<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.devsecopsguides.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://blog.devsecopsguides.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/sbom-and-bill-of-materials-security</loc><lastmod>2026-04-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/supply-chain-security-labs</loc><lastmod>2026-03-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/container-image-security-labs-2026</loc><lastmod>2026-03-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/continuous-delivery-security-labs</loc><lastmod>2026-03-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/terraform-security-labs</loc><lastmod>2026-03-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/container-security-labs-in-2026</loc><lastmod>2026-02-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secure-coding-labs-in-2026</loc><lastmod>2026-02-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/http-request-smuggling-the-silent</loc><lastmod>2026-02-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/nix-package-management-the-attacker</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/investigate-incident-with-logs-like</loc><lastmod>2025-12-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secret-alternatives-for-devsecops</loc><lastmod>2025-12-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/feature-flagging-for-devsecops-engineer</loc><lastmod>2025-11-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/devsecops-process-management</loc><lastmod>2025-11-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secret-management-like-a-ninja-a</loc><lastmod>2025-11-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/keycloak-tenants-vs-realms-for-fun</loc><lastmod>2025-11-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/building-and-breaking-secure-kubernetes</loc><lastmod>2025-10-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secure-by-design-the-reverse-proxy</loc><lastmod>2025-10-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/monitoring-as-code-devsecops-edition</loc><lastmod>2025-10-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/insecure-by-design-the-vibe-coding</loc><lastmod>2025-10-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secure-by-design-real-time-communication</loc><lastmod>2025-09-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secure-by-design-execution-and-file</loc><lastmod>2025-09-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secure-by-design-frontend-security</loc><lastmod>2025-09-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secure-by-design-access-control-middleware</loc><lastmod>2025-09-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/web-service-and-api-secure-by-design</loc><lastmod>2025-08-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/authentication-secure-by-design</loc><lastmod>2025-08-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/java-spring-bug-hunters-secure-coding</loc><lastmod>2025-08-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/aws-proactive-defence-the-art-of</loc><lastmod>2025-08-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/the-container-base-image-security</loc><lastmod>2025-07-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/container-attack-and-defend</loc><lastmod>2025-07-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/aws-eks-attack-and-defend</loc><lastmod>2025-07-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/aws-authentication-and-permission</loc><lastmod>2025-06-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/aws-cspm-playbook</loc><lastmod>2025-06-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/aws-ec2-attack-and-defend</loc><lastmod>2025-06-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/aws-s3-attack-and-defend</loc><lastmod>2025-06-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/aws-abac-cheatsheet</loc><lastmod>2025-04-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/vulnerability-bill-of-materials</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/virtual-patching-best-practices</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-mongodb</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/http-security-headers</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/payment-vulnerabilities</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/file-upload-vulnerabilities</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-pfsense</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-nginx</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-openstack</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-cicd</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-pipeline</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-policy</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-iac</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-vagrant</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-golang</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/ansible-playbooks</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/ebpf-cheatsheet</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/devsecops-security-architecture</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-secrets</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-net</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-rust</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-java</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-php</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-nodejs-application</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-kubernetes</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-azure</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-supply-chain</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-docker</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/secure-coding-cheatsheets</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-aws</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-android</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/java-applications-remote-code-execution</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-ios</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/defending-apis</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-apis</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/2fa-security-issues</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/laravel-security-best-practice</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/malicious-use-of-oauth-applications</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/github-actions-worm</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/nginx-path-configuration-pitfalls</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/devsecops-scenarios</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/devsecops-maturity-model-2023</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attack-against-google-cloud-native</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/devsecops-pipelines</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/owasp-top-10-mobile-risks</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/attacking-against-devops-environment</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/top-business-logic-vulnerability</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/top-system-programming-vulnerabilities</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/owasp-api-security-top-10-2023</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devsecopsguides.com/p/diagram-as-code</loc><lastmod>2025-06-18</lastmod><changefreq>monthly</changefreq></url></urlset>