<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.amputatedtoes.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/identity-governance-in-identity-and-access-management-iam-a-comprehensive-guide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/be7997a2-2e90-4bfc-a68a-3b1f2bd5fb67/Identity+Governance+blog.png</image:loc>
      <image:title>Blog - Identity Governance in Identity and Access Management (IAM): A Comprehensive Guide - Introduction to IAM Governance</image:title>
      <image:caption>The ever-evolving digital landscape has transformed the way organizations manage access to their resources. As enterprises grow and embrace new technologies, they face numerous challenges in ensuring that the right people have the right access to the right resources at the right time. This is where Identity and Access Management (IAM) comes into play. In this blog, we will focus on identity governance, a crucial aspect of IAM that helps organizations maintain a secure and compliant environment. IAM refers to the framework, policies, and technologies used to manage and control user identities and their access to resources within an organization. It encompasses various processes, including identity management, access management, and identity governance. While identity management deals with the creation, maintenance, and deletion of user identities, access management is responsible for granting and revoking access to resources based on user attributes, roles, and permissions.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/a-comprehensive-guide-to-authentication-in-identity-and-access-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/727ce247-1958-4b8a-b39a-ec35f9715e92/guide+to+auth+blog.png</image:loc>
      <image:title>Blog - A Comprehensive Guide to Authentication in Identity and Access Management</image:title>
      <image:caption>Authentication is a critical aspect of Identity and Access Management (IAM) and plays a vital role in maintaining the security of an organization's resources. In this blog post, we will delve deeper into the authentication process for IAM, exploring various methods of authentication, the importance of authentication in cybersecurity, and best practices for implementing authentication. As a cybersecurity expert specializing in IAM, I will ensure that the information provided is accurate, reliable, and up-to-date.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/expanding-on-accountability-in-identity-and-access-management-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/069b6221-fb0b-4158-98c6-c1707596d2c5/expanding+accountability+blog.png</image:loc>
      <image:title>Blog - Expanding on Accountability in Identity and Access Management (IAM)</image:title>
      <image:caption>As a cybersecurity professional with a focus on Identity and Access Management (IAM), I understand the importance of accountability in maintaining a secure and compliant environment. In this blog post, we will delve deeper into the concept of accountability in IAM, examining its critical role in cybersecurity, the methods for tracking user activities, best practices for implementing accountability, and the challenges faced in maintaining accountability.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/accountability-the-fourth-process-in-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/d6988f0c-40ab-4b14-9f60-631de519c31a/accountability+blog.png</image:loc>
      <image:title>Blog - Accountability, the fourth process in IAM</image:title>
      <image:caption>In Identity and Access Management (IAM), accountability is the process of tracking and recording user activities within an organization's systems and networks. This includes monitoring user access to resources, detecting and responding to security incidents, and ensuring compliance with regulatory requirements. In this blog post, we will explore the accountability process for IAM, including the significance of accountability in cybersecurity, the methods for tracking user activities, and best practices for implementing accountability.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/diving-deeper-into-identification-an-in-depth-look-at-identity-and-access-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/0a67343e-1d9c-4fbd-a467-014fda669bf6/ID+deep+dive+blog.png</image:loc>
      <image:title>Blog - Diving Deeper into Identification: An In-Depth Look at Identity and Access Management</image:title>
      <image:caption>As a cybersecurity expert specializing in Identity and Access Management (IAM), I understand the significance of the identification process. Identification serves as the foundation for securing an organization's digital assets and ensuring compliance with regulatory requirements. In this blog post, we will delve deeper into the identification process, exploring additional types of identities, methods of identification, and the role of identification in today's complex cybersecurity landscape.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/the-art-of-mastering-authorization-in-identity-and-access-management-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/06774bd8-db04-4646-b1ed-457d98e42586/Mastering+Authorization+blog.png</image:loc>
      <image:title>Blog - The Art of Mastering Authorization in Identity and Access Management (IAM)</image:title>
      <image:caption>As a cybersecurity expert with a focus on Identity and Access Management (IAM), I understand the critical role that authorization plays in protecting an organization's sensitive data and resources. In a previous blog post, we discussed the basics of authorization, its importance in cybersecurity, and best practices for implementation. In this post, we will delve deeper into the subject, exploring advanced techniques and strategies for effective authorization in IAM.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/authorization-the-third-process-in-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/a2a6978d-eccd-4b37-afee-758d9085b2dd/authorization+blog.png</image:loc>
      <image:title>Blog - Authorization, the third process in IAM</image:title>
      <image:caption>Authorization is a crucial component of Identity and Access Management (IAM). It is the process of granting or denying access to resources based on the identity of the user or entity and the permissions assigned to them. In this blog post, we will explore the authorization process for IAM, including the different types of authorization, the importance of authorization in cybersecurity, and best practices for implementing authorization.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/secure-enterprise-mobility-applying-zero-trust-principles-for-enhanced-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/188aebcb-e81f-4cb5-844d-572980e92b0e/Screenshot+2023-03-06+at+10.11.39+AM.png</image:loc>
      <image:title>Blog - Secure Enterprise Mobility: Applying Zero Trust Principles for Enhanced Cybersecurity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/1678125824046-CN0Q6KHZEQC9Q7VUN8OG/enterprise+mobility.png</image:loc>
      <image:title>Blog - Secure Enterprise Mobility: Applying Zero Trust Principles for Enhanced Cybersecurity</image:title>
      <image:caption>As the use of mobile devices in the workplace becomes more prevalent, the need for secure enterprise mobility is increasing. The Zero Trust (ZT) approach to cybersecurity offers a framework for achieving enhanced security in the mobile ecosystem. In this blog, we will explore the application of Zero Trust principles to enterprise mobility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/38a92843-de1d-44b9-8da7-a07f8c45e8ab/Screenshot+2023-03-10+at+10.00.37+AM.png</image:loc>
      <image:title>Blog - Secure Enterprise Mobility: Applying Zero Trust Principles for Enhanced Cybersecurity - Make it stand out</image:title>
      <image:caption>Table 2: Mapping to Cross-Cutting Capabilities Reprinted from “Applying Zero Trust Principles to Enterprise Mobility”, by Cybersecurity and Infrastructure Security Agency, 2022, p. 14</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/8ec0ecd6-5e39-4b78-8737-607b6b77b717/Screenshot+2023-03-06+at+10.36.38+AM.png</image:loc>
      <image:title>Blog - Secure Enterprise Mobility: Applying Zero Trust Principles for Enhanced Cybersecurity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/authentication-the-second-process-in-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/e545b8cb-a05f-4f20-885a-292b9147beda/authetication+blog.png</image:loc>
      <image:title>Blog - Authentication, the second process in IAM</image:title>
      <image:caption>Authentication is the process of verifying the identity of a user or entity. It is a critical component of Identity and Access Management (IAM) and is necessary to control access to resources. In this blog post, we will explore the authentication process for IAM, including the different methods of authentication, the importance of authentication in cybersecurity, and best practices for implementing authentication.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/implementing-zero-trust-the-crucial-role-of-identity-and-access-management-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/1678203840610-QYHIBF230S1WJDW1VXI5/unsplash-image-H8E4LNKn1K0.jpg</image:loc>
