<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gcld.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T21:39:41Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T21:39:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T21:39:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T21:39:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T21:39:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T21:39:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T21:39:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T21:39:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-1-decode-the-gcld-exam-format-rules-scoring-and-timing-calmly</loc>
    <lastmod>2026-02-14T07:36:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-2-build-a-spoken-study-plan-that-sticks-for-busy-cloud-defenders</loc>
    <lastmod>2026-02-14T07:36:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-3-understand-shared-responsibility-clearly-across-iaas-paas-and-saas-realities</loc>
    <lastmod>2026-02-14T07:36:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-4-apply-threat-informed-defense-by-matching-controls-to-real-cloud-adversaries</loc>
    <lastmod>2026-02-14T07:37:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-5-identify-high-probability-cloud-attacker-goals-incentives-and-target-choices</loc>
    <lastmod>2026-02-14T07:37:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-6-track-common-initial-access-paths-attackers-use-in-public-cloud-environments</loc>
    <lastmod>2026-02-14T07:37:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-7-recognize-privilege-escalation-patterns-unique-to-cloud-identity-and-policy-systems</loc>
    <lastmod>2026-02-14T07:37:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-8-contain-cloud-intrusions-fast-using-isolation-credential-resets-and-scoped-actions</loc>
    <lastmod>2026-02-14T07:37:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-9-preserve-cloud-evidence-correctly-so-investigations-remain-reliable-and-defensible</loc>
    <lastmod>2026-02-14T07:37:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-10-recover-safely-after-cloud-compromise-with-controlled-rebuilds-and-trust-restoration</loc>
    <lastmod>2026-02-14T07:38:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-11-master-cloud-account-fundamentals-tenants-subscriptions-projects-and-billing-boundaries</loc>
    <lastmod>2026-02-14T07:38:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-12-design-multi-account-strategy-that-reduces-blast-radius-and-simplifies-governance</loc>
    <lastmod>2026-02-14T07:38:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-13-structure-organizational-units-and-account-groupings-for-predictable-security-inheritance</loc>
    <lastmod>2026-02-14T07:38:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-14-set-up-guardrails-early-with-policies-that-prevent-dangerous-service-configurations</loc>
    <lastmod>2026-02-14T07:38:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-15-establish-account-level-security-baselines-that-survive-rapid-growth-and-change</loc>
    <lastmod>2026-02-14T07:38:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-16-build-iam-foundations-that-prevent-identity-sprawl-across-teams-and-workloads</loc>
    <lastmod>2026-02-14T07:38:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-17-translate-job-duties-into-roles-that-stay-minimal-precise-and-auditable</loc>
    <lastmod>2026-02-14T07:39:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-18-design-least-privilege-policies-that-avoid-wildcards-and-unnecessary-broad-actions</loc>
    <lastmod>2026-02-14T07:39:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-19-prevent-privilege-creep-with-periodic-access-reviews-and-automated-entitlement-cleanup</loc>
    <lastmod>2026-02-14T07:39:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-20-control-root-and-break-glass-access-with-tight-processes-and-strong-monitoring</loc>
    <lastmod>2026-02-14T07:39:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-21-secure-service-accounts-with-strict-scope-limited-lifetime-and-clear-ownership</loc>
    <lastmod>2026-02-14T07:39:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-22-reduce-session-risk-with-short-lifetimes-reauthentication-and-device-aware-access</loc>
    <lastmod>2026-02-14T07:39:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-23-harden-authentication-using-mfa-phishing-resistance-and-conditional-access-logic</loc>
    <lastmod>2026-02-14T07:39:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-24-validate-federation-patterns-so-enterprise-identity-extends-safely-into-cloud-services</loc>
    <lastmod>2026-02-14T07:40:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-25-secure-third-party-access-by-scoping-permissions-monitoring-behavior-and-revoking-fast</loc>
    <lastmod>2026-02-14T07:40:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-26-control-external-access-by-limiting-public-endpoints-and-enforcing-private-connectivity</loc>
    <lastmod>2026-02-14T07:40:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-27-prevent-accidental-exposure-by-verifying-default-deny-behaviors-and-explicit-allow-lists</loc>
    <lastmod>2026-02-14T07:40:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-28-implement-safe-remote-administration-paths-that-reduce-internet-facing-management-risk</loc>
