<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
  <loc>https://sammy.codific.com/pricing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.9</priority>
</url>
<url>
  <loc>https://sammy.codific.com/contact</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.9</priority>
</url>
<url>
  <loc>https://sammy.codific.com/login</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.9</priority>
</url>
<url>
  <loc>https://sammy.codific.com/register</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.9</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/encoding-and-sanitization/encoding-and-sanitization-architecture</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/encoding-and-sanitization/injection-prevention</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/encoding-and-sanitization/sanitization</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/encoding-and-sanitization/memory-string-and-unmanaged-code</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/encoding-and-sanitization/safe-deserialization</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/validation-and-business-logic/validation-and-business-logic-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/validation-and-business-logic/input-validation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/validation-and-business-logic/business-logic-security</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/validation-and-business-logic/anti-automation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/web-frontend-security/web-frontend-security-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/web-frontend-security/unintended-content-interpretation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/web-frontend-security/cookie-setup</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/web-frontend-security/browser-security-mechanism-headers</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/web-frontend-security/browser-origin-separation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/web-frontend-security/external-resource-integrity</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/web-frontend-security/other-browser-security-considerations</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/api-and-web-service/generic-web-service-security</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/api-and-web-service/http-message-structure-validation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/api-and-web-service/graphql</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/api-and-web-service/websocket</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/file-handling/file-handling-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/file-handling/file-upload-and-content</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/file-handling/file-storage</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/file-handling/file-download</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authentication/authentication-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authentication/password-security</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authentication/general-authentication-security</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authentication/authentication-factor-lifecycle-and-recovery</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authentication/general-multi-factor-authentication-requirements</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authentication/out-of-band-authentication-mechanisms</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authentication/cryptographic-authentication-mechanism</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authentication/authentication-with-an-identity-provider</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/session-management/session-management-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/session-management/session-management-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/session-management/session-timeout</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/session-management/session-termination</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/session-management/defenses-against-session-abuse</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/session-management/federated-re-authentication</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authorization/authorization-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authorization/general-authorization-design</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authorization/operation-level-authorization</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/authorization/operation-level-authorization</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/self-contained-tokens/token-source-and-integrity</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/self-contained-tokens/token-content</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/oauth-and-oidc/generic-oauth-and-oidc-security</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/oauth-and-oidc/oauth-client</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/oauth-and-oidc/oauth-resource-server</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/oauth-and-oidc/oauth-authorization-server</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/oauth-and-oidc/oidc-client</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/oauth-and-oidc/openid-provider</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/oauth-and-oidc/consent-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/cryptography/cryptographic-inventory-and-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/cryptography/secure-cryptography-implementation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/cryptography/encryption-algorithms</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/cryptography/hashing-and-hash-based-functions</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/cryptography/random-values</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/cryptography/public-key-cryptography</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/cryptography/in-use-data-cryptography</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/secure-communication/general-tls-security-guidance</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/secure-communication/https-communication-with-external-facing-services</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/secure-communication/general-service-to-service-communication-security</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/configuration/configuration-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/configuration/backend-communication-configuration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/configuration/secret-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/configuration/unintended-information-leakage</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/data-protection/data-protection-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/data-protection/general-data-protection</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/data-protection/client-side-data-protection</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/secure-coding-and-architecture/secure-coding-and-architecture-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/secure-coding-and-architecture/security-architecture-and-dependencies</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/secure-coding-and-architecture/defensive-coding</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/secure-coding-and-architecture/safe-concurrency</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/security-logging-and-error-handling/security-logging-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/security-logging-