<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/welcome.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/the-security-pillar-of-the-aws-well-architected-framework.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/the-shared-responsibility-model.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/general-design-principles-and-controls.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/secure-workload-operations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/identity-and-access-management-iam.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/data-protection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/infrastructure-protection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/example-architectures-and-associated-security-considerations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/example-architecture-1.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/example-architecture-2.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/example-architecture-3.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/contributors.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/abbreviations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/document-revisions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/notices.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/applying-security-practices-to-network-workload-for-csps/glossary.html</loc>
   </url>
</urlset>
