<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/aws-security-incident-response-guide.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/introduction.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/preparation.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/people.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/define-roles-and-responsibilities.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/train-incident-response-staff.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/understand-aws-cloud-technologies.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/understand-your-aws-environment.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/understand-aws-response-teams-and-support.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/process.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/develop-and-test-incident-response-plan.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/document-and-centralize-architecture-diagrams.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/develop-incident-response-playbooks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/what-to-create-playbooks-for.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/what-to-include-in-playbooks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/sample-playbooks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/run-regular-simulations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/types-of-simulations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/exercise-lifecycle.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/technology.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/develop-aws-account-structure.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/develop-and-implement-tagging-strategy.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/update-aws-account-contact-info.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/prepare-access-to-aws-accounts.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/understand-threat-landscape.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/select-and-set-up-logs-for-analysis-alerting.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/select-and-enable-log-sources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/select-log-storage.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/identify-appropriate-log-retention.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/select-and-implement-querying-mechanisms.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/use-logs-for-alerting.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/develop-forensics-capabilities.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/forensics-on-aws.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/capture-backups-and-snapshots.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/automate-forensics-on-aws.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/preparation-summary.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/operations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/detection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/alert-sources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/detection-as-security-control-engineering.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/detective-control-implementations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/people-based-detection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/detection-summary.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/analysis.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/validate-scope-assess-alert-impact.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/enrich-security-logs-and-findings.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/collect-analyze-forensic-evidence.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/collect-relevant-artifacts.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/develop-narratives.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/containment.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/source-containment.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/technique-access-containment.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/destination-containment.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/containment-summary.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/eradication.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/recovery.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/operations-conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/post-incident-activity.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/establish-framework-for-learning.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/establish-metrics-for-success.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/mean-time-to-detect.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/mean-time-to-acknowledge.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/mean-time-to-respond.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/mean-time-to-contain.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/mean-time-to-recover.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/attacker-dwell-time.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/metrics-summary.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/use-indicators-of-compromise.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/continue-educating-and-training.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/contributors.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/appendix-a-cloud-capability-definitions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/logging-and-events.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/visibility-and-alerting.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/automation-1.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/secure-storage.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/custom.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/appendix-b-incident-response-resources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/document-revisions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/id_id/whitepapers/latest/aws-security-incident-response-guide/notices.html</loc>
   </url>
</urlset>
