diff --git a/blog-service/2023/12-31.md b/blog-service/2023/12-31.md index 7d919fc02f..87e5bdb379 100644 --- a/blog-service/2023/12-31.md +++ b/blog-service/2023/12-31.md @@ -57,7 +57,7 @@ Here are some of the key features the new solution offers: * **Misconfigurations**. See areas in your environment that need to be addressed because they fail best practice security controls. * **Suspicious activity assessment**. See suspicious activity across users, web interactions, networks, and Identity Access Management (IAM). -To learn how you can set up and use Cloud Infrastructure Security for AWS, and for preview limitations, check out our technical documentation [here](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). +To learn how you can set up and use Cloud Infrastructure Security for AWS, and for preview limitations, check out our technical documentation [here](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). :::note To use the solution, you are required to sign up and activate Amazon GuardDuty and AWS Security Hub. diff --git a/blog-service/2024/12-31.md b/blog-service/2024/12-31.md index 76dfc7597a..3c9ed089c1 100644 --- a/blog-service/2024/12-31.md +++ b/blog-service/2024/12-31.md @@ -401,7 +401,7 @@ You can now more easily configure sources on a simplified screen, allowing you t Configure Sources screen -[Learn more](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). +[Learn more](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). ### October 21, 2024 (Apps) @@ -807,7 +807,7 @@ We're excited to announce increased visibility into your AWS Cloud environment w This functionality is in preview. To participate, reach out to your Sumo Logic account executive. -[Learn more](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). +[Learn more](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). :::note As part of the preview, you can use CloudQuery logs with Cloud Infrastructure Security for AWS. To use the logs, configure the CloudQuery source when you deploy the solution. @@ -1077,7 +1077,7 @@ Here are some of the key features the new solution offers: * **Misconfigurations**. See areas in your environment that need to be addressed because they fail best practice security controls. * **Suspicious activity assessment**. See suspicious activity across users, web interactions, networks, and Identity Access Management (IAM). -To learn how you can set up and use Cloud Infrastructure Security for AWS, check out our [technical documentation](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). +To learn how you can set up and use Cloud Infrastructure Security for AWS, check out our [technical documentation](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/). :::note Action Required diff --git a/cid-redirects.json b/cid-redirects.json index 7c9000ff77..17ca6e278a 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -1793,7 +1793,7 @@ "/cid/1094": "/docs/dashboards/share-dashboard-outside-org", "/cid/1095": "/docs/integrations/amazon-aws/cis-aws-foundations-benchmark", "/cid/1096": "/docs/dashboards/explore-view", - "/cid/1097": "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", + "/cid/1097": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", "/cid/1100": "/docs/integrations/amazon-aws/vpc-flow-logs-pci-compliance", "/cid/1101": "/docs/search/search-query-language/math-expressions/floor", "/cid/1102": "/docs/search/search-query-language/math-expressions/ceil", @@ -4151,15 +4151,18 @@ "/cid/-1": "/", "/docs/api/beta": "/docs/api", "/docs/api/dashboard-data": "/docs/api/dashboard", - "/docs/cloud-security-analytics": "/docs/security/cloud-infrastructure-security", - "/docs/cloud-security-analytics/introduction-to-cloud-security-analytics": "/docs/security/cloud-infrastructure-security/introduction", + "/docs/cloud-security-analytics": "/docs/security/additional-security-features/cloud-infrastructure-security", + "/docs/cloud-security-analytics/introduction-to-cloud-security-analytics": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction", "/docs/cloud-security-analytics/data-lake": "/docs/security/additional-security-features/data-lake", "/docs/cloud-security-analytics/audit-and-compliance": "/docs/security/additional-security-features/audit-and-compliance", "/docs/cloud-security-analytics/threat-detection-and-investigation": "/docs/security/additional-security-features/threat-detection-and-investigation", "/docs/cloud-security-analytics/application-security": "/docs/security/additional-security-features/application-security", - "/docs/integrations/amazon-aws/cloud-infrastructure-security-for-aws": "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", - "/docs/cloud-infrastructure-security": "/docs/security/cloud-infrastructure-security", - "/docs/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security": "/docs/security/cloud-infrastructure-security/introduction", + "/docs/integrations/amazon-aws/cloud-infrastructure-security-for-aws": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", + "/docs/cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security", + "/docs/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction", + "/docs/security/cloud-infrastructure-security": "/docs/security/additional-security-features/cloud-infrastructure-security", + "/docs/security/cloud-infrastructure-security/introduction": "/docs/security/additional-security-features/cloud-infrastructure-security/introduction", + "/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws": "/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws", "/docs/cloud-infrastructure-security/data-lake": "/docs/security/additional-security-features/data-lake", "/docs/cloud-infrastructure-security/audit-and-compliance": "/docs/security/additional-security-features/audit-and-compliance", "/docs/cloud-infrastructure-security/threat-detection-and-investigation": "/docs/security/additional-security-features/threat-detection-and-investigation", diff --git a/docs/integrations/amazon-aws/index.md b/docs/integrations/amazon-aws/index.md index 0a0e5fd646..04387b6b26 100644 --- a/docs/integrations/amazon-aws/index.md +++ b/docs/integrations/amazon-aws/index.md @@ -379,5 +379,12 @@ This guide has documentation for all of the apps that Sumo provides for Amazon a