and-error-handling/general-logging</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/security-logging-and-error-handling/general-logging</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/security-logging-and-error-handling/log-protection</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/security-logging-and-error-handling/error-handling</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/webrtc/turn-server</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/webrtc/media</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/asvs/webrtc/media</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/governance/strategy-and-metrics</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/governance/compliance-and-policy</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/governance/training</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/intelligence/attack-models</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/intelligence/security-features-and-design</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/intelligence/standards-and-requirements</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/ssdl-touchpoints/architecture-analysis</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/ssdl-touchpoints/code-review</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/ssdl-touchpoints/security-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/deployment/penetration-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/deployment/software-environment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/bsimm-15/deployment/configuration-management-and-vulnerability-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/risk-assessment/product-risk-assessment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/risk-assessment/threat-modeling</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/technical-requirements/security-requirements</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/technical-requirements/architecture-design</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/technical-requirements/third-party-dependencies</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/technical-requirements/requirements-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/technical-requirements/configuration-hardening</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/vulnerability-management/incident-detection</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/vulnerability-management/incident-response</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/vulnerability-management/defect-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/vulnerability-management/security-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/vulnerability-management/patching-and-updating</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/vulnerability-management/secure-deploy</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/documentary-obligations/technical-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/documentary-obligations/user-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cra-framework/documentary-obligations/product-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/asset-management/physical-devices-and-systems-within-the-organization-are-inventoried</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/asset-management/software-platforms-and-applications-within-the-organization-are-inventoried</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/asset-management/organizational-communication-and-data-flows-are-mapped</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/asset-management/external-information-systems-are-catalogued</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/asset-management/resources-eg-hardware-devices-data-time-personnel-and-software-are-prioritized-based-on-their-classification-criticality-and-business-value</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/asset-management/cybersecurity-roles-responsibilities-and-authorities-for-the-entire-workforce-and-third-party-stakeholders-are-established</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/business-environment/the-organizations-role-in-the-supply-chain-is-identified-and-communicated</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/business-environment/the-organizations-place-in-critical-infrastructure-and-its-industry-sector-is-identified-and-communicated</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/business-environment/priorities-for-organizational-mission-objectives-and-activities-are-established-and-communicated</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/business-environment/dependencies-and-critical-functions-for-delivery-of-critical-services-are-established</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/business-environment/resilience-requirements-to-support-delivery-of-critical-services-are-established-for-all-operating-states-eg-under-duressattack-during-recovery-normal-operations</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/governance/organizational-cybersecurity-policy-is-established-and-communicated</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/governance/legal-and-regulatory-requirements-regarding-cybersecurity-including-privacy-and-civil-liberties-obligations-are-understood-and-managed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/governance/governance-and-risk-management-processes-address-cybersecurity-risks</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/risk-assessment/asset-vulnerabilities-are-identified-and-documented</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/risk-assessment/cyber-threat-intelligence-is-received-from-information-sharing-forums-and-sources</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/risk-assessment/threats-vulnerabilities-likelihoods-and-impacts-are-used-to-determine-risk</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/risk-assessment/risk-responses-are-identified-and-prioritized</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/risk-management-strategy/risk-management-processes-are-established-managed-and-agreed-to-by-organizational-stakeholders</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/risk-management-strategy/organizational-risk-tolerance-is-determined-and-clearly-expressed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/risk-management-strategy/the-organizations-determination-of-risk-tolerance-is-informed-by-its-role-in-critical-infrastructure-and-sector-specific-risk-analysis</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/supply-chain-risk-management/cyber-supply-chain-risk-management-processes-are-identified-established-assessed-managed-and-agreed-to-by-organizational-stakeholders</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/supply-chain-risk-management/suppliers-and-third-party-partners-of-information-systems-components-and-services-are-identified-prioritized-and-assessed-using-a-cyber-supply-chain-risk-assessment-process</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/supply-chain-risk-management/contracts-with-suppliers-and-third-party-partners-are-used-to-implement-appropriate-measures-designed-to-meet-the-objectives-of-an-organizations-cybersecurity-program-and-cyber-supply-chain-risk-management-plan</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/supply-chain-risk-management/suppliers-and-third-party-partners-are-routinely-assessed-using-audits-test-results-or-other-forms-of-evaluations-to-confirm-they-are-meeting-their-contractual-obligations</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/identify/supply-chain-risk-management/response-and-recovery-planning-and-testing-are-conducted-with-suppliers-and-third-party-providers</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