<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.cyberday.ai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/demo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/pricing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/features/documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/discussion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/privacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/features/guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/features/tasks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/trial</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/team</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/features/reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/gdpr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/how-it-works</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/cyber-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/employee-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/compliance-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/control-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/nist-csf</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/csa-ccm</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/iso-27017</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/iso-27018</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/privacy-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/iso-27701</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/customers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/app-for-slack</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/partners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/support-meeting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/book-a-meeting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/video-course</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/cyberday-live</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides/nis2-ebook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/internal-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/subprocessors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/nis2-latvian</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/topic/nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/topic/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/nis2-lithuanian</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/success-stories</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/newsletter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/advisor-search</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/trust-center</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/use-cases/vendor-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/country/belgium</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides/belgium-cybersecurity-frameworks-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides/iso-27001-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides/cybersecurity-frameworks-in-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/country/sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/country/norway</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides/cybersecurity-frameworks-in-norway</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/framework-comparison-tool</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/features/ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/service-description</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/carousel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/content-sharing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/quick-signup</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/country/denmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides/cybersecurity-frameworks-in-denmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides/cybersecurity-frameworks-in-the-netherlands</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/country/netherlands</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/topic/risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/privacy-notices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/topic/ai-collection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/guides/frameworks-in-finland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/admin-training-part-1-2-cyberday-essentials-for-new-admins</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/admin-training-part-2-2-employee-awareness-compliance-reporting-and-other-advanced-features</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/admin-training-part-5-5-asset-management-and-reporting-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/ai-agents-in-isms-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/continuous-improvement-how-to-run-an-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/cyberday-admin-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/cyberday-partner-program-achieve-growth-with-a-new-agile-toolkit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/cybersec-iso-27001-take-control-of-the-basics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/decembers-monthly-review-for-cyberday-admins-12-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/demo-deploying-security-tasks-creating-policy-documents-and-reporting-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/einfuhrung-in-die-nis2-richtlinie-lokale-nis2-gesetze-und-cyberday-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/information-security-risk-management-from-confusion-to-a-working-model</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/iso-27001-entwickle-einen-cybersecurity-plan-der-deine-compliance-sichert</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/iso-27001-part-2-5-security-controls-risk-management-and-soa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/iso-27001-part-3-5-certification-audit-fundamentals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/iso-27001-part-4-5-staff-training-guidelines-and-policy-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/iso-27001-part-5-5-certification-achieved-what-next</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/marchs-monthly-review-for-cyberday-admins-3-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/marchs-monthly-review-for-cyberday-admins-3-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/mays-monthly-review-for-cyberday-admins-5-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/mays-monthly-review-for-cyberday-admins-5-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/monthly-review-for-cyberday-admins-1-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/monthly-review-for-cyberday-admins-12-2023</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/nis2-part-1-2-intro-to-nis2-directive-and-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/septembers-monthly-review-for-cyberday-admins-9-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/septembers-monthly-review-for-cyberday-admins-9-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/webinar/whats-new-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/10-compliance-traps</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/10-most-common-failures-in-information-security-risk-management-and-how-to-fix-them</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/10-most-common-non-conformities-in-iso-27001-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/10-most-important-tasks-for-a-ciso-and-tips-for-being-successful</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/10-things-i-wish-i-knew-before-starting-iso-27001-project</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/6-ways-to-assess-security-work-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/agendium-ltd-is-now-cyberday-inc</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/ai-act-cyber-risks-and-breaches-monthly-cyberday-product-and-news-roundup-1-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/ai-human-what-are-different-levels-of-collaboration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/ai-wont-replace-cybersecurity-consultants-and-why-it-makes-them-more-valuable</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/best-practices-and-common-challenges-of-isms-implementation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/best-practices-from-iso-27001-for-secure-system-acquisition-and-development-create-your-nis2-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/build-your-nis2-measures-for-business-continuity-and-backups-with-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/comparing-eu-cybersecurity-frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/compliance-is-mission-critical---not-a-once-a-year-project</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/compliance-revolution-consulting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cra-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyber-security-regulations-and-frameworks-in-belgium</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-app-outage-on-tuesday-10-6-2025-explanation-and-follow-up</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-fall-2025-round-up-navigating-growth</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-goes-cyber-security-nordic-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-innovation-seminar-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-launched-frameworks-teams-integration-and-much-more</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-listed-on-the-deloitte-2025-technology-fast-50</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-product-and-news-round-up-5-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-product-and-news-summary-3-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-product-and-news-summary-9-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberday-teams-app-is-now-available</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cyberdays-ai-fast-track-cuts-isms-setup-to-minutes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/cybersakerhetslagen-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/dangerous-apps</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/data-system-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/denmark-energy-resilience-order</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/dora-compliance-key-steps-to-prepare-your-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/efficient-cyber-risk-management-with-new-autopilot-mode</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/empowering-employees-the-keystone-in-incident-detection-and-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/encryption-raas-supply-chain-attacks-monthly-cyberday-product-and-news-roundup-12-2023</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/eu-ai-act-and-iso-42001-differences-overlap</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/from-compliance-to-collaboration-stronger-supply-chain-security-collaboration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/guide-to-incident-detection-and-reporting-prepared-for-the-worst</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/how-advisors-can-scale-up-without-hiring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/how-ai-agents-are-changing-information-security-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/how-ai-is-transforming-the-compliance-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/how-iso-27001-supports-gdpr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/how-to-compare-cybersecurity-frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/how-to-comply-with-cra</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/how-to-comply-with-cybersakerhetslagen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/how-to-comply-with-sakerhetsskyddslagen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/hr-security-basics-iso-27001-nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/human-firewall-effect</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/incident-detection-building-nurturing-and-continuously-improving-a-proactive-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/infographic-why-is-cyber-security-getting-more-and-more-important</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/information-security-risk-management-a-step-by-step-guide-to-a-clear-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/information-security-risk-management-in-cyberday-identifying-risks-assessment-processing-and-closure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/introducing-cyberday-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/introduction-to-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/involving-people-in-security-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/isms-implementation-comparison-of-documents-wikis-isms-tools-and-grc</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/isms-implementation-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-and-ai-isms-baseline</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-and-iso-9001-differences-how-they-work-together-and-benefits-of-combining</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-and-nis2-access-control-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-and-nis2-connection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-audit-interview</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-certification-audit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-certification-audit-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-compliance-and-certification-checklist</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-compliance-vs-certification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-27001-standard-updated-to-2022-version-what-changed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/iso-9001-standard-a-peek-inside-the-quality-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/it-vs-ot-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/kicking-off-a-summer-of-innovation-at-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/navigating-the-cybersecurity-maze-master-nis2-with-the-help-of-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/new-frameworks-available-october-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/new-frameworks-nis2-saudi-pdpl-and-caf-4</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/new-nis2-national-frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/nis2-5-reasons-for-manufacturing-sector</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/nis2-directive-whos-in-the-scope-and-what-security-measures-are-required</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/nis2-implementing-regulation-explained</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/nis2-in-slovakia-guide-to-zakon-o-kybernetickej-bezpecnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/nis2-in-slovenia-guide-to-zakon-o-informacijski-varnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/nis2-incident-reporting-iso-27001-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/nis2-national-laws-ransomware-and-a-new-development-forum-cyberday-product-and-news-round-up-9-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/nis2-overview-history-key-contents-and-significance-for-top-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/partnership-partner-features</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/password-security-avoid-these-5-common-mistakes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/personnel-information-security-training-and-guidelines-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/product-and-news-round-up-12-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/product-and-news-round-up-5-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/ransomware-ai-act-101-nist-csf-2-0-cyberday-product-and-news-round-up-3-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/recognising-growth-move-to-new-offices-with-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/risk-management-how-other-isms-key-areas-provide-input</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/sakerhetsskyddslagen-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/saudi-arabia-personal-data-protection-law-pdpl</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/soc-2-working-towards-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/spreadsheet-vs-isms-tool</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/statement-of-applicability-soa-in-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/supply-chain-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/tisax-understanding-the-automotive-assessment-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/top-information-security-standards-frameworks-and-laws-explained</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/understanding-caf-4-cyber-assessment-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/understanding-nis2-in-portugal-regime-juridico-da-ciberseguranca</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/understanding-nis2-supervision-and-penalties-of-non-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/understanding-physical-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-ai-can-do-for-compliance-and-why-it-cant-solve-it-alone</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-are-cyber-security-frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-a-modular-cyber-security-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-a-vciso-virtual-ciso</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-cra</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-cyberbeveiligingswet-dutch-nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-cyberfundamentals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-cybersakerhetslagen-swedish-nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-cybersikkerhedsloven-danish-nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-digitalsikkerhetsloven-nis2-norway</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-dora</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-eu-ai-act</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-gdpr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-nis2-directive</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-nsm-ict-security-principles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-risk-management-in-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-sakerhetsskyddslagen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-sikkerhetsloven</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/what-is-the-nis2-law-in-belgium</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/who-cra-applies-to</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/who-cybersakerhetslagen-applies-to</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/who-sakerhetsskyddslagen-applies-to</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/why-information-security-risk-management-is-important</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/why-is-iso-27001-compliance-now-more-important-than-ever</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/blog/why-value-based-pricing-works-for-compliance-consultants</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/account-structures-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/adding-custom-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/advisory-network-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/allowing-support-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/allowing-the-teams-app-and-its-permissions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/available-support-methods-for-cyberday-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/bulk-editing-in-list-views-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/calculating-risk-level-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/compliance-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/content-tasks-documentation-guidelines-and-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/creating-and-managing-subscription</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/data-stores-data-sets-and-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/distributing-reports-via-guidebook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/edit-structure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/employee-guideline-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/enabling-cia-classification-feature</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/enabling-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/favourites</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/feature-asset-based-risk-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/feature-documentation-tables</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/feature-give-feedback-on-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/feature-improving-translations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/filling-documentation-for-important-data-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/filling-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/framework-library</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/getting-started-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/guidelines-sharing-and-creating-new-guidelines-for-employees</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/harden-your-assurance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-can-i-export-data-from-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-do-i-start-to-use-cyberday-in-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-employee-security-incident-reporting-works</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-is-the-cyberday-data-backed-up</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-access-your-cyberday-organization-dashboard-in-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-create-cyber-security-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-delegate-tasks-and-show-evidence-of-completion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-enable-guidebook-training-extensions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-install-the-teams-app-for-multiple-users-at-once</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-invite-and-manage-other-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-manage-extensions-inside-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-manage-teams-apps-as-an-admin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-set-your-custom-logo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-use-metrics-feature</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-use-the-internal-audit-feature</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/how-to-use-the-slack-integration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/import-multiple-items-at-once</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/incident-management-features</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/intro-to-employee-guidebook-on-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/isms-document-importing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/joining-collaboration-groups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/linking-external-files</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/logging-into-cyberday-via-browser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/manage-workload-with-user-stats-view</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/managing-and-sending-vendor-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/monthly-data-export</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/multilingual-work-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/optional-data-fields-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/partner-management-terminology</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/partner-newsletter-subscription</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/partner-portal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/personalize-menu-pinning-items</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/posting-replies-and-notifications-in-community</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/printing-tips-for-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/privacy-notices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/publishing-embeddable-reports-on-your-website</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/review-cyberday-in-capterra</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/review-cyberday-in-g2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/share-reports-in-ms-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/sharing-process-descriptions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/steps-needed-for-iso-27001-certification-audit-readiness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/subscription-and-user-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/task-assurance-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/task-list</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/taskbook-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/tips-for-processing-automatically-deactivated-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/trust-center</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/unit-employee-ad-syncing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/user-management-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/using-security-statement-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/utilizing-the-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/visual-mode-draws-out-documentation-items-connections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/vote-and-post-development-ideas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/what-are-most-popular-guidelines-for-remote-work-and-mobile-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/what-is-cyber-security-asset-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/what-is-the-organisation-dashboard-and-who-can-access-it</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/what-kind-of-frameworks-are-available</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/what-kind-of-logging-is-available-about-changes-in-your-cyberday-account</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/what-kind-of-notifications-are-available</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/where-do-i-sign-up-for-14-day-free-trial</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/which-units-to-group-employees-into</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-articles/working-as-a-partner-partner-portal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/2024-evi-lxix-torveny-magyarorszag-kiberbiztonsagarol-magyarorszag</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ai-act-base</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ai-act-gpai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ai-act-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ai-act-limited-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/avviz-legali-71-tal-2025-malta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/bekendtgorelse-om-modstandsdygtighed-og-beredskab-i-energisektoren-danmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cer-directive</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cis-18-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cra-cyber-resilience-act</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cyber-essentials</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cyberbeveiligingswet-nederland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cyberfundamentals-belgium</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cybersakerhetslagen-sverige</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cybersecurity-capability-maturity-model-c2m2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cybersecurity-law-of-the-people-s-republic-of-china</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cybersicherheitsverordnung-schweiz</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/cybersikkerhedsloven-danmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/digital-operational-resilience-act-dora</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/digital-security-overview</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/dora-simplified-rmf</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ethniki-arhi-gia-tin-asfaleia-ston-kyvernohoro-kai-alles-diataxeis-ellada</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/gdpr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/il-cybersecurity-act-decreto-legislativo-n-138</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/iso-27001-2022</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/iso-27017</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/iso-27018</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/iso-27701</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/iso-9001-full</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/julkri-tl-iv-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/katakri-2020</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/katakri-finnish-national-security-auditing-criteria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/kibernetinio-saugumo-istatymas-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/kibernetinio-saugumo-reikalavimu-aprasas-isk-nacionalini-kibernetiniu-incidentu-valdymo-plana-lietuva</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/kyberturvallisuuslaki-nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/la-loi-nis2-belgique</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/landskapslag-om-cybersakerhet-och-motstandskraft-aland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ley-de-ciberseguridad-espana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/loi-sur-les-infrastructures-critiques-belgique</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/lov-om-digital-sikkerhet-norge</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/msbfs-2020-6-sverige</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/msbfs-2020-7-sverige</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/msbfs-2020-8-sverige</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nacionalas-kiberdrosibas-likums-latvia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ncsc-cyber-assessment-framework-4-0-uk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nen-7510</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/netz--und-informationssystemsicherheitsgesetz-osterreich</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nis2-austria-draft</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nis2-directive</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nis2-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nis2-implementing-regulation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nis2-umsetzungs--und-cybersicherheitsstarkungsgesetz-deutschland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nist-csf-2-0</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nist-cybersecurity-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/nsm-ict-security-principles-norway</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/o-nomos-gia-tin-kyvernoasfaleia-kypros</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ordonanta-de-urgenta-a-guvernului-nr-155-2024-romania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/personal-data-protection-law-saudi-arabia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/projet-de-loi-ndeg-8364-luxembourg</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/public-administration-information-management-act</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/regime-juridico-da-ciberseguranca-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/sakerhetsskyddslagen-sverige</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/sikkerhetsloven-norge</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/soc-2-systems-and-organization-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/the-national-cyber-security-bill-2024-ireland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/tietoturvan-ja-tietosuojan-omavalvontasuunnitelma</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/tietoturvasuunnitelma-thl-3-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/tihl-suositus-tietoturvan-vahimmaisvaatimuksista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/tisax-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-cyberfundamentals-2025-w-levels</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-cyfun-essential</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-danish-cer-act-denmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-en-17640-2022</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-msb-nis2-implementation-regulation-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nis2-austria-draft</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nis2-bulgaria-draft</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nis2-cyprus-draft</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nis2-decree--security-classification-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nis2-germany-draft</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nis2-poland-draft</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nis2-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nis2-sweden-cybersakerhetslagen