<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/welcome.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/introduction.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/before-you-begin.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/aws-caf-security-perspective.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/foundation-of-incident-response.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/educate.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/shared-responsibility.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/incident-response-in-the-cloud.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/cloud-security-incidents.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/incident-domains.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/indicators-of-cloud-security-events.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/understanding-cloud-capabilities.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/data-privacy.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/aws-response-to-abuse-and-compromise.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/prepare-people.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/define-roles-and-responsibilities.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/define-response-mechanisms.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/create-a-receptive-and-adaptive-security-culture.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/predicting-response.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/partners-and-the-window-of-response.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/unknown-risk.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/prepare-technology.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/prepare-access-to-aws-accounts.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/indirect-access.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/direct-access.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/alternative-access.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/automation-access.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/managed-services-access.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/prepare-processes.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/decision-trees.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/use-alternative-accounts.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/view-or-copy-data.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/sharing-amazon-ebs-snapshots.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/sharing-amazon-cloudwatch-logs.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/use-immutable-storage.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/launch-resources-near-the-event.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/isolate-resources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/launch-forensic-workstations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/cloud-provider-support.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/aws-managed-services.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/aws-support.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/ddos-response-support.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/simulate.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/security-incident-response-simulations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/simulation-steps.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/simulation-examples.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/iterate.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/runbooks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/automation.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/automating-incident-response.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/options-for-automating-response.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/cost-comparisons-in-scanning-methods.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/event-driven-response.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/incident-response-examples.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/service-domain-incidents.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/infrastructure-domain-incidents.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/investigation-decisions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/capturing-volatile-data.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/using-aws-systems-manager.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/automating-the-capture.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/additional-resources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/document-revisions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/appendix-a-cloud-capability-definitions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/logging-and-events.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/visibility-and-alerting.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/automation-1.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/secure-storage.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/custom.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/appendix-b-sample-code.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/appendix-c-example-runbook.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/de_de/whitepapers/latest/aws-security-incident-response-guide/notices.html</loc>
   </url>
</urlset>