/identity-management-authentication-and-access-control/identities-and-credentials-are-issued-managed-verified-revoked-and-audited-for-authorized-devices-users-and-processes</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/identity-management-authentication-and-access-control/physical-access-to-assets-is-managed-and-protected</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/identity-management-authentication-and-access-control/remote-access-is-managed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/identity-management-authentication-and-access-control/access-permissions-and-authorizations-are-managed-incorporating-the-principles-of-least-privilege-and-separation-of-duties</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/identity-management-authentication-and-access-control/network-integrity-is-protected-eg-network-segregation-network-segmentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/identity-management-authentication-and-access-control/identities-are-proofed-and-bound-to-credentials-and-asserted-in-interactions</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/identity-management-authentication-and-access-control/users-devices-and-other-assets-are-authenticated-eg-single-factor-multi-factor-commensurate-with-the-risk-of-the-transaction-eg-individuals-security-and-privacy-risks-and-other-organizational-risks</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/awareness-and-training/all-users-are-informed-and-trained</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/awareness-and-training/privileged-users-understand-their-roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/awareness-and-training/third-party-stakeholders-eg-suppliers-customers-partners-understand-their-roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/awareness-and-training/senior-executives-understand-their-roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/awareness-and-training/physical-and-cybersecurity-personnel-understand-their-roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/data-security/data-at-rest-is-protected</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/data-security/data-in-transit-is-protected</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/data-security/assets-are-formally-managed-throughout-removal-transfers-and-disposition</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/data-security/adequate-capacity-to-ensure-availability-is-maintained</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/data-security/protections-against-data-leaks-are-implemented</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/data-security/integrity-checking-mechanisms-are-used-to-verify-software-firmware-and-information-integrity</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/data-security/the-development-and-testing-environments-are-separate-from-the-production-environment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/data-security/integrity-checking-mechanisms-are-used-to-verify-hardware-integrity</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/a-baseline-configuration-of-information-technologyindustrial-control-systems-is-created-and-maintained-incorporating-security-principles-eg-concept-of-least-functionality</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/a-system-development-life-cycle-to-manage-systems-is-implemented</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/configuration-change-control-processes-are-in-place</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/backups-of-information-are-conducted-maintained-and-tested</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/policy-and-regulations-regarding-the-physical-operating-environment-for-organizational-assets-are-met</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/data-is-destroyed-according-to-policy</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/protection-processes-are-improved</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/effectiveness-of-protection-technologies-is-shared</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/response-plans-incident-response-and-business-continuity-and-recovery-plans-incident-recovery-and-disaster-recovery-are-in-place-and-managed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/cybersecurity-is-included-in-human-resources-practices-eg-deprovisioning-personnel-screening</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/information-protection-processes-and-procedures/a-vulnerability-management-plan-is-developed-and-implemented</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/maintenance/maintenance-and-repair-of-organizational-assets-are-performed-and-logged-with-approved-and-controlled-tools</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/maintenance/remote-maintenance-of-organizational-assets-is-approved-logged-and-performed-in-a-manner-that-prevents-unauthorized-access</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/protective-technology/auditlog-records-are-determined-documented-implemented-and-reviewed-in-accordance-with-policy</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/protective-technology/removable-media-is-protected-and-its-use-restricted-according-to-policy</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/protective-technology/the-principle-of-least-functionality-is-incorporated-by-configuring-systems-to-provide-only-levelsc14-capabilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/protect/protective-technology/communications-and-control-networks-are-protected</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/anomalies-and-events/a-baseline-of-network-operations-and-expected-data-flows-for-users-and-systems-is-established-and-managed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/anomalies-and-events/detected-events-are-analyzed-to-understand-attack-targets-and-methods</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/anomalies-and-events/event-data-are-collected-and-correlated-from-multiple-sources-and-sensors</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/anomalies-and-events/impact-of-events-is-determined</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/anomalies-and-events/incident-alert-thresholds-are-established</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/security-continuous-monitoring/the-network-is-monitored-to-detect-potential-cybersecurity-events</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/security-continuous-monitoring/the-physical-environment-is-monitored-to-detect-potential-cybersecurity-events</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/security-continuous-monitoring/personnel-activity-is-monitored-to-detect-potential-cybersecurity-events</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/security-continuous-monitoring/malicious-code-is-detected</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/security-continuous-monitoring/unauthorized-mobile-code-is-detected</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/security-continuous-monitoring/external-service-provider-activity-is-monitored-to-detect-potential-cybersecurity-events</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/security-continuous-monitoring/monitoring-for-unauthorized-personnel-connections-devices-and-software-is-performed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/security-continuous-monitoring/vulnerability-scans-are-performed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/detection-processes/detection-activities-comply-with-all-applicable-requirements</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/detection-processes/detection-processes-are-tested</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/detection-processes/event-detection-information-is-communicated</