<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://80053.baremetalcyber.com/</loc>
    <lastmod>2026-03-30T14:39:03Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-30T14:39:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-30T14:39:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-03-30T14:39:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-30T14:39:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/cyber-controls-playbook</loc>
    <lastmod>2026-03-30T14:39:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-30T14:39:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-1-foundations-why-nist-800-53-still-anchors-real-programs</loc>
    <lastmod>2025-10-20T15:02:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-2-baselines-and-overlays-tailoring-you-can-defend</loc>
    <lastmod>2025-10-20T15:03:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-3-scoping-and-inheritance-boundaries-providers-and-proofs</loc>
    <lastmod>2025-10-20T15:03:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-4-parameters-and-odps-making-controls-fit-your-system</loc>
    <lastmod>2025-10-20T15:04:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-5-roles-and-artifacts-ssp-sap-sar-and-poa-m-that-agree</loc>
    <lastmod>2025-10-20T15:04:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-6-evidence-definitions-sufficiency-and-traceability</loc>
    <lastmod>2025-10-20T15:05:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-7-sampling-populations-periods-and-selection-logic</loc>
    <lastmod>2025-10-20T15:06:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-8-continuous-monitoring-cadence-triggers-and-tiles</loc>
    <lastmod>2025-10-20T15:06:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-9-metrics-choosing-numbers-that-drive-action</loc>
    <lastmod>2025-10-20T15:06:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-10-tailoring-workflow-from-assumption-to-parameter</loc>
    <lastmod>2025-10-20T15:07:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-11-documentation-quality-narratives-that-survive-scrutiny</loc>
    <lastmod>2025-10-20T15:07:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-12-always-ready-rhythm-updates-reviews-and-renewals</loc>
    <lastmod>2025-10-20T15:08:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-13-access-control-part-one-principles-risks-and-outcomes</loc>
    <lastmod>2025-10-20T15:08:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-14-access-control-part-two-implementation-patterns-and-guardrails</loc>
    <lastmod>2025-10-20T15:09:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-15-access-control-part-three-evidence-reviews-and-pitfalls</loc>
    <lastmod>2025-10-20T15:09:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-16-access-control-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:09:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-17-identification-and-authentication-part-one-authentication-goals-and-threats</loc>
    <lastmod>2025-10-20T15:10:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-18-identification-and-authentication-part-two-implementation-patterns-and-enrollment</loc>
    <lastmod>2025-10-20T15:10:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-19-identification-and-authentication-part-three-evidence-across-the-credential-lifecycle</loc>
    <lastmod>2025-10-20T15:11:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-20-identification-and-authentication-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:11:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-21-audit-and-accountability-part-one-logging-purpose-scope-and-event-taxonomy</loc>
    <lastmod>2025-10-20T15:11:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-22-audit-and-accountability-part-two-collection-transport-and-retention-patterns</loc>
    <lastmod>2025-10-20T15:12:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-23-audit-and-accountability-part-three-evidence-coverage-checks-and-pitfalls</loc>
    <lastmod>2025-10-20T15:12:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-24-audit-and-accountability-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:13:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-25-configuration-management-part-one-baselines-change-control-and-integrity</loc>
    <lastmod>2025-10-20T15:13:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-26-configuration-management-part-two-build-patterns-and-approvals-that-scale</loc>
    <lastmod>2025-10-20T15:14:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-27-configuration-management-part-three-evidence-sampling-and-pitfalls</loc>
    <lastmod>2025-10-20T15:14:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-28-configuration-management-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:14:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-29-incident-response-part-one-purpose-scope-and-maturity-markers</loc>
    <lastmod>2025-10-20T15:15:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-30-incident-response-part-two-implementation-patterns-and-roles</loc>
    <lastmod>2025-10-20T15:15:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-31-incident-response-part-three-evidence-timing-and-pitfalls</loc>
    <lastmod>2025-10-20T15:16:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-32-incident-response-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:17:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-33-risk-assessment-part-one-categorization-context-and-threats</loc>
    <lastmod>2025-10-20T15:17:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-34-risk-assessment-part-two-assessment-practices-and-prioritization</loc>
