<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://soc2.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T01:17:04Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T01:17:04Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T01:17:04Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-03-17T01:17:04Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T01:17:04Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T01:17:04Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-1-what-soc-2-is-and-isn-t</loc>
    <lastmod>2025-10-13T23:40:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-2-do-you-need-soc-2-now-buyer-contract-signals</loc>
    <lastmod>2025-10-13T23:40:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-3-scoping-system-boundary-services-regions-tenants</loc>
    <lastmod>2025-10-13T23:41:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-4-trust-services-criteria-at-a-glance</loc>
    <lastmod>2025-10-13T23:41:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-5-control-ownership-raci-across-the-org</loc>
    <lastmod>2025-10-13T23:42:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-6-program-roadmap-realistic-timelines</loc>
    <lastmod>2025-10-13T23:43:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-7-type-i-vs-type-ii-and-bridge-letters</loc>
    <lastmod>2025-10-13T23:43:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-8-writing-the-system-description</loc>
    <lastmod>2025-10-13T23:44:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-9-subservice-orgs-inclusive-vs-carve-out</loc>
    <lastmod>2025-10-13T23:51:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-10-cuecs-done-right</loc>
    <lastmod>2025-10-13T23:52:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-11-how-to-read-a-soc-2-report</loc>
    <lastmod>2025-10-13T23:52:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-12-cc1-governance-tone-at-the-top</loc>
    <lastmod>2025-10-13T23:53:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-13-cc2-risk-assessment-method-cadence</loc>
    <lastmod>2025-10-13T23:53:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-14-cc3-hr-lifecycle-hiring-training-offboarding</loc>
    <lastmod>2025-10-13T23:54:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-15-cc4-commitments-slas-regulatory-requirements</loc>
    <lastmod>2025-10-13T23:54:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-16-cc5-control-design-reviews-and-monitoring</loc>
    <lastmod>2025-10-13T23:54:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-17-cc6-logical-access-iam-sso-mfa-jml</loc>
    <lastmod>2025-10-13T23:55:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-18-cc7-ops-config-management-vulnerability-mgmt-patching</loc>
    <lastmod>2025-10-13T23:55:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-19-cc8-change-management-sdlc-incl-iac-basics</loc>
    <lastmod>2025-10-13T23:56:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-20-cc9-incident-management-communications</loc>
    <lastmod>2025-10-13T23:56:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-21-cc10-data-integrity-in-pipelines</loc>
    <lastmod>2025-10-13T23:57:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-22-cc11-vendor-risk-subservice-oversight</loc>
    <lastmod>2025-10-13T23:58:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-23-cc12-physical-environmental-remote-first-realities</loc>
    <lastmod>2025-10-13T23:58:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-24-availability-capacity-dr-rto-rpo-game-days</loc>
    <lastmod>2025-10-13T23:59:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-25-confidentiality-classification-encryption-dlp</loc>
    <lastmod>2025-10-13T23:59:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-26-processing-integrity-accuracy-completeness-monitoring</loc>
    <lastmod>2025-10-14T00:00:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-27-privacy-notice-rights-dpias-retention-dsrs</loc>
    <lastmod>2025-10-14T00:06:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-28-privacy-in-context-soc-2-vs-iso-27701-vs-hipaa</loc>
    <lastmod>2025-10-14T00:07:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-29-evidence-for-a-c-pi-p-what-good-looks-like</loc>
    <lastmod>2025-10-14T00:07:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-30-cloud-multitenant-edge-cases-scope-tenancy-regions</loc>
    <lastmod>2025-10-14T00:08:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-31-strong-control-narratives-before-after-examples</loc>
    <lastmod>2025-10-14T00:08:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-32-evidence-strategy-sampling-for-type-ii</loc>
    <lastmod>2025-10-14T00:09:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-33-continuous-control-monitoring-automation</loc>
    <lastmod>2025-10-14T00:09:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-34-ticketing-as-evidence-approvals-change-incidents</loc>
    <lastmod>2025-10-14T00:10:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-35-audit-ready-logs-screenshots-accept-vs-reject</loc>
    <lastmod>2025-10-14T00:10:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-36-ci-cd-cloud-proofs-pipelines-baselines-diffs</loc>
    <lastmod>2025-10-14T00:11:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-37-policy-to-practice-traceability-text-proof-tests</loc>
    <lastmod>2025-10-14T00:11:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-38-selecting-the-cpa-firm-independence</loc>
    <lastmod>2025-10-14T00:12:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-39-readiness-assessments-gap-closure</loc>
    <lastmod>2025-10-14T00:12:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-40-fieldwork-do-s-don-ts-request-lists-walkthroughs</loc>
    <lastmod>2025-10-14T00:13:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-41-handling-exceptions-deviations</loc>
    <lastmod>2025-10-14T00:13:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-42-final-report-reviews-distribution-practices</loc>
    <lastmod>2025-10-14T00:14:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-43-crosswalks-soc-2-nist-csf-iso-27001-cis-18</loc>
    <lastmod>2025-10-14T00:14:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-44-using-soc-2-to-answer-sig-caiq-customer-questionnaires</loc>
    <lastmod>2025-10-14T00:15:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-45-pairing-with-pen-tests-bug-bounties-ssdf-slsa</loc>
    <lastmod>2025-10-14T00:15:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-46-startup-vs-enterprise-right-sizing</loc>
    <lastmod>2025-10-14T00:15:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-47-annual-maintenance-calendars-kris-maturity</loc>
    <lastmod>2025-10-14T00:16:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-48-beyond-the-stamp-turning-soc-2-into-real-outcomes</loc>
    <lastmod>2025-10-14T00:16:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-49-data-residency-sovereignty-in-soc-2-scopes</loc>
    <lastmod>2025-10-14T00:17:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-50-key-management-byok-kms-rotations</loc>
    <lastmod>2025-10-14T00:18:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-51-secrets-management-in-code-and-pipelines-deep-dive</loc>
    <lastmod>2025-10-14T00:18:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-52-endpoint-mdm-controls-for-distributed-teams</loc>
    <lastmod>2025-10-14T00:18:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-53-remote-work-security-home-offices-travel-contractors</loc>
    <lastmod>2025-10-14T00:19:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-54-backup-restore-and-dr-testing-at-scale</loc>
    <lastmod>2025-10-14T00:19:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-55-sre-for-availability-slos-error-budgets-incident-math</loc>
    <lastmod>2025-10-14T00:20:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-56-designing-a-metrics-kris-program-for-soc-2</loc>
    <lastmod>2025-10-14T00:22:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-57-genai-ml-services-in-scope-risks-controls-evidence</loc>
    <lastmod>2025-10-14T00:22:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-58-customer-trust-portals-controlled-evidence-sharing</loc>
    <lastmod>2025-10-14T00:23:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-59-evidence-retention-chain-of-custody-immutability</loc>
    <lastmod>2025-10-14T00:23:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-60-multi-cloud-specifics-aws-azure-gcp-control-patterns</loc>
    <lastmod>2025-10-14T00:24:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-61-mobile-app-sdlc-app-store-release-governance</loc>
    <lastmod>2025-10-14T00:24:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-62-iac-guardrails-policy-as-code-opa-conftest-scps</loc>
    <lastmod>2025-10-14T00:24:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-63-pentest-scoping-findings-lifecycle-remediation-proof</loc>
    <lastmod>2025-10-14T00:25:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/episode-64-pre-sales-enablement-using-soc-2-to-accelerate-deals</loc>
    <lastmod>2025-10-14T00:25:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://soc2.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-27T01:22:54Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