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/detect/detection-processes/detection-processes-are-continuously-improved</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/response-planning/response-plan-is-executed-during-or-after-an-incident</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/response-communications/personnel-know-their-roles-and-order-of-operations-when-a-response-is-needed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/response-communications/incidents-are-reported-consistent-with-established-criteria</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/response-communications/information-is-shared-consistent-with-response-plans</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/response-communications/coordination-with-stakeholders-occurs-consistent-with-response-plans</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/response-communications/voluntary-information-sharing-occurs-with-external-stakeholders-to-achieve-broader-cybersecurity-situational-awareness</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/analysis/notifications-from-detection-systems-are-investigated</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/analysis/the-impact-of-the-incident-is-understood</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/analysis/forensics-are-performed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/analysis/incidents-are-categorized-consistent-with-response-plans</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/analysis/processes-are-established-to-receive-analyze-and-respond-to-vulnerabilities-disclosed-to-the-organization-from-internal-and-external-sources-eg-internal-testing-security-bulletins-or-security-researchers</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/mitigation/incidents-are-contained</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/response-improvements/response-plans-incorporate-lessons-learned</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/respond/response-improvements/response-and-recovery-strategies-are-updated</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/recover/recovery-planning/recovery-plan-is-executed-during-or-after-a-cybersecurity-incident</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/recover/recovery-improvements/recovery-plans-incorporate-lessons-learned</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/recover/recovery-communications/public-relations-are-managed</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/recover/recovery-communications/reputation-is-repaired-after-an-incident</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/cybersecurity-fundamentals/recover/recovery-communications/recovery-activities-are-communicated-to-internal-and-external-stakeholders-as-well-as-executive-and-management-teams</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/supporting-information/purpose-and-scope/purpose-and-scope</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/supporting-information/assumptions/assumptions</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/concept-of-operations/system-description/system-description</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/concept-of-operations/overview-of-three-phases/overview-of-three-phases</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/concept-of-operations/roles-and-responsibilities/roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/activation/activation-procedures/activation-criteria-and-procedure</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/activation/notification-procedures/notification</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/activation/outage-assessment/outage-assessment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/recovery/recovery-activities/sequence-of-recovery-activities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/recovery/recovery-procedures/recovery-procedures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/recovery/recovery-escalation/recovery-escalation-notices</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/validation/data-testing/validation-data-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/validation/functionality-testing/validation-functionality-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/validation/security-testing/security-validation-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/validation/recovery-declaration/recovery-declaration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/validation/event-documentation/event-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/personnel-contact-list/personnel-contact-list</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/vendor-contact-list/vendor-contact-list</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/detailed-recovery/detailed-recovery-procedures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/alternate-processing/alternate-processing-procedures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/validation-test-plan/system-validation-test-plan</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/alternate-storage/alternate-storage</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/diagrams/diagrams</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/inventory/hardware-and-software-inventory</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/interconnections-table/interconnections-table</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/test-and-maintenance/test-and-maintenance-schedule</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/associated-documentation/associated-plans-and-procedures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/business-impact-analysis/business-impact-analysis</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp/appendices/document-change-page/document-change-page</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp-checklist/overall</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp-checklist/pre-activation-activities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp-checklist/recovery-operations-activities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/drp-checklist/disaster-recovery-logging</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/build-and-deployment/build</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/build-and-deployment/deployment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/build-and-deployment/patch-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/culture-and-organization/design</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/culture-and-organization/education-and-guidance</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/culture-and-organization/process</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/implementation/application-hardening</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/implementation/development-and-source-code-control</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/implementation/infrastructure-hardening</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/information-gathering/logging</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/information-gathering/monitoring</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/test-and-verification/test-kpi</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/test-and-verification/application-tests</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/test-and-verification/consolidation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/test-and-verification/dynamic-depth-for-applications</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/test-and-verification/dynamic-depth-for-infrastructure</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/test-and-verification/static-depth-for-applications</