<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.opensecurityarchitecture.org/</loc></url><url><loc>https://www.opensecurityarchitecture.org/about/</loc></url><url><loc>https://www.opensecurityarchitecture.org/about/core-team/</loc></url><url><loc>https://www.opensecurityarchitecture.org/about/faq/</loc></url><url><loc>https://www.opensecurityarchitecture.org/about/license-terms/</loc></url><url><loc>https://www.opensecurityarchitecture.org/about/privacy-policy/</loc></url><url><loc>https://www.opensecurityarchitecture.org/about/terms-of-use/</loc></url><url><loc>https://www.opensecurityarchitecture.org/about/who-uses-osa/</loc></url><url><loc>https://www.opensecurityarchitecture.org/about/why-have-osa/</loc></url><url><loc>https://www.opensecurityarchitecture.org/api/</loc></url><url><loc>https://www.opensecurityarchitecture.org/attack/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/3/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/4/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/5/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/6/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/7/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/another-day-another-large-scale-hack/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/better-printing-for-patterns/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/blockchain-security-architecture-from-tokenised-assets-to-digital-currencies/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/building-the-most-machine-readable-security-architecture-on-the-internet/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/client-module-updated/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/client-side-encryption-protecting-user-data-you-never-see/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/cloud-computing-research/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/cloud-pattern-finalised/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/declassified-1970-us-dod-cybersecurity-document-still-relevant/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/describe-your-experience-in-your-own-blog-statements/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/draft-pattern-soa-internal-usage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/external-attack-surface-management-what-is-mature-and-what-is-next/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/february-2011-open-security-architecture-newsletter/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/foundations-redesign-capability-model-and-archive/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/framework-mappings-and-coverage-analysis-for-21-compliance-frameworks/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/from-controls-to-currency-the-case-for-quantified-risk-in-security-architecture/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/how-to-hack-an-atm/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/introducing-security-maturity-assessments/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/iso-and-cobit-mapping/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/looking-for-contributors-for-the-secure-development-pattern/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/metadata-for-images/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/more-scada-vulnerabilities/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-data-security-pattern/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-definition-pages-security-architecture-and-it-risk/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-front-page-image/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-icon-library-pci-dss-and-whats-next/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-icon-white-hat/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-icons-black-hat-and-iphone/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-icons/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-pattern-identity-management/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-pattern-modules/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/new-patterns/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/openid-support/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/oreilly-cloud-computing-book/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/osa-ai-security-suite/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/osa-changes/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/osa-news-january-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/osa-presentation-at-owasp-chapter-meeting/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/osa-reborn-modern-platform-same-mission/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/secure-scrum/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/security-requirements/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/serious-security-holes-in-siemens-control-systems/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/server-module-updated/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/site-refresh/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/site-update-new-template/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/slow-progress-of-late/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/small-addition-to-the-icon-library/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/soa-security-risks/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/sony-and-amazon-outages/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/sp-028-secure-devops-pipeline-pattern/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/still-live-considering-next-development-steps/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/summary-of-recent-changes-to-the-site/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/summer-hibernation/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/trials-and-tribulations-of-tcpdf/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/twitter-hack-causes-markets-to-plunge/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/uniquely-id-a-browser-via-fingerprint/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/update-the-control-icons-on-patterns/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/update-to-patterns/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/updated-icon-pack/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/updated-pattern-naming-convention/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/which-actors-for-which-controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/blog/yep-still-slow-going/</loc></url><url><loc>https://www.opensecurityarchitecture.org/brand/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-14/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-15/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-16/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-17/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-18/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-19/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-20/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-21/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-22/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-23/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-24/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ac-25/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/at-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/at-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/at-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/at-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/at-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/at-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-14/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-15/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/au-16/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ca-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cm-14/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/cp-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ia-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ir-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ma-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ma-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ma-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ma-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ma-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ma-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ma-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/mp-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/mp-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/mp-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/mp-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/mp-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/mp-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/mp-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/mp-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-14/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-15/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-16/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-17/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-18/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-19/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-20/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-21/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-22/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pe-23/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pl-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-14/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-15/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-16/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-17/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-18/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-19/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-20/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-21/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-22/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-23/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-24/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-25/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-26/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-27/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-28/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-29/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-30/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-31/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pm-32/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ps-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pt-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pt-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pt-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pt-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pt-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pt-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pt-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/pt-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/ra-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-15/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-16/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-17/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-20/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-21/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-22/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sa-23/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-14/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-15/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-16/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-17/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-18/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-19/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