AWS Foundations Benchmark App

A guide to the Sumo Logic app for AWS Threat Intel.

+ +
+
+ Thumbnail icon +

Cloud Infrastructure Security for AWS

+

A guide to our Cloud Infrastructure Security for AWS app.

+
diff --git a/docs/integrations/product-list/product-list-a-l.md b/docs/integrations/product-list/product-list-a-l.md index dabc05ca33..145c6b2b01 100644 --- a/docs/integrations/product-list/product-list-a-l.md +++ b/docs/integrations/product-list/product-list-a-l.md @@ -81,7 +81,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [ | Thumbnail icon | [Automation Anywhere](https://www.automationanywhere.com/) | Partner integration: [Automation Anywhere](https://docs.automationanywhere.com/bundle/enterprise-v2019/page/enterprise-cloud/topics/control-room/administration/settings/setting-up-sumo-logic.html) | | Thumbnail icon | [Automox](https://www.automox.com/) | Automation integration: [Automox](/docs/platform-services/automation-service/app-central/integrations/automox/)
Collector: [Automox Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/automox-source) | | Thumbnail icon | [Auth0](https://auth0.com/) | App: [Auth0](/docs/integrations/saml/auth0/)
Cloud SIEM integration: [Auth0](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/f002a19c-876e-4a33-8be0-ed3b922d19bc.md)
Collector: [Auth0 - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/auth0/)
Partner integration: [Auth0](https://auth0.com/docs/customize/log-streams/sumo-logic-dashboard) | -| Thumbnail icon | [AWS](https://aws.amazon.com/) | Apps:
- [Cloud Infrastructure Security for AWS](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws)
- [Threat Intel for AWS](/docs/integrations/amazon-aws/threat-intel/)
Cloud SIEM integration: [Amazon AWS - Trusted Advisor](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/products/99d21ed4-c3fb-452e-8e4a-a10ff4b94fe0.md)
Community app: [Sumo Logic for AWS Health Events](https://github.com/SumoLogic/sumologic-content/tree/master/Amazon_Web_Services/AWS_Health)
Also see [AWS Observability](/docs/observability/aws/). | +| Thumbnail icon | [AWS](https://aws.amazon.com/) | Apps:
- [Cloud Infrastructure Security for AWS](/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/)
- [Threat Intel for AWS](/docs/integrations/amazon-aws/threat-intel/)
Cloud SIEM integration: [Amazon AWS - Trusted Advisor](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/products/99d21ed4-c3fb-452e-8e4a-a10ff4b94fe0.md)
Community app: [Sumo Logic for AWS Health Events](https://github.com/SumoLogic/sumologic-content/tree/master/Amazon_Web_Services/AWS_Health)
Also see [AWS Observability](/docs/observability/aws/). | | Thumbnail icon | [AWS Amplify](https://aws.amazon.com/amplify/) | App: [AWS Amplify](/docs/integrations/amazon-aws/aws-amplify/) | | Thumbnail icon | [AWS API Gateway](https://aws.amazon.com/api-gateway/) | App: [AWS API Gateway](/docs/integrations/amazon-aws/api-gateway/)
Cloud SIEM integration: [Amazon AWS - API Gateway](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/products/9f76f1fd-fbb0-42d2-9bf5-0f4fd2c1ab82.md) | | Thumbnail icon | [AWS App Runner](https://aws.amazon.com/apprunner/) | App: [AWS App Runner](/docs/integrations/amazon-aws/aws-apprunner/) | diff --git a/docs/manage/manage-subscription/fedramp-capabilities.md b/docs/manage/manage-subscription/fedramp-capabilities.md index 81b4ce2265..4f5c9d6ed3 100644 --- a/docs/manage/manage-subscription/fedramp-capabilities.md +++ b/docs/manage/manage-subscription/fedramp-capabilities.md @@ -20,7 +20,7 @@ The following table shows the capabilities included with Sumo Logic’s FedRAMP | Abilities - Platform | [Training: Learn and certification](/docs/get-started/training-certification-faq/) |![check](/img/reuse/check.png)|![check](/img/reuse/check.png)| | Abilities - Solutions | [Application observability](/docs/observability/application-components/) |![check](/img/reuse/check.png)|![x](/img/reuse/x.png)| | Abilities - Solutions | [AWS observability](/docs/observability/aws/) |![check](/img/reuse/check.png)|![x](/img/reuse/x.png)| -| Abilities - Solutions | [Cloud Infrastructure Security](/docs/security/cloud-infrastructure-security) |![check](/img/reuse/check.png)|![check](/img/reuse/check.png)| +| Abilities - Solutions | [Logs for Security](/docs/security/additional-security-features/) |![check](/img/reuse/check.png)|![check](/img/reuse/check.png)| | Abilities - Solutions | [Cloud SIEM](/docs/cse/) |![check](/img/reuse/check.png)|![check](/img/reuse/check.png)| | Abilities - Solutions | [Cloud SOAR](/docs/cloud-soar/) / [Automation Service](/docs/platform-services/automation-service/) |![check](/img/reuse/check.png)|![x](/img/reuse/x.png) | Abilities - Solutions | [Software Development Optimization](/docs/observability/sdo/) |![check](/img/reuse/check.png)|![x](/img/reuse/x.png)| diff --git a/docs/reuse/cis-note.md b/docs/reuse/cis-note.md index