      <image:title>Blog - Implementing Zero Trust: The Crucial Role of Identity and Access Management (IAM)</image:title>
      <image:caption>In today's digital age, traditional perimeter-based security models are no longer enough to protect organizations from modern threats. Cybersecurity experts are increasingly advocating for a zero trust model, which assumes that all network traffic is potentially malicious and requires strict authentication and authorization measures. Identity and Access Management (IAM) plays a crucial role in implementing a zero trust model, ensuring that only authorized users have access to sensitive data and applications. In this blog post, we'll explore the concept of zero trust and its relationship with IAM, and discuss how organizations are moving towards a zero trust stance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/identification-the-first-step-in-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/94f3b6ff-41ea-4f5f-848a-b133eceba912/identification+blog.png</image:loc>
      <image:title>Blog - Identification, the first process in IAM</image:title>
      <image:caption>Identification is the foundation of Identity and Access Management (IAM) processes. It is the process of identifying a user or entity, and it is the first step in controlling access to resources. In this blog post, we will explore the identification process for IAM, including the different types of identities, methods of identification, and the importance of identification in cybersecurity.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/introduction-to-identity-and-access-management-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/1678204078211-GQQUGI0MR2PS0F35APF4/unsplash-image-SRFG7iwktDk.jpg</image:loc>
      <image:title>Blog - Introduction to Identity and Access Management (IAM)</image:title>
      <image:caption>As technology evolves, the need for strong security measures to protect sensitive information also increases. One of the key components of a secure IT environment is Identity and Access Management (IAM). As a systems engineer, IAM is a critical area that requires close attention to ensure that only authorized individuals can access systems and sensitive data. In this blog post, we'll explore IAM, its benefits, and how it works.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Authorization+and+Access+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Cyber+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Data+Encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Identity+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Information+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Digital+Transformation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Zero+Trust+Security+Model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Identity+and+Access+Management+%28IAM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Governance+and+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Enterprise+Mobility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Access+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Privileged+Access+Management+%28PAM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Future+of+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Access+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Enterprise+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/User+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Regulatory+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Information+Technology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Authentication+Methods</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Mobile+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Digital+Assets+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/T+Security+Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Identity+and+Access+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Industry+Insights+and+Examples</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Executive+Order</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Data+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Security+Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/IT+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Data+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/category/Compliance+and+Regulations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Business+Agility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Biometric</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Advanced+Tracking+Methods</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Data+Encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Identity+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Passwords</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/advanced+techniques</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Multi-factor+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/authorization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Enterprise+Mobility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/ABAC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Regulatory+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Token-based+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Automation+and+Orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/User+Verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Mobile+Device+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Visibility+and+Analytics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/User+Activities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/IAM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Security+Model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Accountability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Digital+Ecosystem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/ZT+Architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Audit+Logs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/IAM+Governance+Implementation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Separation+of+Duties</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Risk-Based+Access+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/SoD</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/MFA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Authorization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Risk-based+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Access+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/IAM+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Mobile+Threat+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Just-In-Time+provisioning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Information+Technology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Mobile+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Rule-Based+Access+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Single+Sign-On</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Identity+and+Access+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Access+and+Identity+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/2FA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Biometric+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Network+Segmentation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Executive+Order+14028</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Systems+Engineer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Data+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/RBAC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/JIT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/RAC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Collaboration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/best+practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Two-factor+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/Security+Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/User+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/blog/tag/IT+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/c53080f4-ec17-496e-842f-2f15030df4dc/gangrene.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/78a7da3f-26d0-4771-ba7c-f6d5099fdd6c/beachday.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/1066fe22-f35d-4f25-bffe-298801c404d2/Torben+and+Lola.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2023-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/255f2b1e-c301-4837-811d-1792e1935837/amputatedtoes_robot.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/915aa875-cc21-4968-a4ff-90098ee13746/amputatedtoes_phone.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f7b7f66f7bfc124b6c77e76/9a3d5d66-8b21-4320-b55e-b63a2240fd85/amputatedtoes_blog.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.amputatedtoes.com/donate</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-27</lastmod>
  </url>
</urlset>

