<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://securitycheckbox.com/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='April 23, 2026 8:08 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://securitycheckbox.com/blog/2011/passing-the-g2700-iso-2700127002-certification-what-materials-you-will-need-for-the-exam/</loc>
		<lastmod>2011-08-29T00:31:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2011/prep-for-the-ceh-v7-exam-tune-your-web-hacking-skills-with-these-live-hackable-simulation-environments/</loc>
		<lastmod>2011-10-11T23:12:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2011/hippa-compliance-checklist-2011/</loc>
		<lastmod>2011-10-17T20:38:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2012/mapping-compliance-controls-for-the-cloud-fisma-pci-nist-and-iso/</loc>
		<lastmod>2012-10-12T14:00:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2012/cloud-controls-framework-1-0/</loc>
		<lastmod>2012-10-12T15:00:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2012/cloud-controls-matrix-security-compliance-mapping-spreadsheet/</loc>
		<lastmod>2012-10-16T01:21:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2012/nist-800-53a-controls-extracted-in-xls-csv-format-2/</loc>
		<lastmod>2012-10-31T16:00:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2012/nist-800-53a-controls-extracted-in-xls-csv-format/</loc>
		<lastmod>2012-10-31T16:00:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2012/nist-800-53a-control-audit-questions-in-excel-csv-format/</loc>
		<lastmod>2012-11-16T15:00:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2012/compliance-controls-and-mappings-database-download/</loc>
		<lastmod>2012-11-19T16:00:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2013/pci-compliance-st-louis/</loc>
		<lastmod>2013-04-27T03:47:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2013/csa-cloud-controls-matrix-v3/</loc>
		<lastmod>2013-09-29T04:52:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2013/nist-800-53-v4-controls-excel-xls-csv/</loc>
		<lastmod>2013-11-26T02:22:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2014/analysis-targets-multiple-pci-dss-failures-resulted-breach/</loc>
		<lastmod>2014-02-06T19:22:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2014/short-paper-identify-theft-compliance-regulations-breach-laws/</loc>
		<lastmod>2014-02-08T21:23:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2014/fedramp-cloud-security-controls-download/</loc>
		<lastmod>2014-07-07T20:56:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2016/soc2-controls-free-download-xls-csv/</loc>
		<lastmod>2016-11-09T05:47:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2016/cis-controls-v6-download-xls-csv/</loc>
		<lastmod>2016-11-09T06:02:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2016/pci-dss-3-controls-download-csv-xls/</loc>
		<lastmod>2016-11-10T07:46:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2016/cyber-security-framework-csf-security-controls-download-xls-csv/</loc>
		<lastmod>2016-12-23T05:24:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2016/fedramp-security-controls-available-download-xls-csv/</loc>
		<lastmod>2016-12-23T05:35:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2016/cjis-v5-controls-download-xls-csv/</loc>
		<lastmod>2016-12-23T05:45:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/download-nysdfs-23-nycrr-500-xls-csv/</loc>
		<lastmod>2017-02-19T10:11:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/security-control-mapping-database-v2/</loc>
		<lastmod>2017-02-28T07:46:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/nist-800-53a-rev4-audit-checklist/</loc>
		<lastmod>2017-05-27T03:50:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/aicpa-soc-2-guide-checklist-mapping/</loc>
		<lastmod>2017-05-31T05:03:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/nist-800-171-controls-checklist-csv/</loc>
		<lastmod>2017-06-02T03:04:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/nist-800-53-r4-download-xls-csv/</loc>
		<lastmod>2017-06-03T03:02:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/pci-32-security-controls-assessment/</loc>
		<lastmod>2017-06-04T14:44:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/nist-cybersecurity-framework-guide/</loc>
		<lastmod>2017-06-16T17:58:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/fedramp-assessment-guide-excel-download/</loc>
		<lastmod>2017-08-01T08:25:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2017/ssae-18-changes-and-updates/</loc>
		<lastmod>2017-10-31T05:35:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://securitycheckbox.com/blog/2019/texas-tac-202-assessment-guide-excel-download-2/</loc>
		<lastmod>2019-11-30T22:20:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
</urlset><!-- Request ID: ed47f68aa43645a217f9ff16678fdd6b; Queries for sitemap: 5; Total queries: 63; Seconds: 0.01; Memory for sitemap: 2MB; Total memory: 26MB -->
