<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.cloudfence.com/old-home</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/product</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/outband-traffic-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/networking-access-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/detection-behavior-deviations</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/company</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/usecase/suspicious-outbound-communications-old</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/usecase/detection-of-behavior-deviations-old</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/blog</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/watch-a-demo</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/faq</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/usecase/security-group-hardening</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/usecase/detection-of-behavior-deviations</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/usecase/suspicious-outbound-communications</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/blog/architecture-vs-reality-why-your-cloud-doesnt-look-the-way-you-designed-it</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/blog/aws-egress-traffic-visibility-security</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/blog/egress-traffic-control-a-strategic-security-investment</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/blog/how-to-detect-c2-traffic-in-aws-a-practical-guide-using-vpc-flow-logs-and-dns</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/blog/tcp-flags-aws-vpc-flow-logs</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/blog/ultimate-guide-security-groups-least-privilege-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/blog/using-vpc-flow-logs-to-tighten-security-group-rules</loc>
    </url>
    <url>
        <loc>https://www.cloudfence.com/landing/g-gain-control-over-your-aws-outbound-traffic</loc>
    </url>
</urlset>