<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://soroush.sh</loc>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://soroush.sh/articles</loc>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://soroush.sh/security</loc>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/now</loc>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://soroush.sh/testimonials</loc>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://soroush.sh/favourites</loc>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://soroush.sh/feed</loc>
<changefreq>daily</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://soroush.sh/articles/antivirus-and-malware-detection-strategy--building-a-defense-in-depth-approach-that-actually-works</loc>
<lastmod>2023-07-06T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/application-whitelisting-and-execution-control--building-a-zero-trust-endpoint-from-the-inside-out</loc>
<lastmod>2025-05-12T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/asset-discovery-and-automated-inventory-scanning--building-a-foundation-you-can-actually-trust</loc>
<lastmod>2025-01-14T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/asset-disposal-and-data-sanitization-procedures--ensuring-data-never-leaves-your-control</loc>
<lastmod>2023-09-24T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/asset-tagging-and-serial-number-tracking--building-a-defensible-hardware-inventory-from-the-ground-up</loc>
<lastmod>2026-01-06T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/automated-patch-deployment-with-configuration-management-tools</loc>
<lastmod>2025-10-18T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/automating-user-onboarding-and-offboarding--eliminating-the-security-gaps-that-get-administrators-fired</loc>
<lastmod>2025-12-23T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/azure-security-best-practices</loc>
<lastmod>2025-06-06T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/backup-and-disaster-recovery-security--protecting-your-last-line-of-defense</loc>
<lastmod>2025-06-19T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/building-effective-security-monitoring-dashboards-and-alerting-pipelines-that-actually-work</loc>
<lastmod>2024-10-22T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/building-security-awareness-and-training-programs-that-actually-change-behavior</loc>
<lastmod>2025-07-28T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/business-continuity-and-disaster-recovery-planning--building-resilient-infrastructure-that-survives-the-worst</loc>
<lastmod>2025-04-02T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/cloud-security-best-practices--building-defense-in-depth-for-modern-cloud-environments</loc>
<lastmod>2023-08-29T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/cloud-threat-detection-and-response-building-a-security-first-detection-pipeline</loc>
<lastmod>2025-02-20T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/cmdb-configuration-and-maintenance-best-practices--building-a-security-focused-source-of-truth</loc>
<lastmod>2024-04-06T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/configuration-management-and-change-control--building-a-fortress-that-doesn-t-crumble-from-within</loc>
<lastmod>2023-12-12T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/cve-management-and-prioritization--a-practical-framework-for-overwhelmed-security-teams</loc>
<lastmod>2025-07-01T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/data-classification-and-handling-procedures--building-a-framework-that-actually-works</loc>
<lastmod>2024-07-23T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/data-protection-regulations--gdpr-and-ccpa---a-practical-guide-for-security-administrators</loc>
<lastmod>2023-04-28T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/data-retention-and-secure-deletion-policies--building-a-framework-that-actually-works</loc>
<lastmod>2023-07-16T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/dns-security-and-threat-intelligence-integration--building-a-proactive-defense-layer</loc>
<lastmod>2023-11-30T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/emergency-patching-procedures-for-critical-vulnerabilities</loc>
<lastmod>2023-06-09T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/encryption-for-data-at-rest-and-in-transit--a-practical-guide-for-security-administrators</loc>
<lastmod>2025-01-24T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/endpoint-forensics-and-incident-investigation--a-practitioner-s-field-guide</loc>
<lastmod>2026-03-14T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/endpoint-protection-policy-enforcement--from-paper-policies-to-automated-compliance</loc>
<lastmod>2025-07-18T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/endpoint-security--hardening-windows-and-linux-systems</loc>
<lastmod>2023-03-09T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/enforcing-device-compliance-at-scale--a-practical-guide-to-mdm-for-security-teams</loc>
<lastmod>2025-04-16T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/enterprise-asset-management--eam--implementation--building-a-security-first-asset-inventory-that-actually-works</loc>
<lastmod>2023-04-03T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/enterprise-vpn-and-secure-remote-access--building-a-zero-trust-tunnel-strategy</loc>
