<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://issap.baremetalcyber.com/</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/course-hub</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-29T03:54:56Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/welcome-to-certified-the-isc-2-issap-audio-course</loc>
    <lastmod>2026-03-29T05:03:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-1-decode-the-issap-exam-blueprint-domain-weights-and-question-styles</loc>
    <lastmod>2026-03-29T05:03:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-2-build-a-spoken-realistic-study-rhythm-that-fits-a-working-architect</loc>
    <lastmod>2026-03-29T05:03:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-3-execute-exam-registration-policies-and-time-management-without-surprises</loc>
    <lastmod>2026-03-29T05:04:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-4-identify-applicable-security-standards-and-guidelines-that-shape-architecture-decisions</loc>
    <lastmod>2026-03-29T05:04:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-5-translate-legal-and-regulatory-requirements-into-enforceable-architecture-constraints</loc>
    <lastmod>2026-03-29T05:05:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-6-design-for-third-party-and-contractual-obligations-across-partners-and-outsourcing</loc>
    <lastmod>2026-03-29T05:05:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-7-architect-for-supply-chain-risk-without-slowing-delivery-and-operations</loc>
    <lastmod>2026-03-29T05:06:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-8-apply-privacy-regulations-and-sensitive-data-standards-to-real-system-designs</loc>
    <lastmod>2026-03-29T05:06:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-9-build-resilient-solutions-that-preserve-security-under-failure-and-disruption</loc>
    <lastmod>2026-03-29T05:06:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-10-identify-key-assets-and-business-objectives-that-drive-grc-architecture-priorities</loc>
    <lastmod>2026-03-29T05:07:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-11-map-stakeholders-to-security-outcomes-without-losing-accountability-and-ownership</loc>
    <lastmod>2026-03-29T05:07:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-12-design-monitoring-and-reporting-for-vulnerability-management-and-audit-readiness</loc>
    <lastmod>2026-03-29T05:08:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-13-engineer-compliance-evidence-flows-that-survive-audits-and-incident-scrutiny</loc>
    <lastmod>2026-03-29T05:08:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-14-design-for-auditability-segregation-forensics-and-high-assurance-requirements</loc>
    <lastmod>2026-03-29T05:12:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-15-incorporate-risk-assessment-artifacts-into-architecture-choices-and-tradeoffs</loc>
    <lastmod>2026-03-29T05:12:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-16-advise-risk-treatment-options-with-clear-rationale-and-decision-traceability</loc>
    <lastmod>2026-03-29T05:12:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-17-define-security-architecture-scope-and-types-for-enterprise-and-cloud</loc>
    <lastmod>2026-03-29T05:12:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-18-choose-network-and-soa-architecture-approaches-that-match-threat-realities</loc>
    <lastmod>2026-03-29T05:13:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-19-apply-togaf-and-sabsa-to-structure-security-architecture-work-products</loc>
    <lastmod>2026-03-29T05:13:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-20-use-reference-architectures-and-blueprints-without-copying-hidden-assumptions</loc>
    <lastmod>2026-03-29T05:13:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-21-operationalize-stride-threat-modeling-from-concept-to-concrete-mitigations</loc>
    <lastmod>2026-03-29T05:14:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-22-apply-cvss-and-threat-intelligence-to-prioritize-architecture-risk-decisions</loc>
    <lastmod>2026-03-29T05:14:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-23-verify-design-with-functional-acceptance-testing-without-missing-security-behaviors</loc>
    <lastmod>2026-03-29T05:14:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-24-validate-design-with-regression-thinking-when-systems-and-dependencies-change</loc>
    <lastmod>2026-03-29T05:14:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-25-turn-threat-vectors-impact-and-probability-into-testable-design-requirements</loc>
    <lastmod>2026-03-29T05:14:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-26-identify-architecture-gaps-early-and-document-them-for-fast-remediation</loc>
    <lastmod>2026-03-29T05:15:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-27-select-alternative-mitigations-and-compensating-controls-that-truly-reduce-risk</loc>
    <lastmod>2026-03-29T05:16:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-28-run-tabletop-exercises-to-validate-security-architecture-under-real-stress</loc>
