<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/security-best-practices-for-manufacturing-ot.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/scenarios.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/gaining-insights-from-manufacturing-data.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/device-control-machine-learning-inference-at-edge.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/edge-computing-infrastructure-management.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/integrated-manufacturing.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/security-principles.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/security-best-practices.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/secure-network-connection-to-the-cloud.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/secure-network-connection-to-local-resources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/secure-cloud-connected-network-resources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/securely-manage-and-access-computing-resources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/continuously-monitor-network-traffic-and-resources.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/secure-manufacturing-data.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/conclusion-and-further-reading.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/document-history-and-contributors.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/whitepapers/latest/security-best-practices-for-manufacturing-ot/notices.html</loc>
   </url>
</urlset>
