<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.cloudsecuritypartners.com</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/cloud-focused-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/cloud-focused-services/secure-ci-cd-pipeline</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/cloud-focused-services/cloud-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/cloud-focused-services/cloud-standards-policies</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services/secure-code-review</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services/dynamic-application-testing</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services/threat-modeling-application-design-review</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/resources</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/about</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/careers</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/glossary</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/cloud-focused-services/infrastructure-as-code-iac-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/cloud-focused-services/cloud-migration-architecture</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/cloud-focused-services/cloud-security-partner-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/cloud-focused-services/saas-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services/hybrid-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services/code-remediation</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services/developer-training</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services/application-security-partner-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/application-security-services/ai-ml-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/network-security-services/internal-network-assessment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/network-security-services/external-network-assessment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/network-security-services/red-team-assessment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/network-security-services/osint-and-external-vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/network-security-services/social-engineering</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-platform/aws-security-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-platform/azure-security-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-platform/google-cloud-security-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-platform/microsoft-cloud-security-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-platform/kubernetes-container-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-platform/multi-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-industry/education</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-industry/energy</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-industry/government</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-industry/healthcare</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/by-industry/other</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/business-size/large-enterprise</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/business-size/small-medium-business</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/business-size/legal-teams</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/role/dev-devops-teams</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/role/security-teams</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/solutions/role/legal-teams</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/get-started</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/ai-security-services/ai-security-practice</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/ai-security-services/llm-application-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/ai-security-services/ai-governance-compliance</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/ai-security-services/ai-agent-agentic-system-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/ai-security-services/ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/ai-security-services/ai-security-partner-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/services/ai-security-services/agentic-security-workflows-training</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/ai-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/ai-vs-deterministic-tools</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/analyzing-access-to-s3-buckets</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/aws-top-10-risks-issue-5-eliminate-overly-permissive-iam-policies</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/aws-top-10-security-risks-issue-1-mitigating-the-99-with-mfa</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/aws-top-10-security-risks-issue-2-using-a-federated-identity-provider</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/aws-top-10-security-risks-issue-3-enable-amazon-guardduty</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/aws-top-10-security-risks-issue-4-enhance-logging-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/aws-top-10-security-risks-issue-6-audit-for-public-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/breaking-into-appsec-hack-your-way-into-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/building-your-ai-security-program</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/csp-inaugural-quarterly-newsletter</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/designing-a-security-review-agent-team-with-superpowers</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/dont-let-your-containers-escape-update-runc-docker-now</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/exploring-amazon-athena-in-incident-response-a-practical-approach</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/exploring-maturity-models</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/finding-strings-everywhere-with-roles-anywhere</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/from-the-office-of-the-ciso-the-7-minute-heist---why-your-cloud-wouldve-fallen-too</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/gen-ai-security-an-introduction-and-resource-guide</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/generating-secure-code-with-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/github-actions-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/google-calendar-and-gemini-exploit</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/happy-appsec-new-year---2024-recap</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/hardening-your-okta-organization</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/ignore-previous-instruction-the-persistent-challenge-of-prompt-injection-in-language-models</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/importance-of-cloud-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/infrastructure-as-code-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/introducing-trust-policy-support-in-cloudsplaining</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/introduction-to-llm-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/keep-your-web-applications-online-even-with-a-cloudflare-outage</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/kiro-ide-guidance</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/lascon-recap---infrastructure-as-code</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/oidc-for-github-actions</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/our-support-for-cloudsplaining</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/participating-in-a-panel-on-assessment-of-election-supporting-technology</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/post-quantum-cryptography-readiness</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/preventing-overreliance-proper-ways-to-use-llms</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/rds-revealed-time-to-give-it-some-shade</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/red-team-reloaded-hacking-ai-applications</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/skills-and-agents-the-new-security-workforce</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/software-bill-of-materials-understanding-what-youre-actually-running</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/the-ai-security-paradox</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/the-ai-security-tooling-landscape</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/the-hidden-dangers-of-using-terraforms-remote-exec-provisioner</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/the-history-and-purpose-of-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/the-security-absolutist</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/the-security-benefits-of-infrastructure-as-code</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-april-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-april-2026</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-august-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-december-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-february-2026</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-january-2026</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-july-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-june-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-march-2026</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-may-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-november-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-october-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/this-month-in-security-september-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/upcoming-events-at-csp</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/using-ai-to-secure-ai-claude-skill-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/what-developers-should-know-about-bots-like-moltbot-openclaw-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/when-designing-agentic-solutions-learn-the-lessons-of-the-past</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/why-your-business-needs-an-ai-policy</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/wordpress-security-cheatsheet</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog/your-first-cloud-security-assessment-a-complete-guide-checklist</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/compliance</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/cryptography</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/from-the-office-of-the-ciso</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/iac</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/infosec</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/most-recent</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/terraform</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/this-month-in-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypartners.com/blog-categories/voting</loc>
    </url>
</urlset>