    <lastmod>2026-02-14T07:40:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-29-apply-iam-best-practices-to-external-entry-points-so-access-stays-intentional</loc>
    <lastmod>2026-02-14T07:42:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-30-secrets-management-eliminate-hardcoded-keys-and-reduce-credential-lifetime-aggressively</loc>
    <lastmod>2026-02-14T07:42:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-31-store-secrets-safely-using-managed-services-encryption-access-controls-and-logging</loc>
    <lastmod>2026-02-14T07:42:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-32-rotate-secrets-reliably-with-automation-that-prevents-outages-and-forgotten-credentials</loc>
    <lastmod>2026-02-14T07:42:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-33-scope-secrets-to-least-privilege-so-one-leak-cannot-unlock-broad-cloud-access</loc>
    <lastmod>2026-02-14T07:43:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-34-deliver-secrets-to-workloads-safely-without-embedding-them-in-images-or-source-code</loc>
    <lastmod>2026-02-14T07:43:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-35-cloud-automation-use-infrastructure-as-code-to-make-security-repeatable-and-testable</loc>
    <lastmod>2026-02-14T07:43:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-36-prevent-configuration-drift-with-policy-as-code-and-continuous-posture-enforcement</loc>
    <lastmod>2026-02-14T07:43:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-37-secure-ci-cd-pipelines-so-build-systems-cannot-become-attacker-bridges</loc>
    <lastmod>2026-02-14T07:43:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-38-validate-automated-deployments-with-approvals-change-tracking-and-safe-rollback-patterns</loc>
    <lastmod>2026-02-14T07:43:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-39-automate-guardrails-that-block-risky-storage-network-and-iam-configurations-instantly</loc>
    <lastmod>2026-02-14T07:44:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-40-frameworks-for-built-in-security-map-provider-native-capabilities-into-reliable-patterns</loc>
    <lastmod>2026-02-14T07:44:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-41-design-security-by-default-architectures-using-managed-services-and-least-management-surfaces</loc>
    <lastmod>2026-02-14T07:44:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-42-operationalize-secure-landing-zones-that-standardize-identity-logging-and-network-controls</loc>
    <lastmod>2026-02-14T07:44:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-43-extend-built-in-controls-consistently-across-single-cloud-and-multi-cloud-environments</loc>
    <lastmod>2026-02-14T07:44:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-44-cloud-logging-fundamentals-choose-log-sources-that-answer-real-investigation-questions</loc>
    <lastmod>2026-02-14T07:44:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-45-capture-identity-logs-that-reveal-misuse-privilege-changes-and-suspicious-sign-ins</loc>
    <lastmod>2026-02-14T07:45:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-46-capture-control-plane-logs-that-show-configuration-changes-and-risky-administrative-actions</loc>
    <lastmod>2026-02-14T07:45:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-47-capture-data-access-logs-that-reveal-sensitive-reads-writes-deletes-and-sharing</loc>
    <lastmod>2026-02-14T07:45:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-48-protect-log-integrity-using-centralized-storage-immutability-controls-and-tight-permissions</loc>
    <lastmod>2026-02-14T07:45:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-49-set-retention-intentionally-so-logs-remain-useful-across-incident-and-audit-timelines</loc>
    <lastmod>2026-02-14T07:48:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-50-normalize-logs-for-correlation-so-patterns-emerge-across-accounts-and-regions</loc>
    <lastmod>2026-02-14T07:48:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-51-cloud-networking-technology-understand-vpc-or-vnet-primitives-and-routing-behaviors</loc>
    <lastmod>2026-02-14T14:39:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-52-segment-networks-intentionally-to-reduce-blast-radius-and-limit-lateral-movement</loc>
    <lastmod>2026-02-14T14:39:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-53-control-ingress-with-security-groups-firewalls-and-service-specific-access-policies</loc>
    <lastmod>2026-02-14T14:40:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-54-control-egress-to-reduce-exfiltration-paths-and-limit-command-and-control-reachability</loc>
    <lastmod>2026-02-14T14:40:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-55-design-private-connectivity-patterns-that-replace-public-exposure-with-controlled-paths</loc>
    <lastmod>2026-02-14T14:40:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-56-encrypt-network-traffic-properly-across-regions-services-and-hybrid-connections</loc>
    <lastmod>2026-02-14T14:40:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-57-secure-dns-and-name-resolution-so-attackers-cannot-redirect-trust-or-hide-access</loc>
    <lastmod>2026-02-14T14:40:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-58-validate-network-design-continuously-by-testing-intended-paths-versus-actual-reachability</loc>
