<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

  <!-- Pages principales -->
  <url><loc>https://asphalia-analytics.com/</loc><priority>1.00</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/</loc><priority>0.90</priority></url>
  <url><loc>https://asphalia-analytics.com/AsphaliaReportExample.pdf</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/privacy.html</loc><priority>0.30</priority></url>

  <!-- Pages paginées du blog (2-10) -->
  <url><loc>https://asphalia-analytics.com/blog/?page=2</loc><priority>0.70</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/?page=3</loc><priority>0.70</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/?page=4</loc><priority>0.70</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/?page=5</loc><priority>0.70</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/?page=6</loc><priority>0.70</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/?page=7</loc><priority>0.70</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/?page=8</loc><priority>0.70</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/?page=9</loc><priority>0.70</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/?page=10</loc><priority>0.70</priority></url>

  <!-- Pages article HTML (index2.php) — 93 articles ISO 27001 -->
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.01-Policies-for-Information-Security-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.02-Information-security-roles-and-responsibilities-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.03-Segregation-of-duties-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.04-Management-responsibilities-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.05-Contact-with-authorities-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.06-Contact-with-special-interest-groups-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.07-Threat-Intelligence-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.08-Information-security-in-project-management-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.09-Inventory-of-information-and-other-associated-assets-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.10-Acceptable-use-of-information-and-other-associated-assets-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.11-Return-of-assets-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.12-Classification-of-information-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.13-Labelling-of-information-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.14-Information-transfer-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.15-Access-control-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.16-Identity-management-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.17-Authentication-information-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.18-Access-rights-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.19-Information-security-in-supplier-relationships-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.20-Addressing-information-security-within-supplier-agreements-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.21-Managing-information-security-in-the-ICT-supply-chain-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.22-Monitoring%2C-review-and-change-management-of-supplier-services-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.23-Information-security-for-use-of-cloud-services-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.24-Information-security-incident-management-planning-and-preparation-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.25-Assessment-and-decision-on-information-security-events-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.26-Response-to-information-security-incidents-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.27-Learning-from-information-security-incidents-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.28-Collection-of-evidence-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.29-Information-security-during-disruption-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.30-ICT-readiness-for-business-continuity-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.31-Legal%2C-statutory%2C-regulatory-and-contractual-requirements-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.32-Intellectual-property-rights-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.33-Protection-of-records-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.34-Privacy-and-protection-of-PII-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.35-Independent-review-of-information-security-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.36-Compliance-with-policies%2C-rules-and-standards-for-information-security-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=5.37-Documented-operating-procedures-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=6.01-Screening-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=6.02-Terms-and-conditions-of-employment-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=6.03-Information-security-awareness%2C-education-and-training-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=6.04-Disciplinary-process-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=6.05-Responsibilities-after-termination-or-change-of-employment-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=6.06-Confidentiality-or-non-disclosure-agreements-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=6.07-Remote-working-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=6.08-Information-security-event-reporting-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.01-Physical-security-perimeters-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.02-Physical-entry-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.03-Securing-offices%2C-rooms-and-facilities-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.04-Physical-security-monitoring-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.05-Protecting-against-physical-and-environmental-threats-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.06-Working-in-secure-areas-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.07-Clear-desk-and-clear-screen-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.08-Equipment-siting-and-protection-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.09-Security-of-assets-off-premises-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.10-Storage-media-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.11-Supporting-utilities-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.12-Cabling-security-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.13-Equipment-maintenance-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=7.14-Secure-disposal-or-re-use-of-equipment-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.01-Secure-disposal-or-re-use-of-equipment-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.02-Privileged-access-rights-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.03-Information-access-restriction-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.04-Access-to-source-code-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.05-Secure-authentication-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.06-Capacity-management-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.07-Protection-against-malware-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.08-Management-of-technical-vulnerabilities-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.09-Configuration-management-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.10-Information-deletion-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.11-Data-masking-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.12-Data-leakage-prevention-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.13-Information-backup-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.14-Redundancy-of-information-processing-facilities-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.15-Logging-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.16-Monitoring-activities-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.17-Clock-synchronization-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.18-Use-of-privileged-utility-programs-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.19-Installation-of-software-on-operational-systems-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.20-Networks-security-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.21-Security-of-network-services-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.22-Segregation-of-networks-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.23-Web-filtering-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.24-Use-of-cryptography-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.25-Secure-development-life-cycle-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.26-Application-security-requirements-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.27-Secure-system-architecture-and-engineering-principles-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.28-Secure-coding-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.29-Security-testing-in-development-and-acceptance-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.30-Outsourced-development-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.31-Separation-of-development%2C-test-and-production-environments-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.32-Change-management-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.33-Test-information-OnePager-1</loc><priority>0.80</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/index2.php?post=8.34-Protection-of-information-systems-during-audit-testing-OnePager-1</loc><priority>0.80</priority></url>

