<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://iso27001.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T03:35:07Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T03:35:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-22T03:35:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T03:35:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T03:35:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/iso-controls-book</loc>
    <lastmod>2026-04-22T03:35:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T03:35:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-1-orientation-outcomes</loc>
    <lastmod>2025-10-14T00:34:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-2-isms-pdca-in-practice</loc>
    <lastmod>2025-10-14T00:35:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-3-what-changed</loc>
    <lastmod>2025-10-14T00:35:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-4-27002-attributes-the-soa</loc>
    <lastmod>2025-10-14T00:36:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-5-clause-4-1-4-2</loc>
    <lastmod>2025-10-14T00:36:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-6-clause-4-3-determining-isms-scope</loc>
    <lastmod>2025-10-14T00:37:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-7-clause-4-4-isms-processes-and-interactions</loc>
    <lastmod>2025-10-14T00:37:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-8-clause-5-1-5-2-leadership-policy-evidence</loc>
    <lastmod>2025-10-14T00:38:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-9-clause-5-3-roles-responsibilities-authorities</loc>
    <lastmod>2025-10-14T00:38:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-10-clause-6-1-actions-to-address-risks-opportunities</loc>
    <lastmod>2025-10-14T00:39:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-11-clause-6-1-2-risk-assessment-methodology</loc>
    <lastmod>2025-10-14T00:45:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-12-clause-6-1-3-risk-treatment-planning</loc>
    <lastmod>2025-10-14T00:46:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-13-clause-6-2-objectives-planning-to-achieve-them</loc>
    <lastmod>2025-10-14T00:46:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-14-clause-6-3-planning-of-changes</loc>
    <lastmod>2025-10-14T00:46:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-15-clause-7-1-7-2-resources-competence</loc>
    <lastmod>2025-10-14T00:47:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-16-clause-7-3-7-4-awareness-communication</loc>
    <lastmod>2025-10-14T00:47:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-17-clause-7-5-documented-information</loc>
    <lastmod>2025-10-14T00:48:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-18-clause-8-1-operational-planning-and-control</loc>
    <lastmod>2025-10-14T00:48:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-19-clause-8-2-8-3-risk-assessment-treatment-in-operations</loc>
    <lastmod>2025-10-14T00:49:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-20-clause-9-1-monitoring-measurement-analysis-evaluation</loc>
    <lastmod>2025-10-14T00:49:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-21-clause-9-2-internal-audit</loc>
    <lastmod>2025-10-14T00:50:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-22-clause-9-3-10-management-review-nonconformity-continual-improvement</loc>
    <lastmod>2025-10-14T00:50:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-23-a-5-1-5-2-policies-for-infosec-roles-responsibilities</loc>
    <lastmod>2025-10-14T00:51:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-24-a-5-3-5-4-segregation-of-duties-management-responsibilities</loc>
    <lastmod>2025-10-14T00:51:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-25-a-5-5-5-6-contact-with-authorities-special-interest-groups</loc>
    <lastmod>2025-10-14T00:52:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-26-a-5-7-5-8-threat-intelligence-security-in-project-management</loc>
    <lastmod>2025-10-14T00:52:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-27-a-5-9-5-10-asset-inventory-acceptable-use</loc>
    <lastmod>2025-10-14T00:53:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-28-a-5-11-5-12-return-of-assets-classification-of-information</loc>
    <lastmod>2025-10-14T00:54:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-29-a-5-13-5-14-labelling-of-information-information-transfer</loc>
    <lastmod>2025-10-14T00:54:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-30-a-5-15-5-16-access-control-identity-management</loc>
    <lastmod>2025-10-14T00:55:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-31-a-5-17-5-18-authentication-information-access-rights</loc>
    <lastmod>2025-10-14T00:56:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-32-a-5-19-5-20-supplier-relationships-supplier-agreements</loc>
    <lastmod>2025-10-14T00:56:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-33-a-5-21-5-22-ict-supply-chain-monitoring-review-of-supplier-services</loc>
    <lastmod>2025-10-14T00:57:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-34-a-5-23-5-24-use-of-cloud-services-incident-mgmt-planning-prep</loc>
    <lastmod>2025-10-14T00:57:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-35-a-5-25-5-26-event-assessment-decision-incident-response</loc>
    <lastmod>2025-10-14T00:57:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-36-a-5-27-5-28-learning-from-incidents-collection-of-evidence</loc>
