<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://red-team.sh/posts/disclaimer/</loc>
<lastmod>2000-01-18T00:00:00-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/why-devsecops-essential/</loc>
<lastmod>2022-01-18T20:52:43-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/hacking-mitigation-strategies/</loc>
<lastmod>2022-02-18T20:52:43-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/yes-phishing-is-still-a-thing/</loc>
<lastmod>2022-02-18T20:52:43-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/optimize-cicd-pipeline/</loc>
<lastmod>2022-03-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/social-eng/</loc>
<lastmod>2022-04-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/embed-security-in-early/</loc>
<lastmod>2022-05-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/common-threat-vectors/</loc>
<lastmod>2022-06-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/10-tips-to-secure-yourself-online/</loc>
<lastmod>2022-07-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/threat-model-priority/</loc>
<lastmod>2022-08-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/the-internets-double-edge-sword/</loc>
<lastmod>2022-09-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/security-malware/</loc>
<lastmod>2022-10-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/security-pub-srcs/</loc>
<lastmod>2022-10-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/security-remain-anon-online/</loc>
<lastmod>2022-10-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/security-so-your-website-just-went-public/</loc>
<lastmod>2022-10-18T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/The-benefits-and-challenges-of-implementing-serverless-architecture/</loc>
<lastmod>2023-01-11T20:52:43-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/Automating-security-compliance-checks/</loc>
<lastmod>2023-01-18T20:52:43-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/attacker-common-toolchain/</loc>
<lastmod>2023-01-30T20:52:43-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/dont-get-caught-without-a-risk-mgmt-plan/</loc>
<lastmod>2023-04-05T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/power-of-prioritization-for-your-soc/</loc>
<lastmod>2023-04-10T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/security-human-factor/</loc>
<lastmod>2023-04-13T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/secure-your-cloud-with-confidence/</loc>
<lastmod>2023-04-28T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/leveraging-snyk-for-improved-security/</loc>
<lastmod>2023-05-01T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/things-to-consider-when-migrating-to-serverless/</loc>
<lastmod>2023-05-11T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/beyond-compliance/</loc>
<lastmod>2023-06-01T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/devops-meets-security/</loc>
<lastmod>2023-06-01T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/security-for-container-based-envs/</loc>
<lastmod>2023-10-01T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/security-osint/</loc>
<lastmod>2023-10-12T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/honeytokens/</loc>
<lastmod>2025-01-05T20:52:43-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/aws-waf-cloudfront-application-protection/</loc>
<lastmod>2025-01-10T08:00:00-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/real-time-log-using-with-kenisis/</loc>
<lastmod>2025-02-10T20:52:43-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/real-time-ids-using-guardduty/</loc>
<lastmod>2025-03-12T21:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/building-a-resilient-security-posture-with-aws-security/</loc>
<lastmod>2025-03-18T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/Automated-threat-hunting-with-aws-lambda/</loc>
<lastmod>2025-04-12T11:52:43-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/best-practices-for-securiing-your-aws-account/</loc>
<lastmod>2025-05-03T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/data-protection-on-aws-encryption-and-secrets-management/</loc>
<lastmod>2025-05-17T08:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/implementing-zero-trust-on-aws/</loc>
<lastmod>2025-06-01T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/aws-cloud-security-best-practices-implementation-guide/</loc>
<lastmod>2025-08-14T09:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/securing-ai-ml-workloads-aws-complete-guide-devsecops/</loc>
<lastmod>2025-08-19T06:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/ai-powered-threat-detection-aws-guardduty-advanced-analytics/</loc>
<lastmod>2025-08-23T06:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/aws-ransomware-protection-comprehensive-defense-strategy/</loc>
<lastmod>2025-08-25T07:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/securing-aws-ai-ml-pipelines-devsecops-integration-guide/</loc>
<lastmod>2025-08-27T06:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/ai-supply-chain-security-model-poisoning-defense/</loc>
<lastmod>2025-08-31T06:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/defending-against-password-spray-attacks-aws-detection-prevention/</loc>
<lastmod>2025-09-01T07:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/aws-cloud-security-best-practices-implementation-guide/</loc>
<lastmod>2025-09-08T07:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/aws-lambda-security-automated-threat-detection-2025/</loc>
<lastmod>2025-09-15T07:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/aws-iam-zero-trust-identity-network-deep-dive/</loc>
<lastmod>2025-09-22T07:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/aws-devsecops-pipeline-security-automation-implementation/</loc>
<lastmod>2025-09-29T07:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/aws-cloudfront-geographic-access-control/</loc>
<lastmod>2026-02-25T08:00:00-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/eks-runtime-security-falco-vs-guardduty/</loc>
<lastmod>2026-03-04T08:00:00-08:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/posts/policy-as-code-opa-kyverno-eks-security/</loc>
<lastmod>2026-03-11T09:00:00-07:00</lastmod>
</url>
<url>
<loc>https://red-team.sh/about/</loc>
</url>
<url>
<loc>https://red-team.sh/year-archive/</loc>
</url>
<url>
<loc>https://red-team.sh/</loc>
</url>
<url>
<loc>https://red-team.sh/resources/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/</loc>
</url>
<url>
<loc>https://red-team.sh/terms-and-tools/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cicd/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cloud/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/compliance/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/security-automation/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cybersecurity/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/incident-response/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/risk-management/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/threat-intelligence/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/threat-mitigation/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/phishing/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/social-engineering/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-cloud-engineering/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cloudformation/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/kubernetes/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/terraform/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/behavioral-analytics/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/phishing-defense/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/security-awareness/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/sdlc/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cloud-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/mitre-attack/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/threat-detection/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/threat-modeling/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/digital-privacy/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/online-safety/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/personal-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/security-tips/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/pasta/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/risk-assessment/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/stride/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ccpa/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/data-protection/