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-nist-sp-800-171</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/upcoming-regulations-and-general-advice-on-record-keeping-and-processing-of-personal-data-in-healthcare-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/ustawa-o-krajowym-systemie-cyberbezpieczenstwa-polska</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/zakon-o-informacijski-varnosti-slovenija</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/zakon-o-kibernetickoj-sigurnosti-croatia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/zakon-o-kybernetickej-bezpecnosti-slovensko</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/frameworks/zakon-za-prilagane-na-nis2-blgariya</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-1-mil2-manage-it-and-ot-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-1-mil3-manage-it-and-ot-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-2-mil2-manage-information-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-2-mil3-manage-information-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-3-manage-it-and-ot-asset-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-3-mil2-manage-it-and-ot-asset-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-3-mil3-manage-it-and-ot-asset-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-4-manage-changes-to-it-and-ot-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-4-mil2-manage-changes-to-it-and-ot-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-4-mil3-manage-changes-to-it-and-ot-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-5-management-activities-for-the-asset-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-5-mil1-management-activities-for-the-asset-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-5-mil2-management-activities-for-the-asset-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-5-mil3-management-activities-for-the-asset-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/1-asset-change-and-configuration-management-asset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-1-establish-cybersecurity-program-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-1-mil2-establish-cybersecurity-program-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-1-mil3-establish-cybersecurity-program-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-2-mil2-establish-and-maintain-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-2-mil3-establish-and-maintain-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-3-management-activities-for-the-program-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-3-mil1-management-activities-for-the-program-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-3-mil2-management-activities-for-the-program-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-3-mil3-management-activities-for-the-program-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/10-cybersecurity-program-management-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/11-1-secure-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/11-2-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/11-physical-and-environmental-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/11-processing-which-does-not-require-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/12-1-operational-procedures-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/12-4-logging-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/12-6-technical-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/12-operational-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/12-operations-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/13-1-network-security-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/13-2-information-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/13-communications-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/14-1-security-requirements-of-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/14-2-security-in-development-and-support-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/14-system-acquisition-development-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/15-1-information-security-in-supplier-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/15-2-supplier-service-delivery-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/15-supplier-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/16-1-management-of-information-security-incidents-and-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/16-information-security-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/17-1-information-security-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/17-2-1-availability-of-information-processing-facilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/17-2-redundancies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/17-information-security-aspects-of-business-continuity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/18-1-compliance-with-legal-and-contractual-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/18-2-information-security-reviews</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/18-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-1-mil2-reduce-cybersecurity-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-1-mil3-reduce-cybersecurity-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-1-reduce-cybersecurity-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-2-mil2-respond-to-threats-and-share-threat-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-2-mil3-respond-to-threats-and-share-threat-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-2-respond-to-threats-and-share-threat-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-3-management-activities-for-the-threat-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-3-mil1-management-activities-for-the-threat-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-3-mil2-management-activities-for-the-threat-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-3-mil3-management-activities-for-the-threat-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-luku-tiedonhallinnan-jarjestaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/2-threat-and-vulnerability-management-threat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/27001-sisalto-4-1-10-2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-1-establish-and-maintain-cyber-risk-management-strategy-and-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-1-mil2-establish-and-maintain-cyber-risk-management-strategy-and-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-1-mil3-establish-and-maintain-cyber-risk-management-strategy-and-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-2-identify-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-2-mil2-identify-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-2-mil3-identify-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-3-analyze-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-3-mil2-analyze-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-3-mil3-analyze-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-4-mil2-respond-to-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-4-mil3-respond-to-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-4-respond-to-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-5-management-activities-for-the-risk-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-5-mil1-management-activities-for-the-risk-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-5-mil2-management-activities-for-the-risk-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-5-mil3-management-activities-for-the-risk-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-risk-management-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/3-turvallisuusjohtaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/31-cooperation-with-the-supervisory-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-1-establish-identities-and-manage-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-1-mil2-establish-identities-and-manage-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-1-mil3-establish-identities-and-manage-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-2-control-logical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-2-mil2-control-logical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-2-mil3-control-logical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-3-control-physical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-3-mil2-control-physical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-3-mil3-control-physical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-4-management-activities-for-the-access-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-4-mil1-management-activities-for-the-access-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-4-mil2-management-activities-for-the-access-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-4-mil3-management-activities-for-the-access-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-fyysinen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-identity-and-access-management-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-luku-18-ss-turvallisuusluokiteltavat-asiakirjat-valtionhallinnossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/4-luku-tietoturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-1-mil2-perform-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-1-mil3-perform-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-1-perform-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-2-mil2-perform-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-2-mil3-perform-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-2-perform-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-3-establish-and-maintain-situational-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-3-mil1-establish-and-maintain-situational-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-3-mil2-establish-and-maintain-situational-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-3-mil3-establish-and-maintain-situational-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-4-management-activities-for-the-situation-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-4-mil1-management-activities-for-the-situation-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-4-mil2-management-activities-for-the-situation-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-4-mil3-management-activities-for-the-situation-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-7-8-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-8-access-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-8-continuity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-8-data-classification-and-privacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-8-supplier-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-legal-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-luku-tietoaineistojen-muodostaminen-ja-sahkoinen-luovutustapa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-situational-awareness-situation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/5-tekninen-tietoturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-1-internal-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-1-mil2-detect-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-1-mil3-detect-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-2-analyze-cybersecurity-events-and-declare-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-2-mil2-analyze-cybersecurity-events-and-declare-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-2-mil3-analyze-cybersecurity-events-and-declare-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-2-mobile-devices-and-teleworking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-3-mil2-respond-to-cybersecurity-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-3-mil3-respond-to-cybersecurity-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-4-mil2-address-cybersecurity-in-continuity-of-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-4-mil3-address-cybersecurity-in-continuity-of-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-5-management-activities-for-the-response-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-5-mil1-management-activities-for-the-response-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-5-mil2-management-activities-for-the-response-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-5-mil3-management-activities-for-the-response-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-event-and-incident-response-continuity-of-operations-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-human-resource-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-luku-asianhallinta-ja-palvelujen-tiedonhallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/6-organization-of-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-1-identify-and-prioritize-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-1-mil2-identify-and-prioritize-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-1-mil3-identify-and-prioritize-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-1-prior-to-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-2-during-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-2-manage-third-party-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-2-mil2-manage-third-party-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-2-mil3-manage-third-party-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-3-management-activities-for-the-third-parties-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-3-mil1-management-activities-for-the-third-parties-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-3-mil2-management-activities-for-the-third-parties-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-3-mil3-management-activities-for-the-third-parties-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-human-resource-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-physical-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/7-third-party-risk-management-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-1-implement-workforce-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-1-mil2-implement-workforce-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-1-mil3-implement-workforce-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-1-responsibility-for-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-2-increase-cybersecurity-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-2-mil2-increase-cybersecurity-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-2-mil3-increase-cybersecurity-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-3-media-handling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-3-mil2-assign-cybersecurity-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-3-mil3-assign-cybersecurity-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-4-develop-cybersecurity-workforce</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-4-mil2-develop-cybersecurity-workforce</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-4-mil3-develop-cybersecurity-workforce</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-5-6-information-security-event-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-5-management-activities-for-the-workforce-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-5-mil1-management-activities-for-the-workforce-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-5-mil2-management-activities-for-the-workforce-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-5-mil3-management-activities-for-the-workforce-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-5-threat-and-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-application-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-secure-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-system-and-network-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/8-workforce-management-workforce</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/83-hallinnollisten-sakkojen-maaraamisen-yleiset-edellytykset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-1-establish-and-maintain-cybersecurity-architecture-strategy-and-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-1-mil2-establish-and-maintain-cybersecurity-architecture-strategy-and-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-1-mil3-establish-and-maintain-cybersecurity-architecture-strategy-and-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-2-implement-network-protections-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-2-mil2-implement-network-protections-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-2-mil3-implement-network-protections-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-2-user-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-2-user-access-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-3-implement-it-and-ot-asset-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-3-mil2-implement-it-and-ot-asset-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-3-mil3-implement-it-and-ot-asset-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-4-implement-software-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-4-mil2-implement-software-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-4-mil3-implement-software-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-4-system-and-application-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-5-implement-data-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-5-mil2-implement-data-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-5-mil3-implement-data-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-6-management-activities-for-the-architecture-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-6-mil1-management-activities-for-the-architecture-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-6-mil2-management-activities-for-the-architecture-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-6-mil3-management-activities-for-the-architecture-domain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-access-control-4eb37</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-access-control-96e8a</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/9-cybersecurity-architecture-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-10-accountability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-11-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-12-privacy-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-3-purpose-legitimacy-and-specification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-7-2-conditions-for-collection-and-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-7-3-obligations-to-pii-principals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-7-4-privacy-by-design-and-privacy-by-default</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-7-5-pii-sharing-transfer-and-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-7-additional-iso-iec-27002-guidance-for-pii-controllers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-8-2-conditions-for-collection-and-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-8-4-privacy-by-design-and-privacy-by-default</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-8-5-pii-sharing-transfer-and-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/a-8-additional-iso-iec-27002-guidance-for-pii-processors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/access-control-and-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/agreements-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-10-1-quality-criteria-of-training-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-10-2-management-of-training-validation-and-testing-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-10-3-relevance-representativeness-and-completeness-of-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-10-4-contextual-characteristics-of-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-10-5-exceptional-processing-of-special-categories-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-10-6-applicability-of-data-requirements-to-non-training-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-11-technical-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-12-record-keeping-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-13-1-transparency-in-the-operation-of-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-13-2-3-usage-instructions-format-for-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-14-effective-human-oversight-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-15-1-accuracy-robustness-and-cybersecurity-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-15-3-declaration-of-accuracy-levels-and-metrics-in-instructions-for-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-15-4-robustness-against-errors-and-mitigation-of-feedback-loops</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-15-5-cybersecurity-and-resilience-against-manipulation-attempts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-16-obligations-for-providers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-17-1-qms-instructions-quality-management-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-17-1-qms-policy-quality-management-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-17-1-qms-procedures-quality-management-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-17-2-proportionality-of-quality-management-system-implementation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-17-4-quality-management-systems-for-financial-institutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-19-retention-of-automatically-generated-logs-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-20-corrective-actions-and-duty-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-21-cooperation-with-competent-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-22-authorised-representatives-of-high-risk-ai-system-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-23-declaration-of-conformity-for-importers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-24-declaration-of-conformity-for-distributors-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-25-1-2-conditions-to-be-considered-a-provider-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-25-3-manufacturer-conditions-for-ai-systems-as-safety-components-of-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-26-1-4-technical-and-organisational-obligations-for-deployers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-26-11-informing-natural-persons-of-the-use-of-a-deployed-high-risk-ai-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-26-5-monitoring-the-operation-of-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-26-6-minimum-log-retention-periods-in-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-26-7-informing-personnel-of-being-subject-to-the-use-of-a-deployed-high-risk-ai-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-26-8-registration-of-deployed-high-risk-ai-systems-for-public-authorities-and-union-institutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-26-9-data-protection-impact-assessment-for-deployers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-27-1-4-fundamental-rights-impact-assessment-prior-to-deployment-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-4-ensuring-personnel-have-a-sufficient-level-of-ai-literacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-43-1-conformity-assessment-procedure-for-providers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-43-2-conformity-assessment-procedure-for-providers-of-high-risk-ai-systems-listed-in-annex-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-43-3-conformity-assessment-procedure-for-providers-of-high-risk-ai-systems-covered-by-eu-harmonisation-legislation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-43-4-conditions-for-high-risk-ai-systems-to-undergo-a-new-conformity-assessment-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-47-eu-declaration-of-conformity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-48-ce-markings-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-49-registration-of-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-50-1-informing-users-they-are-interacting-with-an-ai-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-50-2-clearly-marking-artificially-generated-or-manipulated-ai-content</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-50-3-informing-users-exposed-to-emotion-recognition-or-biometric-categorisation-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-50-4-disclosing-artificially-generated-content</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-50-5-6-clarity-of-information-provided-to-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-60-7-reporting-of-serious-incidents-connected-to-real-world-testing-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-60-8-notification-of-national-market-authorities-where-real-world-testing-is-conducted</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-61-informed-consent-to-participate-in-testing-in-real-world-conditions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-72-post-market-monitoring-and-monitoring-plan-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-73-incident-reporting-procedure-for-providers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-86-right-to-explanation-of-individual-decision-making</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-9-1-establishing-a-risk-management-system-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-9-2-risk-management-system-planning-processes-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-9-4-considerations-for-risk-management-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-9-5-risk-management-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-9-6-testing-for-risk-management-measures-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-9-8-testing-frequency-and-metrics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-9-9-considering-the-impact-on-vulnerable-groups-in-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-base-article-95-3-code-of-conduct-for-providers-or-deployers-of-ai-systems-and-their-organisations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-gpai-article-52-3-cooperation-with-competent-authorities-for-providers-of-general-purpose-ai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-gpai-article-53-1-2-maintaining-accurate-and-up-to-date-technical-information-of-general-purpose-ai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-gpai-article-53-4-codes-of-practice-for-providers-of-general-purpose-ai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-gpai-article-54-authorised-representatives-of-providers-of-general-purpose-ai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-act-gpai-article-55-obligations-for-providers-of-general-purpose-ai-models-with-systemic-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-data-and-model-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ai-risk-and-lifecycle-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/asianhallinta-ja-arkistointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/automatic-solution-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-1-2-manage-information-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-10-2-establish-and-maintain-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-6-1-detect-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-6-3-respond-to-cybersecurity-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-6-4-address-cybersecurity-in-continuity-of-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-8-3-assign-cybersecurity-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-access-1-establish-identities-and-manage-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-access-2-control-logical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-access-3-control-physical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-architecture-1-establish-and-maintain-cybersecurity-architecture-strategy-and-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-architecture-2-implement-network-protections-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-architecture-3-implement-it-and-ot-asset-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-architecture-4-implement-software-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-architecture-5-implement-data-security-as-an-element-of-the-cybersecurity-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-asset-1-manage-it-and-ot-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-asset-2-manage-information-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-asset-3-manage-it-and-ot-asset-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-asset-4-manage-changes-to-it-and-ot-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-asset-manage-it-and-ot-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-program-1-establish-cybersecurity-program-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-program-2-establish-and-maintain-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-response-1-detect-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-response-2-analyze-cybersecurity-events-and-declare-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-response-3-respond-to-cybersecurity-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-response-4-address-cybersecurity-in-continuity-of-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-risk-1-establish-and-maintain-cyber-risk-management-strategy-and-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-risk-2-identify-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-risk-3-analyze-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-risk-4-respond-to-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-situation-1-perform-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-situation-2-perform-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-third-parties-1-identify-and-prioritize-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-third-parties-2-manage-third-party-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-threat-1-reduce-cybersecurity-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-threat-2-respond-to-threats-and-share-threat-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-workforce-1-implement-workforce-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-workforce-2-increase-cybersecurity-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-workforce-3-assign-cybersecurity-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/c2m2-workforce-4-develop-cybersecurity-workforce</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a1-a-board-direction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a1-b-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a1-c-decision-making</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a2-a-internal-processes-for-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a2-b-understanding-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a2-c-assurance-of-security-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a3-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a4-a-supplier-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-a4-b-secure-software-development-and-support</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b1-a-policy-process-and-procedure-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b1-b-implementing-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b2-a-verification-and-authorization-of-system-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b2-b-device-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b2-c-privileged-user-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b2-d-identity-and-access-management-idam</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b3-a-understanding-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b3-b-data-in-transit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b3-c-stored-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b3-d-mobile-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b3-e-media-equipment-sanitisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b4-a-secure-by-design</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b4-b-secure-system-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b4-c-secure-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b4-d-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b5-a-resilience-preparation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b5-b-design-for-resilience</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b5-c-backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b6-a-cyber-security-culture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-b6-b-cyber-security-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-c1-a-logging-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-c1-b-securing-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-c1-c-generating-alerts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-c1-d-alert-contextualisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-c1-e-personnel-skills-for-monitoring-and-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-c1-f-operational-threat-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-c2-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-d1-a-response-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-d1-b-response-and-recovery-capability