    <lastmod>2025-10-20T15:17:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-35-risk-assessment-part-three-evidence-registers-and-pitfalls</loc>
    <lastmod>2025-10-20T15:18:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-36-risk-assessment-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:19:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-37-system-and-information-integrity-part-one-purpose-scope-and-outcomes</loc>
    <lastmod>2025-10-20T15:20:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-38-system-and-information-integrity-part-two-flaw-remediation-and-protection-patterns</loc>
    <lastmod>2025-10-20T15:20:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-39-system-and-information-integrity-part-three-evidence-signals-and-pitfalls</loc>
    <lastmod>2025-10-20T15:21:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-40-system-and-information-integrity-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:21:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-41-system-and-communications-protection-part-one-segmentation-and-boundary-thinking</loc>
    <lastmod>2025-10-20T15:21:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-42-system-and-communications-protection-part-two-cryptography-and-session-protections</loc>
    <lastmod>2025-10-20T15:22:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-43-system-and-communications-protection-part-three-evidence-coverage-and-pitfalls</loc>
    <lastmod>2025-10-20T15:22:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-44-system-and-communications-protection-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:23:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-45-contingency-planning-part-one-plans-roles-and-objectives</loc>
    <lastmod>2025-10-20T15:23:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-46-contingency-planning-part-two-backup-alternate-sites-and-continuity-patterns</loc>
    <lastmod>2025-10-20T15:23:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-47-contingency-planning-part-three-evidence-tests-and-pitfalls</loc>
    <lastmod>2025-10-20T15:24:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-48-contingency-planning-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:24:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-49-system-and-services-acquisition-part-one-purpose-scope-and-sourcing-options</loc>
    <lastmod>2025-10-20T15:25:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-50-system-and-services-acquisition-part-two-security-engineering-and-supplier-controls</loc>
    <lastmod>2025-10-20T15:25:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-51-system-and-services-acquisition-part-three-evidence-contract-hooks-and-pitfalls</loc>
    <lastmod>2025-10-20T15:26:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-52-system-and-services-acquisition-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:26:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-53-assessment-authorization-and-monitoring-part-one-purpose-scope-and-outcomes</loc>
    <lastmod>2025-10-20T15:26:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-54-assessment-authorization-and-monitoring-part-two-assessment-practices-and-monitoring</loc>
    <lastmod>2025-10-20T15:27:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-55-assessment-authorization-and-monitoring-part-three-evidence-poa-m-and-pitfalls</loc>
    <lastmod>2025-10-20T15:28:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-56-assessment-authorization-and-monitoring-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:28:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-57-supply-chain-risk-management-part-one-purpose-scope-and-outcomes</loc>
    <lastmod>2025-10-20T15:29:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-58-supply-chain-risk-management-part-two-supplier-controls-and-assurance-patterns</loc>
    <lastmod>2025-10-20T15:29:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-59-supply-chain-risk-management-part-three-evidence-approvals-and-pitfalls</loc>
    <lastmod>2025-10-20T15:30:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-60-supply-chain-risk-management-part-four-advanced-topics-and-metrics</loc>
    <lastmod>2025-10-20T15:30:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-61-awareness-and-training-part-one-purpose-scope-and-audiences</loc>
    <lastmod>2025-10-20T15:31:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-62-awareness-and-training-part-two-implementation-patterns-and-delivery</loc>
    <lastmod>2025-10-20T15:31:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-63-awareness-and-training-part-three-evidence-coverage-and-pitfalls</loc>
    <lastmod>2025-10-20T15:32:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-64-maintenance-part-one-purpose-scope-and-guardrails</loc>
    <lastmod>2025-10-20T15:32:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-65-maintenance-part-two-local-and-remote-maintenance-patterns</loc>
    <lastmod>2025-10-20T15:32:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-66-maintenance-part-three-evidence-approvals-and-pitfalls</loc>
    <lastmod>2025-10-20T15:33:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-67-media-protection-part-one-purpose-scope-and-handling-basics</loc>
    <lastmod>2025-10-20T15:33:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-68-media-protection-part-two-storage-transport-and-destruction-patterns</loc>
    <lastmod>2025-10-20T15:34:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-69-media-protection-part-three-evidence-chain-of-custody-and-pitfalls</loc>
