<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://ccsp.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T20:59:11Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T20:59:11Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T20:59:11Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T20:59:11Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T20:59:11Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T20:59:11Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T20:59:11Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T20:59:11Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-1-orientation-ccsp-at-a-glance</loc>
    <lastmod>2025-09-08T16:08:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-2-study-strategy-how-to-use-an-audio-first-prepcast</loc>
    <lastmod>2025-09-08T16:09:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-3-exam-mechanics-item-types-scoring-and-time-management</loc>
    <lastmod>2025-09-08T16:09:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-4-planning-8-week-study-plan-and-daily-routines</loc>
    <lastmod>2025-09-08T16:10:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-5-memory-active-recall-spaced-repetition-and-note-taking</loc>
    <lastmod>2025-09-08T16:20:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-7-test-day-mindset-logistics-and-post-exam-next-steps</loc>
    <lastmod>2025-09-08T16:22:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-8-glossary-deep-dive-i-cloud-concepts-architecture-terms</loc>
    <lastmod>2025-09-08T16:22:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-9-glossary-deep-dive-ii-data-platform-terms</loc>
    <lastmod>2025-09-08T16:23:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-10-glossary-deep-dive-iii-application-operations-legal-terms</loc>
    <lastmod>2025-09-08T16:23:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-11-domain-1-overview-cloud-concepts-architecture-design</loc>
    <lastmod>2025-09-08T16:24:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-12-shared-responsibility-model-cloud-vs-customer-controls</loc>
    <lastmod>2025-09-08T16:24:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-13-cloud-service-models-iaas-paas-and-saas-security-considerations</loc>
    <lastmod>2025-09-08T16:25:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-14-cloud-deployment-models-public-private-hybrid-and-community</loc>
    <lastmod>2025-09-08T16:25:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-15-cloud-characteristics-elasticity-on-demand-and-multi-tenancy-security</loc>
    <lastmod>2025-09-08T16:26:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-16-roles-responsibilities-providers-consumers-auditors-and-brokers</loc>
    <lastmod>2025-09-08T16:26:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-17-reference-architectures-secure-design-patterns-and-blueprints</loc>
    <lastmod>2025-09-08T16:27:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-18-trust-boundaries-segmentation-and-isolation-in-cloud-designs</loc>
    <lastmod>2025-09-08T16:28:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-19-virtualization-security-hypervisor-and-guest-isolation-basics</loc>
    <lastmod>2025-09-08T16:28:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-20-compute-abstractions-vms-containers-and-serverless-placement</loc>
    <lastmod>2025-09-08T16:28:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-21-storage-models-object-block-and-file-design-considerations</loc>
    <lastmod>2025-09-08T16:31:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-22-network-architectures-virtual-networks-peering-and-segmentation</loc>
    <lastmod>2025-09-08T16:31:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-23-resilience-by-design-availability-fault-tolerance-and-dr-patterns</loc>
    <lastmod>2025-09-08T16:32:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-24-threat-modeling-cloud-specific-approaches-and-patterns</loc>
    <lastmod>2025-09-08T16:32:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-25-governance-design-policies-standards-and-guardrails-as-code</loc>
    <lastmod>2025-09-08T16:33:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-26-domain-2-overview-cloud-data-security</loc>
    <lastmod>2025-09-08T16:33:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-27-data-lifecycle-create-store-use-share-archive-and-destroy</loc>
    <lastmod>2025-09-08T16:34:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-28-data-discovery-catalogs-and-classification-at-scale</loc>
    <lastmod>2025-09-08T16:34:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-29-data-classification-sensitivity-labels-and-handling-rules</loc>
    <lastmod>2025-09-08T16:35:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-30-data-protection-encryption-at-rest-and-in-transit</loc>
    <lastmod>2025-09-08T16:35:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-31-encryption-in-use-confidential-computing-and-memory-protections</loc>
    <lastmod>2025-09-08T16:36:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-32-key-management-kms-hsm-byok-and-hyok-considerations</loc>