-20/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-21/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-22/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-23/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-24/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-25/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-26/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-27/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-28/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-29/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-30/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-31/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-32/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-34/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-35/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-36/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-37/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-38/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-39/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-40/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-41/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-42/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-43/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-44/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-45/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-46/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-47/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-48/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-49/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-50/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sc-51/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-14/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-15/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-16/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-17/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-18/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-19/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-20/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-21/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-22/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/si-23/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-01/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-02/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-03/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-04/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-05/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-06/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-07/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-08/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-09/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-10/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/controls/sr-12/</loc></url><url><loc>https://www.opensecurityarchitecture.org/definitions/</loc></url><url><loc>https://www.opensecurityarchitecture.org/definitions/glossary/</loc></url><url><loc>https://www.opensecurityarchitecture.org/definitions/it-architecture/</loc></url><url><loc>https://www.opensecurityarchitecture.org/definitions/it-risk/</loc></url><url><loc>https://www.opensecurityarchitecture.org/definitions/it-security-architecture/</loc></url><url><loc>https://www.opensecurityarchitecture.org/definitions/it-security/</loc></url><url><loc>https://www.opensecurityarchitecture.org/definitions/security_patterns/</loc></url><url><loc>https://www.opensecurityarchitecture.org/definitions/security-requirements/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/acceptable-use-policy/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/capability-model/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/design-principles/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/how-to-use/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/icons/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/information-security-policy/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/osa-actors/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/osa-landscape/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/osa-lifecycle/</loc></url><url><loc>https://www.opensecurityarchitecture.org/foundations/policy-templates/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/anssi/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/anssi/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/anssi/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/api-1164/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/api-1164/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/api-1164/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/apra-cps-234/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/apra-cps-234/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/apra-cps-234/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/asd-essential-eight/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/asd-essential-eight/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/asd-essential-eight/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/awia/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/awia/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/awia/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/basel-sco60/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/basel-sco60/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/basel-sco60/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bcbs-239/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bcbs-239/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bcbs-239/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bio2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bio2/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bio2/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bog-cisd/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bog-cisd/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bog-cisd/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bom-ctrm/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bom-ctrm/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bom-ctrm/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bot-cyber/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bot-cyber/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bot-cyber/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bsi-grundschutz/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bsi-grundschutz/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bsi-grundschutz/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bssc/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bssc/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/bssc/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbb-tm/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbb-tm/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbb-tm/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbe-csf/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbe-csf/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbe-csf/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbest/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbest/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbest/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbn-csf/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbn-csf/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbn-csf/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbuae/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbuae/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cbuae/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ccss-v9/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ccss-v9/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ccss-v9/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cis-controls-v8/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cis-controls-v8/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cis-controls-v8/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cmmc-2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cmmc-2/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cmmc-2/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cobit-2019/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cobit-2019/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cobit-2019/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/common-criteria/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/common-criteria/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/common-criteria/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cpmi-pfmi/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cpmi-pfmi/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cpmi-pfmi/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cra/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cra/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/cra/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/csa-aicm/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/csa-aicm/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/csa-aicm/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/csa-ccm-v4/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/csa-ccm-v4/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/csa-ccm-v4/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/dnb-good-practice/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/dnb-good-practice/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/dnb-good-practice/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/doe-c2m2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/doe-c2m2/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/doe-c2m2/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/dora/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/dora/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/dora/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/eba-ict/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/eba-ict/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/eba-ict/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ecb-croe/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ecb-croe/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ecb-croe/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fca-sysc-13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fca-sysc-13/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fca-sysc-13/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fda-21-cfr-11/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fda-21-cfr-11/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fda-21-cfr-11/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fda-cyber/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fda-cyber/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fda-cyber/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ferc-cip/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ferc-cip/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ferc-cip/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ffiec-is/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ffiec-is/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ffiec-is/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/finma-circular/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/finma-circular/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/finma-circular/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/finos-ccc/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/finos-ccc/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/finos-ccc/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fips-140/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fips-140/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fips-140/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fisc/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