diff --git a/content/master/concepts/managed-resources.md b/content/master/concepts/managed-resources.md
index 23c65ec3e..847b98c99 100644
--- a/content/master/concepts/managed-resources.md
+++ b/content/master/concepts/managed-resources.md
@@ -326,14 +326,14 @@ to a managed resource to determine what permissions
Crossplane has over the resource.
For example, give Crossplane permission to create and delete an external resource,
-but not make any changes set the policies to
-{{}}["Create", "Delete"]{{}}.
+but not make any changes, set the policies to
+{{}}["Create", "Delete", "Observe"]{{}}.
```yaml {label="managementPol1"}
apiVersion: ec2.aws.upbound.io/v1beta1
kind: Subnet
spec:
- managementPolicies: ["Create", "Delete"]
+ managementPolicies: ["Create", "Delete", "Observe"]
forProvider:
# Removed for brevity
```
diff --git a/content/v1.13/concepts/managed-resources.md b/content/v1.13/concepts/managed-resources.md
index e80a530a3..1dfaaba47 100644
--- a/content/v1.13/concepts/managed-resources.md
+++ b/content/v1.13/concepts/managed-resources.md
@@ -342,14 +342,14 @@ to a managed resource to determine what permissions
Crossplane has over the resource.
For example, give Crossplane permission to create and delete an external resource,
-but not make any changes set the policies to
-{{}}["Create", "Delete"]{{}}.
+but not make any changes, set the policies to
+{{}}["Create", "Delete", "Observe"]{{}}.
```yaml {label="managementPol1"}
apiVersion: ec2.aws.upbound.io/v1beta1
kind: Subnet
spec:
- managementPolicies: ["Create", "Delete"]
+ managementPolicies: ["Create", "Delete", "Observe"]
forProvider:
# Removed for brevity
```