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/gdpr/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/privacy/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/malware-protection/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/zero-trust/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/anonymity/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/encryption/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/tor/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/vpn/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/api-gateway/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-lambda/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-sam/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cost-optimization/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/event-driven-architecture/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/security-best-practices/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/serverless-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/attack-kill-chain/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/penetration-testing/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/governance/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/nist/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/soc/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/employee-training/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/infrastructure-as-code/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/snyk/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/vulnerability/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/vulnerability-management/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cloud-migration/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/scalability/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/serverless/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-ecs/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-eks/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-fargate/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/container-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/open-source/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/osint/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/honeytokens/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-lambda/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/active-deception/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/devsecops/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-cloud-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-security-engineering/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/application-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-waf/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cloudfront/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/owasp-top-10/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-kinesis/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/real-time-log-analysis/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-guardduty/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/eventbridge/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/hipaa/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/soc2/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-config/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-inspector/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-security-hub/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/compliance-automation/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cspm/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-security-solutions/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-cloud-engineering/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cloudtrail/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/dynamodb/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/active-defense/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/threat-hunting/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/performance-optimization/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cost-optimization/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/soc2/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/hipaa/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/real-time-analytics/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-iam/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/mfa/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-kms/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-secrets-manager/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/pci-dss/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ssm-parameter-store/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-privatelink/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-vpc/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cloudtrail/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ai-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ai-workloads/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-bedrock/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/machine-learning/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/mlops/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/sagemaker/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ai-threat-detection/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/automated-response/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cybersecurity-ai/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/machine-learning-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-backup/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/defensive-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/disaster-recovery/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ransomware-protection/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-sagemaker/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ml-pipeline-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/mlops-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/model-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/secure-machine-learning/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/adversarial-attacks/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ai-model-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ai-supply-chain-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ml-supply-chain/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/model-poisoning-defense/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/third-party-ai-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/authentication-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/identity-protection/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/password-spray-defense/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/security-lake/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/continuous-verification/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/identity-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/network-segmentation/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/privileged-access/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-codepipeline/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/cicd-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/dast/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/sast/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/access-control/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/aws-cloudfront/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/data-sovereignty/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/geo-restriction/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/geographic-blocking/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/ebpf/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/eks-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/falco/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/runtime-security/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/admission-control/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/gatekeeper/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/kyverno/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/opa/</loc>
</url>
<url>
<loc>https://red-team.sh/tags/policy-as-code/</loc>
</url>
<url>
<loc>https://red-team.sh/categories/aws/</loc>
</url>
<url>
<loc>https://red-team.sh/categories/devsecops/</loc>
</url>
<url>
<loc>https://red-team.sh/categories/security/</loc>
</url>
<url>
<loc>https://red-team.sh/page2/</loc>
</url>
<url>
<loc>https://red-team.sh/page3/</loc>
</url>
<url>
<loc>https://red-team.sh/page4/</loc>
</url>
</urlset>