    <lastmod>2025-10-20T15:34:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-70-physical-and-environmental-protection-part-one-purpose-scope-and-boundaries</loc>
    <lastmod>2025-10-20T15:34:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-71-physical-and-environmental-protection-part-two-access-control-and-monitoring-patterns</loc>
    <lastmod>2025-10-20T15:35:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-72-physical-and-environmental-protection-part-three-evidence-logs-and-pitfalls</loc>
    <lastmod>2025-10-20T15:35:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-73-planning-part-one-purpose-scope-and-artifacts</loc>
    <lastmod>2025-10-20T15:36:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-74-planning-part-two-plan-structure-updates-and-integration</loc>
    <lastmod>2025-10-20T15:36:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-75-planning-part-three-evidence-and-common-pitfalls</loc>
    <lastmod>2025-10-20T15:37:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-76-program-management-part-one-strategy-roles-and-alignment</loc>
    <lastmod>2025-10-20T15:37:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-77-program-management-part-two-governance-rhythms-and-portfolios</loc>
    <lastmod>2025-10-20T15:37:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-78-program-management-part-three-evidence-metrics-and-pitfalls</loc>
    <lastmod>2025-10-20T15:38:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-79-personnel-security-part-one-purpose-scope-and-roles</loc>
    <lastmod>2025-10-20T15:38:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-80-personnel-security-part-two-screening-agreements-and-access-lifecycle</loc>
    <lastmod>2025-10-20T15:39:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-81-personnel-security-part-three-evidence-sanctions-and-pitfalls</loc>
    <lastmod>2025-10-20T15:39:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-82-personally-identifiable-information-processing-and-transparency-part-one-purpose-scope-and-responsibilities</loc>
    <lastmod>2025-10-20T15:40:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-83-personally-identifiable-information-processing-and-transparency-part-two-processing-minimization-and-consent-patterns</loc>
    <lastmod>2025-10-20T15:40:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-84-personally-identifiable-information-processing-and-transparency-part-three-evidence-notices-and-pitfalls</loc>
    <lastmod>2025-10-20T15:40:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-85-spotlight-account-management-ac-2</loc>
    <lastmod>2025-10-20T15:41:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-86-spotlight-access-enforcement-ac-3</loc>
    <lastmod>2025-10-20T15:41:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-87-spotlight-separation-of-duties-ac-5</loc>
    <lastmod>2025-10-20T15:42:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-88-spotlight-least-privilege-ac-6</loc>
    <lastmod>2025-10-20T15:42:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-89-spotlight-identification-and-authentication-organizational-users-ia-2</loc>
    <lastmod>2025-10-20T15:43:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-90-spotlight-authenticator-management-ia-5</loc>
    <lastmod>2025-10-20T15:43:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-91-spotlight-non-organizational-user-authentication-ia-8</loc>
    <lastmod>2025-10-20T15:44:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-92-spotlight-identifier-management-ia-4</loc>
    <lastmod>2025-10-20T15:45:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-93-spotlight-event-logging-au-2</loc>
    <lastmod>2025-10-20T15:45:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-94-spotlight-audit-record-review-analysis-and-reporting-au-6</loc>
    <lastmod>2025-10-20T15:46:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-95-spotlight-protection-of-audit-information-au-9</loc>
    <lastmod>2025-10-20T15:46:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-96-spotlight-audit-record-retention-au-11</loc>
    <lastmod>2025-10-20T15:47:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-97-spotlight-baseline-configuration-cm-2</loc>
    <lastmod>2025-10-20T15:48:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-98-spotlight-configuration-change-control-cm-3</loc>
    <lastmod>2025-10-20T15:49:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-100-spotlight-least-functionality-cm-7</loc>
    <lastmod>2025-10-20T15:49:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-101-spotlight-incident-handling-ir-4</loc>
    <lastmod>2025-10-20T15:50:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-102-spotlight-incident-reporting-ir-6</loc>
    <lastmod>2025-10-20T15:50:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-103-spotlight-incident-response-plan-ir-8</loc>
    <lastmod>2025-10-20T15:51:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-104-spotlight-information-spillage-response-ir-9</loc>
    <lastmod>2025-10-20T15:51:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-105-spotlight-risk-assessment-ra-3</loc>
    <lastmod>2025-10-20T15:51:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-106-spotlight-vulnerability-monitoring-and-scanning-ra-5</loc>
    <lastmod>2025-10-20T15:52:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-107-spotlight-security-categorization-ra-2</loc>
    <lastmod>2025-10-20T15:52:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-108-spotlight-criticality-analysis-ra-9</loc>
