diff --git a/use-cases/README.md b/use-cases/README.md
index 138894d8..03734b87 100644
--- a/use-cases/README.md
+++ b/use-cases/README.md
@@ -44,6 +44,10 @@ Current examples were developed for simple use-case scenarios.
If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixed use-cases.
+
+For [all-feature installation](https://docs.sysdig.com/en/docs/sysdig-secure/sysdig-secure-for-cloud/#features), check
+
+
| | `/examples/single-*` | `/examples/organizational-*` |
| --| -- | -- |
| Deployment Type | all Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account (just one), but some features, require resources to be deployed on all of the member-accounts (for Compliance and Image Scanning) .
One role is needed on the management account for cloudtrail-s3 event access |
@@ -53,3 +57,11 @@ If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixe
| More Info | [single-ecs](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs), [single-apprunner](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-apprunner), [single-k8s](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-k8s) | [organizational](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational) |
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
+
+
+
+If you just want [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
+you can make use of
+
+- [Single-Account Compliance Role Setup](./compliance-role-single-account.md)
+- [Organizational Compliance Role setup](./compliance-role-organizational.md)
\ No newline at end of file
diff --git a/use-cases/single-benchmark.md b/use-cases/compliance-role-organizational.md
similarity index 57%
rename from use-cases/single-benchmark.md
rename to use-cases/compliance-role-organizational.md
index e7821dee..d58efcb7 100644
--- a/use-cases/single-benchmark.md
+++ b/use-cases/compliance-role-organizational.md
@@ -1,19 +1,10 @@
-# SingleAccount-CIS Benchmarks
+# Organizational - CIS Unified Compliance
## Use-Case explanation
-Simple single-account setu in order to get CIS Benchmark
+Organizational setup, in order to get [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
-**Client Setup**
-
-- [X] single-account setup
-- [ ] pre-existing resources
-
-**Sysdig Secure For Cloud Features**
-
-- [X] A part of Compliance, only CIS Benchmarks
-
-## Suggested setup
+## Setup
```terraform
terraform {
@@ -35,6 +26,8 @@ provider "aws" {
module "sysdig-sfc" {
source = "sysdiglabs/secure-for-cloud/aws//module/services/cloud-bench"
- name = "TEST-NAME-cloudbench" # optional
+ name = "sysdig-compliance-role" # optional
+
+ is_organizational=true
}
```
diff --git a/use-cases/compliance-role-single-account.md b/use-cases/compliance-role-single-account.md
new file mode 100644
index 00000000..4c0cb512
--- /dev/null
+++ b/use-cases/compliance-role-single-account.md
@@ -0,0 +1,31 @@
+# Single Account - CIS Unified Compliance
+
+## Use-Case explanation
+
+AWS single-account setup, in order to get [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
+
+## Setup
+
+```terraform
+terraform {
+ required_providers {
+ sysdig = {
+ source = "sysdiglabs/sysdig"
+ }
+ }
+}
+
+provider "sysdig" {
+ sysdig_secure_url = ""
+ sysdig_secure_api_token = ""
+}
+
+provider "aws" {
+ region = ""
+}
+
+module "sysdig-sfc" {
+ source = "sysdiglabs/secure-for-cloud/aws//module/services/cloud-bench"
+ name = "sysdig-compliance-role" # optional
+}
+```