    <lastmod>2025-09-08T16:36:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-33-access-to-data-abac-rbac-and-least-privilege-enforcement</loc>
    <lastmod>2025-09-08T16:37:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-34-tokenization-masking-protecting-sensitive-fields</loc>
    <lastmod>2025-09-08T16:38:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-35-data-loss-prevention-patterns-policies-and-tuning</loc>
    <lastmod>2025-09-08T16:38:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-36-data-retention-backup-archival-and-versioning-in-cloud</loc>
    <lastmod>2025-09-08T16:39:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-37-secure-data-deletion-sanitization-and-crypto-erase-in-cloud</loc>
    <lastmod>2025-09-08T16:39:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-38-data-sovereignty-residency-localization-and-transfer-controls</loc>
    <lastmod>2025-09-08T16:40:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-39-privacy-by-design-minimization-consent-and-dpias</loc>
    <lastmod>2025-09-08T16:41:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-40-e-discovery-legal-holds-cloud-storage-implications</loc>
    <lastmod>2025-09-08T16:41:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-41-domain-3-overview-cloud-platform-infrastructure-security</loc>
    <lastmod>2025-09-08T16:42:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-42-virtualization-stack-hypervisors-vm-security-and-hardening</loc>
    <lastmod>2025-09-08T16:42:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-43-compute-workloads-baselines-patching-and-golden-images</loc>
    <lastmod>2025-09-08T16:43:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-44-container-platforms-orchestrator-and-container-hardening</loc>
    <lastmod>2025-09-08T16:43:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-45-serverless-platforms-event-models-and-security-controls</loc>
    <lastmod>2025-09-08T16:44:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-46-network-controls-segmentation-firewalls-and-microsegmentation</loc>
    <lastmod>2025-09-08T16:45:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-47-identity-integration-federated-access-to-cloud-control-planes</loc>
    <lastmod>2025-09-08T16:45:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-48-secrets-management-vaulting-and-rotation-for-infrastructure</loc>
    <lastmod>2025-09-08T16:46:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-49-infrastructure-as-code-secure-templates-and-policy-guardrails</loc>
    <lastmod>2025-09-08T16:50:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-50-software-supply-chain-provenance-sboms-and-signing</loc>
    <lastmod>2025-09-08T16:52:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-51-logging-foundations-control-plane-and-data-plane-telemetry</loc>
    <lastmod>2025-09-08T16:52:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-52-vulnerability-management-scanning-cloud-native-hosts</loc>
    <lastmod>2025-09-08T16:53:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-53-resilience-engineering-auto-scaling-self-healing-and-chaos</loc>
    <lastmod>2025-09-08T16:53:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-54-backup-recovery-snapshots-replication-and-dr-in-cloud</loc>
    <lastmod>2025-09-08T16:54:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-55-edge-hybrid-securing-cloud-gateways-and-on-prem-links</loc>
    <lastmod>2025-09-08T16:55:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-56-domain-4-overview-cloud-application-security</loc>
    <lastmod>2025-09-08T16:55:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-57-secure-sdlc-requirements-design-and-verification-in-cloud</loc>
    <lastmod>2025-09-08T16:56:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-58-threat-modeling-for-apps-microservices-and-apis</loc>
    <lastmod>2025-09-08T16:56:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-59-api-security-authentication-authorization-and-rate-limiting</loc>
    <lastmod>2025-09-08T16:57:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-60-identity-for-apps-oauth-2-0-oidc-and-token-handling</loc>
    <lastmod>2025-09-08T16:57:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-61-secrets-in-code-management-and-injection-avoidance</loc>
    <lastmod>2025-09-08T16:58:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-62-open-source-dependencies-risk-management-and-updates</loc>
    <lastmod>2025-09-08T16:58:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-63-static-analysis-sast-practices-for-cloud-apps</loc>
    <lastmod>2025-09-08T16:59:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-64-dynamic-interactive-testing-dast-and-iast-in-ci-cd</loc>
    <lastmod>2025-09-08T16:59:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-65-runtime-protections-behavior-monitoring-and-application-shielding</loc>
    <lastmod>2025-09-08T17:00:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-66-serverless-apps-event-injection-and-least-privilege-design</loc>
    <lastmod>2025-09-08T17:01:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-67-containerized-apps-image-registry-and-runtime-controls</loc>