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-d1-c-testing-response-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-d2-a-post-incident-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/caf-40-d2-b-learning-from-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-12-1-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-12-2-risk-assessment-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-13-1-a-preventing-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-13-1-b-ensure-adequate-physical-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-13-1-c-responding-to-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-13-1-d-recovering-from-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-13-1-e-ensure-adequate-employee-security-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-13-1-f-raise-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-13-2-resilience-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-13-3-designated-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-14-1-background-checks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-14-2-rules-of-background-checks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-14-3-conducting-a-background-check</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cer-15-1-incident-notification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/changes-in-employment-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-1-1-establish-and-maintain-detailed-enterprise-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-1-2-address-unauthorized-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-1-3-utilize-an-active-discovery-tool</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-1-4-use-dynamic-host-configuration-protocol-dhcp-logging-to-update-enterprise-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-1-5-use-a-passive-asset-discovery-tool</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-10-1-deploy-and-maintain-anti-malware-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-10-2-configure-automatic-anti-malware-signature-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-10-3-disable-autorun-and-autoplay-for-removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-10-4-configure-automatic-anti-malware-scanning-of-removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-10-5-enable-anti-exploitation-features</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-10-6-centrally-manage-anti-malware-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-10-7-use-behavior-based-anti-malware-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-11-1-establish-and-maintain-a-data-recovery-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-11-2-perform-automated-backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-11-3-protect-recovery-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-11-4-establish-and-maintain-an-isolated-instance-of-recovery-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-11-5-test-data-recovery</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-12-1-ensure-network-infrastructure-is-up-to-date</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-12-2-establish-and-maintain-a-secure-network-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-12-3-securely-manage-network-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-12-4-establish-and-maintain-architecture-diagrams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-12-5-centralize-network-authentication-authorization-and-auditing-aaa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-12-6-use-of-secure-network-management-and-communication-protocols</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-12-7-ensure-remote-devices-utilize-a-vpn-and-are-connecting-to-an-enterprises-aaa-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-12-8-establish-and-maintain-dedicated-computing-resources-for-all-administrative-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-1-centralize-security-event-alerting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-10-perform-application-layer-filtering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-11-tune-security-event-alerting-thresholds</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-2-deploy-a-host-based-intrusion-detection-solution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-3-deploy-a-network-intrusion-detection-solution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-4-perform-traffic-filtering-between-network-segments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-5-manage-access-control-for-remote-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-6-collect-network-traffic-flow-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-7-deploy-a-host-based-intrusion-prevention-solution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-8-deploy-a-network-intrusion-prevention-solution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-13-9-deploy-port-level-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-1-establish-and-maintain-a-security-awareness-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-2-train-workforce-members-to-recognize-social-engineering-attacks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-3-train-workforce-members-on-authentication-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-4-train-workforce-on-data-handling-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-5-train-workforce-members-on-causes-of-unintentional-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-6-train-workforce-members-on-recognizing-and-reporting-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-7-train-workforce-on-how-to-identify-and-report-if-their-enterprise-assets-are-missing-security-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-8-train-workforce-on-the-dangers-of-connecting-to-and-transmitting-enterprise-data-over-insecure-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-14-9-conduct-role-specific-security-awareness-and-skills-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-15-1-establish-and-maintain-an-inventory-of-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-15-2-establish-and-maintain-a-service-provider-management-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-15-3-classify-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-15-4-ensure-service-provider-contracts-include-security-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-15-5-assess-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-15-6-monitor-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-15-7-securely-decommission-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-1-establish-and-maintain-a-secure-application-development-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-10-apply-secure-design-principles-in-application-architectures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-11-leverage-vetted-modules-or-services-for-application-security-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-12-implement-code-level-security-checks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-13-conduct-application-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-14-conduct-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-2-establish-and-maintain-a-process-to-accept-and-address-software-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-3-perform-root-cause-analysis-on-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-4-establish-and-manage-an-inventory-of-third-party-software-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-5-use-up-to-date-and-trusted-third-party-software-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-6-establish-and-maintain-a-severity-rating-system-and-process-for-application-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-7-use-standard-hardening-configuration-templates-for-application-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-8-separate-production-and-non-production-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-16-9-train-developers-in-application-security-concepts-and-secure-coding</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-1-designate-personnel-to-manage-incident-handling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-2-establish-and-maintain-contact-information-for-reporting-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-3-establish-and-maintain-an-enterprise-process-for-reporting-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-4-establish-and-maintain-an-incident-response-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-5-assign-key-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-6-define-mechanisms-for-communicating-during-incident-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-7-conduct-routine-incident-response-exercises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-8-conduct-post-incident-reviews</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-17-9-establish-and-maintain-security-incident-thresholds</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-18-1-establish-and-maintain-a-penetration-testing-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-18-2-perform-periodic-external-penetration-tests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-18-3-remediate-penetration-test-findings</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-18-4-validate-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-18-5-perform-periodic-internal-penetration-tests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-2-1-establish-and-maintain-a-software-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-2-2-ensure-authorized-software-is-currently-supported</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-2-3-address-unauthorized-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-2-4-utilize-automated-software-inventory-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-2-5-allowlist-authorized-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-2-6-allowlist-authorized-libraries</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-2-7-allowlist-authorized-scripts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-1-establish-and-maintain-a-data-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-10-encrypt-sensitive-data-in-transit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-11-encrypt-sensitive-data-at-rest</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-12-segment-data-processing-and-storage-based-on-sensitivity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-13-deploy-a-data-loss-prevention-solution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-14-log-sensitive-data-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-2-establish-and-maintain-a-data-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-3-configure-data-access-control-lists</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-4-enforce-data-retention</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-5-securely-dispose-of-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-6-encrypt-data-on-end-user-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-7-establish-and-maintain-a-data-classification-scheme</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-8-document-data-flows</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-3-9-encrypt-data-on-removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-1-establish-and-maintain-a-secure-configuration-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-10-enforce-automatic-device-lockout-on-portable-end-user-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-11-enforce-remote-wipe-capability-on-portable-end-user-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-12-separate-enterprise-workspaces-on-mobile-end-user-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-2-establish-and-maintain-a-secure-configuration-process-for-network-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-3-configure-automatic-session-locking-on-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-4-implement-and-manage-a-firewall-on-servers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-5-implement-and-manage-a-firewall-on-end-user-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-6-securely-manage-enterprise-assets-and-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-7-manage-default-accounts-on-enterprise-assets-and-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-8-uninstall-or-disable-unnecessary-services-on-enterprise-assets-and-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-4-9-configure-trusted-dns-servers-on-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-5-1-establish-and-maintain-an-inventory-of-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-5-2-use-unique-passwords</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-5-3-disable-dormant-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-5-4-restrict-administrator-privileges-to-dedicated-administrator-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-5-5-establish-and-maintain-an-inventory-of-service-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-5-6-centralize-account-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-6-1-establish-an-access-granting-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-6-2-establish-an-access-revoking-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-6-3-require-mfa-for-externally-exposed-applications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-6-4-require-mfa-for-remote-network-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-6-5-require-mfa-for-administrative-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-6-6-establish-and-maintain-an-inventory-of-authentication-and-authorization-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-6-7-centralize-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-6-8-define-and-maintain-role-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-7-1-establish-and-maintain-a-vulnerability-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-7-2-establish-and-maintain-a-remediation-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-7-3-perform-automated-operating-system-patch-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-7-4-perform-automated-application-patch-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-7-5-perform-automated-vulnerability-scans-of-internal-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-7-6-perform-automated-vulnerability-scans-of-externally-exposed-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-7-7-remediate-detected-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-1-establish-and-maintain-an-audit-log-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-10-retain-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-11-conduct-audit-log-reviews</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-12-collect-service-provider-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-2-collect-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-3-ensure-adequate-audit-log-storage</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-4-standardize-time-synchronization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-5-collect-detailed-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-6-collect-dns-query-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-7-collect-url-request-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-8-collect-command-line-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-8-9-centralize-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-9-1-ensure-use-of-only-fully-supported-browsers-and-email-clients</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-9-2-use-dns-filtering-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-9-3-maintain-and-enforce-network-based-url-filters</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-9-4-restrict-unnecessary-or-unauthorized-browser-and-email-client-extensions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-9-5-implement-dmarc</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-9-6-block-unnecessary-file-types</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cis-18-9-7-deploy-and-maintain-email-server-anti-malware-protections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cld-9-5-access-control-of-cloud-service-customer-data-in-shared-virtual-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cloud-service-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/continuity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-12-1-high-risk-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-1-appropriate-level-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-a-known-exploitable-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-b-secure-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-c-addressing-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-d-protection-from-unauthorised-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-e-confidentiality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-f-integrity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-g-data-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-h-availability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-i-minimizing-the-negative-impact</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-j-limit-attack-surfaces</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-k-reducing-the-impact-of-an-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-l-providing-security-related-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-1-2-m-removing-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-10-modified-versions-of-a-software-product</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-11-public-software-archive</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-12-technical-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-13-digital-product-documentation-retention</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-14-conformity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-15-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-16-manufacturers-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-17-single-point-of-contact</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-18-information-and-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-19-support-period</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-2-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-20-declaration-of-conformity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-21-non-comformities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-22-conformity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-23-ceasing-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-3-documenting-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-4-risk-assessment-in-technical-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-5-due-diligence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-6-vulnerabilities-in-third-party-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-7-documenting-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-8-support</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-13-9-security-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-14-1-2-reporting-obligations-of-manufacturers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-14-3-4-incident-notification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-15-1-vulnerability-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-15-2-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-17-2-informing-the-public</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-23-identification-of-economic-operators</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-article-25-security-attestation-of-free-and-open-source-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-vuln-1-identifying-and-documenting-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-vuln-2-address-and-remediate-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-vuln-3-effective-and-regular-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-vuln-4-disclosing-information-about-fixed-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-vuln-5-coordinated-vulnerability-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-vuln-6-sharing-information-about-potential-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-vuln-7-distributing-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cra-vuln-8-obligation-to-provide-security-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-10-technical-measures-and-other-necessary-measures-to-ensure-secure-and-stable-network-operation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-11-industrial-self-discipline</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-14-right-to-report-behaviors-that-endanger-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-21-ensuring-the-network-is-free-from-interference-damage-or-unauthorized-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-22-1-compliance-with-national-cybersecurity-standards</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-22-2-obligations-for-ongoing-security-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-22-3-collection-and-protection-of-users-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-23-critical-network-and-specialized-cybersecurity-product-security-certification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-24-provision-of-real-identity-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-25-contingency-plans-for-cybersecurity-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-26-cybersecurity-authentication-detection-and-risk-evaluation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-27-individual-and-organizational-obligations-in-cases-of-activities-endangering-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-28-technical-support-and-assistance-to-public-security-organs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-29-cybersecurity-cooperation-among-network-operators</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-33-continuous-operation-of-critical-information-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-34-1-establish-independent-security-management-institutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-34-2-conduct-cybersecurity-education-and-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-34-3-disaster-recovery-backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-34-4-formulating-and-testing-contingency-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-34-5-fulfilling-other-legal-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-36-confidentiality-agreements-when-purchasing-network-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-37-storage-of-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-38-cybersecurity-risk-and-detection-reporting-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-40-user-confidentiality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-41-collection-and-usage-of-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-42-1-protection-and-lawful-use-of-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-42-2-security-measures-and-breach-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-43-individual-right-to-request-corrections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-46-network-use-responsibility</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-47-strengthening-the-management-of-information-published-by-network-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-48-security-administration-duties-for-electronic-information-distribution-and-application-download-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-49-complaint-and-reporting-systems-for-network-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-55-activation-of-contingency-plans-for-cybersecurity-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-56-measures-to-effect-rectification-and-eliminate-hidden-dangers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csl-china-article-9-cybersecurity-protection-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csv-art-10-dienstleister</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csv-art-11-ubermittlung-und-nutzung-der-informationen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csv-art-13-einreichung-von-unterlagen-zur-abklarung-der-meldepflicht</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csv-art-14-zu-meldende-cyberangriffe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csv-art-15-inhalt-der-meldung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csv-art-16-frist-zur-erfassung-der-meldung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csv-art-8-sichere-und-automatisierte-informationsaustauschsysteme</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/csv-art-9-registrierung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-fwl-01-firewall-administration-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-fwl-02-documenting-and-managing-the-firewall-administration-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-fwl-03-host-based-firewall-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-mwp-01-keeping-anti-malware-software-up-to-date</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-mwp-02-automatic-file-scan-by-anti-malware-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-mwp-03-automatic-website-scan-by-anti-malware-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-mwp-04-blocking-connections-to-malicious-websites</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-mwp-05-whitelisting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-mwp-06-safe-running-of-unknown-code</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-mwp-application-allow-listing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-mwp-application-sandboxing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sec-01-unnecessary-user-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sec-02-changing-default-passwords</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sec-03-removing-unnecessary-software-and-network-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sec-04-disabling-auto-run-of-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sec-05-remote-access-user-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sec-06-reviewing-password-practices-on-password-protected-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sec-07-password-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sum-01-managing-licensed-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sum-02-keeping-licensed-software-up-to-date</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-sum-security-update-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-uac-01-user-account-creation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-uac-02-user-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-uac-03-disabling-unnecessary-user-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-uac-04-two-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-uac-05-administrative-account-usage</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-essentials-uac-06-managing-user-privileges</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-security-in-contracts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-security-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyber-security-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-ae-1-a-baseline-of-network-operations-and-expected-data-flows-for-users-and-systems-is-established-and-managed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-ae-2-detected-events-are-analysed-to-understand-attack-targets-and-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-ae-3-event-data-are-collected-and-correlated-from-multiple-sources-and-sensors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-ae-4-impact-of-events-is-determined</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-ae-5-incident-alert-thresholds-are-established</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-cm-1-the-network-is-monitored-to-detect-potential-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-cm-2-the-physical-environment-is-monitored-to-detect-potential-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-cm-3-personnel-activity-is-monitored-to-detect-potential-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-cm-4-malicious-code-is-detected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-cm-5-unauthorized-mobile-code-is-detected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-cm-6-external-service-provider-activity-is-monitored-to-detect-potential-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-cm-7-monitoring-for-unauthorized-personnel-connections-devices-and-software-is-performed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-cm-8-vulnerability-scans-are-performed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-dp-2-detection-activities-comply-with-all-applicable-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-dp-3-detection-processes-are-tested</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-dp-4-event-detection-information-is-communicated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-de-dp-5-detection-processes-are-continuously-improved</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-am-1-physical-devices-and-systems-used-within-the-organization-are-inventoried</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-am-2-software-platforms-and-applications-used-within-the-organization-are-inventoried</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-am-3-organizational-communication-and-data-flows-are-mapped</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-am-4-external-information-systems-are-catalogued</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-am-5-resources-are-prioritized-based-on-their-classification-criticality-and-business-value</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-am-6-cybersecurity-roles-responsibilities-and-authorities-for-the-entire-workforce-and-third-party-stakeholders-e-g-suppliers-customers-partners-are-established</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-be-1-the-organizations-role-in-the-supply-chain-is-identified-and-communicated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-be-2-the-organizations-place-in-critical-infrastructure-and-its-industry-sector-is-identified-and-communicated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-be-3-priorities-for-organizational-mission-objectives-and-activities-are-established-and-communicated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-be-4-dependencies-and-critical-functions-for-delivery-of-critical-services-are-established</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-be-5-resilience-requirements-to-support-delivery-of-critical-services-are-established-for-all-operating-states-e-g-under-duressattack-during-recovery-normal-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-gv-1-organizational-cybersecurity-policy-is-established-and-communicated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-gv-3-legal-and-regulatory-requirements-regarding-cybersecurity-including-privacy-and-civil-liberties-obligations-are-understood-and-managed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-gv-4-governance-and-risk-management-processes-address-cybersecurity-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-ra-1-asset-vulnerabilities-are-identified-and-documented</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-ra-2-cyber-threat-intelligence-is-received-from-information-sharing-forums-and-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-ra-5-threats-vulnerabilities-likelihoods-and-impacts-are-used-to-determine-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-ra-6-risk-responses-are-identified-and-prioritized</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-rm-1-risk-management-processes-are-established-managed-and-agreed-to-by-organizational-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-rm-2-organizational-risk-tolerance-is-determined-and-clearly-expressed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-rm-3-the-organizations-determination-of-risk-tolerance-is-informed-by-its-role-in-critical-infrastructure-and-sector-specific-risk-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-sc-1-cyber-supply-chain-risk-management-processes-are-identified-established-assessed-managed-and-agreed-to-by-organizational-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-sc-2-suppliers-and-third-party-partners-of-information-systems-components-and-services-are-identified-prioritized-and-assessed-using-a-cyber-supply-chain-risk-assessment-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-sc-3-contracts-with-suppliers-and-third-party-partners-are-used-to-implement-appropriate-measures-designed-to-meet-the-objectives-of-an-organizations-cybersecurity-program-and-cyber-supply-chain-risk-management-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-sc-4-suppliers-and-third-party-partners-are-routinely-assessed-using-audits-test-results-or-other-forms-of-evaluations-to-confirm-they-are-meeting-their-contractual-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-id-sc-5-response-and-recovery-planning-and-testing-are-conducted-with-suppliers-and-third-party-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ac-1-identities-and-credentials-are-issued-managed-verified-revoked-and-audited-for-authorized-devices-users-and-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ac-2-physical-access-to-assets-is-managed-and-protected