a238056769..fa90f8c206 100644 --- a/docs/reuse/cis-note.md +++ b/docs/reuse/cis-note.md @@ -1,3 +1,3 @@ :::tip -To enable apps to perform security monitoring of your cloud infrastructure, see [Cloud Infrastructure Security](/docs/security/cloud-infrastructure-security/). +To enable apps to perform security monitoring of your cloud infrastructure, see [Cloud Infrastructure Security](/docs/security/additional-security-features/cloud-infrastructure-security/). ::: \ No newline at end of file diff --git a/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md b/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md similarity index 98% rename from docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md rename to docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md index 401309e7be..28254e1123 100644 --- a/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md +++ b/docs/security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws.md @@ -9,7 +9,7 @@ import Iframe from 'react-iframe'; Cloud Infrastructure Security for AWS logo -Cloud Infrastructure Security for AWS provides a unified view of risks, misconfigurations, and active threats in your AWS infrastructure spanning multiple AWS accounts and regions. The solution leverages native AWS tools and telemetry to accelerate cloud security outcomes. +The Cloud Infrastructure Security for AWS app provides a unified view of risks, misconfigurations, and active threats in your AWS infrastructure spanning multiple AWS accounts and regions. The solution leverages native AWS tools and telemetry to accelerate cloud security outcomes. Key features of the solution include: * **Risk overview**. See a summary of all resources that pose risks, and get an action plan for addressing the most important areas of concern. @@ -189,7 +189,7 @@ When you deploy the solution, consider the following. #### Do you already have the required sources?  -When you deploy, you are given the option to create the Sumo Logic sources that the solution applications rely upon. If you have already configured those sources, you do not have to create new ones. You can just provide the URLs of the relevant Sumo Logic sources as part of the configuration. See [Install Cloud Infrastructure Security for AWS](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#install-cloud-infrastructure-security-for-aws) below. +When you deploy, you are given the option to create the Sumo Logic sources that the solution applications rely upon. If you have already configured those sources, you do not have to create new ones. You can just provide the URLs of the relevant Sumo Logic sources as part of the configuration. See [Install Cloud Infrastructure Security for AWS](#install-cloud-infrastructure-security-for-aws) below. :::note If you use existing sources rather than create new ones, it is not necessary to modify the existing metadata and source categories associated with the sources. The metadata that the solution depends on will be added to the sources at deployment time.  @@ -205,7 +205,7 @@ You can deploy Cloud Infrastructure Security to a single account or all accounts #### Multi-region enablement -Cloud Infrastructure Security supports collecting data from multiple regions if you have any of the following services running in multiple regions in your AWS infrastructure. You can enable multiple regions when you perform the steps in the [Create new source: Deploy AWS](/docs/security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws/#create-new-source-deploy-aws) section below. +Cloud Infrastructure Security supports collecting data from multiple regions if you have any of the following services running in multiple regions in your AWS infrastructure. You can enable multiple regions when you perform the steps in the [Create new source: Deploy AWS](#create-new-source-deploy-aws) section below. ##### GuardDuty @@ -570,7 +570,7 @@ Following are saved searches included with the solution: ## Cloud Infrastructure Security for AWS dashboards​ -import FilterDashboards from '../../reuse/filter-dashboards.md'; +import FilterDashboards from '../../../reuse/filter-dashboards.md'; diff --git a/docs/security/cloud-infrastructure-security/index.md b/docs/security/additional-security-features/cloud-infrastructure-security/index.md similarity index 50% rename from docs/security/cloud-infrastructure-security/index.md rename to docs/security/additional-security-features/cloud-infrastructure-security/index.md index 5da991936c..fae02cefb5 100644 --- a/docs/security/cloud-infrastructure-security/index.md +++ b/docs/security/additional-security-features/cloud-infrastructure-security/index.md @@ -1,5 +1,5 @@ --- -slug: /security/cloud-infrastructure-security +slug: /security/additional-security-features/cloud-infrastructure-security title: Cloud Infrastructure Security --- @@ -12,13 +12,13 @@ This section contains the following topics:
- Shield icon

