<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://security-by-design.nl/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://security-by-design.nl/</loc><lastmod>2026-03-09T06:58:42+00:00</lastmod></url><url><loc>https://security-by-design.nl/index.php/security-by-design/</loc><lastmod>2026-03-08T11:16:08+00:00</lastmod></url><url><loc>https://security-by-design.nl/index.php/threat-modeling/</loc><lastmod>2026-03-08T11:18:53+00:00</lastmod></url><url><loc>https://security-by-design.nl/index.php/dealing-with-vulnerabilities/</loc><lastmod>2026-03-08T11:19:46+00:00</lastmod></url><url><loc>https://security-by-design.nl/index.php/legal-requirements/</loc><lastmod>2026-03-08T11:20:47+00:00</lastmod></url></urlset>