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/test-and-verification/static-depth-for-infrastructure</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/dsomm/test-and-verification/test-intensity</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/supporting-information/purpose-and-scope</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/supporting-information/assumptions</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/concept-of-operations/system-description</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/concept-of-operations/overview-of-three-phases</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/concept-of-operations/roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/activation/activation-procedures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/activation/notification-procedures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/activation/outage-assessment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/recovery/recovery-activities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/recovery/recovery-procedures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/recovery/recovery-escalation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/validation/data-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/validation/functionality-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/validation/security-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/validation/recovery-declaration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/validation/event-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/personnel-contact-list</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/vendor-contact-list</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/detailed-recovery</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/alternate-processing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/validation-test-plan</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/alternate-storage</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/diagrams</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/inventory</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/interconnections-table</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/test-and-maintenance</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/associated-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/business-impact-analysis</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-800-34/appendices/document-change-page</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/organizational-context/organizational-mission</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/organizational-context/stakeholder-risk-management-expectations</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/organizational-context/legal-regulatory-and-contractual-requirements</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/organizational-context/stakeholder-service-expectations</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/organizational-context/organizational-service-dependencies</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/risk-management-strategy/risk-management-objectives-agreement</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/risk-management-strategy/risk-appetite-and-risk-tolerance-statements</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/risk-management-strategy/enterprise-risk-integration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/risk-management-strategy/risk-response-strategic-direction</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/risk-management-strategy/lines-of-communication</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/risk-management-strategy/standardized-risk-management-method</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/risk-management-strategy/strategic-opportunities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/roles-responsibilities-and-authorities/organizational-leadership-responsibility</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/roles-responsibilities-and-authorities/risk-management-roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/roles-responsibilities-and-authorities/resource-adequacy</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/roles-responsibilities-and-authorities/human-resource-practices</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/policies-processes-and-procedures/establishment-of-policies-and-procedures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/policies-processes-and-procedures/policy-and-procedure-review-and-update</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/oversight/risk-management-strategy-outcomes-review</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/oversight/risk-management-strategy-review-and-adjustment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/oversight/risk-management-performance-measurement</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/supply-chain-risk-managementprogram</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/third-party-roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/supply-chain-risk-management-integration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/supplier-identification-and-prioritization</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/supplier-cybersecurity-risk-requirements</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/third-party-due-diligence</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/third-party-risk-assessment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/third-party-incident-management-integration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/supply-chain-security-practice-integration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/govern/supply-chain-risk-management/post-agreement-activities-planning</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/asset-management/hardware-inventory</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/asset-management/software-services-and-systems-inventory</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/asset-management/network-communications-and-data-flows</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/asset-management/supplier-services-inventory</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/asset-management/asset-protection-prioritization</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/asset-management/data-and-metadata-inventory</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/asset-management/asset-life-cycle-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/asset-vulnerability-identification</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/information-sharing-forums</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/threat-identification</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/impact-and-likelihood-analysis</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/risk-exposure-determination-and-prioritization</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/risk-response-determination</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/change-and-exception-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/vulnerability-disclosure-response</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/integrity-and-authenticity-verification</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/risk-assessment/critical-supplier-assessment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/improvement/continuous-improvements-evaluation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/improvement/tests-and-exercises</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/improvement/improvements-from-lessons-learned</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/identify/improvement/plans-