Introduction to Cloud Infrastructure Security

+ Shield icon

Introduction to Cloud Infrastructure Security

Learn basic concepts about Cloud Infrastructure Security.

- AWS icon

Cloud Infrastructure Security for AWS

+ AWS icon

Cloud Infrastructure Security for AWS

Learn about our Cloud Infrastructure Security for AWS app.

diff --git a/docs/security/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security.md b/docs/security/additional-security-features/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security.md similarity index 100% rename from docs/security/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security.md rename to docs/security/additional-security-features/cloud-infrastructure-security/introduction-to-cloud-infrastructure-security.md diff --git a/docs/security/additional-security-features/index.md b/docs/security/additional-security-features/index.md index caf060d4dd..2a28ba668f 100644 --- a/docs/security/additional-security-features/index.md +++ b/docs/security/additional-security-features/index.md @@ -1,11 +1,11 @@ --- slug: /security/additional-security-features -title: Additional Security Features +title: Logs for Security --- import useBaseUrl from '@docusaurus/useBaseUrl'; -Sumo Logic offers additional security features beyond Cloud Infrastructure Security, Cloud SIEM, and Cloud SOAR. You can use these additional features to: +Sumo Logic provides features that let you use logs for security use cases. You can use these features to: * Collect security log and event data from your infrastructure and applications, on-premises and in-cloud. * Analyze your security data with pre-built and custom dashboards, out-of-the-box security apps, and robust queries. @@ -15,7 +15,7 @@ This section contains the following topics:
- Shield icon

Introduction to Additional Security Features

+ Shield icon

Introduction to Logs for Security

Get an introduction to basic concepts of using Sumo Logic for security use cases.

