<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://plerion.com/blog</loc>
    </url>
    <url>
        <loc>https://plerion.com/company/careers</loc>
    </url>
    <url>
        <loc>https://plerion.com/company/contact-us</loc>
    </url>
    <url>
        <loc>https://plerion.com/sign-up</loc>
    </url>
    <url>
        <loc>https://plerion.com/company/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/platform-overview</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/cloud-asset-inventory</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/cloud-workload-protection-platform</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/cloud-infrastructure-entitlement-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/code-security</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/cloud-compliance</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/software-bill-of-materials</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/integrations</loc>
    </url>
    <url>
        <loc>https://plerion.com/company/partnerships</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/supported-clouds</loc>
    </url>
    <url>
        <loc>https://plerion.com/use-cases/find-and-prioritize-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://plerion.com/use-cases/identify-the-1-percent-of-risk-that-matters</loc>
    </url>
    <url>
        <loc>https://plerion.com/use-cases/understand-whats-in-your-cloud</loc>
    </url>
    <url>
        <loc>https://plerion.com/use-cases/work-where-youre-already-working</loc>
    </url>
    <url>
        <loc>https://plerion.com/use-cases/know-who-has-access-to-what</loc>
    </url>
    <url>
        <loc>https://plerion.com/use-cases/overview</loc>
    </url>
    <url>
        <loc>https://plerion.com/company/about-us</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base</loc>
    </url>
    <url>
        <loc>https://plerion.com/search</loc>
    </url>
    <url>
        <loc>https://plerion.com/company/privacy-policy</loc>
    </url>
    <url>
        <loc>https://plerion.com/company/vulnerability-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://plerion.com/subscribe-to-blog</loc>
    </url>
    <url>
        <loc>https://plerion.com/talk-to-sales</loc>
    </url>
    <url>
        <loc>https://plerion.com/get-a-demo</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers</loc>
    </url>
    <url>
        <loc>https://plerion.com/pricing</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/risk</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/kubernetes-security-posture-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/attack-paths</loc>
    </url>
    <url>
        <loc>https://plerion.com/pleri-ai</loc>
    </url>
    <url>
        <loc>https://plerion.com/pleri-skills-capabilities</loc>
    </url>
    <url>
        <loc>https://plerion.com/get-a-cloud-security-assessment</loc>
    </url>
    <url>
        <loc>https://plerion.com</loc>
    </url>
    <url>
        <loc>https://plerion.com/platform/ai-security</loc>
    </url>
    <url>
        <loc>https://plerion.com/cnapp</loc>
    </url>
    <url>
        <loc>https://plerion.com/jobs/express-of-interest</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/about-aws-service-linked-roles</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/automatically-prioritize-security-issues-from-different-tools-with-an-llm</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/building-pleri-an-ai-security-teammate-on-aws</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/conditional-love-for-aws-metadata-enumeration</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/dont-expose-yourself-in-public-let-aws-error-messages-do-it</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/find-hidden-aws-resources-with-effective-wordlists</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/give-direction-to-engineering-led-startup</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/hacking-terraform-state-for-privilege-escalation</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/how-to-build-an-ai-teammate-not-a-chatbot</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/how-to-get-rekt-using-aws-neptune</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/i-automated-a-newsletter-using-aws-bedrock-agents</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/please-buy-our-gen-v-humachine-cloud-security-solution</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/plerion-achieves-aws-security-competency-status</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/plerion-raises-10m-in-seed-funding-to-revolutionize-cloud-security</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/privilege-escalation-with-sagemaker-and-execution-roles</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/pwn-request-scanning-github-for-the-vulnerability-that-took-down-trivy</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/root-in-prod</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/s3-bucket-encryption-doesnt-work-the-way-you-think-it-works</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/tapping-the-leaking-aws-account-id-faucet</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/testing-access-to-aws-resources</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/the-deputy-is-confused-about-aws-security-hub</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/the-final-answer-aws-account-ids-are-secrets</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/things-you-wish-you-didnt-need-to-know-about-s3</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/trust-relationships-in-bedrock-service-roles</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/what-do-hackers-know-about-your-aws-account</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/without-passrole-it-fine-lambda-edition</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/your-queues-your-responsibility</loc>
    </url>
    <url>
        <loc>https://plerion.com/blog/your-vulnerability-backlog-is-mostly-fiction</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/4-9-ensure-aws-config-configuration-changes-are-monitored-manual</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/acceptable-use-of-technology-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/access-control-logs</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/amazon-s3-has-been-discovered-classified-and-secured-when-required</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/anti-malware-detection-and-prevention</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/application-and-interface-security-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/application-and-service-approval</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/application-interface-availability</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/application-security-baseline-requirements</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/application-security-metrics</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/application-vulnerability-remediation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/asset-returns</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/assets-cataloguing-and-tracking</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/assets-classification</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/audit-and-assurance-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/audit-logs-access-and-accountability</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/audit-logs-monitoring-and-response</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/audit-logs-protection</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/audit-management-process</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/authorization-mechanisms</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/automated-application-security-testing</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/automated-secure-application-deployment</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/automatic-lock-screen</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/background-screening-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/backup</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/business-continuity-exercises</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/business-continuity-management-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/business-continuity-planning</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/business-continuity-strategy</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/cabling-security</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/capacity-and-resource-planning</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/cek-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/change-agreements</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/change-management-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/change-management-technology</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/change-restoration</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/clean-desk-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/clock-synchronization</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/communication</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/compatibility</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/compliance-user-responsibility</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/controlled-access-points</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/csc-key-management-capability</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/cscs-approval-for-agreed-privileged-access-roles</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-classification</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-encryption</