<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/authentication/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/cia-triad/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/edr/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/firewall/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/incident-response-plan/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/ransomware/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/risk-assessment/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/secure-coding/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/shared-responsibility/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/siem/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/symmetric-encryption/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/asymmetric-encryption/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/authorization/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/containment/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/cspm/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/defense-in-depth/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/residual-risk/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/soar/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/sql-injection/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/trojan/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/waf/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/xdr/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/antivirus/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/container-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/eradication/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/ids/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/least-privilege/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/mfa/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/pki/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/segregation-of-duties/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/soc/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/worm/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/xss/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/application-whitelisting/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/attack-surface/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/audit-log/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/botnet/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/csrf/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/digital-certificate/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/ips/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/kubernetes-rbac/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/log-correlation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/recovery/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/sso/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/ca/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/command-and-control/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/compliance-framework/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/cwp/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/iocs/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/mdm/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/passwordless-auth/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/sca/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/threat/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/threat-hunting/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/vpn/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/anti-malware/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/data-classification/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/detection-rule/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/hardware-token/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/identity-federation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/ioas/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/key-rotation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/phishing/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/sast/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/vulnerability/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/ztna/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/dast/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/device-hardening/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/hashing/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/incident-triage/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/network-segmentation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/rbac/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/risk/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/risk-register/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/root-cause-analysis/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/spear-phishing/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/threat-actor/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/workload-identity/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/abac/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/bec/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/compensating-control/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/digital-signature/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/exploit/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/forensic-artifact/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/host-firewall/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/insider-threat/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/microsegmentation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/secrets-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/secrets-manager/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/tabletop-exercise/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/alert-fatigue/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/credential-stuffing/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/denial-of-service/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/dmz/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/input-validation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/mitigation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/pam/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/patch-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/post-incident-review/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/security-baseline/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/security-group/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/tls/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/bastion-host/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/brute-force-attack/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/evidence-preservation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/exception-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/false-positive/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/output-encoding/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/perfect-forward-secrecy/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/saml/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/secure-boot/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/security-control/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/supply-chain-attack/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/vpc/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/chain-of-custody/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/deep-packet-inspection/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/device-compliance/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/false-negative/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/key-escrow/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/oauth/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/password-spraying/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/rasp/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/security-misconfiguration/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/vendor-assessment/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/api-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/attack-vector/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/change-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/endpoint-isolation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/forensics/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/oidc/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/session-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/vulnerability-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/blast-radius/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/hardware-security-module/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/kerberos/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/playbook/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/rate-limiting/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/security-policy/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/tamper-protection/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/vulnerability-scanner/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/acceptable-use-policy/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/certificate-revocation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/configuration-drift/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/cwe/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/disk-encryption/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/ldap/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/lessons-learned/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/nac/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/secure-by-default/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/threat-intelligence/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/biometrics/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/cve/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/egress-filtering/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/kms/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/ocsp/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/remote-wipe/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/risk-treatment/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/runbook/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/secure-configuration/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/ssrf/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/zero-day/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/attack-path/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/broken-access-control/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/control-objective/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/cvss/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/east-west-traffic/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/immutable-infrastructure/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/lateral-movement/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/memory-forensics/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/pbac/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/salting/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/sandboxing/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/access-review/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/casb/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/cloud-forensics/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/crown-jewels/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/detection-engineering/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/dns-filtering/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/email-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/file-integrity-monitoring/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/mtls/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/persistence/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/policy-exception/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/sbom/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/scim/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/vm-escape/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/asset-inventory/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/cdr/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/credential-theft/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/dnssec/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/envelope-encryption/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/iga/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/least-functionality/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/least-privilege/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/mam/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/mdr/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/secrets-scanning/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/ssh/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/attack-surface-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/certificate-transparency/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/full-packet-capture/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-provider/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/malvertising/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/service-account/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/tee/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/third-party-risk/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/threat-modeling/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/zero-trust/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/break-glass/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/browser-isolation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/certificate-pinning/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/command-injection/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/easm/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/network-telemetry/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/security-awareness-training/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/security-by-design/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/watering-hole-attack/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/allowlist/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/command-line-auditing/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/conditional-access/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/csp/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/data-exfiltration/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/dwell-time/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-lifecycle/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/jea/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/privilege-escalation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/secure-transport/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/ueba/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/vendor-risk-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/anomaly-detection/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/denylist/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/idor/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/jit-access/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/raas/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/red-team/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/risk-appetite/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/blue-team/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/control-mapping/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-governance/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/mitm/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/sandbox-evasion/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/session-hijacking/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/account-provisioning/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/email-authentication/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/fileless-malware/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/log-retention/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/purple-team/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/deception-technology/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/shadow-it/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/access-token/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/attack-graph/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/data-loss-prevention/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/kill-chain/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/refresh-token/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/security-debt/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/attack-campaign/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/token-revocation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/honeypot/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/phishing-resistant-auth/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-proofing/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/threat-emulation/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/account-lockout/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/security-chaos-engineering/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/threat-landscape/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/defense-evasion/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/exposure-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/about/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/application-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/application-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/authors/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/cloud-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/contact/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/disclaimer/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/authors/fuadefendi/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/author/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/encryption-and-key-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/endpoint-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/governance-risk-and-compliance/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/identity-and-access-management/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/incident-response/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/malware-and-threats/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/network-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/network-security/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/privacy/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/security-fundamentals/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/categories/security-operations/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/faq/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/tos/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url><url><loc>https://cybersecuritytermslexicon.com/topics/</loc><lastmod>2026-04-13T10:48:13-04:00</lastmod></url></urlset>