<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/ransomware-risk-management-on-aws-using-nist-csf.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/nistir-8374-ransomware-profile.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/nist-practice-guide-goals.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/technical-capabilities.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/backup.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/corruption-testing.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/denylisting.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/event-detection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/forensics-and-analytics.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/integrity-monitoring.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/inventory.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/logging.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/mitigation-and-containment.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/network-protection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/policy-enforcement.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/reporting.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/secure-storage.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/virtual-infrastructure.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/vulnerability-management.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/contributors.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/further-reading.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/document-revisions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/notices.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/ransomware-risk-management-on-aws-using-nist-csf/glossary.html</loc>
   </url>
</urlset>
