diff --git a/docs/concepts/policies/values-settings.md b/docs/concepts/policies/values-settings.md
index b51e702d..8daea48f 100644
--- a/docs/concepts/policies/values-settings.md
+++ b/docs/concepts/policies/values-settings.md
@@ -9,13 +9,13 @@ sidebar_label: Values & Settings
Each policy type may have many settings for different resources.
-
The policy type
AWS > S3 > Bucket > Approved
may be set to `Enforce: Delete unapproved if new & empty` for development accounts, but deliberately limited to `Check: Approved` for production accounts.
+
The policy type AWS > S3 > Bucket > Approved
may be set to Enforce: Delete unapproved if new & empty
for development accounts, but deliberately limited to Check: Approved
for production accounts.
**Policy Settings** are inherited down through the hierarchy of resources.
AWS > S3 > Bucket > Approved
may be set
-to `Enforce: Delete unapproved if new & empty` at Turbot level - ensuring all buckets are deleted if they don't meet the approval criteria (e.g. in approved region).
+to Enforce: Delete unapproved if new & empty
at Turbot level - ensuring all buckets are deleted if they don't meet the approval criteria (e.g. in approved region).
Policy settings are only valid for target resources and their ancestors.
@@ -44,7 +44,7 @@ policy values exist only on the target.
AWS > S3 > Bucket > Approved
- A Policy Setting for
AWS > S3 > Bucket > Approved
can be made on an AWS Account, Region, or individual bucket.
- - Every S3 bucket has a Policy Value for
AWS > S3 > Bucket > Approved
. The policy value may have been set at the AWS account, region, and/or individual bucket - this is the effective value for this instance.
+ - Every S3 bucket that has a Policy Setting for
AWS > S3 > Bucket > Approved
will have a corresponding Policy Value for AWS > S3 > Bucket > Approved
. The policy value represents the effective setting for this instance, which may have been inherited from the AWS account, region, or set directly on the individual bucket.
diff --git a/docs/faq/workspace-faq/index.md b/docs/faq/workspace-faq/index.md
index ae868e22..153daea7 100644
--- a/docs/faq/workspace-faq/index.md
+++ b/docs/faq/workspace-faq/index.md
@@ -12,10 +12,13 @@ sidebar_label: "Workspace FAQ"
* [When do Guardrails API keys expire?](#when-do-guardrails-api-keys-expire)
* [Is it possible to get an event stream out of Guardrails?](#is-it-possible-to-get-an-event-stream-out-of-guardrails)
* [Can I make mods available for only part of the workspace?](#can-i-make-mods-available-for-only-part-of-the-workspace)
+* [Why don't I see all controls for my resources?](#why-dont-i-see-all-controls-for-my-resources)
+* [Why do some policy types have no values?](#why-do-some-policy-types-have-no-values)
---
## Can I rotate the keys embedded in Guardrails' event handlers?
+
Sure! Regular key rotation is a part of any strong security stance. Configuration and troubleshooting instructions can be found on the [key rotation](workspace-faq/key_rotation) page.
## The Guardrails console session expires at 12 hours. Can it be shorter?
@@ -23,12 +26,37 @@ Sure! Regular key rotation is a part of any strong security stance. Configurati
The Guardrails console session timeout period can be adjusted with the [Turbot > Workspace > Console Session Timeout](mods/turbot/turbot-iam/policy#turbot--workspace--console-session-timeout) to as little as 15 minutes. Keep in mind that this is a global change that affects all users in the Guardrails console. Guardrails API keys are not affected by this change.
## When do Guardrails API keys expire?
+
By default, Guardrails API keys do not expire. Guardrails admins can set the [Turbot > IAM > Access Key > Expiration](mods/turbot/turbot-iam/policy#turbot--iam--access-key--expiration) policy to deactivate or delete Guardrails API keys to a range of expiration periods ranging up to 90 days. Ensure that Guardrails console access can be recovered if access keys expire for any break-glass users. A calculated policy could be written for the `Turbot > IAM > Access Key > Expiration` policy to identify and preserve the API keys for break-glass users but deactivate/destroy keys for other users.
