- This will delete all resources in the account. Make sure you are deleting the correct directory.
-
-
-Push your changes and create a PR. Pipelines will detect that an account is deleted. Verify that all expected resources will be removed in the `plan` output.
-
-Once you have confirmed everything looks as expected, merge the PR.
-
-1. Create a branch and delete the account request file in `_new_account_requests`
-
-This will de-provision the product in AWS Service Catalog, but will not delete the account.
-
-Push your changes and create a PR. Pipelines will detect that the account should be removed, which can be verified in the `plan` output.
-
-Once you have confirmed everything looks as expected, merge the PR. After `apply` runs, the account status should be `Suspended`.
-
-## Updating the account request
-
-You may update some attributes attributes of an AWS Account by modifying the the account request file in `_new_account_requests`. See below for steps to update each attribute.
-
-Start by creating a new branch that will contain your changes.
-
-1. Update the name of the OU by modifying the `organizational_unit_name` key
-1. Updating the account admin user by modifying the `sso_user_first_name`, `sso_user_last_name`, and `sso_user_email` keys to the new users first name, last name, and email.
-
-After you have made your modifications, push your branch and create a pull request. Gruntwork Pipelines will detect the account changes and run a `plan` operation. Review the output of the `plan` to confirm the output is as expected. Once confirmed, merge the PR to apply the changes.
diff --git a/_docs-sources/foundations/ci-cd/index.md b/_docs-sources/foundations/ci-cd/index.md
deleted file mode 100644
index 1e3dc889f7..0000000000
--- a/_docs-sources/foundations/ci-cd/index.md
+++ /dev/null
@@ -1,68 +0,0 @@
-# Pipelines for Account Factory
-
-[Gruntwork Pipelines](../../pipelines/overview/) is a framework for deploying Infrastructure as Code changes and managing requests for and creation of AWS accounts, with first class support for [Terragrunt](https://terragrunt.gruntwork.io/). Pipelines enables you to use your preferred CI tool to detect changes to Infrastructure as Code Infrastructure Units (IUs — individual modules containing `terragrunt.hcl` files) and securely run `terragrunt plan` and `terragrunt apply` jobs on each IU.
-
-Pipelines runs as a step in your CI tool, determining the types of changes that were made (e.g., adding, changing, or deleting a module) and the action to take based on whether your change was made in a Pull Request (PR) or in a commit to your main branch (e.g., the PR has been merged). As an example, creating a pull request with changes that add a new IU containing an AWS RDS instance in your `dev` account would detect the new module and run a `terragrunt plan` in the directory containing the IU.
-
-:::note Supported CI systems
-
-GitHub Actions is currently the only CI system supported by Gruntwork Pipelines. Support for additional CI systems will be added in the future — let us know your preferred tool. In the meantime, our legacy version of Gruntwork Pipelines remains available and can be configured for the CI system of your choice.
-
-:::
-
-## Components of Pipelines
-
-Pipelines is a single binary that runs as a step in your CI tool. To perform the actions that Pipelines detects, each account will need an AWS IAM Role that allows GitHub Actions to assume it using OIDC. This role is automatically provisioned in new accounts that are provisioned when [adding an account](../accounts/add-account.md) using the Account Factory.
-
-Pipelines assumes that each top level directory in your `infrastructure-live` repository maps to a single AWS account, excluding the `_envcommon` directory. Each account mapped directory must have an entry in `accounts.yml` with a key matching the directory name and containing key/value pairs for the account ID and the e-mail for the root user of the account.
-
-For example, the following entry in `accounts.yml` would be mapped to a directory called `my-cool-account` in your `infrastructure-live` repository.
-
-```yml title=accounts.yml
-"my-cool-account":
- "email": "my-root-account-email@example.com"
- "id": "123456789012"
-```
-
-```bash title="Infrastructure Live"
-.
-├── accounts.yml
-├── _envcommon
-│ └── services
-│ └── my-app.hcl
-├── my-cool-account
-│ └── us-east-1
-│ └── dev
-│ └── database
-│ └── terragrunt.hcl
-```
-
-## Account Specific Pipelines
-
-:::note
-
-This section contains some advanced topics pertaining to Pipelines, how it differentiates between types of changes, and how it handles planning and applying changes.
-
-From the perspective of the end user, you will still only need one step in your CI job. Pipelines knows how to do the rest.
-
-:::
-
-Pipelines can handle two main types of events — additions, changes, or deletions of Terragrunt files, and creating new AWS accounts. With the exception of account creation, adding, changing, or deleting Terragrunt files (aka Infrastructure Units) is handled by the pipeline for each specific account. Provisioning new accounts and applying baselines in them is handled exclusively by the management account.
-
-### Management Account
-
-Provisioning AWS accounts must be handled by your Management AWS Account (e.g., your AWS Control Tower management account). When account requests are approved and the account is created, Pipelines will create a PR that contains an account baseline. Since Pipelines doesn’t have access to the account yet, the baseline will be applied using the Management Account Pipeline.