@@ -43,4 +43,10 @@ This section contains the following topics:

Learn about using Sumo Logic for application security.

+
+
+ Shield icon

Cloud Infrastructure Security

+

Learn how to secure your cloud infrastructure.

+
+
\ No newline at end of file diff --git a/docs/security/additional-security-features/introduction-to-additional-security-features.md b/docs/security/additional-security-features/introduction-to-additional-security-features.md index b5d0d35762..b0813e3f61 100644 --- a/docs/security/additional-security-features/introduction-to-additional-security-features.md +++ b/docs/security/additional-security-features/introduction-to-additional-security-features.md @@ -1,19 +1,20 @@ --- id: introduction -title: Introduction to Additional Security Features +title: Introduction to Logs for Security sidebar_label: Introduction -description: Learn basic concepts about supplemental security features of Sumo Logic. +description: Learn basic concepts about using logs for security use cases. --- import useBaseUrl from '@docusaurus/useBaseUrl'; -[Cloud Infrastructure Security](/docs/security/cloud-infrastructure-security/), [Cloud SIEM](/docs/cse/), and [Cloud SOAR](/docs/cloud-soar/) are Sumo Logic's primary security solutions. But Sumo Logic offers additional security features, including apps, customizable dashboards, and tools to analyze your security data. These allow you to use Sumo Logic's core functionality, including data collection, ingestion, and storage, to produce findings that help protect your attack surfaces from threats. +Sumo Logic permits you to leverage logs for security use cases, and includes apps, customizable dashboards, and tools to analyze your security data. This allows you to use Sumo Logic's core functionality, including data collection, ingestion, and storage, to produce findings that help protect your attack surfaces from threats. -You can use Sumo Logic for: +You can use Sumo Logic logs for: * [Threat detection and investigation](/docs/security/additional-security-features/threat-detection-and-investigation). Identify and explore threats or security-related events within your assets, applications, or networks as quickly and effectively as possible. * [Security data lake storage](/docs/security/additional-security-features/data-lake). Store your structured and unstructured data in a centralized repository so it can be easily accessed for analytics. * [Audit and compliance](/docs/security/additional-security-features/audit-and-compliance). Audit your systems to ensure they are in compliance with the rules set by governments and regulatory organizations. This helps protect end users and keep information private and secure, in addition to outlining protocols in the event of a breach. * [Application security](/docs/security/additional-security-features/application-security). Monitor your software development pipeline to ensure it is secure during the continuous integration/continuous deployment (CI/CD) process and production cycle. +* [Cloud infrastructure security](/docs/security/additional-security-features/cloud-infrastructure-security/). Monitor the health of your cloud infrastructure via a unified security and compliance audit view. ## The Sumo Logic data pipeline diff --git a/docs/security/index.md b/docs/security/index.md index 8b843b71e6..ddba51a238 100644 --- a/docs/security/index.md +++ b/docs/security/index.md @@ -11,15 +11,15 @@ Sumo Logic's security solutions support the entire spectrum of security use case | Cloud monitoring | Threat detection and investigation | Threat response | | :-- | :-- | :-- | -| [Cloud Infrastructure Security](/docs/security/cloud-infrastructure-security/) | [Cloud SIEM](/docs/cse/) | [Cloud SOAR](/docs/cloud-soar/) | -| Provides enhanced insight **for security analysts** into threat activity via a unified security and compliance audit view of your cloud infrastructure. Leveraging cloud-native tools and telemetry, it accelerates development, operations, security, and reliability management teams in maintaining security visibility into their environment, managing their risk and attack surface. | Gives **SOC (security operations center) analysts** prioritized and contextualized actionable threats with automated security workflows. Out-of-the-box automated detection reduces manual