    <lastmod>2025-09-08T17:01:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-68-configuration-management-feature-flags-and-secure-defaults</loc>
    <lastmod>2025-09-08T17:02:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-69-devsecops-pipelines-gates-and-automated-policy</loc>
    <lastmod>2025-09-08T17:02:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-70-secure-delivery-blue-green-canary-and-rollback-safety</loc>
    <lastmod>2025-09-08T17:03:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-71-domain-5-overview-cloud-security-operations</loc>
    <lastmod>2025-09-08T17:03:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-72-monitoring-strategies-metrics-logs-and-traces-in-cloud</loc>
    <lastmod>2025-09-08T17:04:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-73-siem-analytics-ingesting-and-correlating-cloud-telemetry</loc>
    <lastmod>2025-09-08T17:05:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-74-cloud-posture-management-misconfiguration-detection-and-drift</loc>
    <lastmod>2025-09-08T17:05:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-75-soar-playbooks-automation-for-detection-and-response</loc>
    <lastmod>2025-09-08T17:06:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-76-incident-response-cloud-specific-triage-and-containment</loc>
    <lastmod>2025-09-08T17:06:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-77-forensics-in-cloud-acquisition-chain-of-custody-and-tools</loc>
    <lastmod>2025-09-08T17:07:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-78-change-management-guardrails-approvals-and-exceptions</loc>
    <lastmod>2025-09-08T17:07:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-79-configuration-management-baselines-and-continuous-compliance</loc>
    <lastmod>2025-09-08T17:08:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-80-vulnerability-operations-prioritization-and-remediation-at-scale</loc>
    <lastmod>2025-09-08T17:08:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-81-key-secret-operations-rotation-expiry-and-escrow</loc>
    <lastmod>2025-09-08T17:09:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-82-access-reviews-just-in-time-and-just-enough-access-workflows</loc>
    <lastmod>2025-09-08T17:10:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-83-business-continuity-failover-runbooks-and-exercises</loc>
    <lastmod>2025-09-08T17:10:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-84-cost-security-guardrails-for-spend-with-least-privilege</loc>
    <lastmod>2025-09-08T17:11:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-85-service-catalog-standard-builds-and-self-service-controls</loc>
    <lastmod>2025-09-08T17:11:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-86-domain-6-overview-legal-risk-and-compliance</loc>
    <lastmod>2025-09-08T17:12:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-87-contracts-slas-security-privacy-and-audit-clauses</loc>
    <lastmod>2025-09-08T17:13:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-88-governance-risk-erm-risk-appetite-and-cloud-policies</loc>
    <lastmod>2025-09-08T17:13:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-89-compliance-frameworks-iso-soc-and-cloud-specific-standards</loc>
    <lastmod>2025-09-08T17:14:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-90-privacy-regulations-cross-border-transfers-and-consent</loc>
    <lastmod>2025-09-08T17:15:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-91-e-discovery-preservation-collection-and-production-in-cloud</loc>
    <lastmod>2025-09-08T17:15:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-92-digital-evidence-logging-time-sync-and-admissibility</loc>
    <lastmod>2025-09-08T17:16:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-93-third-party-risk-due-diligence-and-continuous-monitoring</loc>
    <lastmod>2025-09-08T17:16:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-94-audit-readiness-evidence-generation-and-control-mapping</loc>
    <lastmod>2025-09-08T17:17:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-95-cloud-insurance-coverage-exclusions-and-incident-costs</loc>
    <lastmod>2025-09-08T17:17:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-96-ethics-professionalism-codes-conflicts-and-duty-of-care</loc>
    <lastmod>2025-09-08T17:18:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-97-legal-for-bcdr-force-majeure-rto-rpo-and-notifications</loc>
    <lastmod>2025-09-08T17:18:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-98-intellectual-property-licensing-oss-use-and-patents-in-cloud</loc>
    <lastmod>2025-09-08T17:19:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-99-records-management-retention-schedules-and-disposition</loc>
    <lastmod>2025-09-08T17:20:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/episode-100-emerging-regulations-ai-sovereignty-and-sector-rules</loc>
    <lastmod>2025-09-08T17:20:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://ccsp.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-26T23:31:06Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
