<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://awsmatt.com/</loc><lastmod>2026-04-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://awsmatt.com/posts/d3fend-aws-defensive-technique-mappings/</loc><lastmod>2026-04-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://awsmatt.com/posts/</loc><lastmod>2026-04-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://awsmatt.com/posts/behavioural-detection-automated-agents-mdr/</loc><lastmod>2026-04-20T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://awsmatt.com/posts/scps-rcps-preventive-controls/</loc><lastmod>2026-04-16T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://awsmatt.com/posts/guardduty-cloudtrail-signal-gap/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://awsmatt.com/posts/iam-privilege-escalation-patterns/</loc><lastmod>2026-03-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://awsmatt.com/posts/aws-security-research/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://awsmatt.com/background/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>