<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://ridgelinecyber.com/blog/iso-27001-first-90-days-implementation-roadmap/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/incident-response-plan-build-guide/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/zero-trust-implementation-guide-practical-steps/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/how-long-to-build-security-program/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/customer-asked-for-security-policies/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/tags/business-impact-analysis/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/risk-management-programme-assessment-bia-vendor-risk/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/tags/iso-27001/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/tags/nist-csf/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/tags/risk-assessment/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/tags/risk-management/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/tags/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/tags/vendor-risk/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/iso-27001-risk-assessment-treatment-documentation/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/soc-2-compliance-documentation-audit-preparation/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/cmmc-level-2-compliance-documentation-guide/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/data-privacy-governance-gdpr-ccpa-documentation/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/nist-csf-implementation-operations-documentation/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/vulnerability-management-documentation-program/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/starting-grc-program-minimum-documentation/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/cross-mapping-nist-iso-cis-frameworks/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/security-policy-documentation-enterprise-quality/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/cmmc-level-1-compliance-documentation-guide/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/owasp-llm-top-10-2025-ai-governance-documentation/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/nist-csf-2-policy-templates-implementation-guide/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/about/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/ai-security/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://ridgelinecyber.com/products/ai-security-toolkit/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/applications/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/categories/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/cmmc-level-1-compliance-toolkit/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/cmmc-level-2-compliance-suite/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/contact/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/cyber-incident-response-toolkit/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/blog/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://ridgelinecyber.com/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority></url><url><loc>https://ridgelinecyber.com/products/data-privacy-governance-suite/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/services/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/applications/questionnairepro-download/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/questionnairepro-download/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/executive/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/faq/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/free-resources/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/get-started/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/governance/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://ridgelinecyber.com/products/grc-essentials-toolkit/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/industries/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/information-security-policy-suite/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/nist-csf-implementation-operations-suite/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/privacy/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/applications/questionnairepro/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/questionnairepro/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/refund-policy/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/request-toolkit/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/compare/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/risk-management/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://ridgelinecyber.com/products/risk-management-toolkit/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/security-awareness-training/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/security-operations/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://ridgelinecyber.com/products/security-program-foundation/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/soc-2-readiness-suite/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/start-here/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/terms/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/thank-you/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.1</priority></url><url><loc>https://ridgelinecyber.com/products/vulnerability-patch-management-toolkit/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://ridgelinecyber.com/products/zero-trust-implementation-toolkit/</loc><lastmod>2026-04-02T11:56:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>