    <lastmod>2025-10-20T15:53:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-109-spotlight-security-and-privacy-engineering-principles-sa-8</loc>
    <lastmod>2025-10-20T15:53:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-110-spotlight-developer-testing-and-evaluation-sa-11</loc>
    <lastmod>2025-10-20T15:54:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-111-spotlight-external-system-services-sa-9</loc>
    <lastmod>2025-10-20T15:54:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-112-spotlight-unsupported-system-components-sa-22</loc>
    <lastmod>2025-10-20T15:54:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-113-spotlight-boundary-protection-sc-7</loc>
    <lastmod>2025-10-20T15:55:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-114-spotlight-transmission-confidentiality-and-integrity-sc-8</loc>
    <lastmod>2025-10-20T15:55:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-115-spotlight-cryptographic-key-establishment-and-management-sc-12</loc>
    <lastmod>2025-10-20T15:56:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-116-spotlight-cryptographic-protection-sc-13</loc>
    <lastmod>2025-10-20T15:57:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-117-spotlight-protection-of-information-at-rest-sc-28</loc>
    <lastmod>2025-10-20T15:57:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-118-spotlight-session-authenticity-sc-23</loc>
    <lastmod>2025-10-20T15:58:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-119-spotlight-public-key-infrastructure-certificates-sc-17</loc>
    <lastmod>2025-10-20T15:59:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-120-spotlight-denial-of-service-protection-sc-5</loc>
    <lastmod>2025-10-20T15:59:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-121-spotlight-flaw-remediation-si-2</loc>
    <lastmod>2025-10-20T16:00:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-122-spotlight-system-monitoring-si-4</loc>
    <lastmod>2025-10-20T16:00:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-123-spotlight-software-firmware-and-information-integrity-si-7</loc>
    <lastmod>2025-10-20T16:01:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-124-spotlight-information-input-validation-si-10</loc>
    <lastmod>2025-10-20T16:01:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-125-spotlight-malicious-code-protection-si-3</loc>
    <lastmod>2025-10-20T16:02:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-126-spotlight-spam-protection-si-8</loc>
    <lastmod>2025-10-20T16:02:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-127-spotlight-error-handling-si-11</loc>
    <lastmod>2025-10-20T16:02:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-128-spotlight-contingency-plan-cp-2</loc>
    <lastmod>2025-10-20T16:03:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-129-spotlight-system-backup-cp-9</loc>
    <lastmod>2025-10-20T16:03:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-130-spotlight-contingency-plan-testing-cp-4</loc>
    <lastmod>2025-10-20T16:04:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-131-spotlight-system-recovery-and-reconstitution-cp-10</loc>
    <lastmod>2025-10-20T16:04:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-132-spotlight-control-assessments-ca-2</loc>
    <lastmod>2025-10-20T16:05:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-133-spotlight-plan-of-action-and-milestones-ca-5</loc>
    <lastmod>2025-10-20T16:05:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-134-spotlight-continuous-monitoring-ca-7</loc>
    <lastmod>2025-10-20T16:06:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-135-spotlight-authorization-ca-6</loc>
    <lastmod>2025-10-20T16:06:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-136-spotlight-supply-chain-controls-and-processes-sr-3</loc>
    <lastmod>2025-10-20T16:07:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-137-spotlight-supplier-assessments-sr-6</loc>
    <lastmod>2025-10-20T16:07:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-138-spotlight-component-authenticity-sr-11</loc>
    <lastmod>2025-10-20T16:07:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-139-spotlight-supply-chain-risk-management-plan-sr-2</loc>
    <lastmod>2025-10-20T16:08:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-140-spotlight-awareness-training-at-2</loc>
    <lastmod>2025-10-20T16:09:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-141-spotlight-controlled-maintenance-ma-2</loc>
    <lastmod>2025-10-20T16:09:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-142-spotlight-media-sanitization-mp-6</loc>
    <lastmod>2025-10-20T16:09:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-143-spotlight-personnel-screening-ps-3</loc>
    <lastmod>2025-10-20T16:10:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-144-spotlight-authority-to-process-personally-identifiable-information-pt-2</loc>
    <lastmod>2025-10-20T16:10:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-145-spotlight-system-security-and-privacy-plans-pl-2</loc>
    <lastmod>2025-10-20T16:11:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-146-spotlight-risk-management-strategy-pm-9</loc>
    <lastmod>2025-10-20T16:11:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/episode-147-spotlight-physical-access-control-pe-3</loc>
    <lastmod>2025-10-20T16:11:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://80053.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-27T01:09:59Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