fisc/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/fisc/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/gdpr/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/gdpr/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/gdpr/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hipaa-sr/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hipaa-sr/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hipaa-sr/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hitrust-csf/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hitrust-csf/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hitrust-csf/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hkma-tme1/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hkma-tme1/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/hkma-tme1/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iaea-nss/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iaea-nss/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iaea-nss/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iec-62443/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iec-62443/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iec-62443/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ieee-1686/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ieee-1686/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/ieee-1686/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iosco-cyber/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iosco-cyber/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iosco-cyber/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/isae-3402/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/isae-3402/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/isae-3402/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27001-2022/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27001-2022/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27001-2022/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27002-2022/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27002-2022/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27002-2022/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27799/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27799/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-27799/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-42001-2023/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-42001-2023/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/iso-42001-2023/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/lgpd-bcb/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/lgpd-bcb/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/lgpd-bcb/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/lloyds-ms/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/lloyds-ms/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/lloyds-ms/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mas-trm/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mas-trm/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mas-trm/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mica/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mica/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mica/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mlps-2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mlps-2/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/mlps-2/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/naic-ds/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/naic-ds/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/naic-ds/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nca-ecc/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nca-ecc/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nca-ecc/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nerc-cip/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nerc-cip/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nerc-cip/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nhs-dspt/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nhs-dspt/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nhs-dspt/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nis2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nis2/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nis2/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nist-csf-2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nist-csf-2/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nist-csf-2/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nrc-73-54/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nrc-73-54/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nrc-73-54/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nydfs-500/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nydfs-500/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/nydfs-500/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/osfi-b13/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/osfi-b13/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/osfi-b13/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/owasp-masvs-v2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/owasp-masvs-v2/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/owasp-masvs-v2/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-dss-v4/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-dss-v4/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-dss-v4/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-hsm/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-hsm/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-hsm/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-pts/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-pts/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pci-pts/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/popia/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/popia/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/popia/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pra-op-resilience/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pra-op-resilience/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pra-op-resilience/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pra-ss1-23/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pra-ss1-23/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/pra-ss1-23/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/qatar-nia/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/qatar-nia/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/qatar-nia/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/rbi-csf/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/rbi-csf/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/rbi-csf/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sa-js2/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sa-js2/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sa-js2/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sama-csf/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sama-csf/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sama-csf/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sebi-cscrf/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sebi-cscrf/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sebi-cscrf/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sec-custody-digital/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sec-custody-digital/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/sec-custody-digital/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/soc2-tsc/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/soc2-tsc/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/soc2-tsc/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/solvency-ii/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/solvency-ii/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/solvency-ii/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/swift-cscf/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/swift-cscf/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/swift-cscf/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/tiber-eu/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/tiber-eu/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/tiber-eu/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/tsa-psd/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/tsa-psd/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/tsa-psd/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/uae-ia/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/uae-ia/controls/</loc></url><url><loc>https://www.opensecurityarchitecture.org/frameworks/uae-ia/coverage/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-000/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-001/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-002/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-003/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-004/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-005/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-006/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-007/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-008/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-009/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-010/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-011/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-012/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-013/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-014/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-015/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-016/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-017/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-018/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-019/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-020/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-021/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-022/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-023/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-024/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-025/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-026/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-027/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-028/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-029/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-030/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-031/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-032/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-033/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-034/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-035/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-036/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-037/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-038/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-039/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-040/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-041/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-042/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-043/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-044/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-045/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-046/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-047/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-048/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-049/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-050/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-051/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-052/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-053/</loc></url><url><loc>https://www.opensecurityarchitecture.org/patterns/sp-054/</loc></url></urlset>