<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyentrix.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-backup_test/</loc>
		<lastmod>2026-05-21T07:39:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-third-party-risk-tpr_dpa/</loc>
		<lastmod>2026-05-21T07:39:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-rs_retainer/</loc>
		<lastmod>2026-05-21T07:38:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_browser/</loc>
		<lastmod>2026-05-21T07:38:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-backups_isolated/</loc>
		<lastmod>2026-05-21T07:38:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-phish_ir_runbook/</loc>
		<lastmod>2026-05-21T07:37:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-third-party-risk-tpr_clauses/</loc>
		<lastmod>2026-05-21T07:37:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-rs_tabletop/</loc>
		<lastmod>2026-05-21T07:36:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_dmarc/</loc>
		<lastmod>2026-05-21T07:36:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-legal/</loc>
		<lastmod>2026-05-21T07:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-oauth_apps/</loc>
		<lastmod>2026-05-21T07:35:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-third-party-risk-tpr_certs/</loc>
		<lastmod>2026-05-21T07:35:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-rs_plan/</loc>
		<lastmod>2026-05-21T07:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_external_banner/</loc>
		<lastmod>2026-05-21T07:34:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-cyber_insurance/</loc>
		<lastmod>2026-05-21T07:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-mailbox_rules/</loc>
		<lastmod>2026-05-21T07:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-third-party-risk-tpr_questionnaire/</loc>
		<lastmod>2026-05-21T07:32:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-de_anomaly/</loc>
		<lastmod>2026-05-21T07:32:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_email_filter/</loc>
		<lastmod>2026-05-21T07:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-retainer/</loc>
		<lastmod>2026-05-21T07:31:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-session_anomaly/</loc>
		<lastmod>2026-05-21T07:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-third-party-risk-tpr_predd/</loc>
		<lastmod>2026-05-21T07:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-de_threat_intel/</loc>
		<lastmod>2026-05-21T07:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_wifi/</loc>
		<lastmod>2026-05-21T07:29:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-comms/</loc>
		<lastmod>2026-05-21T07:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-click_telemetry/</loc>
		<lastmod>2026-05-21T07:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-third-party-risk-tpr_tiering/</loc>
		<lastmod>2026-05-21T07:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_screen_lock/</loc>
		<lastmod>2026-05-21T07:28:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-de_monitoring/</loc>
		<lastmod>2026-05-21T07:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-ir_plan/</loc>
		<lastmod>2026-05-21T07:27:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-wire_transfer/</loc>
		<lastmod>2026-05-21T07:26:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-third-party-risk-tpr_inventory/</loc>
		<lastmod>2026-05-21T07:26:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_disk_enc/</loc>
		<lastmod>2026-05-21T07:25:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-de_logging/</loc>
		<lastmod>2026-05-21T07:25:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-lateral_movement/</loc>
		<lastmod>2026-05-21T07:24:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-high_risk_roles/</loc>
		<lastmod>2026-05-21T07:24:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_updates/</loc>
		<lastmod>2026-05-21T07:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-pr_network/</loc>
		<lastmod>2026-05-21T07:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-attack_surface/</loc>
		<lastmod>2026-05-21T07:23:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-phish_button/</loc>
		<lastmod>2026-05-21T07:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_vuln/</loc>
		<lastmod>2026-05-21T07:22:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_av/</loc>
		<lastmod>2026-05-21T07:21:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-pr_awareness/</loc>
		<lastmod>2026-05-21T07:21:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-threat_intel/</loc>
		<lastmod>2026-05-21T07:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-training_cadence/</loc>
		<lastmod>2026-05-21T07:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_supply/</loc>
		<lastmod>2026-05-21T07:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_admin_rights/</loc>
		<lastmod>2026-05-21T07:19:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-pr_data/</loc>
		<lastmod>2026-05-21T07:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-logging/</loc>
		<lastmod>2026-05-21T07:18:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-mfa_email/</loc>
		<lastmod>2026-05-21T07:18:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_24h/</loc>
		<lastmod>2026-05-21T07:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_offboard/</loc>
		<lastmod>2026-05-21T07:17:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-pr_endpoint/</loc>
		<lastmod>2026-05-21T07:17:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-admin_rights/</loc>
		<lastmod>2026-05-21T07:16:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-lookalike_domains/</loc>
		<lastmod>2026-05-21T07:16:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_ir/</loc>
		<lastmod>2026-05-21T07:15:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_shared/</loc>
		<lastmod>2026-05-21T07:15:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-pr_iam/</loc>
		<lastmod>2026-05-21T07:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-phishing/</loc>
		<lastmod>2026-05-21T07:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-attachment_sandboxing/</loc>
		<lastmod>2026-05-21T07:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_awareness/</loc>
		<lastmod>2026-05-21T07:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_pwmgr/</loc>
		<lastmod>2026-05-21T07:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-id_vuln_mgmt/</loc>
		<lastmod>2026-05-21T07:12:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-edr/</loc>