-
-When applying the baseline and provisioning the Pipelines role in the new child account, Pipelines will first assume the management account Pipelines role, then will assume an automatically provisioned role in the child account (this process is known as [role chaining](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html)). Once Pipelines has temporary credentials in the new account, it will run a plan or apply to provision the requested resources. After the initial baseline and Pipelines role has been applied in the child account, all subsequent events for that account will be handled by the Pipelines role directly in the child account.
-
-:::note
-
-The AWS IAM Role for the management account must have permissions to provision new AWS Accounts (via AWS Control Tower) and assume a role in all child accounts.
-
-:::
-
-### Child Accounts
-
-Each child account (e.g., `dev`, `stage`, `prod,` etc.) contains an AWS IAM role that Pipelines can assume from GitHub Actions using OIDC. This role is automatically provisioned as a part of the [account baseline process](../accounts/add-account#4-review-and-merge-the-account-baseline-pr). Once this role is in place in the child account, users may submit pull requests with new Infrastructure Units in the child account.
-
-When a Pull Request is created or synchronized, or a push to main occurs, Pipelines will detect the changes, map them to the new account, assume the role in the child account, then run a `terragrunt plan` or `terragrunt apply` job (plan for PRs, apply for pushes to main).
diff --git a/_docs-sources/foundations/iac/folder_structure.md b/_docs-sources/foundations/iac-foundations/folder-structure.md
similarity index 100%
rename from _docs-sources/foundations/iac/folder_structure.md
rename to _docs-sources/foundations/iac-foundations/folder-structure.md
diff --git a/_docs-sources/foundations/iac-foundations/index.md b/_docs-sources/foundations/iac-foundations/index.md
new file mode 100644
index 0000000000..ce78089838
--- /dev/null
+++ b/_docs-sources/foundations/iac-foundations/index.md
@@ -0,0 +1,27 @@
+# About IaC Foundations
+
+The IaC Foundations component is focused on:
+
+- Teaching you the considerations to think about when coming up with your foundational Terraform/OpenTofu and Terragrunt patterns
+- Giving you a fully configured set of git repositories with an initial folder structure
+
+## What's included
+
+- **Strategy.** We recommend core patterns your Terragrunt and Terraform/OpenTofu git repo needs to incorporate to scale effectively.
+- **IaC Modules.** No IaC modules are needed for this component.
+- **Tooling.** We recommend Terragrunt to effectively use Terraform/OpenTofu at scale.
+- **Setup.** We grant you access to a sophisticated git repo template that includes customization options and generates your repo code.
+- **Updates.** We publish ongoing updates to IaC foundational patterns and will write [patches](/patcher) if applicable to adopt those changes.
+
+## IaC foundations considerations
+
+When creating your initial Terraform/OpenTofu and Terragrunt infrastructure, there are a number of patterns you need to consider how to solve, including:
+
+- How to create the backend (e.g. S3 bucket) for storing Terraform state
+- How to structure your folder hierarchy
+- How to handle tagging and labels
+- Whether to use branches per environment
+- How to handle global variables
+- How to handle module default values
+
+This component includes either pre-baked implementations that address these considerations, or written guidance on how to incorporate them yourself.
diff --git a/_docs-sources/foundations/iac-foundations/initial-setup.md b/_docs-sources/foundations/iac-foundations/initial-setup.md
new file mode 100644
index 0000000000..0b04845452
--- /dev/null
+++ b/_docs-sources/foundations/iac-foundations/initial-setup.md
@@ -0,0 +1,27 @@
+# Initial setup
+
+To set up IaC Foundations, we use three pre-configured git repository templates that include best practices and also allow for customization.
+
+For each repository below, navigate to the template repository and select **Use this template** -> **Create a new Repository**. This will initiate repository creation. You should select your org as the owner, add a description if you like, make sure you are creating a **private** repo, and click **Create repository**.
+
+The repository template will be created, and you can follow the instructions in the `README` to bootstrap your IaC Foundations. Gruntwork is available to assist with questions around other patterns as they arise.
+
+### Infrastructure Live Template
+
+_[https://github.com/gruntwork-io/infrastructure-live-template](https://github.com/gruntwork-io/infrastructure-live-template)_
+
+This template creates an infrastructure-live repository with scaffolding for a best practices Terragrunt configuration, including patterns for module defaults, global variables, and account baselines. It also configures Gruntwork Pipelines, which is easy to remove if you don't want it.
+
+### Infrastructure Modules Template
+
+_[https://github.com/gruntwork-io/infrastructure-modules-template](https://github.com/gruntwork-io/infrastructure-modules-template)_
+
+This template creates an empty infrastructure-modules repository that will be used to store Terraform/OpenTofu modules that your organization has authored and intends to use within your organization.