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ac-3-remote-access-is-managed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ac-4-access-permissions-and-authorizations-are-managed-incorporating-the-principles-of-least-privilege-and-separation-of-duties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ac-5-network-integrity-network-segregation-network-segmentation-is-protected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ac-6-identities-are-proofed-and-bound-to-credentials-and-asserted-in-interactions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ac-7-identities-are-proofed-bound-to-credentials-and-asserted-in-interactions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-at-1-all-users-are-informed-and-trained</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-at-2-privileged-users-understand-their-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-at-3-third-party-stakeholders-e-g-suppliers-customers-partners-understand-their-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-at-4-senior-executives-understand-their-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-at-5-physical-security-and-cybersecurity-personnel-understand-their-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ds-1-data-at-rest-is-protected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ds-2-data-in-transit-is-protected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ds-3-assets-are-formally-managed-throughout-removal-transfers-and-disposition</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ds-4-adequate-capacity-to-ensure-availability-is-maintained</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ds-5-protections-against-data-leaks-are-implemented</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ds-6-integrity-checking-mechanisms-are-used-to-verify-software-firmware-and-information-integrity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ds-7-the-development-and-testing-environments-are-separate-from-the-production-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ds-8-integrity-checking-mechanisms-are-used-to-verify-hardware-integrity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-1-a-baseline-configuration-of-information-technologyindustrial-control-systems-is-created-and-maintained-incorporating-security-principles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-11-cybersecurity-is-included-in-human-resources-practices-deprovisioning-personnel-screening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-12-a-vulnerability-management-plan-is-developed-and-implemented</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-2-a-system-development-life-cycle-to-manage-systems-is-implemented</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-3-configuration-change-control-processes-are-in-place</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-4-backups-of-information-are-conducted-maintained-and-tested</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-5-policy-and-regulations-regarding-the-physical-operating-environment-for-organizational-assets-are-met</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-6-data-is-destroyed-according-to-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-7-protection-processes-are-improved</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-8-effectiveness-of-protection-technologies-is-shared</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ip-9-response-plans-incident-response-and-business-continuity-and-recovery-plans-incident-recovery-and-disaster-recovery-are-in-place-and-managed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ma-1-maintenance-and-repair-of-organizational-assets-are-performed-and-logged-with-approved-and-controlled-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-ma-2-remote-maintenance-of-organizational-assets-is-approved-logged-and-performed-in-a-manner-that-prevents-unauthorized-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-pt-1-auditlog-records-are-determined-documented-implemented-and-reviewed-in-accordance-with-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-pt-2-removable-media-is-protected-and-its-use-restricted-according-to-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-pt-3-the-principle-of-least-functionality-is-incorporated-by-configuring-systems-to-provide-only-essential-capabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-pr-pt-4-communications-and-control-networks-are-protected-web-and-e-mail-filters-shall-be-installed-and-used</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rc-co-1-public-relations-are-managed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rc-co-2-reputation-is-repaired-after-an-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rc-co-3-recovery-activities-are-communicated-to-internal-and-external-stakeholders-as-well-as-executive-and-management-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rc-im-1-recovery-plans-incorporate-lessons-learned</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rc-im-2-recovery-strategies-are-updated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rc-rp-1-recovery-plan-is-executed-during-or-after-a-cybersecurity-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-an-1-notifications-from-detection-systems-are-investigated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-an-2-the-impact-of-the-incident-is-understood</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-an-3-forensics-are-performed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-an-4-incidents-are-categorized-consistent-with-response-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-an-5-processes-are-established-to-receive-analyse-and-respond-to-vulnerabilities-disclosed-to-the-organization-from-internal-and-external-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-co-1-personnel-know-their-roles-and-order-of-operations-when-a-response-is-needed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-co-2-incidents-are-reported-consistent-with-established-criteria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-co-3-information-is-shared-consistent-with-response-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-co-4-coordination-with-stakeholders-occurs-consistent-with-response-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-co-5-voluntary-information-sharing-occurs-with-external-stakeholders-to-achieve-broader-cybersecurity-situational-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-im-1-response-plans-incorporate-lessons-learned</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-im-2-response-and-recovery-strategies-are-updated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-mi-1-incidents-are-contained</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-mi-2-incidents-are-mitigated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-mi-3-newly-identified-vulnerabilities-are-mitigated-or-documented-as-accepted-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/cyberfundamentals-rs-rp-1-response-plan-is-executed-during-or-after-an-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/data-breach-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/data-classification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/data-system-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/data-system-procurement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/data-transfer-and-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/de-ae-anomalies-and-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/de-cm-security-continuous-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/de-detect</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/de-dp-detection-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/development-and-cloud</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-1-tehtavat-ja-vastuut</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-10-prosessi-vaarinkaytoksiin-reagoimiseksi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-11-digiturvan-mittarien-maarittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-12-digiturvan-tilan-seuraaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-13-digiturvan-kokonaistilanteen-raportointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-14-riskienhallinnan-linjaukset-ja-prosessi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-15-digiturvan-saannollinen-riskienarviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-16-organisaationlaajuinen-viestinta-riskitilanteesta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-17-riskitilanteen-raportointi-johdolle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-18-kriittisten-riskien-raportointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-19-riskienhallinan-tilanteen-seuraaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-2-lainsaadanto-ja-velvoitteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-20-jaannosriskien-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-21-riskienhallintaprosessin-kehittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-22-organisaation-tehtavat-ja-vastuut-poikkeustilanteissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-23-hairioiden-ja-poikkeamienhallintaprosessi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-24-jatkuvuudenhallinnan-kuvaus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-25-suojattavien-kohteiden-tunnistaminen-ja-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-26-kriittisten-toimintojen-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-27-siedettavien-toimintakatkoksien-maarittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-28-palvelutasovaatimukset-sopimuksissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-29-jatkuvuuteen-liittyvien-riskien-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-3-keskeisten-sidos-ja-asiakasryhmien-kartoitus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-30-riskeihin-perustuvat-jatkuvuussuunnitelmat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-31-toipumissuunnitelmat-kriittisille-jarjestelmille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-32-viestintasuunnitelma-hairio-ja-kriisitilanteisiin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-33-hairiotilanteiden-suunnitelmien-kouluttaminen-henkilostolle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-34-sidosryhmien-valisen-viestinnan-mahdollistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-35-hairioiden-ilmoittaminen-viranomaisille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-36-hairiotilanteiden-saannollinen-harjoittelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-37-suunnitelmien-paivittaminen-kokemusten-pohjalta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-38-hyvaksytty-tietoturvapolitiikka</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-39-henkiloiden-taustatarkistusmenettely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-4-riittava-osaavan-henkiloston-maara</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-40-kayttovaltuuspolitiikka-ja-prosessi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-41-kayttovaltuuksien-ajantasaisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-42-turvallisuusalueiden-maarittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-43-tietojarjestelmien-ja-laitteiden-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-44-monivaiheinen-tunnistus-etakaytossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-45-ulkopuoliset-yhteyden-vpn-yhteydella</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-46-haittalohjelmien-torjunta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-47-tietojen-ja-jarjestelmien-varmuuskopiointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-48-palautettavien-varmuuskopioiden-testaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-49-tietojarjestelmien-lokitietojen-kerays</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-5-riittava-digiturvallisuuden-budjetti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-50-teknisten-haavoittuvuuksien-seuranta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-51-tietoturvallisuuden-auditointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-52-tietoturva-ja-tietousojavaatimukset-hankintavaatimuksissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-53-tietoturva-ja-tietousojavaatimusten-huomiointi-kehityksessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-54-tietoisuus-kasitellyista-henkilotiedoista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-55-henkilotietojen-kasittelyn-oikeusperusteiden-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-56-organisaation-roolin-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-57-henkilotietojen-kasittelysopimukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-58-yhteisrekisterinpitajyystilanteiden-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-59-henkilotietojen-kasittelyn-roolit-ja-vastuut</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-6-organisaation-johdon-sitoutuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-60-tietosuojavastaavan-asema-ja-rooli</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-61-seloste-kasittelytoiminnasta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-62-henkilotietojen-kasittelyssa-kaytettyjen-jarjestelmien-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-63-rakenteettoman-tiedon-tunnistaminen-ja-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-64-informointikaytantojen-maarittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-65-vaikutustenarvioinnin-tarpeen-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-66-tietoturvaloukkausten-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-67-tietojen-kolmansiin-maihin-siirtamisen-edellytyksien-selvittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-68-tietosuojan-tila-organisaatiossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-69-digiturvan-huomiointi-osana-kokonaisuutta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-7-digiturvan-osa-alueiden-jarjestelmallinen-kehittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-70-riittavat-resurssit-digiturvan-kehittamiseen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-71-organisaation-roolin-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-72-organisaation-kriittisten-palveluiden-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-73-kriittisten-palveluiden-riippuvuudet-palvelutoimittajista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-74-kriittisten-palveluiden-riskien-arviointi-ja-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-75-digiturvallisuusyhteistyo-kriittisten-toimittajien-ja-alihankkjoiden-kanssa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-76-varautuminen-informaatiovaikuttamiseen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-77-menettely-toimintaympariston-seuraamiseen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-8-henkiloston-ohjeistaminen-digiturvasta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/digiturvan-kokonaiskuvapalvelu-9-henkiloston-digiturvakoulutukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-10-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-11-response-and-recovery</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-12-backup-policies-and-procedures-restoration-and-recovery-procedures-and-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-13-learning-and-evolving</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-14-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-17-ict-related-incident-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-18-classification-of-ict-related-incidents-and-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-19-reporting-of-major-ict-related-incidents-and-voluntary-notification-of-significant-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-24-general-requirements-for-the-performance-of-digital-operational-resilience-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-25-testing-of-ict-tools-and-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-26-advanced-testing-of-ict-tools-systems-and-processes-based-on-tlpt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-27-requirements-for-testers-for-the-carrying-out-of-tlpt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-28-general-principles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-29-preliminary-assessment-of-ict-concentration-risk-at-entity-level</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-30-key-contractual-provisions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-45-information-sharing-arrangements-on-cyber-threat-information-and-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-5-governance-and-organisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-6-ict-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-7-ict-systems-protocols-and-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-8-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-9a-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-article-9b-prevention</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-chapter-vi-information-sharing-arrangements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-28-governance-and-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-29-information-security-policy-and-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-30-classification-of-information-assets-and-ict-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-31-ict-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-32-physical-and-environmental-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-33-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-34-ict-operations-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-35-data-system-and-network-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-36-ict-security-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-37-ict-systems-acquisition-development-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-38-ict-project-and-change-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-39-components-of-the-ict-business-continuity-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-40-testing-of-business-continuity-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/dora-simplified-rmf-article-41-format-and-content-of-the-report-on-the-review-of-the-simplified-ict-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/email-and-phishing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/email-and-web-browser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/encryption</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-10-ledelsesorganets-forpligtelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-104-fortrolige-oplysninger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-105-digital-kommunikation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-11-koordinator-for-beredskab-cyberkoordinator-og-sikringskoordinatorer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-113-samordnet-beredskab</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-12-politik-for-risikostyring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-13-forretningskontinuitet-og-planlaegning-af-haendelsesstyring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-14-fortegnelser-over-anlaeg</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-15-fortegnelser-af-netvaerk-og-informationssystemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-16-fortegnelse-over-fysiske-og-digitale-informationsstromme</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-18-risiko-og-sarbarhedsvurdering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-19-3-vaesentlige-procedurer-for-handtering-af-haendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-19-beredskabs-og-krisestyringsplaner</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-20-femarige-ovelsesplan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-21-beredskabsovelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-22-funktionstests-af-teknisk-udstyr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-23-ovelsesevalueringen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-24-ledertraening-i-sikkerhed-og-beredskab</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-25-medarbejderkompetence-og-traening-inden-for-sikkerhedsomrader</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-26-arlige-awareness-tiltag</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-27-risikovurdering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-28-godkendelse-af-risikovurderinger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-29-procedurer-for-sikkerhed-i-forsyningskaeden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-30-krav-til-sikkerhed-i-forsyningskaeden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-31-fjernadgang</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-32-leverandoraftale</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-33-krav-til-it-sikkerhedstjenester-og-samarbejde</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-34-handtering-af-haendelser-med-it-sikkerhedstjeneste</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-35-deling-af-oplysninger-om-sarbarheder-og-haendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-36-fysiske-anlaegs-modstandsdygtighed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-37-kontrolleret-adgang-til-faciliteter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-38-sikkerhedsforanstaltninger-mod-uautoriseret-fysisk-adgang</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-39-procedurer-for-handtering-af-alarmer-og-rapportering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-40-kontrol-og-dokumentation-af-sikkerhedsforanstaltninger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-43-sikkerhedsforanstaltninger-for-ikke-klassificerede-kritiske-lokationer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-44-politik-for-informationssystemsikkerhed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-45-sikker-anskaffelse-og-udvikling-af-systemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-46-sikker-konfiguration-og-patchhandtering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-47-identifikation-reaktion-og-afbodning-af-sarbarheder</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-48-styring-af-software-og-hardwareaktiver</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-49-procedurer-for-sikker-systemkonfiguration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-50-krav-til-data-lokation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-51-politik-for-adgangskontrol</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-52-styring-af-identiteter-og-adgange</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-53-anvendelse-af-multifaktorautentificering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-54-styring-af-adgangselementer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-55-sikring-af-fjernadgange</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-56-styring-af-mobile-og-stationaere-enheder</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-57-overholdelse-og-korrigerende-handlinger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-58-politik-for-backup-styring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-59-backup-af-kritiske-systemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-60-anvendelse-af-kryptografi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-61-sikker-kommunikation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-62-netvaerkssegmentering-af-kritiske-systemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-63-netvaerksdokumentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-64-logpolitik</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-6566-implementering-af-logning-og-monitorering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-67-beskyttelse-af-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-68-reagering-pa-uregelmaessigheder-i-realtid</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-69-logplanlaegning-og-overvagning-til-haendelsesrespons</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-70-regelmaessig-verifikation-af-logintegritet-og-brugbarhed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-71-politik-og-procedurer-for-sikkerhedsevaluering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-72-handtering-af-sikkerhedshaendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-73-operationelt-kontaktpunkt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-74-opretholdelse-af-kommunikation-under-haendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-75-underretninger-om-haendelser-til-modtagere-af-tjenester</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-76-underretninger-om-cybertrusler-til-modtagere-af-tjenester</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-77-rapportering-af-vaesentlige-haendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-78-rapporteringsprocessen-for-vaesentlige-haendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-79-forpligtelser-ved-rapportering-af-haendelserindberetningslosninger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/energisektor-beredskabsbekendtgrelse-ss-80-anmeldelse-til-politiet-og-forsvaret</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/environmental</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/equipment-maintenance-and-safety</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/esg</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-10-processing-of-personal-data-relating-to-criminal-convictions-and-offences</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-12-transparent-information-communication-and-modalities-for-the-exercise-of-the-rights-of-the-data-subject</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-13-information-to-be-provided-where-personal-data-are-collected-from-the-data-subject</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-14-information-to-be-provided-where-personal-data-have-not-been-obtained-from-the-data-subject</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-15-right-of-access-by-the-data-subject</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-16-right-to-rectification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-17-right-to-erasure-right-to-be-forgotten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-18-right-to-restriction-of-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-19-notification-obligation-regarding-rectification-or-erasure-of-personal-data-or-restriction-of-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-20-right-to-data-portability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-21-right-to-object</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-22-automated-individual-decision-making-including-profiling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-23-restrictions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-24-responsibility-of-the-controller</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-25-data-protection-by-design-and-by-default</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-26-joint-controllers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-27-representatives-of-controllers-or-processors-not-established-in-the-union</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-28-data-processor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-29-processing-under-the-authority-of-the-controller-or-processor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-30-records-of-processing-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-32-security-of-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-33-notification-of-a-personal-data-breach-to-the-supervisory-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-34-communication-of-a-personal-data-breach-to-the-data-subject</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-35-data-protection-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-36-prior-consultation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-37-designation-of-the-data-protection-officer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-38-position-of-the-data-protection-officer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-39-tasks-of-the-data-protection-officer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-44-general-principle-for-transfers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-45-transfers-on-the-basis-of-an-adequacy-decision</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-46-transfers-subject-to-appropriate-safeguards</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-47-binding-corporate-rules</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-48-transfers-or-disclosures-not-authorised-by-union-law</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-49-derogations-for-specific-situations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-5-principles-relating-to-processing-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-6-lawfulness-of-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-7-conditions-for-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-8-conditions-applicable-to-childs-consent-in-relation-to-information-society-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-9-processing-of-special-categories-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/gdpr-transfers-of-personal-data-to-third-countries-or-international-organisations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/governance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/hallinnollinen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/henkiloston-ohjeistus-ja-koulutus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/henkilostoturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iacs-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/id-am-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/id-be-business-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/id-gv-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/id-identify</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/id-ra-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/id-rm-risk-management-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/id-sc-supply-chain-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/incident-management-and-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/informing-and-data-subject-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/interoperability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-10-1-1-policy-on-the-use-of-cryptographic-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-10-1-2-key-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-10-1-continual-improvement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-10-1-cryptographic-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-10-2-non-conformity-and-corrective-action</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-10-cryptography</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-1-1-physical-security-perimeter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-1-2-physical-entry-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-1-3-securing-offices-rooms-and-facilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-1-4-protecting-against-external-and-environmental-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-1-5-working-in-secure-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-1-6-delivery-and-loading-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-1-equipment-siting-and-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-2-supporting-utilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-3-cabling-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-4-equipment-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-5-removal-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-6-security-of-equipment-and-assets-off-premises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-7-secure-disposal-or-re-use-of-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-8-unattended-user-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-11-2-9-clear-desk-and-clear-screen-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-1-1-documented-operating-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-1-2-change-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-1-3-capacity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-1-4-separation-of-development-testing-and-operational-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-2-1-controls-against-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-2-protection-from-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-3-1-information-backup</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-3-backup</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-4-1-event-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-4-2-protection-of-log-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-4-3-administrator-and-operator-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-4-4-clock-synchronisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-5-1-installation-of-software-on-operational-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-5-control-of-operational-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-6-1-management-of-technical-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-6-2-restrictions-on-software-installation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-7-1-information-systems-audit-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-12-7-information-systems