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-flow-documentation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-inventory</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-location</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-ownership-and-stewardship</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-portability-contractual-obligations</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-privacy-by-design-and-default</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-protection-by-design-and-default</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-protection-impact-assessment</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-retention-and-deletion</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/data-security-and-privacy-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/detection-of-baseline-deviation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/detection-updates</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/disaster-response-plan</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/disclosure-notification</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/disclosure-of-data-sub-processors</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/do-not-setup-access-keys-iam-users</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/documentation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/efs-access-points-should-be-configured-to-enforce-a-user-identity</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/elasticache-redis-cache-clusters-should-use-authentication-tokens</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/eliminate-use-of-the-root-user-for-administrative-and-daily-tasks</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/employment-agreement-content</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/employment-agreement-process</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/employment-termination</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/enable-auto-scaling-for-dynamodb-tables</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/enable-logging-for-api-gateway-rest-and-websocket-apis</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/enable-point-in-time-recovery-pitr-for-dynamodb-global-tables</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/enable-x-ray-tracing-for-lambda-functions</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/encryption-algorithm</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/encryption-and-key-management-audit</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/encryption-and-key-management-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/encryption-change-cost-benefit-analysis</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/encryption-change-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/encryption-monitoring-and-reporting</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/encryption-risk-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/endpoint-devices-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/endpoint-inventory</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/endpoint-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-access-keys-are-rotated-every-90-days-or-less</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-access-to-awscloudshellfullaccess-is-restricted</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-auto-minor-version-upgrade-feature-is-enabled-for-rds-instances</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-aws-config-is-enabled-in-all-regions</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-aws-management-console-authentication-failures-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-aws-organizations-changes-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-aws-security-hub-is-enabled</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-changes-to-network-gateways-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-cloudtrail-configuration-changes-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-cloudtrail-is-enabled-in-all-regions</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-cloudtrail-log-file-validation-is-enabled</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-cloudtrail-logs-are-encrypted-at-rest-using-kms-cmks</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-credentials-unused-for-45-days-or-greater-are-disabled</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-disabling-or-scheduled-deletion-of-customer-is-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-ebs-volume-encryption-is-enabled-in-all-regions</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-expired-ssl-tls-certificates-in-aws-iam-are-removed</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-hardware-mfa-is-enabled-for-the-root-user-account</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-iam-password-policy-prevents-password-reuse</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-iam-password-policy-requires-minimum-length-of-14-or-greater</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-iam-policy-changes-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-iam-users-receive-permissions-only-through-groups</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-management-console-sign-in-without-mfa-is-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-mfa-delete-is-enabled-on-s3-buckets</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-mfa-is-enabled-for-the-root-user-account</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-multi-factor-authentication-mfa-is-enabled-for-all-iam-users</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-network-access-control-lists-nacl-changes-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-no-network-acls-allow-ingress-from-0-0-0-0-0-to-remote-server</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-no-root-user-account-access-key-exists</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-object-level-logging-for-read-events-enabled-for-s3-bucket</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-object-level-logging-for-write-events-enabled-for-s3-bucket</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-only-one-active-access-key-available-for-single-iam-user</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-rotation-for-customer-created-symmetric-cmks-is-enabled</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-route-table-changes-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-routing-tables-for-vpc-peering-are-least-access</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-s3-bucket-access-logging-is-enabled-on-the-cloudtrail-s3-bucket</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-s3-bucket-policy-changes-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-s3-bucket-policy-is-set-to-deny-http-requests</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-s3-buckets-are-configured-with-access-bucket-settings</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-security-contact-information-is-registered</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-security-group-changes-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-security-questions-are-registered-in-the-aws-account</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-that-ec2-metadata-service-only-allows-imdsv2</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-that-encryption-at-rest-is-enabled-for-rds-instances</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-that-encryption-is-enabled-for-efs-file-systems</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-that-iam-access-analyzer-is-enabled-for-all-regions</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-that-public-access-is-not-given-to-rds-instance</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-that-users-can-add-gallery-apps-to-my-apps-is-set-to-no</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-the-default-security-group-of-every-vpc-restricts-all-traffic</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-unauthorized-api-calls-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-usage-of-root-account-is-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-vpc-changes-are-monitored</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ensure-vpc-flow-logging-is-enabled-in-all-vpcs</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/environmental-systems</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/equipment-identification</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/equipment-location</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/equipment-redundancy</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/event-triage-processes</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/exception-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/external-library-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/failures-and-anomalies-reporting</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/governance-program-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/governance-responsibility-model</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/iam-instance-roles-for-resource-access</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/iam-policies-that-allow-full-administrative-privileges</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/identity-and-access-management-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/identity-inventory</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/incident-response-metrics</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/incident-response-plans</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/incident-response-testing</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/independent-assessments</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/information-security