work, saving valuable resource time and enabling your team to be more effective by allowing them to focus on higher-value security functions. | Fully automates triage, investigation, and remediation of threats **for any security professional**. The open integrations framework allows you to connect to a multitude of third-party applications. The platform provides full incident response lifecycle management with machine learning and threat hunting, accelerating mean time to respond (MTTR). | +| [Logs for Security](/docs/security/additional-security-features/) | [Cloud SIEM](/docs/cse/) | [Cloud SOAR](/docs/cloud-soar/) | +| Provides enhanced insight **for security analysts** into threat activity via logs. Collect security log and event data from your infrastructure and applications, on-premises and in-cloud. Analyze your security data with pre-built and custom dashboards, out-of-the-box security apps, and robust queries. | Gives **SOC (security operations center) analysts** prioritized and contextualized actionable threats with automated security workflows. Out-of-the-box automated detection reduces manual work, saving valuable resource time and enabling your team to be more effective by allowing them to focus on higher-value security functions. | Fully automates triage, investigation, and remediation of threats **for any security professional**. The open integrations framework allows you to connect to a multitude of third-party applications. The platform provides full incident response lifecycle management with machine learning and threat hunting, accelerating mean time to respond (MTTR). | ## Security feature comparison Following are features available with our security solutions. If you have any questions on availability or a free trial, you can reach out to your Sumo Logic account team. -| Feature | Cloud Infrastructure Security | Cloud SIEM | Cloud SOAR | +| Feature | Logs for Security | Cloud SIEM | Cloud SOAR | | :-- | :-- | :-- | :-- | | Log collection | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | | App catalog (out-of-the-box analytics) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | ![check](/img/reuse/check.png) | diff --git a/sidebars.ts b/sidebars.ts index b6903b061d..eb175fa66c 100644 --- a/sidebars.ts +++ b/sidebars.ts @@ -2080,6 +2080,7 @@ integrations: [ 'integrations/amazon-aws/threat-intel', 'integrations/amazon-aws/waf', 'integrations/amazon-aws/cis-aws-foundations-benchmark', + 'security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws' ], }, { @@ -2659,13 +2660,27 @@ integrations: [ }, { type: 'category', - label: 'Cloud Infrastructure Security', + label: 'Logs for Security', collapsible: true, collapsed: true, - link: {type: 'doc', id: 'security/cloud-infrastructure-security/index'}, + link: {type: 'doc', id: 'security/additional-security-features/index'}, items: [ - 'security/cloud-infrastructure-security/introduction', - 'security/cloud-infrastructure-security/cloud-infrastructure-security-for-aws', + 'security/additional-security-features/introduction', + 'security/additional-security-features/threat-detection-and-investigation', + 'security/additional-security-features/data-lake', + 'security/additional-security-features/audit-and-compliance', + 'security/additional-security-features/application-security', + { + type: 'category', + label: 'Cloud Infrastructure Security', + collapsible: true, + collapsed: true, + link: {type: 'doc', id: 'security/additional-security-features/cloud-infrastructure-security/index'}, + items: [ + 'security/additional-security-features/cloud-infrastructure-security/introduction', + 'security/additional-security-features/cloud-infrastructure-security/cloud-infrastructure-security-for-aws', + ], + }, ], }, { @@ -2934,20 +2949,6 @@ integrations: [ }, ], }, - { - type: 'category', - label: 'Additional Security Features', - collapsible: true, - collapsed: true, - link: {type: 'doc', id: 'security/additional-security-features/index'}, - items: [ - 'security/additional-security-features/introduction', - 'security/additional-security-features/threat-detection-and-investigation', - 'security/additional-security-features/data-lake', - 'security/additional-security-features/audit-and-compliance', - 'security/additional-security-features/application-security', - ], - }, ], api: [ {