-audit-considerations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-13-1-1-network-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-13-1-2-security-of-network-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-13-1-3-segregation-in-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-13-2-1-information-transfer-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-13-2-2-agreements-on-information-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-13-2-3-electronic-messaging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-13-2-4-confidentiality-or-non-disclosure-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-1-1-information-security-requirements-analysis-and-specification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-1-2-securing-application-services-on-public-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-1-3-protecting-application-services-transactions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-1-secure-development-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-2-system-change-control-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-3-technical-review-of-applications-after-operating-platform-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-4-restrictions-on-changes-to-software-packages</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-5-secure-system-engineering-principles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-6-secure-development-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-7-outsourced-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-8-system-security-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-2-9-system-acceptance-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-3-1-protection-of-test-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-14-3-test-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-15-1-1-information-security-policy-for-supplier-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-15-1-2-addressing-security-within-supplier-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-15-1-3-information-and-communication-technology-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-15-2-1-monitoring-and-review-of-supplier-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-15-2-2-managing-changes-to-supplier-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-16-1-1-responsibilities-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-16-1-2-reporting-information-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-16-1-3-reporting-information-security-weaknesses</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-16-1-4-assessment-of-and-decision-on-information-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-16-1-5-response-to-information-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-16-1-6-learning-from-information-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-16-1-7-collection-of-evidence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-17-1-1-planning-information-security-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-17-1-2-implementing-information-security-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-17-1-3-verify-review-and-evaluate-information-security-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-18-1-1-identification-of-applicable-legislation-and-contractual-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-18-1-2-intellectual-property-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-18-1-3-protection-of-records</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-18-1-4-privacy-and-protection-of-personally-identifiable-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-18-1-5-regulation-of-cryptographic-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-18-2-1-independent-review-of-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-18-2-2-compliance-with-security-policies-and-standards</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-18-2-3-technical-compliance-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-4-1-organization-and-its-context</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-4-2-interested-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-4-3-scope-of-the-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-4-4-information-security-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-1-1-policies-for-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-1-2-review-of-the-policies-for-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-1-leadership-and-commitment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-1-management-direction-for-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-1-policies-for-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-10-acceptable-use-of-information-and-other-associated-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-11-return-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-12-classification-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-13-labelling-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-14-information-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-15-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-16-identity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-17-authentication-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-18-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-19-information-security-in-supplier-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-2-information-security-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-2-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-20-addressing-information-security-within-supplier-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-21-managing-information-security-in-the-ict-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-22-monitoring-review-and-change-management-of-supplier-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-23-information-security-for-use-of-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-24-information-security-incident-management-planning-and-preparation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-25-assessment-and-decision-on-information-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-26-response-to-information-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-27-learning-from-information-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-28-collection-of-evidence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-29-information-security-during-disruption</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-3-organizational-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-3-segregation-of-duties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-30-ict-readiness-for-business-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-31-legal-statutory-regulatory-and-contractual-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-32-intellectual-property-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-33-protection-of-records</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-34-privacy-and-protection-of-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-35-independent-review-of-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-36-compliance-with-policies-rules-and-standards-for-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-37-documented-operating-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-4-management-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-5-contact-with-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-6-contact-with-special-interest-groups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-7-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-8-information-security-in-project-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-9-inventory-of-information-and-other-associated-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-5-information-security-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-1-1-information-security-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-1-2-segregation-of-duties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-1-3-contact-with-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-1-4-contact-with-special-interest-groups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-1-5-information-security-in-project-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-1-information-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-1-screening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-2-1-mobile-device-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-2-2-teleworking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-2-information-security-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-2-terms-and-conditions-of-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-3-information-security-awareness-education-and-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-3-planning-of-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-4-disciplinary-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-5-responsibilities-after-termination-or-change-of-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-6-confidentiality-or-non-disclosure-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-7-remote-working</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-6-8-information-security-event-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-1-1-screening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-1-2-terms-and-conditions-of-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-1-physical-security-perimeters</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-1-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-10-storage-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-11-supporting-utilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-12-cabling-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-13-equipment-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-14-secure-disposal-or-re-use-of-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-2-1-management-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-2-2-information-security-awareness-education-and-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-2-3-disciplinary-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-2-competence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-2-physical-entry</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-3-1-termination-or-change-of-employment-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-3-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-3-securing-offices-rooms-and-facilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-3-termination-and-change-of-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-4-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-4-physical-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-5-protecting-against-physical-and-environmental-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-5-requirements-for-documented-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-6-working-in-secure-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-7-clear-desk-and-clear-screen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-8-equipment-siting-and-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-7-9-security-of-assets-off-premises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-1-1-inventory-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-1-2-ownership-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-1-3-acceptable-use-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-1-4-return-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-1-operational-planning-and-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-1-user-endpoint-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-10-information-deletion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-11-data-masking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-12-data-leakage-prevention</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-13-information-backup</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-14-redundancy-of-information-processing-facilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-15-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-16-monitoring-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-17-clock-synchronization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-18-use-of-privileged-utility-programs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-19-installation-of-software-on-operational-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-2-1-classification-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-2-2-labelling-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-2-3-handling-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-2-information-classification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-2-information-security-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-2-privileged-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-20-networks-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-21-security-of-network-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-22-segregation-of-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-23-web-filtering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-24-use-of-cryptography</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-25-secure-development-life-cycle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-26-application-security-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-27-secure-system-architecture-and-engineering-principles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-28-secure-coding</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-29-security-testing-in-development-and-acceptance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-3-1-management-of-removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-3-2-disposal-of-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-3-3-physical-media-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-3-information-access-restriction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-3-information-security-risk-treatment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-30-outsourced-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-31-separation-of-development-test-and-production-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-32-change-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-33-test-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-34-protection-of-information-systems-during-audit-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-4-access-to-source-code</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-5-secure-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-6-capacity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-7-protection-against-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-8-management-of-technical-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-8-9-configuration-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-1-1-access-control-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-1-2-access-to-networks-and-network-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-1-business-requirements-of-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-1-monitoring-measurement-analysis-and-evaluation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-2-1-user-registration-and-de-registration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-2-2-user-access-provisioning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-2-3-management-of-privileged-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-2-4-management-of-secret-authentication-information-of-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-2-5-review-of-user-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-2-6-removal-or-adjustment-of-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-2-internal-audit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-3-1-use-of-secret-authentication-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-3-management-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-3-user-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-4-1-information-access-restriction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-4-2-secure-log-on-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-4-3-password-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-4-4-use-of-privileged-utility-programs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27001-9-4-5-access-control-to-program-source-code</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-10-1-2-key-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-10-1-cryptographic-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-10-cryptography</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-11-2-7-secure-disposal-or-re-use-of-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-11-2-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-11-physical-and-environmental-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-13-1-3-segregation-in-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-13-communications-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-15-1-2-addressing-security-within-supplier-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-15-1-3-information-and-communication-technology-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-15-1-information-security-in-supplier-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-15-supplier-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-16-1-2-reporting-information-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-16-1-management-of-information-security-incidents-and-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-16-information-security-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-18-1-2-intellectual-property-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-18-1-5-regulation-of-cryptographic-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-18-1-compliance-with-legal-and-contractual-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-18-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-6-1-3-contact-with-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-6-1-4-contact-with-special-interest-groups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-6-1-internal-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-6-organization-of-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-8-1-1-inventory-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-8-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-9-2-1-user-registration-and-de-registration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-9-2-2-user-access-provisioning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-9-4-2-secure-log-on-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-9-4-4-use-of-privileged-utility-programs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-9-4-system-and-application-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-12-1-5-administrators-operational-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-12-1-operational-procedures-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-12-4-5-monitoring-of-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-12-4-logging-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-13-1-4-alignment-of-security-management-for-virtual-and-physical-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-13-1-network-security-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-6-3-1-shared-roles-and-responsibilities-within-a-cloud-computing-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-6-3-relationship-between-cloud-service-customer-and-cloud-service-provider</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-8-1-5-removal-of-cloud-service-customer-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-8-1-responsibility-for-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-9-5-1-segregation-in-virtual-computing-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27017-cld-9-5-2-virtual-machine-hardening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-13-2-1-information-transfer-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-13-2-information-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-13-communications-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-9-2-1-user-registration-and-de-registration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-9-2-user-access-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-9-4-2-secure-log-on-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-9-4-system-and-application-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-10-1-notification-of-a-data-breach-involving-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-10-2-retention-period-for-administrative-security-policies-and-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-10-3-pii-return-transfer-and-disposal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-1-confidentiality-or-non-disclosure-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-10-user-id-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-11-contract-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-12-sub-contracted-pii-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-13-access-to-data-on-pre-used-data-storage-space</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-2-restriction-of-the-creation-of-hardcopy-material</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-3-control-and-logging-of-data-restoration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-4-protecting-data-on-storage-media-leaving-the-premises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-5-use-of-unencrypted-portable-storage-media-and-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-6-encryption-of-pii-transmitted-over-public-data-transmission-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-7-secure-disposal-of-hardcopy-materials</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-8-unique-use-of-user-ids</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-11-9-records-of-authorized-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-12-1-geographical-location-of-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-12-2-intended-destination-of-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-2-1-obligation-to-co-operate-regarding-pii-principals-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-2-consent-and-choice</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-3-1-public-cloud-pii-processors-purpose</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-3-2-public-cloud-pii-processors-commercial-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-5-1-secure-erasure-of-temporary-files</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-5-data-minimization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-6-1-pii-disclosure-notification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-6-2-recording-of-pii-disclosures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-6-use-retention-and-disclosure-limitation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-8-1-disclosure-of-sub-contracted-pii-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27018-a-8-openness-transparency-and-notice</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-2-1-identify-and-document-purpose</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-2-2-identify-lawful-basis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-2-3-determine-when-and-how-consent-is-to-be-obtained</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-2-4-obtain-and-record-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-2-5-privacy-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-2-6-contracts-with-pii-processors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-2-7-joint-pii-controller</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-2-8-records-related-to-processing-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-1-determining-and-fulfilling-obligations-to-pii-principals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-10-automated-decision-making</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-2-determining-information-for-pii-principals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-3-providing-information-to-pii-principals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-4-providing-mechanism-to-modify-or-withdraw-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-5-providing-mechanism-to-object-to-pii-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-6-access-correction-andor-erasure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-7-pii-controllers-obligations-to-inform-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-8-providing-copy-of-pii-processed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-3-9-handling-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-1-limit-collection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-2-limit-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-3-accuracy-and-quality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-4-pii-minimization-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-5-pii-de-identification-and-deletion-at-the-end-of-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-6-temporary-files</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-7-retention</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-8-disposal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-4-9-pii-transmission-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-5-1-identity-basis-for-pii-transfer-between-jursdictions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-5-2-countries-and-international-organizations-to-which-pii-can-be-transferred</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-5-3-records-of-transfer-of-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-7-5-4-records-of-pii-disclosure-to-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-2-1-customer-agreement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-2-2-organizations-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-2-3-marketing-and-advertising-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-2-4-infringing-instruction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-2-5-customer-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-2-6-records-related-to-processing-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-3-1-obligations-to-pii-principals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-3-obligations-to-pii-principals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-4-1-temprorary-files</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-4-2-return-transfer-or-disposal-of-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-4-3-pii-transmission-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-5-1-basis-for-pii-transfer-between-jurisdictions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-5-2-countries-and-international-organizations-to-which-pii-can-be-transferred</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-5-3-records-of-pii-disclosure-to-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-5-4-notification-of-pii-disclosure-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-5-5-legally-binding-pii-disclosures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-5-6-disclosure-of-subcontractors-used-to-process-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-5-7-engagement-of-subcontractor-to-process-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-27701-a-8-5-8-change-of-subcontractor-to-process-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-10-1-improvement-selection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-10-2-non-conformity-and-corrective-action</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-10-3-continuous-improvement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-4-1-organization-and-its-context</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-4-2-needs-and-expectations-of-interested-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-4-3-scope-of-the-qms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-4-4-qms-and-its-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-5-1-1-top-management-commitment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-5-1-2-customer-focus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-5-2-1-establishing-the-quality-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-5-2-2-communicating-the-quality-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-5-3-roles-responsibilities-and-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-6-1-1-quality-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-6-1-2-quality-risk-treatment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-6-2-1-quality-objective-establishment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-6-2-2-actions-to-reach-quality-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-6-3-planning-of-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-1-1-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-1-2-people</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-1-3-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-1-4-environment-for-the-operation-of-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-1-5-monitoring-and-measuring-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-1-6-organizational-knowledge</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-2-personnel-competence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-3-personnel-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-4-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-7-5-documented-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-1-requirements-and-monitoring-for-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-2-requirements-for-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-3-1-design-and-development-process-establishment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-3-2-design-and-development-planning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-3-3-design-and-development-inputs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-3-4-design-and-development-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-3-5-design-and-development-outputs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-3-6-design-and-development-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-4-control-of-externally-provided-processes-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-5-1-control-of-production-and-service-provision</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-5-2-product-and-service-identification-and-traceability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-5-3-property-belonging-to-customers-or-external-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-5-4-product-and-service-preservation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-5-5-post-delivery-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-5-6-control-of-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-6-release-of-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-8-7-control-of-nonconforming-outputs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-9-1-1-monitoring-and-measurement-of-performance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-9-1-2-customer-satisfaction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-9-1-3-analysis-and-evaluation-of-performance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-9-2-internal-audit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/iso-9001-9-3-management-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/jarjestelmien-kayttoohjeet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-01-1-fyysisen-turvallisuuden-riskien-arviointi-tempest-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-01-fyysisen-turvallisuuden-riskien-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-02-fyysisten-turvatoimien-valinta-monitasoinen-suojaus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-03-tiedon-kasittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-04-1-tiedon-sailytys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-04-2-tiedon-sailytys-tietovarannot-ja-tietojarjestelmat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-04-3-tiedon-sailytys-tietovarannot-ja-tietojarjestelmat-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-04-4-tiedon-sailytys-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-04-5-tiedon-sailytys-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-04-6-tiedon-sailytys-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-04-tiedon-sailytys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-05-1-turvallisuusalue-aanieristys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-05-2-turvallisuusalue-salaa-katselun-estaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-05-3-turvallisuusalue-tila-ja-laitetarkastukset-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-05-4-turvallisuusalue-paasyoikeuksien-ja-avaintenhallinnan-menettelyt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-05-5-turvallisuusalue-vierailijat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-05-turvallisuusalue</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-06-1-hallinnollinen-alue-alueen-raja-ja-rakenteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-06-2-hallinnollinen-alue-kulunvalvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-06-3-hallinnollinen-alue-paasyoikeuksien-myontaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-06-4-hallinnollinen-alue-tunkeutumisen-ilmaisujarjestelmat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-06-hallinnollinen-alue</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-07-1-turva-alue-alueen-raja-ja-rakenteet-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-07-2-turva-alue-kulunvalvonta-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-07-3-turva-alue-paasyoikeuksien-myontaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-07-4-turva-alue-vierailijat-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-07-5-turva-alue-turvallisuusohjeet-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-07-6-turva-alue-tunkeutumisen-ilmaisujarjestelmat-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-07-7-turva-alue-sailytysyksikoiden-avaimet-ja-paasykoodit-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-07-turva-alue-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-08-1-tietojen-kuljettaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-08-2-tietojen-kuljettaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-08-3-tietojen-kuljettaminen-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-08-tietojen-kuljettaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-09-1-tietojen-kopioiminen-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-09-tietojen-kopioiminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-10-tietojen-kirjaaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-11-1-tietojen-fyysinen-tuhoaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-11-2-tietojen-fyysinen-tuhoaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-11-3-tietojen-fyysinen-tuhoaminen-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-fyy-11-tietojen-fyysinen-tuhoaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-01-periaatteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-02-1-tehtavat-ja-vastuut-tehtavien-eriyttaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-02-tehtavat-ja-vastuut</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-03-resurssit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-04-1-suojattavat-kohteet-vastuut</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-04-2-suojattavat-kohteet-luokittelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-04-3-suojattavat-kohteet-kasautumisvaikutus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-04-4-suojattavat-kohteet-merkitseminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-04-5-suojattavat-kohteet-riippuvuudet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-04-6-suojattavat-kohteet-sidosryhmat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-04-suojattavat-kohteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-05-1-vaatimukset-seuranta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-05-2-vaatimukset-muutosvaikutukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-05-vaatimukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-06-1-riskienhallinta-lainsaadantojohdannaiset-riskit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-06-riskienhallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-07-1-seuranta-ja-valvonta-tietojen-kaytto-ja-luovutukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-07-seuranta-ja-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-08-hairioiden-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-09-1-dokumentointi-ajantasaisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-09-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-10-1-henkiloston-luotettavuuden-arviointi-turvallisuusselvitys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-10-henkiloston-luotettavuuden-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-11-salassapito-ja-vaitiolovelvollisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-12-ohjeet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-13-koulutukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-14-1-kaytto-ja-kasittelyoikeudet-ajantasainen-luettelo-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-14-2-kaytto-ja-kasittelyoikeudet-paattyminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-14-kaytto-ja-kasittelyoikeudet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-15-tyoskentelyn-tietoturvallisuus-koko-palvelussuhteen-ajan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-16-1-hankintojen-turvallisuus-sopimukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-16-hankintojen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-17-1-tietojarjestelmien-toiminnallinen-kaytettavyys-ja-vikasietoisuus-saavutettavuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-17-tietojarjestelmien-toiminnallinen-kaytettavyys-ja-vikasietoisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-18-asiakirjajulkisuuden-toteuttaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-hal-19-tietojen-kasittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-01-1-verkon-rakenteellinen-turvallisuus-salaus-yleisissa-tietoverkoissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-01-2-verkon-rakenteellinen-turvallisuus-palomuuri</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-01-3-verkon-rakenteellinen-turvallisuus-kasittely-ymparistojen-erottaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-01-4-verkon-rakenteellinen-turvallisuus-salaaminen-turva-alueiden-ulkopuolella</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-01-5-verkon-rakenteellinen-turvallisuus-yhdyskaytavaratkaisun-kaytto-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-01-6-verkon-rakenteellinen-turvallisuus-kasittely-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-01-7-verkon-rakenteellinen-turvallisuus-kasittely-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-01-verkon-rakenteellinen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-02-1-tietoliikenne-verkon-vyohykkeistaminen-vahimpien-oikeuksien-periaate</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-02-tietoliikenne-verkon-vyohykkeistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-03-1-suodatus-ja-valvontajarjestelmien-hallinnointi-vastuutus-ja-organisointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-03-2-suodatus-ja-valvontajarjestelmien-hallinnointi-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-03-3-suodatus-ja-valvontajarjestelmien-hallinnointi-tarkastukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-03-suodatus-ja-valvontajarjestelmien-hallinnointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-1-hallintayhteydet-vahva-tunnistaminen-julkisessa-verkossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-2-hallintayhteydet-hallintayhteyksen-salaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-3-hallintayhteydet-vahimmat-oikeudet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-4-hallintayhteydet-henkilokohtaiset-tunnukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-5-hallintayhteydet-yhteyksien-rajaaminen-turvallisuusluokittain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-6-hallintayhteydet-turvallisuusluokiteltua-tietoa-sisaltavat-hallintayhteydet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-7-hallintayhteydet-salaaminen-turvallisuusluokan-sisalla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-8-hallintayhteydet-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-04-hallintayhteydet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-05-1-langaton-tiedonsiirto-salaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-05-langaton-tiedonsiirto</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-06-kasautumisvaikutus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-07-1-paasyoikeuksien-hallinnointi-paasyoikeuksien-myontaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-07-2-paasyoikeuksien-hallinnointi-paasyoikeuksien-rajaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-07-3-paasyoikeuksien-hallinnointi-paasyoikeuksien-ajantasaisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-07-4-paasyoikeuksien-hallinnointi-turvallisuusluokiteltujen-tietojen-erottelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-07-5-paasyoikeuksien-hallinnointi-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-07-paasyoikeuksien-hallinnointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-08-1-tietojenkasittely-ympariston-toimijoiden-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-08-2-tietojenkasittely-ympariston-toimijoiden-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-08-3-tietojenkasittely-ympariston-toimijoiden-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-08-4-tietojenkasittely-ympariston-toimijoiden-tunnistaminen-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-08-5-tietojenkasittely-ympariston-toimijoiden-tunnistaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-08-tietojenkasittely-ympariston-toimijoiden-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-09-tietojarjestelmien-fyysinen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-10-1-jarjestelmakovennus-kaytossa-olevien-palveluiden-minimointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-10-2-jarjestelmakovennus-kovennusten-varmistaminen-koko-elinkaaren-ajan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-10-3-jarjestelmakovennus-turvallisuusluokitellut-ymparistot-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-10-jarjestelmakovennus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-11-1-haittaohjelmilta-suojautuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-11-2-haittaohjelmilta-suojautuminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-11-3-haittaohjelmilta-suojautuminen-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-11-haittaohjelmilta-suojautuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-12-1-turvallisuuteen-liittyvien-tapahtumien-jaljitettavyys-tietojen-luovutukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-12-2-turvallisuuteen-liittyvien-tapahtumien-jaljitettavyys-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-12-3-turvallisuuteen-liittyvien-tapahtumien-jaljitettavyys-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-12-turvallisuuteen-liittyvien-tapahtumien-jaljitettavyys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-13-1-poikkeamien-havainnointikyky-ja-toipuminen-poikkeamien-havainnointi-lokitiedoista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-13-2-poikkeamien-havainnointikyky-ja-toipuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-13-3-poikkeamien-havainnointikyky-ja-toipuminen-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-13-poikkeamien-havainnointikyky-ja-toipuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-14-ohjelmistojen-turvallisuuden-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-15-1-hajasateily-tempest-ja-elektroninen-tiedustelu-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-15-2-hajasateily-tempest-ja-elektroninen-tiedustelu-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-15-hajasateily-tempest-ja-elektroninen-tiedustelu-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-16-1-tiedon-salaaminen-salaaminen-turvallisuusalueen-sisalla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-16-2-tiedon-salaaminen-turvallisuusluokitellun-tiedon-siirto-turvallisuusalueiden-ulkopuolella</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-16-3-tiedon-salaaminen-turvallisuusluokitellun-tiedon-siirto-turvallisuusalueiden-sisalla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-16-4-tiedon-salaaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-16-5-tiedon-salaaminen-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-16-tiedon-salaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-17-1-muutoshallintamenettelyt-uudelleenarviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-17-2-muutoshallintamenettelyt-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-17-3-muutoshallintamenettelyt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-17-4-muutoshallintamenettelyt-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-17-muutoshallintamenettelyt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-1-etakaytto-tietojen-ja-tietoliikenteen-salaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-2-etakaytto-turvallisuusluokitettujen-tietojen-ja-tietoliikenteen-salaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-3-etakaytto-kayttajien-vahva-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-4-etakaytto-hyvaksytyt-laitteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-5-etakaytto-turvallisuusluokitellun-tiedon-kaytto-julkisella-paikalla-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-6-etakaytto-laitetunnistus-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-7-etakaytto-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-8-etakaytto-etakaytto-turvallisuusalueella-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-9-etakaytto-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-18-etakaytto</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-19-1-ohjelmistohaavoittuvuuksien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-19-2-ohjelmistohaavoittuvuuksien-hallinta-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-19-ohjelmistohaavoittuvuuksien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-20-1-varmuuskopiointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-20-2-varmuuskopiointi-varmuuskopioiden-rekisterointi-ja-kasittelyn-seuranta-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-20-varmuuskopiointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-21-1-sahkoisessa-muodossa-olevien-tietojen-tuhoaminen-arkistointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-21-2-sahkoisessa-muodossa-olevien-tietojen-tuhoaminen-pilvipalveluissa-olevan-tiedon-tuhoaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-21-3-sahkoisessa-muodossa-olevien-tietojen-tuhoaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-21-4-sahkoisessa-muodossa-olevien-tietojen-tuhoaminen-toisen-viranomaisen-laatimat-tiedot-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-21-5-sahkoisessa-muodossa-olevien-tietojen-tuhoaminen-tuhoamisen-suorittaja-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-21-6-sahkoisessa-muodossa-olevien-tietojen-tuhoaminen-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-21-sahkoisessa-muodossa-olevien-tietojen-tuhoaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-22-1-tietojarjestelmien-saatavuus-saatavuutta-suojaavat-menettelyt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-22-2-tietojarjestelmien-saatavuus-palveluiden-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-22-tietojarjestelmien-saatavuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tek-23-tietojarjestelmien-toiminnallinen-kaytettavyys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-01-1-kasiteltavien-henkilotietojen-tunnistaminen-erityiset-henkilotietoryhmat-tai-rikostuomioihin-ja-rikoksiin-liittyvat-tiedot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-01-kasiteltavien-henkilotietojen-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-02-organisaation-roolit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-03-yhteisrekisterinpitajat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-04-1-henkilotietojen-kasittelija-sopimukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-04-henkilotietojen-kasittelija</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-05-1-tehtavat-ja-vastuut-tietosuojavastaava</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-05-2-tehtavat-ja-vastuut-tietosuojavastaavan-asema-ja-tehtavat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-05-tehtavat-ja-vastuut</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-06-henkilotietojen-kasittelyn-ohjeet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-07-1-kasittelyn-lainmukaisuus-suostumus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-07-2-kasittelyn-lainmukaisuus-henkilotunnus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-07-3-kasittelyn-lainmukaisuus-erityiset-henkilotietoryhmat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-07-4-kasittelyn-lainmukaisuus-rikostuomioihin-ja-rikoksiin-liittyvat-henkilotiedot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-07-kasittelyn-lainmukaisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-08-tarpeellisuus-ja-oikeasuhtaisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-09-kayttotarkoitussidonnaisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-10-tietojen-minimointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-11-sailytyksen-rajoittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-12-tasmallisyys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-13-kasittelyn-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-14-tietoturvaloukkaukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-15-osoitusvelvollisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-16-tietosuojariskien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-17-1-tietosuojan-vaikutustenarviointi-ennakkokuuleminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-17-tietosuojan-vaikutustenarviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-18-henkilotietojen-siirto-etan-ulkopuolelle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-19-1-rekisteroidyn-oikeudet-rekisteroidyn-kaytettavissa-olevien-oikeuksien-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-19-2-rekisteroidyn-oikeudet-lapinakyva-informointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-19-3-rekisteroidyn-oikeudet-oikeus-saada-paasy-tietoihin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-19-4-rekisteroidyn-oikeudet-tietojen-oikaiseminen-poistaminen-siirtaminen-kasittelyn-rajoittaminen-ja-vastustaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-19-rekisteroidyn-oikeudet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-20-automatisoidut-yksittaispaatokset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-tsu-21-seloste-kasittelytoimista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-01-varautumista-ohjaava-lainsaadanto</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-02-1-jatkuvuusvaatimusten-maarittely-palveluiden-siirrot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-02-jatkuvuusvaatimusten-maarittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-03-1-jatkuvuussuunnitelmien-testaus-ja-harjoittelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-03-jatkuvuussuunnitelmat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-04-resurssit-ja-osaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-05-henkiloston-saatavuus-ja-varajarjestelyt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-06-tietoliikenteen-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-07-tietoteknisten-ymparistojen-varmentaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-08-1-vikasietoisuus-riippuvuudet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-08-vikasietoisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/julkri-var-09-tietojarjestelmien-toipumissuunnitelmat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kanta-palveluihin-liittyva-tietoturva</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kanta-palvelujen-kayton-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kanta-palvelujen-paasynhallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-01-goal-for-physical-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-02-risk-assessment-of-physical-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-03-selection-of-physical-security-measures-defence-in-depth</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-04-handling-and-storage-of-information-in-security-areas-and-outside</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-05-1-boundary-and-structures-for-the-area-walls-doors-windows-floor-and-ceiling-structures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-05-2-management-of-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-05-3-visitors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-05-4-soundproofing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-05-5-intrusion-detection-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-05-6-protection-from-unauthorised-observation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-05-7-inspections-of-working-spaces-and-devices-only-for-national-classification-level-ii-or-eu-secret</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-05-8-handling-and-storage-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-1-boundary-and-structures-for-the-area-walls-doors-windows-floor-and-ceiling-structures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-10-handling-and-storage-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-2-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-3-management-of-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-4-visitors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-5-security-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-6-soundproofing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-7-intrusion-detections-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-8-protection-from-unauthorized-observation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-06-9-inspections-of-working-spaces-and-devices-only-for-national-classification-level-ii-or-eu-secret</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-07-technically-secured-area</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-08-1-transfer-of-information-by-using-postal-or-courier-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-08-2-copying-of-classified-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-08-3-registering-of-classified-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-f-08-4-disposal-of-information-in-non-electronic-format</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-01-secure-interconnection-of-cis-security-of-the-network-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-02-principle-of-least-privilege-segmenting-of-the-communication-network-and-filtering-rules-within-the-classification-level</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-03-security-of-information-processing-environment-throughout-the-life-cycle-management-of-filtering-and-monitoring-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-04-secure-interconnection-of-cis-management-connections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-05-exchange-of-classified-information-outside-the-physically-protected-areas-wireless-transmission</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-06-the-principle-of-least-privilege-management-of-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-07-defence-in-depth-identification-of-actors-of-the-information-processing-environment-within-a-physically-protected-security-area</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-08-principle-of-minimality-and-of-least-privilege-systems-hardening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-09-defence-in-depth-protection-against-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-10-defence-in-depth-traceability-of-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-11-defence-in-depth-incident-detection-and-recovery</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-12-evaluation-and-approval-of-cryptographic-products-crypto-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-13-defence-in-depth-throughout-the-life-cycle-protection-of-software-against-network-attacks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-14-defence-in-depth-electromagnetic-emanations-tempest-and-electronic-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-15-exchange-of-classified-information-between-physically-protected-areas-electronic-transfer-of-the-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-16-security-throughout-the-information-processing-environment-life-cycle-change-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-17-handling-of-classified-information-within-physically-protected-areas-physical-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-18-handling-and-transfer-of-classified-information-between-physically-protected-areas-remote-use-and-remote-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-19-security-throughout-the-information-processing-environment-lifecycle-management-of-software-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-20-security-throughout-the-information-processing-environment-lifecycle-backup-copies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-i-21-security-throughout-the-information-processing-environment-lifecycle-disposal-of-classified-information-in-electronic-format</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-01-support-from-the-management-guidance-responsibilities-security-principles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-02-defining-the-tasks-and-responsibilities-of-the-security-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-03-management-of-information-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-04-security-guidance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-05-resources-for-the-security-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-06-malfunctions-and-exceptional-situations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-07-management-of-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-08-classification-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-09-changes-in-the-handling-of-classified-information-throughout-the-employement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-10-assessment-of-the-trustworthiness-and-reliability-of-the-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-11-non-disclosure-and-confidentiality-commitment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-12-security-education</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-2020-t-13-need-to-know-and-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-f01-fyysiset-turvatoimet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-f02-hallinnolliset-alueet-turva-alueet-ja-tekniset-turva-alueet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-f03-tietojen-fyysiseen-suojaukseen-tarkoitetut-turvallisuusjarjestelmat-ja-laitteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-f04-kulkuoikeuksien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-f05-avainten-ja-numeroyhdistelmien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-f06-salakatselulta-suojautuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-f07-salakuuntelulta-suojautuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-f08-toiminnan-jatkuvuuden-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i01-verkon-rakenteellinen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i02-verkon-vyohykkeistaminen-ja-suodatussaannostot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i03-suodatus-ja-valvontajarjestelmien-hallinnointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i04-hallintayhteydet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i05-langattomat-verkot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i06-paasyoikeuksien-hallinnointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i07-tietojenkasittely-ympariston-toimijoiden-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i08-jarjestelmakovennus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i09-haittaohjelmasuojaus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i10-turvallisuuteen-liittyvien-tapahtumien-jaljitettavyys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i11-poikkeamien-havainnointikyky-ja-toipuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i12-salausratkaisut</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i13-ohjelmistoilla-toteutettavat-paasynhallintatoteutukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i14-hajasateily-tempest</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i15-aineiston-sahkoinen-valitys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i16-aineiston-valitys-postilla-ja-kuriirilla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i17-salassa-pidettavien-tietojen-jaljentaminen-tulostus-ja-kopiointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i18-turvallisuustarkoituksia-varten-tapahtuva-salassa-pidettavien-tietojen-kirjaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i19-salassa-pidettavaa-tietoa-sisaltavien-tietoaineistojen-havittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i20-muutoshallintamenettelyt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i21-fyysinen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i22-etakaytto-ja-etahallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i23-ohjelmistohaavoittuvuuksien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-i24-varmuuskopiointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t01-turvallisuusperiaatteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t02-turvallisuustyon-tehtavien-ja-vastuiden-maarittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t03-turvallisuustyon-resurssit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t04-turvallisuusriskien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t05-jatkuvuuden-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t06-turvallisuuspoikkeamien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t07-tietojen-luokittelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t08-tyosuhteen-elinkaaren-huomioiminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t09-henkiloston-luotettavuuden-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t10-salassapito-ja-vaitiolositoumukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t11-turvallisuuskoulutus-ja-tietoisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-t12-tiedonsaantitarve-ja-kasittelyoikeudet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/katakri-toiminnan-jatkuvuuden-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kayttoturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-10-ss-johdon-vastuu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-11-ss-poikkeamailmoitukset-viranomaiselle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-12-ss-poikkeamaa-koskeva-valiraportti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-13-ss-poikkeamaa-koskeva-loppuraportti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-14-ss-poikkeamasta-ja-kyberuhkasta-ilmoittaminen-muulle-kuin-viranomaiselle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-15-ss-vapaaehtoinen-ilmoittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-7-ss-riskienhallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-8-ss-kyberturvallisuutta-koskeva-riskienhallinnan-toimintamalli</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-1-ss-toimien-vaikuttavuuden-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-10-ss-varmuuskopiointi-ja-jatkuvuuden-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-11-ss-perustason-tietoturvakaytannot-ja-henkiloston-vastuu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-12-ss-fyysinen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-2-ss-kyberturvallisuuden-toimintaperiaatteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-3-ss-tietojarjestelmien-hankinta-ja-kehittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-4-ss-toimitusketjun-hallinta-ja-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-5-ss-suojattavan-omaisuuden-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-6-ss-henkilostoturvallisuus-ja-tietoturvakoulutus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-7-ss-paasynhallinta-todentaminen-ja-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-8-ss-salaus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-9a-ss-poikkeamien-havainnointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/kyberturvallisuuslaki-9-9b-ss-poikkeamien-kasittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-12-1-3-point-de-contact-pour-la-securite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-1-plan-de-securite-de-loperateur</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-2-1-mesures-permanentes-de-securite-interieure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-2-2-mesures-internes-de-securite-graduelles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-3-1-inventaire-et-localisation-des-points-critiques</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-3-2-analyse-des-risques</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-3-3-analyse-de-la-vulnerabilite-et-de-limpact</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-3-4-identification-selection-et-priorisation-des-mesures-de-securite-interieure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-4-periode-de-mise-en-oeuvre-des-mesures-de-securite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-13-6-organisation-des-exercices-et-mise-a-jour-de-lp-s-e</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-14-1-notification-de-services-determines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/loi-infrastructures-critiques-art-19-echange-dinformations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/luvattoman-paasyn-estaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/malware-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/management-of-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/management-of-data-sets-2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/management-of-operational-technologies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/management-of-secure-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/mobile-device-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-10-atgarder-for-att-forsvara-obehorig-tillgang-till-information-