add-authentication/README.md
index ca65255c..0611b4ea 100644
--- a/docs/01-add-authentication/README.md
+++ b/docs/01-add-authentication/README.md
@@ -347,10 +347,9 @@ Now we have configured our API so only authenticated requests can get through to
To make authenticated requests using the admin client credentials we just created in Module 1C, we can use PostMan:
-1. In Postman, right click on the **Manage Partner** folder and click **edit**
-1. In the Edit Folder window that pops up, go to **Authorization** tab, and change the Auth **Type** to `OAuth 2.0`, then click **Get New Access Token**
-
- 
+1. In Postman, left click on the **Manage Partner** folder
+1. In the **Authorization** tab, and change the Auth **Type** to `OAuth 2.0`, then click **Get New Access Token**
+ 
1. Configure the token request:
@@ -365,8 +364,6 @@ To make authenticated requests using the admin client credentials we just create
* **Client Secret**: this the client secret of the admin we created in Module 1D
* **Scope**: it's optional (the token will be scoped anyways) we can leave it blank
- 
-
And click **Request Token**
1. Now you should see the new token returned from Cognito. scroll down and click **Use Token**
diff --git a/docs/01-add-authentication/images/1E-postman-add-auth.png b/docs/01-add-authentication/images/1E-postman-add-auth.png
deleted file mode 100644
index 499c76e6..00000000
Binary files a/docs/01-add-authentication/images/1E-postman-add-auth.png and /dev/null differ
diff --git a/docs/01-add-authentication/images/1E-postman-gettoken.png b/docs/01-add-authentication/images/1E-postman-gettoken.png
old mode 100644
new mode 100755
index ad45ead7..3d156f6d
Binary files a/docs/01-add-authentication/images/1E-postman-gettoken.png and b/docs/01-add-authentication/images/1E-postman-gettoken.png differ
diff --git a/docs/06-waf/README.md b/docs/06-waf/README.md
index 3f23018d..944bf6f8 100644
--- a/docs/06-waf/README.md
+++ b/docs/06-waf/README.md
@@ -68,19 +68,16 @@ If you have completed **Module 3: Input validation on API Gateway**, your API no
-### Module 6A: Create a WAF ACL
+### Module 6A: Describe a Web ACL
Now let's start creating an AWS WAF to give us additional protection:
1. Go to the [AWS WAF Console](https://console.aws.amazon.com/wafv2/home#/wafhome)
-1. The AWS WAF console has recently released a new version: see [Introducing AWS Managed Rules for AWS WAF
-](https://aws.amazon.com/about-aws/whats-new/2019/11/introducing-aws-managed-rules-for-aws-waf/). However, this workshop has not been yet adapted to the new version. Therefore, we will be using the classic version of the WAF console. You can use the **Switch to AWS WAF Classic** button to switch to classic:
- 
-
-1. Click on **Create web ACL** on the WAF Classic console
+1. Click on **Create web ACL**
+ 

1. In Step 1 of the ACL creation wizard, fill in:
@@ -88,122 +85,66 @@ Now let's start creating an AWS WAF to give us additional protection:
* **Web ACL Name**: `ProtectUnicorn`
* **CloudWatch metric name**: this should be automatically populated for you
* **Region**: select the AWS region you chose for previous steps of the workshop
- * **Resource type to associate with web ACL**: Pick `API Gateway`
- * **Amazon API Gateway API**: Pick the API Gateway we deployed previously, `CustomizeUnicorns`
- * **Stage**: select `dev`
-
- 
-
- and click **Next**
-### Module 6B: Create WAF conditions
+1. To associate the WAF with your API Gateway resources, click **add AWS resources** and select the API Gateway we deployed previously, `CustomizeUnicorns`
+ 
+ click **Add**
+ 
+ and then **Next**
-1. Next you will create 2 different conditions. Let's start with a condition to restrict the maximum size of request body:
- * Go to **Size constraint conditions** section, click **Create condition**
- * Give the condition a name, like `LargeBodyMatch`
- * In Filter settings, add a filer on
- * **Part of the request to filter on**: body
- * **Comparison operator**: Greater than
- * **Size (Bytes)**: 3000
- * Click **Add filter**
- * After the filter is added to the condition, click **Create**
+### Module 6B: Add web ACL rules
- 
-
+1. Next you will create 3 different rules. Let's start with a rule to restrict the maximum size of request body:
-1. Next, let's add a SQL injection condition.
-
- * Go to **SQL injection match conditions** section, click **Create condition**
- * Give the condition a name, like `SQLinjectionMatch`
- * Here, we want to add multiple rules to inspect multiple aspects of the request: request body, request URI and query strings
- * In the **Filter settings**, add 4 filters:
-
-
- | Part of the request to filter on | -Transformation | -
---|---|---|
1 | -Body | -None | -
2 | -Body | -URL decode | -
3 | -URI | -URL decode | -
4 | -Query string | -URL decode | -