<lastmod>2025-10-04T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/file-system-security-and-permissions-management--building-defense-from-the-ground-up</loc>
<lastmod>2025-08-10T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/firewall-configuration-and-rule-management--building-a-defense-that-actually-works</loc>
<lastmod>2023-10-20T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/fortifying-the-inbox--a-practical-guide-to-email-security-and-phishing-prevention-in-the-enterprise</loc>
<lastmod>2024-09-30T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/group-policy-hardening-for-enterprise-windows-environments</loc>
<lastmod>2023-02-22T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/hardening-active-directory--a-practical-guide-to-security-and-governance-in-the-enterprise</loc>
<lastmod>2024-08-05T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/hardening-docker-containers</loc>
<lastmod>2026-03-15T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/hardening-ldap-and-directory-services--closing-the-gaps-attackers-actually-exploit</loc>
<lastmod>2025-02-09T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/hardening-the-container-lifecycle--practical-security-controls-for-docker-and-kubernetes-in-production</loc>
<lastmod>2026-01-16T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/hardening-the-edge--a-practical-guide-to-secure-network-device-configuration-and-management</loc>
<lastmod>2024-09-14T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/hardware-asset-inventory-and-lifecycle-management--building-a-security-foundation-you-can-actually-trust</loc>
<lastmod>2025-03-17T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/hardware-configuration-standards--building-security-from-the-ground-up</loc>
<lastmod>2025-09-22T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/hardware-security-modules-and-key-management--building-a-root-of-trust-your-organization-can-actually-rely-on</loc>
<lastmod>2025-04-28T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/identity-and-access-management--iam--best-practices--building-a-zero-trust-foundation-in-enterprise-environments</loc>
<lastmod>2023-01-25T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/incident-response-planning-and-execution--building-a-battle-tested-framework-for-enterprise-environments</loc>
<lastmod>2023-05-11T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/incident-triage-and-severity-classification--a-practical-framework-for-security-operations</loc>
<lastmod>2023-03-22T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/infrastructure-as-code-security--catching-misconfigurations-before-they-become-breaches</loc>
<lastmod>2026-02-24T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/intrusion-prevention-and-detection-systems--building-your-network-s-immune-system</loc>
<lastmod>2024-01-21T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/kubernetes-rbac</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/linux-hardening--security-baselines-and-automation</loc>
<lastmod>2023-01-01T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/linux-kernel-security-modules</loc>
<lastmod>2026-02-14T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/linux-patch-management--rhel--ubuntu--and-centos-strategies</loc>
<lastmod>2024-01-07T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/locking-down-the-cloud--a-practical-guide-to-storage-security-and-access-control</loc>
<lastmod>2024-05-16T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/log-aggregation-and-forensic-analysis--building-an-evidence-pipeline-that-holds-up-under-pressure</loc>
<lastmod>2024-07-08T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/malware-analysis-and-response-procedures--a-practical-playbook-for-security-teams</loc>
<lastmod>2023-02-09T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/mfa-and-passwordless-authentication-implementation--a-practical-guide-for-enterprise-environments</loc>
<lastmod>2025-09-07T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/microsoft-defender-for-endpoint--alert-triage-and-response</loc>
<lastmod>2024-02-29T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/mobile-device-management--mdm--for-enterprise--locking-down-the-endpoints-you-can-t-see</loc>
<lastmod>2026-05-04T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/network-access-control--nac--implementation--from-zero-trust-policy-to-enforced-reality</loc>
<lastmod>2023-08-03T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/network-monitoring-and-siem-best-practices--building-a-detection-pipeline-that-actually-works</loc>
<lastmod>2024-02-04T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/network-security-in-the-cloud--beyond-the-virtual-perimeter</loc>
<lastmod>2023-12-23T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/network-segmentation-and-zero-trust-architecture--building-defense-in-depth-that-actually-works</loc>
<lastmod>2023-04-16T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/patch-compliance-reporting-and-metrics--building-a-framework-that-actually-drives-action</loc>
<lastmod>2024-12-31T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/patch-management-at-scale-with-tanium--from-chaos-to-control-in-enterprise-environments</loc>