		<lastmod>2026-05-21T07:12:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-external_banner/</loc>
		<lastmod>2026-05-21T07:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_backups/</loc>
		<lastmod>2026-05-21T07:11:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-small-business-cyber-sb_mfa/</loc>
		<lastmod>2026-05-21T07:11:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-id_data_class/</loc>
		<lastmod>2026-05-21T07:10:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-patching/</loc>
		<lastmod>2026-05-21T07:10:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-email_security/</loc>
		<lastmod>2026-05-21T07:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_crypto/</loc>
		<lastmod>2026-05-21T07:09:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-id_assets/</loc>
		<lastmod>2026-05-21T07:09:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-ransomware-readiness-mfa/</loc>
		<lastmod>2026-05-21T07:08:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-phishing-vulnerability-spf_dkim_dmarc/</loc>
		<lastmod>2026-05-21T07:08:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_mfa/</loc>
		<lastmod>2026-05-21T07:07:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_vendors/</loc>
		<lastmod>2026-05-21T07:07:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-gv_supplychain/</loc>
		<lastmod>2026-05-21T07:06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_risk/</loc>
		<lastmod>2026-05-21T07:06:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_incident/</loc>
		<lastmod>2026-05-21T07:06:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-gv_risk/</loc>
		<lastmod>2026-05-21T07:05:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_lessons/</loc>
		<lastmod>2026-05-21T07:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_change/</loc>
		<lastmod>2026-05-21T07:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_accountability/</loc>
		<lastmod>2026-05-21T07:04:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_logging/</loc>
		<lastmod>2026-05-21T07:03:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-gv_roles/</loc>
		<lastmod>2026-05-21T07:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_priorities/</loc>
		<lastmod>2026-05-21T07:03:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_sdlc/</loc>
		<lastmod>2026-05-21T07:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_policy/</loc>
		<lastmod>2026-05-21T07:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_backup/</loc>
		<lastmod>2026-05-21T07:01:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nist-csf-quick-check-gv_strategy/</loc>
		<lastmod>2026-05-21T07:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_rto/</loc>
		<lastmod>2026-05-21T07:01:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_crypto/</loc>
		<lastmod>2026-05-21T07:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-nis2-compliance-n2_scope/</loc>
		<lastmod>2026-05-21T07:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_jobs/</loc>
		<lastmod>2026-05-21T06:59:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_immutable/</loc>
		<lastmod>2026-05-21T06:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_network/</loc>
		<lastmod>2026-05-21T06:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_emergency/</loc>
		<lastmod>2026-05-21T06:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_disposal/</loc>
		<lastmod>2026-05-21T06:58:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_break_glass/</loc>
		<lastmod>2026-05-21T06:57:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_log/</loc>
		<lastmod>2026-05-21T06:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_change/</loc>
		<lastmod>2026-05-21T06:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_segregation/</loc>
		<lastmod>2026-05-21T06:56:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_media/</loc>
		<lastmod>2026-05-21T06:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_visibility/</loc>
		<lastmod>2026-05-21T06:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_backup/</loc>
		<lastmod>2026-05-21T06:54:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_ephemeral/</loc>
		<lastmod>2026-05-21T06:54:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_change/</loc>
		<lastmod>2026-05-21T06:54:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_offsite/</loc>
		<lastmod>2026-05-21T06:53:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_isolation/</loc>
		<lastmod>2026-05-21T06:53:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_dlp/</loc>
		<lastmod>2026-05-21T06:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_image/</loc>
		<lastmod>2026-05-21T06:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_priv/</loc>
		<lastmod>2026-05-21T06:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_equipment/</loc>
		<lastmod>2026-05-21T06:51:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_regulator/</loc>
		<lastmod>2026-05-21T06:51:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_config/</loc>
		<lastmod>2026-05-21T06:50:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_pipeline/</loc>
		<lastmod>2026-05-21T06:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_review/</loc>
		<lastmod>2026-05-21T06:49:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_clear_desk/</loc>
		<lastmod>2026-05-21T06:49:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_evidence/</loc>
		<lastmod>2026-05-21T06:48:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_vuln/</loc>
		<lastmod>2026-05-21T06:48:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_alert_route/</loc>
		<lastmod>2026-05-21T06:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_termination/</loc>
		<lastmod>2026-05-21T06:47:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_environmental/</loc>
		<lastmod>2026-05-21T06:47:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_decision_log/</loc>
		<lastmod>2026-05-21T06:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_auth/</loc>
		<lastmod>2026-05-21T06:46:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_runtime/</loc>
		<lastmod>2026-05-21T06:45:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-itgc-soc-readiness-i_provisioning/</loc>
		<lastmod>2026-05-21T06:45:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_monitor/</loc>
		<lastmod>2026-05-21T06:44:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_paper/</loc>
		<lastmod>2026-05-21T06:44:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_priv_access/</loc>
