<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://securitycomplianceguide.com/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/about/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/contact/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/privacy/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/aws-compliance-certifications/</loc>
    <lastmod>2026-05-04</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/best-grc-software-platforms/</loc>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"best-penetration-testing-companies"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/best-penetration-testing-tools/</loc>
    <lastmod>2026-04-06</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/best-siem-tools-compliance/</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/best-vulnerability-scanners/</loc>
    <lastmod>2026-04-28</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/build-compliance-program/</loc>
    <lastmod>2026-04-24</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/ccpa-compliance-guide/</loc>
    <lastmod>2026-04-22</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/cmmc-compliance-guide/</loc>
    <lastmod>2026-04-08</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/compliance-automation-guide/</loc>
    <lastmod>2026-04-06</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"cyber-insurance-requirements"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"cybersecurity-compliance-checklist"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/cybersecurity-compliance-guide/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"cybersecurity-compliance-startups"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/equifax-data-breach-compliance/</loc>
    <lastmod>2026-04-15</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/fedramp-authorization-guide/</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/fintech-compliance-requirements/</loc>
    <lastmod>2026-04-20</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/gdpr-compliance-us-companies/</loc>
    <lastmod>2026-04-21</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/google-workspace-hipaa-compliant/</loc>
    <lastmod>2026-04-25</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/healthcare-compliance-requirements/</loc>
    <lastmod>2026-04-14</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-business-associate-agreement/</loc>
    <lastmod>2026-04-21</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-compliance-guide/</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"hipaa-compliance-saas-startups"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-compliance-software/</loc>
    <lastmod>2026-04-07</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-compliance-startups-minimum-viable/</loc>
    <lastmod>2026-04-19</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-documentation-templates/</loc>
    <lastmod>2026-04-19</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-risk-assessment-guide/</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-security-rule-safeguards/</loc>
    <lastmod>2026-04-14</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-training-requirements/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-violation-penalties-fines/</loc>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa-vs-hitrust/</loc>
    <lastmod>2026-05-04</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/how-long-soc-2-audit/</loc>
    <lastmod>2026-04-24</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"how-to-choose-soc-2-auditor"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/is-shopify-soc-2-compliant/</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/is-stripe-soc-2-compliant/</loc>
    <lastmod>2026-04-22</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/is-zoom-hipaa-compliant/</loc>
    <lastmod>2026-04-16</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001-annex-a-controls/</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001-audit-process/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"iso-27001-certification-cost"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001-certification-guide/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001-certification-process/</loc>
    <lastmod>2026-04-07</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001-implementation-guide/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001-internal-audit/</loc>
    <lastmod>2026-04-23</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001-statement-of-applicability/</loc>
    <lastmod>2026-04-28</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001-vs-soc-2-vs-nist/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/microsoft-365-hipaa-compliant/</loc>
    <lastmod>2026-04-25</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/nist-800-171-compliance-guide/</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/nist-800-53-controls-guide/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/nist-csf-vs-iso-27001/</loc>
    <lastmod>2026-04-22</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"nist-cybersecurity-framework-2"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/nist-cybersecurity-framework-guide/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/nist-password-guidelines/</loc>
    <lastmod>2026-04-28</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/nist-risk-management-framework-guide/</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/pci-dss-4-requirements/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/pci-dss-compliance-checklist/</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"pci-dss-compliance-guide"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/pci-dss-saq-guide/</loc>
    <lastmod>2026-04-29</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/pci-dss-self-assessment-questionnaire/</loc>
    <lastmod>2026-04-06</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/pci-dss-vs-soc-2/</loc>
    <lastmod>2026-04-15</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/pen-test-vs-vulnerability-assessment/</loc>
    <lastmod>2026-04-15</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/penetration-test-cost/</loc>
    <lastmod>2026-04-20</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/penetration-testing-guide/</loc>
    <lastmod>2026-05-04</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/penetration-testing-vs-vulnerability-scanning/</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/saas-compliance-frameworks/</loc>
    <lastmod>2026-04-23</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/security-awareness-training-requirements/</loc>
    <lastmod>2026-04-08</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"soc-2-audit-cost"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"soc-2-compliance-checklist-2026"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-compliance-guide/</loc>
    <lastmod>2026-04-29</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-compliance-timeline/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"soc-2-cost-calculator"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-evidence-collection/</loc>
    <lastmod>2026-04-08</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-for-healthcare-organizations/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-for-saas-startups/</loc>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-readiness-assessment/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-report-types-type-1-vs-type-2/</loc>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-timeline-saas-startups/</loc>
    <lastmod>2026-04-27</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-trust-service-criteria/</loc>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-updates-2026/</loc>
    <lastmod>2026-04-27</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"soc-2-vs-iso-27001"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2-vs-soc-1/</loc>
    <lastmod>2026-04-26</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/solarwinds-hack-compliance-lessons/</loc>
    <lastmod>2026-04-20</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/sprinto-vs-vanta/</loc>
    <lastmod>2026-04-25</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/target-data-breach-pci-dss/</loc>
    <lastmod>2026-04-23</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/vanta-review-worth-cost/</loc>
    <lastmod>2026-04-26</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"vanta-vs-drata-vs-secureframe"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/web-application-pen-test-checklist/</loc>
    <lastmod>2026-04-29</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/web-application-penetration-testing/</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/what-counts-hipaa-breach/</loc>
    <lastmod>2026-04-24</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/what-happens-fail-soc-2-audit/</loc>
    <lastmod>2026-04-16</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/"what-is-soc-2-type-2"/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/zero-trust-nist-800-207-guide/</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/compliance/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/hipaa/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/iso-27001/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/nist/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/pci-dss/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/pen-testing/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/soc-2/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
  <url>
    <loc>https://securitycomplianceguide.com/blog/tools/</loc>
    <lastmod>2026-05-05</lastmod>
  </url>
</urlset>