-program</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/information-system-regulatory-mapping</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/infrastructure-and-virtualization-security-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/internal-compliance-testing</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/interoperability-and-portability-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-activation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-archival</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-compromise</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-deactivation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-destruction</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-generation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-inventory-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-purpose</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-recovery</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-revocation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-rotation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/key-suspension</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/least-privilege</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/limitation-of-production-data-use</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/limitation-of-purpose-in-personal-data-processing</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/log-protection</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/log-records</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/logging-and-monitoring-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/logging-scope</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/maintain-current-contact-details</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/malware-protection-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/managed-centrally-via-identity-federation-or-aws-organizations</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/management-of-privileged-access-roles</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/migration-to-cloud-environments</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/network-architecture-documentation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/network-defense</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/network-security</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/no-security-groups-allow-ingress-from-0-0-0-0-0-to-remote-server</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/no-security-groups-allow-ingress-from-0-to-remote-server-ports</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/non-disclosure-agreements</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/off-site-equipment-disposal-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/off-site-transfer-authorization-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/operating-systems</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/organizational-policy-reviews</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/os-hardening-and-base-controls</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/passwords-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/penetration-testing</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/personal-and-sensitive-data-awareness-and-training</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/personal-data-access-reversal-rectification-and-deletion</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/personal-data-sub-processing</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/personnel-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/points-of-contact-maintenance</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/policy-exception-process</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/primary-service-and-contractual-agreement</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/production-and-non-production-environments</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/quality-testing</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/remediation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/remote-and-home-working-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/remote-locate</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/remote-wipe</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/requirements-compliance</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/response-plan-exercise</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/risk-assessment-and-impact-analysis</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/risk-based-planning-assessment</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/risk-management-program</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/safeguard-logs-integrity</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/secure-application-design-and-development</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/secure-area-authorization</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/secure-area-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/secure-disposal</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/secure-interoperability-and-portability-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/secure-media-transportation-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/secure-utilities</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/security-awareness-training</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/security-breach-notification</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/security-incident-management-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/security-monitoring-and-alerting</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/segmentation-and-segregation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/segregation-of-privileged-access-roles</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/sensitive-data-protection</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/sensitive-data-transfer</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/separation-of-duties</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/service-management-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/software-firewall</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/special-interest-groups</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ssrm-control-implementation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ssrm-control-ownership</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ssrm-documentation-review</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ssrm-guidance</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ssrm-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/ssrm-supply-chain</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/storage-encryption</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/strong-authentication</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/strong-password-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/supply-chain-agreement-review</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/supply-chain-data-security-assessment</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/supply-chain-governance-review</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/supply-chain-inventory</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/supply-chain-risk-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/supply-chain-service-agreement-compliance</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/support-role-has-been-created-to-manage-incidents-aws-support</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/surveillance-system</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/third-party-endpoint-security-posture</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/threat-and-vulnerability-management-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/transaction-activity-logging</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/unauthorized-access-response-training</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/unauthorized-change-protection</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/uniquely-identifiable-users</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/user-access-changes-and-revocation</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/user-access-provisioning</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/user-access-review</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/vulnerability-identification</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/vulnerability-management-metrics</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/vulnerability-management-reporting</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/vulnerability-prioritization</loc>
    </url>
    <url>
        <loc>https://plerion.com/cloud-knowledge-base/vulnerability-remediation-schedule</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/basis</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/cache-investment-management</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/deputy</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/dnx</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/finstro</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/landchecker</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/mintable</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/multiplier</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/savvymoney</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/storypark</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/tokka-labs</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/tuned-global</loc>
    </url>
    <url>
        <loc>https://plerion.com/customers/workflowmax</loc>
    </url>
</urlset>