diff --git a/vault/config-as-code/identity_control/groups/sudo/terragrunt.hcl b/vault/config-as-code/identity_control/groups/sudo/terragrunt.hcl
index 5df7308f5d77fa0ceb635f789efd75039e9d55e8..4461939a4d353cc34adc9b73c0e39f36ceccda6f 100644
--- a/vault/config-as-code/identity_control/groups/sudo/terragrunt.hcl
+++ b/vault/config-as-code/identity_control/groups/sudo/terragrunt.hcl
@@ -21,6 +21,6 @@ inputs = {
   name                = "sudo"
   policies            = ["sudo"]
   member_entity_ids   = [
-    dependency.user1_identity_id.outputs.id,
+    dependency.admin1_identity_id.outputs.id,
   ]
 }
diff --git a/vault/config-as-code/identity_control/groups/vault_user1-kv/terragrunt.hcl b/vault/config-as-code/identity_control/groups/vault_user1-kv/terragrunt.hcl
new file mode 100644
index 0000000000000000000000000000000000000000..054578028d472553959bffc05208315ba0a7f138
--- /dev/null
+++ b/vault/config-as-code/identity_control/groups/vault_user1-kv/terragrunt.hcl
@@ -0,0 +1,26 @@
+# Terragrunt will copy the Terraform configurations specified by the source parameter, along with any files in the
+# working directory, into a temporary folder, and execute your Terraform commands in that folder.
+terraform {
+  source = "../../../terraform-modules/identity_group"
+}
+
+# Include all settings from the root terragrunt.hcl file
+include {
+  path = find_in_parent_folders()
+}
+
+dependency user1_identity_id {
+  config_path = "../../users/vault_user1"
+  mock_outputs = {
+    member_entity_ids = "abc-123"
+  }
+}
+
+# These are the variables we have to pass in to use the module specified in the terragrunt configuration above
+inputs = {
+  name                = "user1"
+  policies            = ["user1"]
+  member_entity_ids   = [
+    dependency.user1_identity_id.outputs.id,
+  ]
+}
diff --git a/vault/config-as-code/identity_control/users/vault_user2/terragrunt.hcl b/vault/config-as-code/identity_control/users/vault_admin1/terragrunt.hcl
similarity index 90%
rename from vault/config-as-code/identity_control/users/vault_user2/terragrunt.hcl
rename to vault/config-as-code/identity_control/users/vault_admin1/terragrunt.hcl
index ed1190d3cd5b0af5b0ef4bba5aa4c046e8afd0f0..60292130089da11dbb9e9b42188941728ee37ab6 100644
--- a/vault/config-as-code/identity_control/users/vault_user2/terragrunt.hcl
+++ b/vault/config-as-code/identity_control/users/vault_admin1/terragrunt.hcl
@@ -19,7 +19,7 @@ dependency userpass_auth_backend {
 # These are the variables we have to pass in to use the module specified in the terragrunt configuration above
 inputs = {
   auth_backend              = dependency.userpass_auth_backend.outputs.accessor
-  identity_entity_name      = "test.user2"
+  identity_entity_name      = "test.admin1"
   identity_entity_policies  = ["change-userpass-password"]
-  userpass_username         = "user2"
+  userpass_username         = "admin1"
 }
diff --git a/vault/config-as-code/kv/vault_admin1-kv/terragrunt.hcl b/vault/config-as-code/kv/vault_admin1-kv/terragrunt.hcl
new file mode 100644
index 0000000000000000000000000000000000000000..f0f4a65c1b83f2957b86c7ced4ab0b0bd92b53dc
--- /dev/null
+++ b/vault/config-as-code/kv/vault_admin1-kv/terragrunt.hcl
@@ -0,0 +1,19 @@
+# Terragrunt will copy the Terraform configurations specified by the source parameter, along with any files in the
+# working directory, into a temporary folder, and execute your Terraform commands in that folder.
+terraform {
+  source = "git::https://repo1.dso.mil/platform-one/private/cnap/terraform-modules.git//vault/mount"
+}
+
+# Include all settings from the root terragrunt.hcl file
+include {
+  path = find_in_parent_folders()
+}
+
+# These are the variables we have to pass in to use the module specified in the terragrunt configuration above
+inputs = {
+  mount_path                = "kv/vault_admin1"
+  mount_type                = "kv"
+  description               = "pki secrets for container signing"
+  max_mount_ttl             = "315569260"
+  default_mount_ttl         = "315569260"
+}
diff --git a/vault/config-as-code/kv/vault_user1-kv/terragrunt.hcl b/vault/config-as-code/kv/vault_user1-kv/terragrunt.hcl
new file mode 100644
index 0000000000000000000000000000000000000000..209975629aeefa9a83ec2679eed356f9fbce37f3
--- /dev/null
+++ b/vault/config-as-code/kv/vault_user1-kv/terragrunt.hcl
@@ -0,0 +1,19 @@
+# Terragrunt will copy the Terraform configurations specified by the source parameter, along with any files in the
+# working directory, into a temporary folder, and execute your Terraform commands in that folder.
+terraform {
+  source = "git::https://repo1.dso.mil/platform-one/private/cnap/terraform-modules.git//vault/mount"
+}
+
+# Include all settings from the root terragrunt.hcl file
+include {
+  path = find_in_parent_folders()
+}
+
+# These are the variables we have to pass in to use the module specified in the terragrunt configuration above
+inputs = {
+  mount_path                = "kv/vault_user1"
+  mount_type                = "kv"
+  description               = "pki secrets for container signing"
+  max_mount_ttl             = "315569260"
+  default_mount_ttl         = "315569260"
+}
diff --git a/vault/config-as-code/policies/user1/terragrunt.hcl b/vault/config-as-code/policies/user1/terragrunt.hcl
new file mode 100644
index 0000000000000000000000000000000000000000..72bc790100824ac6f6fdeed8e4bed6059e771187
--- /dev/null
+++ b/vault/config-as-code/policies/user1/terragrunt.hcl
@@ -0,0 +1,24 @@
+# Terragrunt will copy the Terraform configurations specified by the source parameter, along with any files in the
+# working directory, into a temporary folder, and execute your Terraform commands in that folder.
+terraform {
+  source = "../../../terraform-modules/policy"
+}
+
+# Include all settings from the root terragrunt.hcl file
+include {
+  path = find_in_parent_folders()
+}
+
+# These are the variables we have to pass in to use the module specified in the terragrunt configuration above
+inputs = {
+  name   = "user1"
+  policy = <<EOT
+# -----------------------------------------------------------------------------
+# Root equivalent permissions
+# -----------------------------------------------------------------------------
+path "kv/vault_user1" {
+  capabilities = ["read"]
+}
+
+EOT
+}