|
1794 | 1794 | "/cid/1094": "/docs/dashboards/share-dashboard-outside-org", |
1795 | 1795 | "/cid/1095": "/docs/integrations/amazon-aws/cis-aws-foundations-benchmark", |
1796 | 1796 | "/cid/1096": "/docs/dashboards/explore-view", |
1797 | | - "/cid/1097": "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", |
| 1797 | + "/cid/1097": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", |
1798 | 1798 | "/cid/1100": "/docs/integrations/amazon-aws/vpc-flow-logs-pci-compliance", |
1799 | 1799 | "/cid/1101": "/docs/search/search-query-language/math-expressions/floor", |
1800 | 1800 | "/cid/1102": "/docs/search/search-query-language/math-expressions/ceil", |
|
4152 | 4152 | "/cid/-1": "/", |
4153 | 4153 | "/docs/api/beta": "/docs/api", |
4154 | 4154 | "/docs/api/dashboard-data": "/docs/api/dashboard", |
4155 | | - "/docs/cloud-security-analytics": "/docs/security/cloud-infrastructure-security", |
4156 | | - "/docs/cloud-security-analytics/introduction-to-cloud-security-analytics": "/docs/security/cloud-infrastructure-security/introduction", |
| 4155 | + "/docs/cloud-security-analytics": "/docs/security/additional-security-features/cloud-infrastructure-security", |
| 4156 | + "/docs/cloud-security-analytics/introduction-to-cloud-security-analytics": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction", |
4157 | 4157 | "/docs/cloud-security-analytics/data-lake": "/docs/security/additional-security-features/data-lake", |
4158 | 4158 | "/docs/cloud-security-analytics/audit-and-compliance": "/docs/security/additional-security-features/audit-and-compliance", |
4159 | 4159 | "/docs/cloud-security-analytics/threat-detection-and-investigation": "/docs/security/additional-security-features/threat-detection-and-investigation", |
4160 | 4160 | "/docs/cloud-security-analytics/application-security": "/docs/security/additional-security-features/application-security", |
4161 | | - "/docs/integrations/amazon-aws/cloud-infrastructure-security-for-aws": "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", |
4162 | | - "/docs/cloud-infrastructure-security": "/docs/security/cloud-infrastructure-security", |
4163 | | - "/docs/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security": "/docs/security/cloud-infrastructure-security/introduction", |
| 4161 | + "/docs/integrations/amazon-aws/cloud-infrastructure-security-for-aws": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", |
| 4162 | + "/docs/cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security", |
| 4163 | + "/docs/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction", |
| 4164 | + "/docs/security/cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security", |
| 4165 | + "/docs/security/cloud-infrastructure-security/introduction": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction", |
| 4166 | + "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", |
4164 | 4167 | "/docs/cloud-infrastructure-security/data-lake": "/docs/security/additional-security-features/data-lake", |
4165 | 4168 | "/docs/cloud-infrastructure-security/audit-and-compliance": "/docs/security/additional-security-features/audit-and-compliance", |
4166 | 4169 | "/docs/cloud-infrastructure-security/threat-detection-and-investigation": "/docs/security/additional-security-features/threat-detection-and-investigation", |
|
0 commit comments