    <lastmod>2026-03-29T05:16:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-29-use-modeling-and-simulation-to-expose-security-failures-before-production</loc>
    <lastmod>2026-03-29T05:17:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-30-perform-manual-function-reviews-to-catch-design-flaws-automated-tools-miss</loc>
    <lastmod>2026-03-29T05:17:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-31-execute-peer-review-practices-that-improve-architecture-quality-without-politics</loc>
    <lastmod>2026-03-29T05:17:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-32-choose-dynamic-analysis-approaches-that-reveal-runtime-security-weaknesses</loc>
    <lastmod>2026-03-29T05:17:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-33-use-static-analysis-effectively-without-drowning-in-false-positives</loc>
    <lastmod>2026-03-29T05:18:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-34-apply-manual-code-review-techniques-for-high-risk-components-and-interfaces</loc>
    <lastmod>2026-03-29T05:18:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-35-use-source-composition-analysis-to-control-supply-chain-and-dependency-risk</loc>
    <lastmod>2026-03-29T05:18:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-36-define-deployment-model-requirements-across-on-premises-cloud-and-hybrid-systems</loc>
    <lastmod>2026-03-29T05:18:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-37-separate-it-and-operational-technology-requirements-without-breaking-safety-goals</loc>
    <lastmod>2026-03-29T05:19:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-38-architect-physical-security-requirements-perimeter-controls-zoning-and-fire-suppression</loc>
    <lastmod>2026-03-29T05:19:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-39-specify-infrastructure-and-system-monitoring-requirements-for-detection-and-response</loc>
    <lastmod>2026-03-29T05:19:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-40-define-infrastructure-and-system-cryptography-requirements-that-avoid-fragile-designs</loc>
    <lastmod>2026-03-29T05:20:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-41-translate-application-security-needs-using-traceability-and-architecture-documentation</loc>
    <lastmod>2026-03-29T05:21:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-42-build-physical-security-control-sets-using-cameras-doors-and-controllers</loc>
    <lastmod>2026-03-29T05:21:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-43-architect-platform-security-across-hardware-firmware-os-virtual-and-container</loc>
    <lastmod>2026-03-29T05:21:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-44-design-wired-and-wireless-network-security-without-creating-hidden-trust-paths</loc>
    <lastmod>2026-03-29T05:22:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-45-secure-public-private-and-management-networks-with-segmentation-and-policy</loc>
    <lastmod>2026-03-29T05:22:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-46-architect-iot-and-management-plane-security-without-losing-operational-visibility</loc>
    <lastmod>2026-03-29T05:22:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-47-select-firewalls-airgaps-and-software-defined-perimeters-for-clear-boundaries</loc>
    <lastmod>2026-03-29T05:23:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-48-design-vpn-and-ipsec-strategies-that-preserve-identity-integrity-and-scale</loc>
    <lastmod>2026-03-29T05:24:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-49-apply-nac-dns-and-ntp-protections-to-prevent-control-plane-attacks</loc>
    <lastmod>2026-03-29T05:24:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-50-secure-voip-and-unified-communications-without-sacrificing-availability-and-quality</loc>
    <lastmod>2026-03-29T05:24:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-51-apply-web-application-firewalls-where-they-help-and-where-they-fail</loc>
    <lastmod>2026-03-29T05:25:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-52-design-storage-security-for-das-san-nas-archives-and-removable-media</loc>
    <lastmod>2026-03-29T05:25:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-53-secure-data-repositories-with-access-control-encryption-redaction-and-masking</loc>
    <lastmod>2026-03-29T05:25:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-54-architect-cloud-security-across-iaas-paas-and-saas-responsibility-boundaries</loc>
    <lastmod>2026-03-29T05:26:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-55-secure-industrial-control-systems-and-scada-without-breaking-safety-operations</loc>
    <lastmod>2026-03-29T05:26:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-56-design-endpoint-security-for-byod-mobile-edr-and-hids-hips</loc>
    <lastmod>2026-03-29T05:26:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-57-secure-shared-services-like-email-and-communications-with-practical-control-sets</loc>
