diff --git a/fast/stages/2-security/README.md b/fast/stages/2-security/README.md
index 5ff903f02f..0f6302aa52 100644
--- a/fast/stages/2-security/README.md
+++ b/fast/stages/2-security/README.md
@@ -295,16 +295,16 @@ Some references that might be useful in setting up this stage:
| [automation](variables.tf#L17) | Automation resources created by the bootstrap stage. | object({…})
| ✓ | | 0-bootstrap
|
| [billing_account](variables.tf#L25) | Billing account id. If billing account is not part of the same org set `is_org_level` to false. | object({…})
| ✓ | | 0-bootstrap
|
| [folder_ids](variables.tf#L38) | Folder name => id mappings, the 'security' folder name must exist. | object({…})
| ✓ | | 1-resman
|
-| [organization](variables.tf#L97) | Organization details. | object({…})
| ✓ | | 0-bootstrap
|
-| [prefix](variables.tf#L113) | Prefix used for resources that need unique names. Use 9 characters or less. | string
| ✓ | | 0-bootstrap
|
-| [service_accounts](variables.tf#L124) | Automation service accounts that can assign the encrypt/decrypt roles on keys. | object({…})
| ✓ | | 1-resman
|
+| [organization](variables.tf#L98) | Organization details. | object({…})
| ✓ | | 0-bootstrap
|
+| [prefix](variables.tf#L114) | Prefix used for resources that need unique names. Use 9 characters or less. | string
| ✓ | | 0-bootstrap
|
+| [service_accounts](variables.tf#L125) | Automation service accounts that can assign the encrypt/decrypt roles on keys. | object({…})
| ✓ | | 1-resman
|
| [groups](variables.tf#L46) | Group names to grant organization-level permissions. | map(string)
| | {…}
| 0-bootstrap
|
-| [kms_keys](variables.tf#L61) | KMS keys to create, keyed by name. | map(object({…}))
| | {}
| |
-| [outputs_location](variables.tf#L107) | Path where providers, tfvars files, and lists for the following stages are written. Leave empty to disable. | string
| | null
| |
-| [vpc_sc_access_levels](variables.tf#L135) | VPC SC access level definitions. | map(object({…}))
| | {}
| |
-| [vpc_sc_egress_policies](variables.tf#L164) | VPC SC egress policy definitions. | map(object({…}))
| | {}
| |
-| [vpc_sc_ingress_policies](variables.tf#L184) | VPC SC ingress policy definitions. | map(object({…}))
| | {}
| |
-| [vpc_sc_perimeters](variables.tf#L205) | VPC SC regular perimeter definitions. | object({…})
| | {}
| |
+| [kms_keys](variables.tf#L61) | KMS keys to create, keyed by name. | map(object({…}))
| | {}
| |
+| [outputs_location](variables.tf#L108) | Path where providers, tfvars files, and lists for the following stages are written. Leave empty to disable. | string
| | null
| |
+| [vpc_sc_access_levels](variables.tf#L136) | VPC SC access level definitions. | map(object({…}))
| | {}
| |
+| [vpc_sc_egress_policies](variables.tf#L165) | VPC SC egress policy definitions. | map(object({…}))
| | {}
| |
+| [vpc_sc_ingress_policies](variables.tf#L185) | VPC SC ingress policy definitions. | map(object({…}))
| | {}
| |
+| [vpc_sc_perimeters](variables.tf#L206) | VPC SC regular perimeter definitions. | object({…})
| | {}
| |
## Outputs