<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/planning-your-security-journey.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/security-governance.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/security-assurance.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/identity-and-access-management.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/vulnerability-management.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/infrastructure-protection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/data-protection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/application-security.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/threat-detection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/incident-response.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/contributors.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/further-reading.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/document-revisions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/notices.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/glossary.html</loc>
   </url>
</urlset>