    <lastmod>2026-02-14T14:40:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-59-securing-cloud-networks-prevent-misroutes-shadow-paths-and-accidental-trust-relationships</loc>
    <lastmod>2026-02-14T14:40:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-60-reduce-exposure-from-load-balancers-gateways-and-proxies-with-strong-defaults</loc>
    <lastmod>2026-02-14T14:41:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-61-protect-administrative-network-services-so-management-planes-stay-isolated-and-controlled</loc>
    <lastmod>2026-02-14T14:41:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-62-network-security-monitoring-in-the-cloud-choose-signals-that-reveal-attacker-movement</loc>
    <lastmod>2026-02-14T14:41:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-63-detect-identity-abuse-by-correlating-logins-token-use-and-privilege-changes</loc>
    <lastmod>2026-02-14T14:41:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-64-detect-lateral-movement-by-monitoring-network-flows-service-calls-and-unusual-access-paths</loc>
    <lastmod>2026-02-14T14:41:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-65-detect-data-exfiltration-attempts-using-volume-baselines-destination-analysis-and-timing</loc>
    <lastmod>2026-02-14T14:42:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-66-tune-detections-to-reduce-noise-while-keeping-high-confidence-cloud-security-alerts</loc>
    <lastmod>2026-02-14T14:42:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-67-investigate-alerts-with-cloud-context-to-decide-benign-behavior-versus-true-compromise</loc>
    <lastmod>2026-02-14T14:42:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-68-secure-compute-deployment-harden-images-reduce-services-and-enforce-patch-cadence</loc>
    <lastmod>2026-02-14T14:43:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-69-use-immutable-infrastructure-patterns-to-shrink-the-window-for-persistent-compromise</loc>
    <lastmod>2026-02-14T14:43:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-70-validate-compute-security-with-baselines-policy-enforcement-and-continuous-posture-checks</loc>
    <lastmod>2026-02-14T14:43:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-71-apply-runtime-protections-that-limit-execution-persistence-and-privilege-inside-workloads</loc>
    <lastmod>2026-02-14T14:44:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-72-secure-serverless-and-managed-compute-by-controlling-permissions-triggers-and-inputs</loc>
    <lastmod>2026-02-14T14:44:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-73-containers-and-cloud-storage-secure-container-builds-from-source-to-registry-to-runtime</loc>
    <lastmod>2026-02-14T14:44:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-74-enforce-image-hygiene-by-scanning-signing-and-blocking-risky-dependencies</loc>
    <lastmod>2026-02-14T14:44:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-75-isolate-containers-using-least-privilege-runtime-settings-and-strong-boundary-controls</loc>
    <lastmod>2026-02-14T14:44:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-76-protect-cloud-storage-with-encryption-access-policies-and-safe-sharing-defaults</loc>
    <lastmod>2026-02-14T14:45:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-77-prevent-public-bucket-mistakes-by-validating-policies-acls-and-inherited-permissions</loc>
    <lastmod>2026-02-14T14:45:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-78-control-object-lifecycle-and-versioning-to-support-recovery-accountability-and-integrity</loc>
    <lastmod>2026-02-14T14:45:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-79-discovering-sensitive-data-classify-what-matters-and-reduce-unknown-data-sprawl</loc>
    <lastmod>2026-02-14T14:46:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-80-find-sensitive-data-in-storage-databases-logs-and-object-metadata-consistently</loc>
    <lastmod>2026-02-14T14:46:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-81-store-sensitive-data-safely-with-encryption-key-management-and-strict-access-controls</loc>
    <lastmod>2026-02-14T14:46:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-82-use-sensitive-data-responsibly-by-controlling-purpose-retention-and-minimum-exposure</loc>
    <lastmod>2026-02-14T14:46:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-83-prevent-data-leakage-with-monitoring-blocking-controls-and-tested-response-playbooks</loc>
    <lastmod>2026-02-14T14:46:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-84-risk-management-and-compliance-translate-cloud-risk-into-defensible-business-decisions</loc>
    <lastmod>2026-02-14T14:47:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-85-map-controls-to-requirements-so-audits-become-evidence-driven-rather-than-narrative-driven</loc>
    <lastmod>2026-02-14T14:47:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-86-prepare-for-cloud-audits-by-aligning-logs-configurations-and-access-reviews-to-evidence</loc>
    <lastmod>2026-02-14T14:47:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/episode-87-perform-practical-cloud-security-assessments-that-surface-misconfigurations-before-attackers-do</loc>
    <lastmod>2026-02-14T14:47:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcld.baremetalcyber.com/episodes/welcome-to-certified-the-giac-gcld-audio-course</loc>
    <lastmod>2026-02-10T21:32:59Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