    <lastmod>2026-03-29T05:27:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-58-integrate-third-parties-using-federation-apis-vpn-and-sftp-safely</loc>
    <lastmod>2026-03-29T05:27:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-59-design-infrastructure-monitoring-architecture-that-supports-fast-triage-and-containment</loc>
    <lastmod>2026-03-29T05:28:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-60-build-content-monitoring-using-dlp-across-email-web-data-and-social-media</loc>
    <lastmod>2026-03-29T05:28:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-61-plan-out-of-band-communications-for-incident-response-and-bc-dr-operations</loc>
    <lastmod>2026-03-29T05:28:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-62-evaluate-control-applicability-across-clients-proxies-and-application-service-components</loc>
    <lastmod>2026-03-29T05:28:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-63-determine-cryptographic-design-constraints-lifecycle-algorithms-and-system-capabilities</loc>
    <lastmod>2026-03-29T05:29:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-64-choose-cryptographic-implementations-for-data-in-transit-in-use-and-at-rest</loc>
    <lastmod>2026-03-29T05:29:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-65-plan-key-management-lifecycle-from-generation-through-storage-and-distribution</loc>
    <lastmod>2026-03-29T05:29:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-66-architect-identity-proofing-and-verification-using-physical-and-logical-methods</loc>
    <lastmod>2026-03-29T05:29:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-67-assign-identifiers-to-users-services-devices-and-components-without-collisions</loc>
    <lastmod>2026-03-29T05:30:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-68-design-joiners-movers-leavers-provisioning-and-deprovisioning-that-prevents-orphan-access</loc>
    <lastmod>2026-03-29T05:31:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-69-select-identity-management-technologies-that-support-scale-recovery-and-governance</loc>
    <lastmod>2026-03-29T05:31:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-70-define-authentication-approaches-single-factor-mfa-and-risk-based-elevation</loc>
    <lastmod>2026-03-29T05:31:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-71-apply-saml-radius-kerberos-and-oauth-where-each-fits-best</loc>
    <lastmod>2026-03-29T05:31:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-72-use-ldap-and-xacml-controls-to-enforce-authentication-and-access-policies</loc>
    <lastmod>2026-03-29T05:32:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-73-define-trust-relationships-for-federated-and-stand-alone-identity-architectures</loc>
    <lastmod>2026-03-29T05:32:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-74-apply-authorization-principles-least-privilege-sod-and-interactive-vs-non-interactive</loc>
    <lastmod>2026-03-29T05:32:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-75-choose-authorization-models-for-physical-logical-and-administrative-access-control</loc>
    <lastmod>2026-03-29T05:33:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-76-design-authorization-workflows-issuance-review-revocation-suspension-and-governance</loc>
    <lastmod>2026-03-29T05:33:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-77-map-roles-rights-and-responsibilities-to-system-application-and-data-access</loc>
    <lastmod>2026-03-29T05:33:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-78-implement-drm-and-group-strategies-without-creating-unmanageable-entitlement-sprawl</loc>
    <lastmod>2026-03-29T05:33:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-79-manage-privileged-accounts-using-pam-to-reduce-standing-administrative-risk</loc>
    <lastmod>2026-03-29T05:33:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-80-select-authorization-approaches-sso-rbac-abac-rules-tokens-certificates</loc>
    <lastmod>2026-03-29T05:34:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-81-determine-accounting-and-forensic-requirements-that-drive-audit-logging-architecture</loc>
    <lastmod>2026-03-29T05:34:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-82-define-audit-events-that-matter-without-flooding-storage-and-analysts</loc>
    <lastmod>2026-03-29T05:34:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-83-establish-log-alerts-and-notifications-that-support-rapid-response-and-investigation</loc>
    <lastmod>2026-03-29T05:35:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-84-engineer-log-retention-and-integrity-controls-that-hold-up-in-court</loc>
    <lastmod>2026-03-29T05:35:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-85-build-log-analysis-and-reporting-that-connects-iam-events-to-business-risk</loc>
    <lastmod>2026-03-29T05:35:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issap.baremetalcyber.com/episodes/episode-86-align-iam-logging-with-policies-and-regulations-including-pci-dss-and-gdpr</loc>
    <lastmod>2026-03-29T05:36:05Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