    <lastmod>2025-10-14T00:58:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-37-a-5-29-5-30-security-during-disruption-ict-readiness-for-bc</loc>
    <lastmod>2025-10-14T00:58:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-38-a-5-31-5-32-legal-regulatory-contractual-intellectual-property-rights</loc>
    <lastmod>2025-10-14T00:59:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-39-a-5-33-5-34-protection-of-records-privacy-pii-protection</loc>
    <lastmod>2025-10-14T00:59:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-40-a-5-35-5-36-independent-review-compliance-with-policies-rules-standards</loc>
    <lastmod>2025-10-14T01:00:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-41-a-5-37-documented-operating-procedures</loc>
    <lastmod>2025-10-14T01:02:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-42-a-5-integration-capstone-pitfalls-auditor-patterns-mappings</loc>
    <lastmod>2025-10-14T01:02:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-43-a-6-1-6-2-screening-terms-conditions-of-employment</loc>
    <lastmod>2025-10-14T01:03:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-44-a-6-3-6-4-awareness-education-training-disciplinary-process</loc>
    <lastmod>2025-10-14T01:03:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-45-a-6-5-6-6-responsibilities-after-termination-change-ndas</loc>
    <lastmod>2025-10-14T01:04:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-46-a-6-7-6-8-remote-working-event-reporting</loc>
    <lastmod>2025-10-14T01:04:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-47-a-7-1-7-2-perimeters-physical-entry</loc>
    <lastmod>2025-10-14T01:04:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-48-a-7-3-7-4-securing-offices-rooms-facilities-physical-security-monitoring</loc>
    <lastmod>2025-10-14T01:05:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-49-a-7-5-7-6-environmental-threats-working-in-secure-areas</loc>
    <lastmod>2025-10-14T01:05:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-50-a-7-7-7-8-clear-desk-screen-equipment-siting-protection</loc>
    <lastmod>2025-10-14T01:06:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-51-a-7-9-7-10-off-premises-assets-storage-media</loc>
    <lastmod>2025-10-14T01:06:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-52-a-7-11-7-12-supporting-utilities-cabling-security</loc>
    <lastmod>2025-10-14T01:07:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-53-a-7-13-7-14-equipment-maintenance-secure-disposal-re-use</loc>
    <lastmod>2025-10-14T01:07:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-54-a-8-1-8-2-user-endpoint-devices-privileged-access-rights</loc>
    <lastmod>2025-10-14T01:08:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-55-a-8-3-8-4-information-access-restriction-access-to-source-code</loc>
    <lastmod>2025-10-14T01:08:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-56-a-8-5-8-6-secure-authentication-capacity-management</loc>
    <lastmod>2025-10-14T01:09:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-57-a-8-7-8-8-anti-malware-technical-vulnerability-management</loc>
    <lastmod>2025-10-14T01:09:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-58-a-8-9-8-10-configuration-management-information-deletion</loc>
    <lastmod>2025-10-14T01:10:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-59-a-8-11-8-12-data-masking-data-leakage-prevention</loc>
    <lastmod>2025-10-14T01:11:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-60-a-8-13-8-14-information-backup-redundancy-of-processing-facilities</loc>
    <lastmod>2025-10-14T01:25:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-61-a-8-15-8-16-logging-monitoring-activities</loc>
    <lastmod>2025-10-14T01:25:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-62-a-8-17-8-18-clock-synchronization-privileged-utility-programs</loc>
    <lastmod>2025-10-14T01:26:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-63-a-8-19-8-20-software-installation-on-operational-systems-network-security</loc>
    <lastmod>2025-10-14T01:26:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-64-a-8-21-8-22-security-of-network-services-segregation-of-networks</loc>
    <lastmod>2025-10-14T01:27:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-65-a-8-23-8-24-web-filtering-use-of-cryptography</loc>
    <lastmod>2025-10-14T01:27:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-66-a-8-25-8-26-secure-development-lifecycle-application-security-requirements</loc>
    <lastmod>2025-10-14T01:28:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-67-a-8-27-8-28-secure-system-architecture-engineering-secure-coding</loc>
    <lastmod>2025-10-14T01:28:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-68-a-8-29-8-30-security-testing-in-development-acceptance-outsourced-development</loc>
    <lastmod>2025-10-14T01:29:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-69-a-8-31-8-32-separation-of-dev-test-prod-change-management</loc>
    <lastmod>2025-10-14T01:29:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/episode-70-a-8-33-8-34-test-information-protecting-systems-during-audit-testing</loc>
    <lastmod>2025-10-14T01:30:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://iso27001.baremetalcyber.com/episodes/welcome-to-framework-iso-27001</loc>
    <lastmod>2025-10-20T21:29:16Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
