diff --git a/docs/index.md b/docs/index.md
index b384ef4..1110ee9 100644
--- a/docs/index.md
+++ b/docs/index.md
@@ -1,25 +1,31 @@
# Introduction
-This guide outlines how to override the default AWS connections backend in Apache Airflow with a custom backend.
-This enables Airflow to access secrets stored in other AWS accounts, in addition to the current one,
-leveraging [AWS Secrets Manager](https://aws.amazon.com/es/secrets-manager/).
+This comprehensive guide details the steps to enhance Apache Airflow's default AWS connections backend by integrating a
+custom backend. This advanced setup allows Airflow to seamlessly access secrets not only within its AWS account but also
+across multiple AWS accounts, utilizing [AWS Secrets Manager](https://aws.amazon.com/es/secrets-manager/).
+The integration enhances security and flexibility, enabling centralized secret management across diverse cloud
+environments.
## Overview
-By default, Airflow uses the `airflow.secrets` base class
-for [secrets backends](https://airflow.apache.org/docs/apache-airflow/stable/security/secrets/secrets-backend/index.html).
-To access secrets across different AWS accounts, we implemented a custom backend that extends this functionality.
+Apache Airflow's default configuration utilizes the `airflow.secrets base class for managing secrets, such as database
+credentials and API keys.
+Our approach extends this functionality with
+a [custom backend](https://airflow.apache.org/docs/apache-airflow/stable/security/secrets/secrets-backend/index.html),
+specifically designed to retrieve secrets from AWS Secrets Manager across different AWS accounts and regions.
+This solution facilitates secure and efficient secret management for complex cloud architectures.
!!! note "SecretsManagerBackend class"
- In short, we extended
+ In essence, we enhance
the [SecretsManagerBackend](https://airflow.apache.org/docs/apache-airflow-providers-amazon/stable/secrets-backends/aws-secrets-manager.html)
- class with cross-account and cross-region secrets access.
+ to enable cross-account and cross-region secrets access, thereby providing a more versatile and secure secrets
+ management strategy.