		<lastmod>2026-05-21T06:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_workload_log/</loc>
		<lastmod>2026-05-21T06:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_offices/</loc>
		<lastmod>2026-05-21T06:43:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_playbooks/</loc>
		<lastmod>2026-05-21T06:42:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-technological-t_endpoint/</loc>
		<lastmod>2026-05-21T06:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_logging/</loc>
		<lastmod>2026-05-21T06:41:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_takedown_sla/</loc>
		<lastmod>2026-05-21T06:41:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_entry/</loc>
		<lastmod>2026-05-21T06:41:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_legal/</loc>
		<lastmod>2026-05-21T06:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_backups/</loc>
		<lastmod>2026-05-21T06:40:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_cloud_buckets/</loc>
		<lastmod>2026-05-21T06:39:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-physical-ph_perimeter/</loc>
		<lastmod>2026-05-21T06:39:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_ir_retainer/</loc>
		<lastmod>2026-05-21T06:38:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_compliance/</loc>
		<lastmod>2026-05-21T06:38:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_data_disco/</loc>
		<lastmod>2026-05-21T06:38:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_dns_hygiene/</loc>
		<lastmod>2026-05-21T06:37:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_deputies/</loc>
		<lastmod>2026-05-21T06:37:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_continuity/</loc>
		<lastmod>2026-05-21T06:36:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_secrets/</loc>
		<lastmod>2026-05-21T06:36:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_brand_phish/</loc>
		<lastmod>2026-05-21T06:35:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-people-p_culture/</loc>
		<lastmod>2026-05-21T06:35:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_roster/</loc>
		<lastmod>2026-05-21T06:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_incident/</loc>
		<lastmod>2026-05-21T06:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_encryption/</loc>
		<lastmod>2026-05-21T06:34:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_typo_domains/</loc>
		<lastmod>2026-05-21T06:33:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-people-p_reporting/</loc>
		<lastmod>2026-05-21T06:33:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_status_page/</loc>
		<lastmod>2026-05-21T06:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_cloud/</loc>
		<lastmod>2026-05-21T06:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_network/</loc>
		<lastmod>2026-05-21T06:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_secrets_in_code/</loc>
		<lastmod>2026-05-21T06:31:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-people-p_remote/</loc>
		<lastmod>2026-05-21T06:31:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_external_comms/</loc>
		<lastmod>2026-05-21T06:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_supplier/</loc>
		<lastmod>2026-05-21T06:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_cis/</loc>
		<lastmod>2026-05-21T06:29:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_dark_web/</loc>
		<lastmod>2026-05-21T06:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-people-p_termination/</loc>
		<lastmod>2026-05-21T06:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_internal_comms/</loc>
		<lastmod>2026-05-21T06:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_access/</loc>
		<lastmod>2026-05-21T06:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_iac/</loc>
		<lastmod>2026-05-21T06:27:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_breach_creds/</loc>
		<lastmod>2026-05-21T06:27:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_oob/</loc>
		<lastmod>2026-05-21T06:26:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-people-p_disciplinary/</loc>
		<lastmod>2026-05-21T06:26:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_inventory/</loc>
		<lastmod>2026-05-21T06:25:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_cspm/</loc>
		<lastmod>2026-05-21T06:25:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_certs/</loc>
		<lastmod>2026-05-21T06:25:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_board/</loc>
		<lastmod>2026-05-21T06:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-people-p_awareness/</loc>
		<lastmod>2026-05-21T06:24:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_threat_intel/</loc>
		<lastmod>2026-05-21T06:23:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_keys/</loc>
		<lastmod>2026-05-21T06:23:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_admin_panels/</loc>
		<lastmod>2026-05-21T06:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_authority/</loc>
		<lastmod>2026-05-21T06:22:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-people-p_terms/</loc>
		<lastmod>2026-05-21T06:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_roles/</loc>
		<lastmod>2026-05-21T06:21:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_least_priv/</loc>
		<lastmod>2026-05-21T06:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_ports/</loc>
		<lastmod>2026-05-21T06:20:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_thresh/</loc>
		<lastmod>2026-05-21T06:20:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-people-p_screen/</loc>
		<lastmod>2026-05-21T06:19:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-iso-27001-organisational-org_policy/</loc>
		<lastmod>2026-05-21T06:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_sso/</loc>
		<lastmod>2026-05-21T06:18:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_external_assets/</loc>
		<lastmod>2026-05-21T06:17:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-crisis-assessment-cr_owner/</loc>
		<lastmod>2026-05-21T06:17:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-cloud-security-maturity-cl_root/</loc>
		<lastmod>2026-05-21T06:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/c-attack-surface-as_domains/</loc>
		<lastmod>2026-05-21T06:16:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/controls/network-segmentation/</loc>
		<lastmod>2026-05-21T06:04:20+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->