<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/classic-intrusion-analysis-frameworks-for-aws-environments.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/introduction.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/what-is-an-intrusion-method.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/weakness-and-limitations-of-classic-frameworks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/stopping-intrusion-methods.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/modifications-for-the-cloud.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/sample-mapping-exercise.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/contributors.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/further-reading.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/doc-history.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/appendix-reference-material.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/reconnaissance-pre-intrusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/reconnaissance-post-intrusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/exploit-development.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/delivery.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/exploitation.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/installation.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/command-and-control.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/actions-on-objectives.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/control-name-descriptions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/prioritizing-control-implementations.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/notices.html</loc>
   </url>
</urlset>