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-11-atgarder-for-att-hantera-incidenter-och-avvikelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-12-grundorsaksanalys-av-incidenter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-13-atgarder-for-att-uppratthalla-kontinuitet-under-incidenter-och-kriser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-14-uppfoljning-av-informationssakerhetsarbetet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-15-rapportering-till-ledningen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-4-efterlevnad-av-standarder-for-informationssakerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-5-hur-informationssakerhetsarbetet-ska-utformas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-6-hur-informationssakerhetsarbetet-ska-bedrivas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-7-nar-annan-statlig-myndighet-eller-en-extern-aktor-behandlar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-8-hantering-av-leverantorssakerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20206-ss-9-atgarder-for-att-sakerstalla-att-personal-behandlar-information-pa-ett</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-2-1-ansvar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-2-2-hotinformation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-2-3-riskbedomning-pa-systemniva</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-2-4-dokumentation-av-it-miljon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-1-natverkssegmentering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-10-loggning-och-analys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-11-natverksovervakning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-12-systemovervakning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-13-skydd-mot-skadlig-kod</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-14-skydd-av-utrustning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-15-redundans-och-aterstallning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-16-kontinuitetshantering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-17-arkivering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-18-avveckling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-2-filtrering-av-natverkstrafik</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-3-identitets-och-behorighetshantering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-4-kryptering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-5-sakerhetskonfigurering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-6-sakerhetstester-och-granskningar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-7-andringshantering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-8-robust-och-korrekt-tid</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-1-9-sakerhetskopiering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-2-sakerhetsverifiering-innan-driftsattning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-3-separation-av-utvecklings-och-produktionsmiljoer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-3-4-separat-utbildningsmiljo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-1-natverkssegmentering-i-produktion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-10-systemhardning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-11-sarbarhetshantering-och-sakerhetstestning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-12-andringshantering-uppgradering-och-uppdatering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-13-tidssynkronisering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-14-sakerhetskopiering-av-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-15-skydd-av-sakerhetskopior</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-16-loggning-av-sakerhetshandelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-17-logghantering-och-analys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-18-intrangsdetektering-och-intrangsskydd</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-19-sakerhetsovervakning-i-realtid</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-2-filtrering-av-natverkstrafik</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-20-skydd-mot-skadlig-kod</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-21-1-sakra-it-utrymmen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-21-2-tilltradesstyrning-till-it-utrymmen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-21-3-overvakning-och-larm</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-21-4-loggning-av-tilltrade</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-21-5-mobil-utrustning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-22-katastrofaterstallning-och-redundans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-3-behorighetsstyrning-och-minsta-mojliga-behorighet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-4-hantering-av-privilegierad-atkomst</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-5-flerfaktorsautentisering-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-6-policy-for-hantering-av-autentiseringsuppgifter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-7-datakryptering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-8-dns-sakerhet-dnssec</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-4-9-krypteringspolicy-och-nyckelhantering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-5-1-krisberedskapen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20207-ss-5-2-test-av-system-for-krissituationer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20208-ss-3-incidentrapporteringsprocess</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20208-ss-4-initial-incidentnotifiering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20208-ss-5-slutgiltig-incidentrapportering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20208-ss-6-informationsforfragningar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20208-ss-7-korrigering-av-incidentrapporter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20208-ss-8-rapporteringskrav-for-leverantorer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/msbfs-20208-ss-9-kontaktuppgifter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-10-1-voortdurende-verbetering-van-het-managementsysteem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-10-2-afwijkingen-en-corrigerende-maatregelen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-4-1-inzicht-in-de-organisatie-en-haar-context</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-4-2-belanghebbenden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-4-3-toepassingsgebied-van-het-informatiebeveiligingsbeheersysteem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-4-4-informatiebeveiligingsbeheersysteem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-1-beleid-voor-informatiebeveiliging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-1-leiderschap-en-betrokkenheid</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-10-aanvaardbaar-gebruik-van-informatie-en-andere-gerelateerde-bedrijfsmiddelen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-11-teruggave-van-activa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-12-classificatie-van-informatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-13-labeling-van-informatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-14-overdracht-van-informatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-15-toegangsbeveiliging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-16-identiteitsbeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-17-authenticatiegegevens</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-18-toegangsrechten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-19-informatiebeveiliging-in-relaties-met-leveranciers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-2-beleid</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-2-rollen-en-verantwoordelijkheden-op-het-gebied-van-informatiebeveiliging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-20-informatiebeveiliging-in-leveranciersovereenkomsten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-21-beheer-van-informatiebeveiliging-in-de-ict-toeleveringsketen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-22-monitoring-evaluatie-en-beheer-van-wijzigingen-in-leveranciersdiensten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-23-informatiebeveiliging-voor-het-gebruik-van-clouddiensten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-24-planning-en-voorbereiding-van-het-beheer-van-informatiebeveiligingsincidenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-25-beoordeling-van-en-besluitvorming-over-informatiebeveiligingsincidenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-26-reageren-op-informatiebeveiligingsincidenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-27-leren-van-informatiebeveiligingsincidenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-28-bewijs-verzamelen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-29-informatiebeveiliging-tijdens-een-verstoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-3-rollen-verantwoordelijkheden-en-bevoegdheden-binnen-de-organisatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-3-scheiding-van-taken</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-30-ict-gereedheid-voor-bedrijfscontinuiteit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-31-wettelijke-statutaire-regelgevende-en-contractuele-vereisten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-32-intellectuele-eigendomsrechten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-33-bescherming-van-registraties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-34-privacy-en-bescherming-van-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-35-onafhankelijke-beoordeling-van-informatiebeveiliging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-36-naleving-van-informatiebeveiligingsbeleid-regels-en-normen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-37-gedocumenteerde-operationele-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-38-hlt-analyse-en-specificatie-van-informatiebeveiligingseisen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-39-hlt-unieke-identificatie-van-zorgontvangers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-4-managementverantwoordelijkheden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-40-hlt-validatie-van-weergegevenafgedrukte-gegevens</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-41-hlt-openbaar-beschikbare-gezondheidsinformatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-42-hlt-noodcommunicatiesituaties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-43-hlt-externe-rapportage-van-incidenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-5-contact-met-overheidsinstanties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-6-contact-met-belangengroepen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-7-informatie-over-en-analyse-van-bedreigingen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-8-informatiebeveiliging-in-projectbeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-5-9-inventarisatie-van-informatie-en-andere-gerelateerde-activa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-1-maatregelen-om-risicos-en-kansen-aan-te-pakken</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-1-screening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-2-arbeidsovereenkomst</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-2-informatiebeveiligingsdoelstellingen-en-de-planning-om-deze-te-bereiken</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-3-bewustwording-voorlichting-en-opleiding-op-het-gebied-van-informatiebeveiliging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-3-planning-van-wijzigingen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-4-tuchtprocedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-5-verantwoordelijkheden-na-beeindiging-of-wijziging-van-het-dienstverband</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-6-geheimhoudings-of-non-disclosureovereenkomsten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-7-werken-op-afstand</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-8-melden-van-informatiebeveiligingsincidenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-6-9-hlt-managementtraining</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-1-fysieke-beveiligingsperimeter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-1-middelen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-10-opslagmedia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-11-ondersteunende-hulpprogrammas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-12-beveiliging-van-bekabeling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-13-onderhoud-van-apparatuur</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-14-veilige-verwijdering-of-hergebruik-van-apparatuur</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-2-competentie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-2-fysieke-toegang</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-3-beveiliging-van-kantoren-ruimtes-en-faciliteiten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-3-bewustzijn</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-4-communicatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-4-monitoring-van-fysieke-beveiliging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-5-bescherming-tegen-fysieke-en-omgevingsbedreigingen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-5-vereisten-voor-gedocumenteerde-informatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-6-werken-in-beveiligde-zones</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-7-schone-bureau-en-schoon-scherm</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-8-plaatsing-en-bescherming-van-apparatuur</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-7-9-beveiliging-van-bedrijfsmiddelen-buiten-het-bedrijfsterrein</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-1-eindapparatuur-van-gebruikers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-1-operationele-planning-en-controle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-10-verwijdering-van-informatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-11-gegevensmaskering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-12-preventie-van-gegevenslekken</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-13-back-up-van-informatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-14-redundantie-van-informatieverwerkingsfaciliteiten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-15-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-16-monitoringactiviteiten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-17-kloksynchronisatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-18-gebruik-van-speciale-systeemtools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-19-software-installeren-op-besturingssystemen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-2-beoordeling-van-informatiebeveiligingsrisicos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-2-speciale-toegangsrechten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-20-beveiliging-van-netwerkcomponenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-21-beveiliging-van-netwerkdiensten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-22-netwerksegmentatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-23-webfiltering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-24-gebruik-van-cryptografie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-25-beveiliging-tijdens-de-ontwikkelingscyclus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-26-vereisten-voor-applicatiebeveiliging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-27-veilige-systeemarchitectuur-en-technische-principes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-28-veilig-coderen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-29-testen-van-de-beveiliging-tijdens-ontwikkeling-en-acceptatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-3-behandeling-van-informatiebeveiligingsrisicos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-3-beperking-van-de-toegang-tot-informatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-30-uitbestede-ontwikkeling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-31-scheiding-van-ontwikkel-test-en-productieomgevingen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-32-wijzigingsbeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-33-testgegevens</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-34-bescherming-van-informatiesystemen-tijdens-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-35-hlt-zero-trust-principes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-4-beveiliging-van-toegang-tot-broncode</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-5-veilige-authenticatie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-6-capaciteitsbeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-7-bescherming-tegen-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-8-technisch-kwetsbaarheidsbeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-8-9-configuratiebeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-9-1-monitoring-meten-analyseren-en-evalueren</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-9-2-interne-audit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nen-7510-9-3-managementbeoordeling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/network-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-20-1-top-management-commitment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-20-2-top-management-monitoring-for-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-a-risk-management-and-information-system-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-b-incidents-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-b-logs-logging-and-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-c-business-continuity-and-backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-d-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-e-secure-system-acquisition-and-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-f-assessing-effectiveness-of-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-g-cyber-hygiene-practices-and-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-h-encryption</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-i-access-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-i-assets-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-i-hr-human-resource-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-2-j-multi-factor-authentication-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-3-defining-and-monitoring-required-supply-chain-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-21-4-non-conformities-and-corrective-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-23-1-incident-notifications-to-csirt-and-recipients-of-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-23-2-threat-notifications-to-recipients-of-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-13-riskbedomning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-14-1-forebyggande-av-incidenter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-14-2-sakerstall-adekvat-fysiskt-skydd</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-14-3-incidenthantering-och-respons</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-14-4-aterhamta-sig-fran-incidenter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-14-5-sakerstalla-en-andamalsenlig-hantering-av-personalsakerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-14-6-oka-medvetenheten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-16-rapporteringsskyldigheter-for-kritiska-verksamhetsutovare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-17-standarder-for-kritiska-verksamhetsutovare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-18-radgivande-uppdrag</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-19-ledningens-styrning-och-ansvar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-1-strategier-for-riskanalys-och-informationssystemens-sakerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-10-multifaktorautentisering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-2-incidenthantering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-3-driftskontinuitet-och-krishantering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-4-sakerhet-i-leveranskedjan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-5-saker-systemanskaffning-och-utveckling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-6-bedomning-av-sakerhetsatgarders-effektivitet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-7-cyberhygien-och-utbildning-i-cybersakerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-8-kryptering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-9a-personalsakerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-9b-strategier-for-atkomstkontroll</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-9c-tillgangsforvaltning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-atgarder-for-cybersakerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-avvikelse-avvikelser-och-korrigerande-atgarder</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-20-forsorjningskedja-sakerhetsatgarder-for-leveranskedjan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-21-1-2-anmalan-av-betydande-incidenter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-21-anmalan-av-incidenter-till-provinsiella-myndigheter-och-tjanstemottagare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-22-frivillig-rapportering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-23-europeiska-ordningar-for-cybersakerhetscertifiering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-aland-ss-24-standarder-for-vasentliga-och-viktiga-verksamhetsutovare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-32-2-3-sicherheit-in-der-lieferkette</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-31-1-aufsichtspflicht-des-managements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-31-2-verpflichtung-zur-cybersicherheitsschulung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-1-3-pflichten-fur-risikobasierte-cybersicherheitsmassnahmen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-a-risikomanagement-und-informationssystemsicherheit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-b-protokolle-protokollierung-und-erkennung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-b-vorfalle-vorfallmanagement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-c-geschaftskontinuitat-und-datensicherung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-d-sicherheit-in-der-lieferkette</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-e-sichere-beschaffung-und-entwicklung-von-systemen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-f-bewertung-der-wirksamkeit-von-sicherheitsmassnahmen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-g-cyberhygiene-und-schulungen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-h-verschlusselung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-i-betriebsmittel-verwaltung-von-betriebsmitteln</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-i-personals-sicherheit-im-personalbereich</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-i-zugriff-zugriffskontrolle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-32-4-j-multi-faktor-authentifizierung-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-33-1-selbstdeklaration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-33-2-3-prufung-durch-unabhangige-stelle-fur-wesentliche-einrichtungen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-33-5-ankundigung-geplanter-prufungen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-34-1-2-meldung-von-sicherheitsvorfallen-an-das-csirt-und-betroffene-diensteempfanger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-34-3-bedrohungsmitteilungen-an-diensteempfanger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-36-1-freiwilliger-austausch-von-cybersicherheitsinformationen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-36-2-vereinbarungen-zum-informationsaustausch</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-36-4-mitteilung-des-vereinbarungsstatus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-37-freiwillige-meldung-relevanter-informationen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-austria-ss-40-nutzung-der-europaischen-schemata-fur-die-cybersicherheitszertifizierung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-27-ss-1deg-volontaire-echanger-des-informations-pertinentes-en-matiere-de-cybersecurite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-27-ss-2deg-daccords-de-partage-dinformations-en-matiere-de-cybersecurite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-27-ss-4deg-notification-de-la-participation-a-des-accords-dechange-dinformations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-1deg-gestion-des-risques-et-maitrise-des-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-2deg-evaluation-des-risques-et-mesures-de-gestion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-10deg-dauthentification-a-plusieurs-facteurs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-11deg-divulgation-des-vulnerabilites</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-1deg-lanalyse-des-risques-et-a-la-securite-des-systemes-dinformation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-2deg-detection-et-journaux-la-gestion-des-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-2deg-incidents-la-gestion-des-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-3deg-la-continuite-et-la-gestion-des-crises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-4deg-la-securite-de-la-chaine-dapprovisionnement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-5deg-lacquisition-du-developpement-et-de-la-maintenance-des-reseaux-et-des-systemes-dinformation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-6deg-lefficacite-des-mesures-de-gestion-des-risques</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-7deg-les-pratiques-et-la-formation-en-matiere-dhygiene-cybernetique</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-8deg-la-cryptographie-et-du-chiffrement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-9deg-actifs-gestion-des-actifs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-9deg-lacces-controle-dacces</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-3-9deg-ressources-humaines-la-securite-des-ressources-humaines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-4deg-definir-et-controler-les-mesures-de-securite-requises-pour-la-chaine-dapprovisionnement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-5deg-analyse-des-risques-et-politique-de-securite-de-linformation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-30-ss-6deg-non-conformites-et-mesures-correctives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-31-ss-1deg-approbation-des-mesures-de-gestion-des-risques-de-cybersecurite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-31-ss-2deg-formation-des-cadres-superieurs-a-la-cybersecurite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-32-responsabilite-de-lencadrement-superieur</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-34-ss-1deg-notifications-dincidents-au-csirt-et-aux-beneficiaires-des-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-34-ss-2deg-notifications-de-menaces-aux-beneficiaires-des-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-35-ss-1deg-processus-de-notification-des-incidents-au-csirt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-belgium-39-conformite-et-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-21-1-odobriavane-na-merki-za-upravlenie-na-riska</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-21-2-obuchenie-na-upravlenski-personal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-21-3-obuchenie-na-sluzhitelite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-1-upravlenie-na-riska-v-oblastta-na-kibersigurnostta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-1-politiki-za-analiz-na-riska-i-sigurnost-na-informatsionnite-sistemi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-10-mnogofaktorno-udostoveriavane</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-11-upravlenie-na-promenite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-2-dnevnitsi-registrirane-i-otkrivane</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-2-intsidenti-upravlenie-na-intsidenti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-3-nepreksnatost-na-deinostta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-4-sigurnost-na-verigata-za-dostavki-na-mrezhi-i-informatsionni-sistemi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-5-sigurnost-na-pridobivaneto-na-mrezhi-i-informatsionni-sistemi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-6-otsenka-na-efektivnostta-na-merkite-za-sigurnost</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-7-kiberkhigiena-i-obuchenie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-8-politiki-i-protseduri-za-kriptografiia-i-kriptirane</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-9-aktivi-upravlenie-na-aktivite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-9-choveshki-resursi-sigurnost-na-choveshkite-resursi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-2-9-dostpa-politiki-za-kontrol-na-dostpa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-3-otsenka-na-uiazvimostta-na-verigata-na-dostavchitsite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-22-4-nesotvetstviia-i-korigirashchi-deistviia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-23-1-uvedomiavane-za-znachitelni-intsidenti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-23-4-uvedomleniia-za-zaplakhi-do-polzvatelite-na-uslugite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-23-5-protsedura-za-uvedomiavane-za-intsidenti-km-seriks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-24-2-uvedomiavane-na-poluchatelite-na-uslugi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-24-izpolzvane-na-sertifitsirani-ikt-produkti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-27d-dobrovolno-uvedomiavane-za-otnosima-informatsiia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-bulgaria-chl-27g-sporazumeniia-za-obmen-na-informatsiia-v-oblastta-na-kibersigurnostta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-29-a-upravljanje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-29-b-osposobljavanja</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-a-politike-analize-rizika-i-sigurnosti-informacijskih-sustava</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-b-logs-postupanje-s-incidentima-ukljucujuci-njihovo-pracenje-evidentiranje-i-prijavljivanje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-b-postupanje-s-incidentima-ukljucujuci-njihovo-pracenje-evidentiranje-i-prijavljivanje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-c-kontinuitet-poslovanja</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-d-sigurnost-lanca-opskrbe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-e-sigurnost-u-nabavi-razvoju-i-odrzavanju-mreznih-i-informacijskih-sustava</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-f-politike-i-postupke-za-procjenu-djelotvornosti-mjera-upravljanja-kibernetickim-sigurnosnim-rizicima</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-g-kiberneticke-higijene-i-osposobljavanje-o-kibernetickoj-sigurnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-h-kriptografije</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-i-imovina-upravljanja-programskom-i-sklopovskom-imovinom</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-i-ljudskih-resursa-sigurnost-ljudskih-resursa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-i-pristup-politike-kontrole-pristupa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-1-j-koristenje-visefaktorske-provjere-autenticnosti-ili-rjesenja-kontinuirane-provjere-autenticnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-30-2-dobavljacka-kiberneticka-sigurnost-i-rizici</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-34-provedba-revizije-kiberneticke-sigurnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-35-provedba-samoprocjene-kiberneticke-sigurnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-37-obavjestavanje-o-znacajnim-incidentima</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-38-obavjestavanje-primatelja-usluga</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-39-obavjestavanje-na-dobrovoljnoj-osnovi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-40-obavjestavanje-o-znacajnom-incidentu-s-prekogranicnim-i-medusektorskim-ucinkom</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-croatia-clanak-41-obavjestavanje-javnosti-o-znacajnom-incidentu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-34b-ethelontike-antallage-plerophorion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-a-diakheirise-kindunou-kai-asphaleia-sustematon-plerophorion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-b-katagraphe-katagraphe-kai-anikhneuse</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-b-peristatika-diakheirise-peristatikou</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-d-asphaleia-ephodiastikes-alusidas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-e-asphales-apoktese-kai-anaptuxe-sustematos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