<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/securing-iot-with-aws.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/security-challenges-and-focus-areas.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/aws-iot-services-and-compliance.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/using-provable-security-to-enhance-iot-an-industry-differentiator.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/implementing-iot-security-using-aws-services.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/conduct-a-formal-security-risk-assessment.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/maintain-an-asset-inventory-of-all-iot-assets.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/provision-iot-devices-and-systems-with-unique-identities-and-credentials.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/define-appropriate-update-mechanisms-for-updates.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/encrypt-persistent-data-at-rest.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/encrypt-all-data-in-transit.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/secure-both-the-iot-environment-and-supporting-it-environments.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/deploy-security-auditing-and-monitoring.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/create-incident-response-playbooks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/create-and-test-business-continuity-and-recovery-plans.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/augmenting-security-practices-for-industrial-control-systems-operational-technology-and-industrial-iot.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/government-contributions-to-iot-security.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/key-iot-security-takeaways.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/contributors.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/document-revisions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/appendix-1-aws-iot-services-and-security-capabilities.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/freertos-device-software.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/aws-iot-greengrass-software-for-edge-computing.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/aws-iot-core-cloud-based-iot-gateway.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/aws-iot-device-management-cloud-based-iot-device-management-service.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/aws-iot-device-defender-cloud-based-iot-device-security-service.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/aws-iot-sitewise-edge-and-cloud-processing-for-industrial-data.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/appendix-2-government-involvement-in-iot.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/united-states.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/united-kingdom.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/notices.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/securing-iot-with-aws/glossary.html</loc>
   </url>
</urlset>