  <!-- PDFs (93) -->
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.01%20-%20Policies%20for%20Information%20Security%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.02%20-%20Information%20security%20roles%20and%20responsibilities%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.03%20-%20Segregation%20of%20duties%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.04%20-%20Management%20responsibilities%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.05%20-%20Contact%20with%20authorities%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.06%20-%20Contact%20with%20special%20interest%20groups%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.07%20-%20Threat%20Intelligence%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.08%20%20-%20Information%20security%20in%20project%20management%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.09%20%20-%20Inventory%20of%20information%20and%20other%20associated%20assets%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.10%20%20-%20Acceptable%20use%20of%20information%20and%20other%20associated%20assets%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.11%20%20-%20Return%20of%20assets%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.12%20%20-%20Classification%20of%20information%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.13%20-%20Labelling%20of%20information%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.14%20%20-%20Information%20transfer%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.15%20%20-%20Access%20control%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.16%20%20-%20Identity%20management%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.17%20%20-%20Authentication%20information%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.18%20%20-%20Access%20rights%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.19%20%20-%20Information%20security%20in%20supplier%20relationships%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.20%20-%20Addressing%20information%20security%20within%20supplier%20agreements%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.21%20-%20Managing%20information%20security%20in%20the%20ICT%20supply%20chain%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.22%20-%20Monitoring,%20review%20and%20change%20management%20of%20supplier%20services%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.23%20-%20Information%20security%20for%20use%20of%20cloud%20services%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.24%20-%20Information%20security%20incident%20management%20planning%20and%20preparation%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.25%20-%20Assessment%20and%20decision%20on%20information%20security%20events%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.26%20-%20Response%20to%20information%20security%20incidents%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.27%20-%20Learning%20from%20information%20security%20incidents%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.28%20-%20Collection%20of%20evidence%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.29%20-%20Information%20security%20during%20disruption%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.30%20-%20ICT%20readiness%20for%20business%20continuity%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.31%20-%20Legal,%20statutory,%20regulatory%20and%20contractual%20requirements%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.32%20-%20Intellectual%20property%20rights%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.33%20-%20Protection%20of%20records%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.34%20-%20Privacy%20and%20protection%20of%20PII%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.35%20-%20Independent%20review%20of%20information%20security%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.36%20-%20Compliance%20with%20policies,%20rules%20and%20standards%20for%20information%20security%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/5.37%20-%20Documented%20operating%20procedures%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/6.01%20-%20Screening%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/6.02%20-%20Terms%20and%20conditions%20of%20employment%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/6.03%20-%20Information%20security%20awareness,%20education%20and%20training%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/6.04%20-%20Disciplinary%20process%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/6.05%20-%20Responsibilities%20after%20termination%20or%20change%20of%20employment%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/6.06%20-%20Confidentiality%20or%20non-disclosure%20agreements%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/6.07%20-%20Remote%20working%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/6.08%20-%20Information%20security%20event%20reporting%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.01%20-%20Physical%20security%20perimeters%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.02%20-%20Physical%20entry%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.03%20-%20Securing%20offices,%20rooms%20and%20facilities%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.04%20-%20Physical%20security%20monitoring%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.05%20-%20Protecting%20against%20physical%20and%20environmental%20threats%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.06%20-%20Working%20in%20secure%20areas%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.07%20-%20Clear%20desk%20and%20clear%20screen%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.08%20-%20Equipment%20siting%20and%20protection%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.09%20-%20Security%20of%20assets%20off-premises%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.10%20-%20Storage%20media%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.11%20-%20Supporting%20utilities%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.12%20-%20Cabling%20security%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.13%20-%20Equipment%20maintenance%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/7.14%20-%20Secure%20disposal%20or%20re-use%20of%20equipment%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.01%20-%20Secure%20disposal%20or%20re-use%20of%20equipment%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.02%20-%20Privileged%20access%20rights%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.03%20-%20Information%20access%20restriction%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.04%20-%20Access%20to%20source%20code%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.05%20-%20Secure%20authentication%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.06%20-%20Capacity%20management%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.07%20-%20Protection%20against%20malware%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.08%20-%20Management%20of%20technical%20vulnerabilities%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.09%20-%20Configuration%20management%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.10%20-%20Information%20deletion%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.11%20-%20Data%20masking%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.12%20-%20Data%20leakage%20prevention%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.13%20-%20Information%20backup%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.14%20-%20Redundancy%20of%20information%20processing%20facilities%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.15%20-%20Logging%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.16%20-%20Monitoring%20activities%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.17%20-%20Clock%20synchronization%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.18%20-%20Use%20of%20privileged%20utility%20programs%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.19%20-%20Installation%20of%20software%20on%20operational%20systems%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.20%20-%20Networks%20security%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.21%20-%20Security%20of%20network%20services%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.22%20-%20Segregation%20of%20networks%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.23%20-%20Web%20filtering%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.24%20-%20Use%20of%20cryptography%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.25%20-%20Secure%20development%20life%20cycle%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.26%20-%20Application%20security%20requirements%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.27%20-%20Secure%20system%20architecture%20and%20engineering%20principles%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.28%20-%20Secure%20coding%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.29%20-%20Security%20testing%20in%20development%20and%20acceptance%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.30%20-%20Outsourced%20development%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.31%20-%20Separation%20of%20development,%20test%20and%20production%20environments%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.32%20-%20Change%20management%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.33%20-%20Test%20information%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
  <url><loc>https://asphalia-analytics.com/blog/posts/pdf/8.34%20-%20Protection%20of%20information%20systems%20during%20audit%20testing%20-%20OnePager.pdf</loc><priority>0.50</priority></url>