affecting-operations</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/identity-management-authentication-and-access-control/identity-and-credential-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/identity-management-authentication-and-access-control/identity-binding-to-credentials</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/identity-management-authentication-and-access-control/authentication</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/identity-management-authentication-and-access-control/identity-assertions</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/identity-management-authentication-and-access-control/access-authorizations</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/identity-management-authentication-and-access-control/physical-access</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/awareness-and-training/user-awareness-and-training</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/awareness-and-training/specialized-role-awareness-and-training</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/data-security/protection-of-data-at-rest</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/data-security/protection-of-data-in-transit</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/data-security/protection-of-data-in-use</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/data-security/data-backup</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/platform-security/configuration-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/platform-security/software-maintenance-and-replacement</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/platform-security/hardware-maintenance</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/platform-security/log-record-generation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/platform-security/unauthorized-software-installation-and-execution</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/platform-security/secure-systems-development-practices</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/technology-infrastructure-resilience/logical-access-protections</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/technology-infrastructure-resilience/environmental-threat-protections</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/technology-infrastructure-resilience/resilience-measures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/protect/technology-infrastructure-resilience/capacity-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/continuous-monitoring/network-monitoring</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/continuous-monitoring/physical-environment-monitoring</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/continuous-monitoring/personnel-activity-monitoring</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/continuous-monitoring/service-provider-monitoring</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/continuous-monitoring/hardware-software-and-data-monitoring</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/adverse-event-analysis/potentially-adverse-event-analysis</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/adverse-event-analysis/event-information-correlation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/adverse-event-analysis/impact-and-scope-determination</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/adverse-event-analysis/event-information-sharing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/adverse-event-analysis/contextual-analysis</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/detect/adverse-event-analysis/incident-declaration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-management/response-plan-execution</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-management/incident-triage-and-validation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-management/incident-categorization-and-prioritization</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-management/incident-escalation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-management/recovery-initiation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-analysis/incident-analysis-and-root-cause-determination</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-analysis/investigation-documentation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-analysis/incident-data-collection-and-preservation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-analysis/incident-magnitude-determination</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-response-reporting-and-communication/stakeholder-incident-notification</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-response-reporting-and-communication/stakeholder-incident-information-sharing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-mitigation/incident-containment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/respond/incident-mitigation/incident-eradication</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/recover/incident-recovery-plan-execution/recovery-plan-execution</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/recover/incident-recovery-plan-execution/recovery-action-performance</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/recover/incident-recovery-plan-execution/backup-and-restoration-asset-integrity</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/recover/incident-recovery-plan-execution/post-incident-operational-norms</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/recover/incident-recovery-plan-execution/asset-integrity-restoration</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/recover/incident-recovery-plan-execution/end-of-incident-determination</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/recover/incident-recovery-communication/recovery-activity-communication</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-csf-20/recover/incident-recovery-communication/public-information-sharing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/define-security-requirements-for-software-development/requirements-for-infrastructures</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/define-security-requirements-for-software-development/requirements-for-software</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/define-security-requirements-for-software-development/third-party-requirements-communication</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/implement-roles-and-responsibilities/roles-and-responsibilities</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/implement-roles-and-responsibilities/role-based-training</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/implement-roles-and-responsibilities/management-commitment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/implement-supporting-toolchains/tool-selection</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/implement-supporting-toolchains/tool-best-practices</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/implement-supporting-toolchains/tool-configuration-to-generate-artifacts</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/define-and-use-criteria-for-software-security-checks/security-checks-criteria-definition</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/define-and-use-criteria-for-software-security-checks/security-checks-criteria-implementation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/implement-and-maintain-secure-environments-for-software-development/separate-environments</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/prepare-the-organization/implement-and-maintain-secure-environments-for-software-development/development-endpoint-hardening</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/protect-software/protect-all-forms-of-code-from-unauthorized-access-and-tampering/least-privilege-access</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/protect-software/provide-a-mechanism-for-verifying-software-release-integrity/integrity-verification-data</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/protect-software/archive-and-protect-each-software-release/secure-software-archive-storage</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/protect-software/archive-and-protect-each-software-release/provenance-data-safeguarding-and-sharing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/design-software-to-meet-security-requirements-and-mitigate-security-risks/threat-assessment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/design-software-to-meet-security-requirements-and-mitigate-security-risks/design-decision-tracking</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/design-software-to-meet-security-requirements-and-mitigate-security-risks/reusable-security-components</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/review-the-software-design-to-verify-compliance-with-security-requirements-and-risk-information/architectural-validation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/reuse-existing-well-secured-software-when-feasible-instead-of-duplicating-functionality/secure-component-acquisition</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/reuse-existing-well-secured-software-when-feasible-instead-of-duplicating-functionality/secure-component-creation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/reuse-existing-well-secured-software-when-feasible-instead-of-duplicating-functionality/supplier-assessment</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/create-source-code-by-adhering-to-secure-coding-practices/best-practice-implementation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/configure-the-compilation-interpreter-and-build-processes-to-improve-executable-security/secure-build-tooling</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/configure-the-compilation-interpreter-and-build-processes-to-improve-executable-security/build-tooling-hardening</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/review-andor-analyze-human-readable-code-to-identify-vulnerabilities-and-verify-compliance-with-security-requirements/code-analysis-and-review-needs</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/review-andor-analyze-human-readable-code-to-identify-vulnerabilities-and-verify-compliance-with-security-requirements/code-analysis-and-review-process</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/test-executable-code-to-identify-vulnerabilities-and-verify-compliance-with-security-requirements/code-testing-needs</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/test-executable-code-to-identify-vulnerabilities-and-verify-compliance-with-security-requirements/code-testing-process</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/configure-software-to-have-secure-settings-by-default/configuration-hardening</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/produce-well-secured-software/configure-software-to-have-secure-settings-by-default/hardening-baselines</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/identify-and-confirm-vulnerabilities-on-an-ongoing-basis/threat-intelligence</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/identify-and-confirm-vulnerabilities-on-an-ongoing-basis/vulnerability-regressions</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/identify-and-confirm-vulnerabilities-on-an-ongoing-basis/vulnerability-remediation-and-disclosure</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/assess-prioritize-and-remediate-vulnerabilities/vulnerability-analysis</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/assess-prioritize-and-remediate-vulnerabilities/vulnerability-triaging</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/analyze-vulnerabilities-to-identify-their-root-causes/root-cause-determination</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/analyze-vulnerabilities-to-identify-their-root-causes/root-cause-correlation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/analyze-vulnerabilities-to-identify-their-root-causes/systematic-vulnerability-eradication</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/nist-ssdf/respond-to-vulnerabilities/analyze-vulnerabilities-to-identify-their-root-causes/vulnerability-prevention</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/design/security-architecture/architecture-design</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/design/security-architecture/technology-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/design/security-requirements/software-requirements</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/design/security-requirements/supplier-security</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/design/threat-assessment/application-risk-profile</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/design/threat-assessment/threat-modeling</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/governance/education-and-guidance/training-and-awareness</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/governance/education-and-guidance/organization-and-culture</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/governance/policy-and-compliance/policy-and-standards</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/governance/policy-and-compliance/compliance-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/governance/strategy-and-metrics/create-and-promote</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/governance/strategy-and-metrics/measure-and-improve</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/implementation/defect-management/defect-tracking</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/implementation/defect-management/metrics-and-feedback</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/implementation/secure-build/build-process</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/implementation/secure-build/software-dependencies</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/implementation/secure-deployment/deployment-process</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/implementation/secure-deployment/secret-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/operations/environment-management/configuration-hardening</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/operations/environment-management/patching-and-updating</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/operations/incident-management/incident-detection</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/operations/incident-management/incident-response</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/operations/operational-management/data-protection</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/operations/operational-management/system-decommissioning-legacy-management</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/verification/architecture-assessment/architecture-validation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/verification/architecture-assessment/architecture-mitigation</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/verification/requirements-driven-testing/control-verification</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/verification/requirements-driven-testing/misuseabuse-testing</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/verification/security-testing/scalable-baseline</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
<url>
  <loc>https://sammy.codific.com/browse/samm/verification/security-testing/deep-understanding</loc>
  <lastmod>2025-04-18</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1</priority>
</url>
</urlset>