<lastmod>2024-03-15T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/patch-rollback-procedures-and-disaster-recovery--building-your-safety-net-before-you-need-it</loc>
<lastmod>2024-11-06T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/patch-testing-and-validation-workflows--building-a-repeatable-process-that-doesn-t-break-production</loc>
<lastmod>2025-12-08T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/penetration-testing-and-security-assessments--a-practitioner-s-guide-to-finding-what-attackers-will</loc>
<lastmod>2023-06-20T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/post-incident-review-and-lessons-learned--turning-security-failures-into-defensive-strength</loc>
<lastmod>2024-12-16T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/privilege-access-management--pam--for-it-operations--from-theory-to-hardened-infrastructure</loc>
<lastmod>2024-12-01T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/privileged-session-management-and-monitoring--building-a-real-time-safety-net-for-your-most-dangerous-access</loc>
<lastmod>2024-05-03T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/regulatory-reporting-and-documentation--building-an-audit-ready-security-practice</loc>
<lastmod>2024-05-29T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/remediation-tracking-and-sla-management--building-a-system-that-actually-closes-vulnerabilities</loc>
<lastmod>2024-11-21T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/risk-analysis-and-management-planning--a-practical-framework-for-it-security-administrators</loc>
<lastmod>2023-09-08T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/risk-assessment-and-threat-modeling-for-infrastructure--a-practitioner-s-guide</loc>
<lastmod>2025-03-07T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/securing-cloud-databases--from-default-configs-to-defense-in-depth</loc>
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/security-audit-planning-and-execution--a-practitioner-s-field-guide</loc>
<lastmod>2024-02-15T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/security-budget-planning-and-roi-analysis--turning-risk-into-revenue-protection</loc>
<lastmod>2023-10-08T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/security-incident-documentation-and-playbooks--building-repeatable-response-under-pressure</loc>
<lastmod>2023-08-13T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/security-metrics--kpis--and-reporting--turning-raw-data-into-defensible-decisions</loc>
<lastmod>2024-10-11T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/server-and-workstation-security-baselines--building-your-foundation-before-the-breach</loc>
<lastmod>2026-05-04T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/service-hardening-and-port-minimization--shrinking-your-attack-surface-one-socket-at-a-time</loc>
<lastmod>2023-11-13T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/soc-2-audit-preparation-and-maintenance--a-practical-guide-for-security-administrators</loc>
<lastmod>2025-05-22T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/software-inventory-and-configuration-tracking--building-your-organization-s-source-of-truth</loc>
<lastmod>2023-05-25T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/software-license-inventory-and-compliance-tracking--a-practical-guide-for-security-administrators</loc>
<lastmod>2026-02-01T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/ssl-tls-certificate-management-and-monitoring--preventing-the-outages-nobody-sees-coming</loc>
<lastmod>2024-08-21T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/system-baseline-documentation-and-maintenance--the-foundation-you-can-t-afford-to-ignore</loc>
<lastmod>2024-04-23T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/system-configuration-and-secure-defaults--building-infrastructure-that-defends-itself</loc>
<lastmod>2024-08-31T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/third-party-risk-and-vendor-security-assessment--a-practical-framework-for-security-administrators</loc>
<lastmod>2024-03-27T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/usb-and-removable-media-control--locking-down-the-endpoints-that-matter-most</loc>
<lastmod>2025-11-27T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/vpn-and-network-segmentation-best-practices--building-defense-in-depth-that-actually-works</loc>
<lastmod>2023-01-16T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/vulnerability-assessment-and-remediation-workflows--building-a-repeatable-defense-pipeline</loc>
<lastmod>2024-06-14T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/vulnerability-management-in-the-cloud</loc>
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/vulnerability-scanning-tools-and-integration--building-a-continuous-security-pipeline</loc>
<lastmod>2025-11-14T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/windows-and-linux-update-management-strategies--building-a-patch-pipeline-that-actually-works</loc>
<lastmod>2024-06-28T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://soroush.sh/articles/windows-server-update-services--wsus--deployment-and-management</loc>
<lastmod>2023-10-30T00:00:00.000Z</lastmod>
<changefreq>never</changefreq>
<priority>0.8</priority>
</url>
</urlset>
