diff --git a/blog-service/2023/12-31.md b/blog-service/2023/12-31.md
index 7d919fc02f..87e5bdb379 100644
--- a/blog-service/2023/12-31.md
+++ b/blog-service/2023/12-31.md
@@ -57,7 +57,7 @@ Here are some of the key features the new solution offers:
* **Misconfigurations**. See areas in your environment that need to be addressed because they fail best practice security controls.
* **Suspicious activity assessment**. See suspicious activity across users, web interactions, networks, and Identity Access Management (IAM).
-To learn how you can set up and use Cloud Infrastructure Security for AWS, and for preview limitations, check out our technical documentation [here](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
+To learn how you can set up and use Cloud Infrastructure Security for AWS, and for preview limitations, check out our technical documentation [here](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
:::note
To use the solution, you are required to sign up and activate Amazon GuardDuty and AWS Security Hub.
diff --git a/blog-service/2024/12-31.md b/blog-service/2024/12-31.md
index 76dfc7597a..3c9ed089c1 100644
--- a/blog-service/2024/12-31.md
+++ b/blog-service/2024/12-31.md
@@ -401,7 +401,7 @@ You can now more easily configure sources on a simplified screen, allowing you t
-[Learn more](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
+[Learn more](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
### October 21, 2024 (Apps)
@@ -807,7 +807,7 @@ We're excited to announce increased visibility into your AWS Cloud environment w
This functionality is in preview. To participate, reach out to your Sumo Logic account executive.
-[Learn more](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
+[Learn more](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
:::note
As part of the preview, you can use CloudQuery logs with Cloud Infrastructure Security for AWS. To use the logs, configure the CloudQuery source when you deploy the solution.
@@ -1077,7 +1077,7 @@ Here are some of the key features the new solution offers:
* **Misconfigurations**. See areas in your environment that need to be addressed because they fail best practice security controls.
* **Suspicious activity assessment**. See suspicious activity across users, web interactions, networks, and Identity Access Management (IAM).
-To learn how you can set up and use Cloud Infrastructure Security for AWS, check out our [technical documentation](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
+To learn how you can set up and use Cloud Infrastructure Security for AWS, check out our [technical documentation](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/).
:::note Action Required
diff --git a/cid-redirects.json b/cid-redirects.json
index 7c9000ff77..17ca6e278a 100644
--- a/cid-redirects.json
+++ b/cid-redirects.json
@@ -1793,7 +1793,7 @@
"/cid/1094": "/docs/dashboards/share-dashboard-outside-org",
"/cid/1095": "/docs/integrations/amazon-aws/cis-aws-foundations-benchmark",
"/cid/1096": "/docs/dashboards/explore-view",
- "/cid/1097": "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws",
+ "/cid/1097": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws",
"/cid/1100": "/docs/integrations/amazon-aws/vpc-flow-logs-pci-compliance",
"/cid/1101": "/docs/search/search-query-language/math-expressions/floor",
"/cid/1102": "/docs/search/search-query-language/math-expressions/ceil",
@@ -4151,15 +4151,18 @@
"/cid/-1": "/",
"/docs/api/beta": "/docs/api",
"/docs/api/dashboard-data": "/docs/api/dashboard",
- "/docs/cloud-security-analytics": "/docs/security/cloud-infrastructure-security",
- "/docs/cloud-security-analytics/introduction-to-cloud-security-analytics": "/docs/security/cloud-infrastructure-security/introduction",
+ "/docs/cloud-security-analytics": "/docs/security/additional-security-features/cloud-infrastructure-security",
+ "/docs/cloud-security-analytics/introduction-to-cloud-security-analytics": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction",
"/docs/cloud-security-analytics/data-lake": "/docs/security/additional-security-features/data-lake",
"/docs/cloud-security-analytics/audit-and-compliance": "/docs/security/additional-security-features/audit-and-compliance",
"/docs/cloud-security-analytics/threat-detection-and-investigation": "/docs/security/additional-security-features/threat-detection-and-investigation",
"/docs/cloud-security-analytics/application-security": "/docs/security/additional-security-features/application-security",
- "/docs/integrations/amazon-aws/cloud-infrastructure-security-for-aws": "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws",
- "/docs/cloud-infrastructure-security": "/docs/security/cloud-infrastructure-security",
- "/docs/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security": "/docs/security/cloud-infrastructure-security/introduction",
+ "/docs/integrations/amazon-aws/cloud-infrastructure-security-for-aws": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws",
+ "/docs/cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security",
+ "/docs/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction",
+ "/docs/security/cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security",
+ "/docs/security/cloud-infrastructure-security/introduction": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction",
+ "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws",
"/docs/cloud-infrastructure-security/data-lake": "/docs/security/additional-security-features/data-lake",
"/docs/cloud-infrastructure-security/audit-and-compliance": "/docs/security/additional-security-features/audit-and-compliance",
"/docs/cloud-infrastructure-security/threat-detection-and-investigation": "/docs/security/additional-security-features/threat-detection-and-investigation",
diff --git a/docs/integrations/amazon-aws/index.md b/docs/integrations/amazon-aws/index.md
index 0a0e5fd646..04387b6b26 100644
--- a/docs/integrations/amazon-aws/index.md
+++ b/docs/integrations/amazon-aws/index.md
@@ -379,5 +379,12 @@ This guide has documentation for all of the apps that Sumo provides for Amazon a
A guide to the Sumo Logic app for AWS Threat Intel.
+ +
+ A guide to our Cloud Infrastructure Security for AWS app.