+
+### Infrastructure Pipelines Template
+
+_[https://github.com/gruntwork-io/infrastructure-pipelines-template](https://github.com/gruntwork-io/infrastructure-pipelines-template)_
+
+This template is only necessary if you plan on implementing [Gruntwork Pipelines](../pipelines).
+
+
diff --git a/_docs-sources/foundations/iac/module_defaults/defining.md b/_docs-sources/foundations/iac-foundations/module_defaults/defining.md
similarity index 100%
rename from _docs-sources/foundations/iac/module_defaults/defining.md
rename to _docs-sources/foundations/iac-foundations/module_defaults/defining.md
diff --git a/_docs-sources/foundations/iac/module_defaults/index.md b/_docs-sources/foundations/iac-foundations/module_defaults/index.md
similarity index 100%
rename from _docs-sources/foundations/iac/module_defaults/index.md
rename to _docs-sources/foundations/iac-foundations/module_defaults/index.md
diff --git a/_docs-sources/foundations/iac/module_defaults/usage.md b/_docs-sources/foundations/iac-foundations/module_defaults/usage.md
similarity index 100%
rename from _docs-sources/foundations/iac/module_defaults/usage.md
rename to _docs-sources/foundations/iac-foundations/module_defaults/usage.md
diff --git a/_docs-sources/foundations/iac/index.md b/_docs-sources/foundations/iac/index.md
deleted file mode 100644
index 3fddb0cf8b..0000000000
--- a/_docs-sources/foundations/iac/index.md
+++ /dev/null
@@ -1,37 +0,0 @@
-# About IaC Foundations
-
-The IaC Foundations component is focused on:
-
-- Teaching you the considerations to think about when coming up with your foundational Terraform and Terragrunt patterns
-- Giving you a fully configured set of git repositories with an initial folder structure
-
-## IaC foundations considerations
-
-When creating your initial Terraform and Terragrunt and infrastructure, there are a number of patterns you need to consider how to solve. These include:
-
-- How to create the backend (e.g. S3 bucket) for storing Terraform state
-- How to structure your folder hierarchy
-- How to handle tagging and labels
-- Whether to use branches per environment
-- How to handle global variables
-- How to handle module default values
-
-## Initial setup
-
-We provide 3 template repos to subscribers that implement best practices regarding the considerations above.
-
-For each of the repositories below, navigate to the template repository and select **Use this template** -> **Create a new Repository**.
-This will initiate repository creation. You should select your org as the owner, add a description if you like, make sure you are creating a **private** repo, and click **Create repository**.
-
-The repository template will be created, and you can follow the instructions in the README to bootstrap your IaC Foundations.
-
-### [Infrastructure Live Template](https://github.com/gruntwork-io/infrastructure-live-template)
-This [template](https://github.com/gruntwork-io/infrastructure-live-template) creates an infrastructure live repository with scaffolding for common module defaults, account baselines, and Gruntwork Pipelines
-
-### [Infrastructure Modules Template](https://github.com/gruntwork-io/infrastructure-modules-template)
-This [template](https://github.com/gruntwork-io/infrastructure-modules-template) creates an empty infrastructure modules repository for populating shared modules within your organization.
-
-### [Infrastructure Pipelines Template](https://github.com/gruntwork-io/infrastructure-pipelines-template)
-
-This [template](https://github.com/gruntwork-io/infrastructure-pipelines-template) is only necessary if you plan on implementing [Gruntwork Pipelines](../ci-cd).
-
diff --git a/docs/foundations/accounts/add-account.md b/_docs-sources/foundations/landing-zone/add-aws-account.md
similarity index 78%
rename from docs/foundations/accounts/add-account.md
rename to _docs-sources/foundations/landing-zone/add-aws-account.md
index 03d86aa5b1..5c8db1ec60 100644
--- a/docs/foundations/accounts/add-account.md
+++ b/_docs-sources/foundations/landing-zone/add-aws-account.md
@@ -1,6 +1,6 @@
-# Add a new account
+# Add a new AWS account
-This document provides instructions for provisioning a new account in a Control Tower managed organization using Gruntwork. The described workflow gives you the flexibility to require approval for all new account requests in accordance with the permissions configured in your repository.
+This document provides instructions for provisioning a new AWS account using Gruntwork Landing Zone. The described workflow gives you the flexibility to require approval for all new AWS account requests in accordance with the permissions configured in your git repository.
## Prerequisites
@@ -8,9 +8,9 @@ Before proceeding, ensure you have an `infrastructure-live` repository which con
- The [`control-tower-multi-account-factory` module](https://GitHub.com/gruntwork-io/terraform-aws-control-tower/tree/main/modules/landingzone/control-tower-multi-account-factory) configured in the root account
-- An installation of [Gruntwork Pipelines](https://LINK-TO-VALID-DOC)
+- An installation of [Gruntwork Pipelines](/pipelines/overview)
-## 1. Create an account request file
+## 1. Create an AWS account request file
To initiate the process, create an `account-