Note that this policy does not affect AWS IAM Access Keys.
## Is it possible to get an event stream out of Guardrails?
+
The Guardrails Firehose provides a user configurable event stream of cloud environment change, Guardrails control state, and Guardrails permission assignments. Full details on how to configure the Firehose can be found in the [Firehose guide](guides/firehose).
## Can I make mods available for only part of the workspace?
-Installing a Guardrails mod makes the resource types, controls and policies available to the entire workspace.
\ No newline at end of file
+
+Installing a Guardrails mod makes the resource types, controls and policies available to the entire workspace.
+
+## Why don't I see all controls for my resources?
+
+**Note**: This applies when the `Turbot > Materialization` policy is set to `Automatic`. If set to `Always`, all controls will appear regardless of policy settings.
+
+Most controls are only created when policy settings exist for the primary policy that drives that control.
+
+For example, the `AWS > S3 > Bucket > Approved` control will only appear on your S3 buckets when you have policy settings for the `AWS > S3 > Bucket > Approved` policy type. If you only create policy settings for sub-policies, like `AWS > S3 > Bucket > Approved > Regions`, the control will **not** be created.
+
+CMDB and configuration controls, like `AWS > EC2 > Instance > Discovery` and `AWS > Turbot > Event Handlers`, are always created with their related policy values.
+
+You can view all available control types for a resource by navigating to a specific resource, and then selecting the `Controls` tab.
+
+## Why do some policy types have no values?
+
+**Note**: This applies when the `Turbot > Materialization` policy is set to `Automatic`. If set to `Always`, all policy values will be created regardless of whether policy settings exist.
+
+Most policy types only create policy values when you explicitly set a policy setting somewhere in the resource hierarchy. These are typically policies that drive specific controls like `AWS > S3 > Bucket > Approved` or `AWS > EC2 > Instance > Active`.
+
+For example, if you set the `AWS > S3 > Bucket > Approved` policy at the AWS account level, Guardrails will create policy values for this policy type and all of its sub-policies, like `AWS > S3 > Bucket > Approved > Regions` for all S3 buckets in that account. Without a policy setting somewhere in the hierarchy, no policy value exists for these policy types.
+
+Some policy types always have values created automatically when resources are discovered, using default values. These CMDB and configuration policies include settings like CMDB, event handlers, and account notification recipients.
\ No newline at end of file
diff --git a/docs/getting-started/7-minute-labs/set-policy/index.md b/docs/getting-started/7-minute-labs/set-policy/index.md
index 4c7ba220..d80cf1ee 100644
--- a/docs/getting-started/7-minute-labs/set-policy/index.md
+++ b/docs/getting-started/7-minute-labs/set-policy/index.md
@@ -33,20 +33,21 @@ values in the Turbot Guardrails Console.
## View a Policy Value
-1. In the Turbot Guardrails Console, navigate to the test bucket that you created in the
- [prerequisite step](set-policy#prerequisites). Our test bucket name is
- _turbot-bucket-version_, which we can search for at the main Turbot Guardrails screen.
- Click on the bucket once it is found.
+1. In the Turbot Guardrails Console, search for the test bucket called _turbot-bucket-version_ that you created in the [prerequisite step](set-policy#prerequisites).

+
+2. Click on the bucket once it is found.

+
+3. Next, you'll see the bucket's details.

-2. Click the **Policies** tab. It shows both
+4. Click the **Policies** tab. It shows both
[Policy Settings](concepts/policies/values-settings#policy-settings) and
[Policy Values](concepts/policies/values-settings#policy-values).

-3. From the list of Policy Values for this bucket, click on the **Template
+5. From the list of Policy Values for this bucket, click on the **Template
(Bucket > Tags > Template)** item to bring up the policy value.