+
| [Automation Anywhere](https://www.automationanywhere.com/) | Partner integration: [Automation Anywhere](https://docs.automationanywhere.com/bundle/enterprise-v2019/page/enterprise-cloud/topics/control-room/administration/settings/setting-up-sumo-logic.html) |
|
| [Automox](https://www.automox.com/) | Automation integration: [Automox](/docs/platform-services/automation-service/app-central/integrations/automox/)
| [Auth0](https://auth0.com/) | App: [Auth0](/docs/integrations/saml/auth0/)
| [AWS Amplify](https://aws.amazon.com/amplify/) | App: [AWS Amplify](/docs/integrations/amazon-aws/aws-amplify/) |
|
| [AWS API Gateway](https://aws.amazon.com/api-gateway/) | App: [AWS API Gateway](/docs/integrations/amazon-aws/api-gateway/)
| [AWS App Runner](https://aws.amazon.com/apprunner/) | App: [AWS App Runner](/docs/integrations/amazon-aws/aws-apprunner/) |
diff --git a/docs/manage/manage-subscription/fedramp-capabilities.md b/docs/manage/manage-subscription/fedramp-capabilities.md
index 81b4ce2265..4f5c9d6ed3 100644
--- a/docs/manage/manage-subscription/fedramp-capabilities.md
+++ b/docs/manage/manage-subscription/fedramp-capabilities.md
@@ -20,7 +20,7 @@ The following table shows the capabilities included with Sumo Logic’s FedRAMP
| Abilities - Platform | [Training: Learn and certification](/docs/get-started/training-certification-faq/) |||
| Abilities - Solutions | [Application observability](/docs/observability/application-components/) |||
| Abilities - Solutions | [AWS observability](/docs/observability/aws/) |||
-| Abilities - Solutions | [Cloud Infrastructure Security](/docs/security/cloud-infrastructure-security) |||
+| Abilities - Solutions | [Logs for Security](/docs/security/additional-security-features/) |||
| Abilities - Solutions | [Cloud SIEM](/docs/cse/) |||
| Abilities - Solutions | [Cloud SOAR](/docs/cloud-soar/) / [Automation Service](/docs/platform-services/automation-service/) ||
| Abilities - Solutions | [Software Development Optimization](/docs/observability/sdo/) |||
diff --git a/docs/reuse/cis-note.md b/docs/reuse/cis-note.md
index a238056769..fa90f8c206 100644
--- a/docs/reuse/cis-note.md
+++ b/docs/reuse/cis-note.md
@@ -1,3 +1,3 @@
:::tip
-To enable apps to perform security monitoring of your cloud infrastructure, see [Cloud Infrastructure Security](/docs/security/cloud-infrastructure-security/).
+To enable apps to perform security monitoring of your cloud infrastructure, see [Cloud Infrastructure Security](/docs/security/additional-security-features/cloud-infrastructure-security/).
:::
\ No newline at end of file
diff --git a/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md b/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md
similarity index 98%
rename from docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md
rename to docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md
index 401309e7be..28254e1123 100644
--- a/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md
+++ b/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md
@@ -9,7 +9,7 @@ import Iframe from 'react-iframe';
-Cloud Infrastructure Security for AWS provides a unified view of risks, misconfigurations, and active threats in your AWS infrastructure spanning multiple AWS accounts and regions. The solution leverages native AWS tools and telemetry to accelerate cloud security outcomes.
+The Cloud Infrastructure Security for AWS app provides a unified view of risks, misconfigurations, and active threats in your AWS infrastructure spanning multiple AWS accounts and regions. The solution leverages native AWS tools and telemetry to accelerate cloud security outcomes.
Key features of the solution include:
* **Risk overview**. See a summary of all resources that pose risks, and get an action plan for addressing the most important areas of concern.
@@ -189,7 +189,7 @@ When you deploy the solution, consider the following.
#### Do you already have the required sources?
-When you deploy, you are given the option to create the Sumo Logic sources that the solution applications rely upon. If you have already configured those sources, you do not have to create new ones. You can just provide the URLs of the relevant Sumo Logic sources as part of the configuration. See [Install Cloud Infrastructure Security for AWS](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#install-cloud-infrastructure-security-for-aws) below.
+When you deploy, you are given the option to create the Sumo Logic sources that the solution applications rely upon. If you have already configured those sources, you do not have to create new ones. You can just provide the URLs of the relevant Sumo Logic sources as part of the configuration. See [Install Cloud Infrastructure Security for AWS](#install-cloud-infrastructure-security-for-aws) below.
:::note
If you use existing sources rather than create new ones, it is not necessary to modify the existing metadata and source categories associated with the sources. The metadata that the solution depends on will be added to the sources at deployment time.
@@ -205,7 +205,7 @@ You can deploy Cloud Infrastructure Security to a single account or all accounts
#### Multi-region enablement
-Cloud Infrastructure Security supports collecting data from multiple regions if you have any of the following services running in multiple regions in your AWS infrastructure. You can enable multiple regions when you perform the steps in the [Create new source: Deploy AWS](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#create-new-source-deploy-aws) section below.
+Cloud Infrastructure Security supports collecting data from multiple regions if you have any of the following services running in multiple regions in your AWS infrastructure. You can enable multiple regions when you perform the steps in the [Create new source: Deploy AWS](#create-new-source-deploy-aws) section below.
##### GuardDuty
@@ -570,7 +570,7 @@ Following are saved searches included with the solution:
## Cloud Infrastructure Security for AWS dashboards
-import FilterDashboards from '../../reuse/filter-dashboards.md';
+import FilterDashboards from '../../../reuse/filter-dashboards.md';
Learn basic concepts about Cloud Infrastructure Security.
Learn about our Cloud Infrastructure Security for AWS app.
Get an introduction to basic concepts of using Sumo Logic for security use cases.
Learn about using Sumo Logic for application security.
Learn how to secure your cloud infrastructure.
+