-e-kruptographese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-g-sunekheia-epikheirematikes-drasteriotetas-kai-antigrapha-asphaleias</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-i-elegkhos-tautotetas-pollaplon-paragonton</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-st-axiologese-tes-apotelesmatikotetas-ton-metron-asphaleias</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-th-anthropino-dunamiko-asphaleia-anthropinou-dunamikou</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-th-energetiko-diakheirise-periousiakon-stoikheion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-th-prosbase-elegkhos-prosbases</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-2-z-praktikes-kai-ekpaideuse-ston-kubernokhoro-gia-ten-ugieine</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-3-kathorismos-kai-elegkhos-ton-metron-asphaleias-pou-apaitountai-gia-ten-alusida-ephodiasmou</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35-4-diorthotika-metra</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35a-1-desmeuse-tes-anotates-dioikeses</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35a-3-parakolouthese-tes-ekpaideuses-apo-ten-anotate-dioikese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35b-1-koinopoieseis-peristatikon-sten-arkhe-kai-stous-apodektes-ton-uperesion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35b-2-koinopoieseis-apeilon-stous-apodektes-ton-uperesion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-35b-4-anaphora-enos-peristatikou-stis-arkhes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-41a-1-khrese-ton-europaikon-sustematon-pistopoieses-tes-kubernoasphaleias</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-cyprus-42-1-ethelousia-koinopoiese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-12-underretningspligter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-13-2-gennemforelse-af-prioriteringer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-13-3-underretningspligt-i-beredskabssituationer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-13-4-sikring-af-udsendelse-af-offentlige-advarsler</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-13-6-prioritering-af-retablering-af-infrastruktur</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-13-7-prioritering-af-forbindelser-og-tjenester-ved-kapacitetsproblemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-13-retningslinjer-for-haendelsesmeddelelse</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-14-frivillige-underretninger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-15-underretning-og-oplysning-om-vaesentlige-haendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-16-krav-om-sikkerhedsgodkendelse-af-medarbejdere</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-1-politikker-for-risikoanalyse-og-informationssystemsikkerhed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-10-sikker-autentificering-og-kommunikation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-2-haendelser-handtering-af-haendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-2-logfiler-logning-og-detektion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-3-driftskontinuitet-herunder-backupstyring-og-reetablering-efter-en-katastrofe-og-krisestyring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-4-forsyningskaedesikkerhed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-5-sikkerhed-i-forbindelse-med-erhvervelse-og-udvikling-af-systemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-6-politikker-for-styring-af-cybersikkerhedsrisici</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-7-grundlaeggende-cyberhygiejnepraksisser-og-cybersikkerhedsuddannelse</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-8-politikker-for-kryptografi-og-kryptering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-9-adgangs-adgangskontrolpolitikke</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-9-aktiver-forvaltning-af-aktiver</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-1-9-personaleomradet-personalesikkerhed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-6-2-manglende-overholdelse-og-korrigerende-foranstaltninger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-7-1-topledelsens-engagement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-denmark-7-2-topledelsestraening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-1-konzepte-in-bezug-auf-die-risikoanalyse-und-auf-die-sicherheit-in-der-informationstechnik</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-10-multi-faktor-authentifizierung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-2-protokollierung-protokollierung-und-erkennung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-2-sicherheitsvorfalle-bewaltigung-von-sicherheitsvorfallen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-3-aufrechterhaltung-des-betriebs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-4-sicherheit-der-lieferkette</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-5-sicherheitsmassnahmen-beim-erwerb-und-bei-der-entwicklung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-6-wirksamkeit-von-massnahmen-zum-management-von-cybersicherheitsrisiken</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-7-grundlegende-verfahren-im-bereich-der-cyberhygiene-und-schulungen-im-bereich-der-sicherheit-in-der-informationstechnik</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-8-konzepte-und-verfahren-fur-den-einsatz-von-kryptografie-und-verschlusselung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-9-personals-sicherheit-des-personals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-9-vermogenswert-vermogenswertverwaltung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-2-9-zugriff-konzepte-fur-die-zugriffskontrolle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-30-6-verwendung-von-cybersicherheits-zertifizierungssystemen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-31-besondere-anforderungen-an-die-risikomanagementmassnahmen-von-betreibern-kritischer-anlagen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-32-meldepflichten-bei-erheblichen-sicherheitsvorfallen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-35-2-unterrichtungspflichten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-38-1-2-engagement-der-obersten-leitung</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-38-3-schulung-fur-das-obere-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-germany-ss-39-1-prufungsanforderungen-und-compliance-berichterstattung-fur-betreiber-kritischer-infrastrukturen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-14-1-desmeuse-tes-anotates-dioikeses</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-14-2-parakolouthese-tes-katartises-apo-ten-anotate-dioikese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-1-metra-diakheirises-kindunon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-a-diakheirise-kindunon-kai-asphaleia-sustematon-plerophorion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-b-katagraphe-katagraphe-kai-anikhneuse</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-b-peristatika-diakheirise-peristatikon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-d-asphaleia-tes-alusidas-ephodiasmou</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-e-asphales-apoktese-kai-anaptuxe-sustematon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-e-kruptographese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-g-epikheiresiake-sunekheia-kai-antigrapha-asphaleias</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-i-elegkhos-tautotetas-pollaplon-paragonton-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-st-axiologese-tes-apotelesmatikotetas-ton-metron-asphaleias</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-th-energetiko-diakheirise-periousiakon-stoikheion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-th-hr-asphaleia-anthropinou-dunamikou</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-th-prosbase-elegkhos-prosbases</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-2-z-praktikes-ugieines-ston-kubernokhoro-kai-katartise</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-3-kathorismos-kai-parakolouthese-ton-apaitoumenon-metron-asphaleias-tes-alusidas-ephodiasmou</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-4-me-summorphoseis-kai-diorthotikes-energeies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-5-a-upeuthunos-asphaleias-plerophorion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-5-b-tekmeriomenes-politikes-kai-diadikasies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-15-5-g-apographe-ton-periousiakon-stoikheion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-16-1-koinopoieseis-peristatikon-sten-csirt-kai-stous-apodektes-ton-uperesion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-16-2-koinopoieseis-apeilon-stous-apodektes-ton-uperesion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-16-3-semantika-peristatika</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-greece-16-4-koinopoiese-peristatikou-sten-csirt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-1-1-the-network-and-information-system-security-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-1-2-roles-responsibilities-and-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-10-1-human-resources-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-10-2-verification-of-background</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-10-3-termination-or-change-of-employment-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-10-4-disciplinary-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-11-1-access-control-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-11-2-management-of-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-11-3-privileged-accounts-and-system-administration-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-11-4-administration-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-11-5-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-11-6-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-11-7-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-12-1-asset-classification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-12-2-handling-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-12-3-removable-media-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-12-4-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-12-5-deposit-return-or-deletion-of-assets-upon-termination-of-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-13-1-supporting-utilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-13-2-protection-against-physical-and-environmental-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-13-3-perimeter-and-physical-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-2-1-1-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-2-1-2-cybersecurity-risk-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-2-1-3-selection-of-risk-treatment-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-2-1-4-review-of-risk-assessments-and-treatment-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-2-2-compliance-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-2-3-independent-review-of-information-and-network-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-1-incident-handling-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-2-1-monitoring-and-logging-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-2-2-automation-and-frequency-of-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-2-3-log-management-and-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-2-4-alarm-thresholds-and-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-2-5-log-retention-and-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-2-6-log-correlation-redundancy-and-system-availability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-2-7-review-of-monitoring-and-logging-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-3-event-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-4-event-assessment-and-classification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-5-incident-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-3-6-post-incident-reviews</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-1-1-business-continuity-and-disaster-recovery-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-1-2-restoration-and-recovery-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-1-3-business-impact-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-1-4-testing-review-and-update-of-continuity-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-2-1-backup-and-redundancy-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-2-2-backup-planning-and-implementation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-2-3-verification-of-backup-integrity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-2-4-availability-and-redundancy-of-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-2-5-monitoring-and-adjusting-resources-for-redundancy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-2-6-testing-of-backup-and-recovery-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-4-3-crisis-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-5-1-1-supply-chain-security-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-5-1-2-supplier-and-service-provider-selection-criteria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-5-1-3-consideration-of-coordinated-supply-chain-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-5-1-4-supply-chain-contractual-security-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-5-1-5-integration-of-security-criteria-in-supplier-selection-and-procurement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-5-1-6-monitoring-of-supplier-and-service-provider-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-5-1-7-monitoring-and-analysis-of-supplier-and-service-provider-performance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-5-2-directory-of-suppliers-and-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-1-security-in-acquisition-of-ict-services-or-ict-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-10-1-vulnerability-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-10-2-vulnerability-monitoring-and-handling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-10-3-mitigation-planning-for-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-10-4-review-of-vulnerability-information-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-2-secure-development-life-cycle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-3-configuration-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-4-change-management-repairs-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-5-security-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-6-security-patch-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7a-network-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7b-network-security-internal-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7c-network-security-restriction-of-unnecessary-network-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7d-network-security-remote-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7e-network-security-dedicated-security-administration-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7f-network-security-deactivation-of-unneeded-connections-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7g-network-security-authorised-device-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7h-network-security-service-provider-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7i-network-security-secure-inter-system-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7j-network-security-protocol-transition</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7k-network-security-e-mail-communication-standards</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-7l-network-security-dns-and-internet-routing-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-8-network-segmentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-6-9-protection-against-malicious-and-unauthorised-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-7-policy-and-procedures-for-effectiveness-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-8-1-awareness-raising-and-basic-cyber-hygiene-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-8-2-security-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-9-1-cryptography-policy-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-9-2-cryptographic-measures-protocols-and-key-management-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-9-3-review-of-cryptographic-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-10-11-nacionalineje-kibernetiniu-incidentu-valdymo-platformoje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-10-rizikos-vertinimo-ataskaitos-ir-rizikos-valdymo-plano-patvirtinimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-11-rizikos-vertinimo-ataskaita</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-12-rizikos-valdymo-planas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-13-14-rizikos-vertinimo-rezultatu-teikimas-ir-dokumentu-saugojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-13-nedidelis-kibernetinis-incidentas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-14-kibernetinio-incidento-pirminio-vertinimo-ataskaita</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-15-menesinis-ataskaitu-teikimas-apie-ilgalaikius-incidentus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-16-uz-kibernetini-sauguma-atsakingu-asmenu-paskyrimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-17-18-pranesimas-apie-paskirtus-kibernetinio-saugumo-atsakingus-asmenis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-17-savanoriska-ataskaita</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-20-kibernetinio-saugumo-vadovo-ir-arba-saugumo-pareiguno-pareigos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-21-administratoriaus-paskyrimas-ir-pareigos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-22-kibernetiniu-incidentu-valdymo-plano-patvirtinimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-23-incidentu-plano-koordinavimas-su-paslaugu-teikejais</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-24-kibernetiniu-incidentu-valdymo-planas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-25-zurnaliniu-irasu-valdymas-ir-isibrovimu-prevencija</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-1-privalomi-zurnalo-irasai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-10-kontroliuojama-prieiga-prie-zurnalo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-11-periodinis-zurnalo-perziurejimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-12-tinklo-isibrovimo-aptikimo-sistema</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-13-neiprastos-veiklos-registravimas-ir-ispejimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-14-tinklu-atskyrimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-15-reguliari-ugniasienes-saugumo-taisykliu-perziura</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-2-dvigubo-laiko-saltinio-reikalavimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-3-privalomi-zurnalo-duomenys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-4-visu-tinklo-srauto-ivykiu-registravimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-5-specializuota-zurnaliniu-irasu-saugykla-esminiams-kibernetinio-saugumo-subjektams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-6-pranesimas-apie-ivykiu-zurnalu-registravimo-sutrikimus-esminiams-svarbos-kibernetinio-saugumo-subjektams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-26-7-9-zurnalo-saugojimas-ir-vientisumas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-27-verslo-testinumo-valdymo-planas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-28-duomenu-atsargines-kopijos-ir-atkurimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-29-verslo-testinumo-testo-ataskaitos-pateikimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-3-saugumo-operaciju-centro-soc-skirto-incidentams-valdyti-isteigimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-31-16-tinklo-prieinamumo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-31-17-atsarginiu-kopiju-kurimas-ir-geografiskai-nutoles-saugojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-31-18-atsarginiu-kopiju-atkurimo-testavimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-31-19-atsargines-patalpos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-31-20-irangos-dubliavimas-ir-bukles-stebejimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-32-tiekimo-grandines-saugumo-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-33-tiekeju-atrankos-kriterijai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-34-tiekeju-sutarciu-reikalavimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-35-tiekeju-rizikos-vertinimo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-36-interneto-paslaugu-sutartis-esminems-kibernetinio-saugumo-subjektams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-37-interneto-paslaugu-sutartis-svarbiam-kibernetinio-saugumo-subjektas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-38-tiekeju-atitikties-stebesena</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-39-tiekeju-saraso-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-4-kibernetinio-saugumo-politikos-patvirtinimas-ir-turinys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-4-kibernetiniu-incidentu-valdymas-pagal-kibernetiniu-incidentu-valdymo-plana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-40-saugumas-isigyjant-kuriant-ir-priziurint</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-41-programines-irangos-diegimo-apribojimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-42-tinklo-ir-informaciniu-sistemu-pokyciu-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-43-operaciniu-pokyciu-patvirtinimas-ir-testavimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-44-pataisu-valdymo-proceduros</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-45-46-pazeidziamumo-valdymas-ir-atskleidimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-21-tinklo-architekturos-dokumentacija</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-22-isilauzimo-ataku-pedsaku-atnaujinimas-esminiams-kibernetinio-saugumo-subjektas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-23-serveriu-ir-darbo-vietu-ugniasieniu-konfiguracija</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-24-el-pasto-turinio-saugumas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-25-konfiguracijos-valdymas-ir-saugojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-26-saugus-belaidis-autentifikavimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-27-saugus-tinklo-protokolai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-28-nereikalingi-protokolai-ir-atviri-prievadai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-29-lygiarangio-p2p-rysio-ribojimas-esminems-kibernetinio-saugumo-subjektas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-30-programines-irangos-atnaujinimo-igyvendinimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-31-senosios-sistemos-tinklo-segmentavimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-32-vidinis-tinklo-segmentavimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-33-vykdomojo-kodo-kontrole</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-34-saugus-os-vaizdo-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-35-sesijos-duomenu-istrynimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-36-svetainiu-saugasienes-waf-naudojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-37-owasp-pagristi-ziniatinklio-saugumo-standartai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-38-ziniatinklio-formu-ivesties-tikrinimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-39-issamiu-klaidu-pranesimu-slopinimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-40-https-protokolo-metodo-apribojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-41-centralizuota-apsauga-nuo-kenkejisku-programu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-42-teisetas-ir-autorizuotas-programines-irangos-naudojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-47-43-istekliu-stebejimas-ir-ispejimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-48-atitikties-vertinimas-ir-audito-procedura</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-49-saugumo-veiklos-vertinimas-ir-stebesena</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-5-kibernetinio-saugumo-politikos-pateikimas-nksc</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-51-metinis-atitikties-vertinimo-teikimas-nksc</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-52-kibernetinio-saugumo-higiena-ir-mokymai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-53-darbuotoju-informuotumas-apie-kibernetini-sauguma</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-54-kibernetinio-saugumo-mokymu-ataskaitos-ir-saugojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-55-56-kriptografija-ir-sifravimo-politika</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-57-44-konfidencialios-informacijos-sifravimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-57-45-belaidzio-tinklo-sifravimas-ir-konfiguravimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-57-46-saugus-mobilusis-rysys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-57-47-mobiliojo-ir-isorinio-saugojimo-irenginiu-sifravimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-57-48-esminis-esminiu-kibernetinio-saugumo-subjektu-interneto-svetainiu-kriptografines-kontroles-priemones</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-57-48-svarbu-svarbiu-kibernetinio-saugumo-subjektu-svetainiu-kriptografines-kontroles-priemones</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-57-49-atsarginiu-kopiju-sifravimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-57-50-kriptografiniu-raktu-valdymo-audito-irasu-saugojimas-ir-stebesena</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-58-zmogiskuju-istekliu-saugumo-reikalavimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-59-fizines-prieigos-kontroles-reikalavimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-60-51-serveriu-patalpu-ir-atsarginiu-saugyklu-fizinis-saugumas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-60-52-kontroliuojama-prieiga-prie-saugiu-patalpu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-61-kibernetinio-saugumo-turto-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-62-kvalifikuota-sistemos-prieziura-ir-palaikymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-63-aparaturos-gedimu-registravimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-64-53-neleistiniu-irenginiu-apribojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-64-54-centralizuotas-mobiliuju-irenginiu-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-64-55-mobiliojo-kodo-gresmiu-mazinimas-esminiams-kibernetinio-saugumo-subjektas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-64-56-nuotolinis-mobiliuju-irenginiu-duomenu-istrynimas-esminiams-kibernetinio-saugumo-subjektas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-64-57-esminiams-techniniai-ir-aplinkos-saugumo-reikalavimai-esminiams-kibernetinio-saugumo-subjektas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-64-57-svarbiems-techniniai-ir-aplinkos-saugumo-reikalavimai-svarbiems-kibernetinio-saugumo-subjektas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-65-prieigos-valdymo-tvarka</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-66-administratoriaus-prieigos-saraso-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-67-slaptazodziu-saugojimas-ir-perdavimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-68-saugaus-autentifikavimo-ir-komunikacijos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-58-administratoriaus-ir-naudotojo-paskyru-atskyrimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-59-naudotoju-teisiu-apribojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-60-unikalus-vartotojo-identifikavimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-61-daugialype-autentifikacija-vartotojams-ir-administratoriams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-62-vartotojo-paskyros-sustabdymas-del-neaktyvumo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-63-administratoriaus-paskyros-sustabdymas-del-neveiklumo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-64-nedelsiamas-prieigos-atsaukimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-65-neveikliu-paskyru-blokavimas-ir-istrynimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-66-ekrano-uzrakinimas-ir-sesijos-nutraukimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-67-automatinis-darbo-vietos-uzraktas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-68-draudimas-issaugoti-slaptazodzius-narsykleje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-69-slaptazodzio-sudetingumo-reikalavimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-70-uzblokavimas-po-nesekmingu-prisijungimo-bandymu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-71-vartotojo-slaptazodzio-reikalavimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-72-administratoriaus-slaptazodzio-reikalavimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-73-administratoriaus-paskyros-kontrole</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-74-vartotojo-paskyros-kontrole</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-75-vietines-paskyros-atitiktis-reikalavimams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-69-76-svetaines-autentifikavimo-saugumas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-guide-lithuania-7-9-kibernetinio-saugumo-rizikos-vertinimas-ir-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-10-ss-a-biztonsagi-osztalyba-sorolas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-11-ss-az-elektronikus-informacios-rendszer-biztonsagaert-felelos-szemely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-13-ss-az-elektronikus-informacios-rendszer-fejlesztese-tovabbfejlesztese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-14-ss-kulonleges-fejlesztesi-szabalyok</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-15-ss-sebezhetosegi-ertekelesi-szabvanyok-es-javitasi-tervek</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-16-ss-kiberbiztonsagi-audit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-17-ss-a-tamogato-rendszerek-vedelmi-kovetelmenyei</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-18-ss-1-a-kozponti-rendszer-szolgaltatojanak-felelossegei</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-18-ss-2-a-kozponti-rendszer-felhasznaloi-szervezetenek-felelossegei</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-18-ss-3-jogi-alap-es-a-szolgaltatok-es-felhasznalok-kozos-operativ-feladatai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-2-kockazatkezelesi-keretrendszer-letrehozasa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-1-informatikai-rendszer-es-szolgaltatasleltar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-10-a-biztonsagi-intezkedesek-idoszakos-ertekelese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-11-javito-intezkedesek</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-12-a-rendszer-hasznalata-es-elfogadasa-a-szervezet-vezetoje-altal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-13-a-szervezet-vezetojenek-szabalyozasi-felelossegei</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-2-szerepkorok-es-felelossegek</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-3-adatosztalyozas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-4-kockazatkezeles-es-hataselemzes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-5-rendszerbiztonsagi-besorolas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-6-a-kockazattal-aranyos-biztonsagi-intezkedesek-meghatarozasa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-7-informaciobiztonsagi-politika-kezelese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-8-a-biztonsagi-intezkedesek-megfelelosegenek-es-hatekonysaganak-biztositasa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-3-9-a-biztonsagi-intezkedesek-kezdeti-ertekelese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-4-a-biztonsagi-intezkedesek-idoszakos-felulvizsgalata</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-5-a-kepzes-es-tudatossag</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-5-b-reszvetel-a-nemzeti-gyakorlatokon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-5-c-naplozas-es-monitorozas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-5-d-harmadik-fel-es-beszallitoi-biztonsag</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-5-e-incidenskezeles-es-reagalas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-5-f-az-erintett-felek-ertesitese-a-kiberbiztonsagi-incidensekrol</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-5-g-a-hatosagi-iranymutatasoknak-valo-megfeleles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-5-i-kiberbiztonsagi-koltsegvetes-tervezes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-6-a-vezetoi-felelosseg-kore</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-6-ss-9-europai-kiberbiztonsagi-tanusitasi-rendszerek-hasznalata</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-66-ss-biztonsagi-esemenyek-ertesitese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-67-ss-1-onkentes-incidensjelentes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-70-ss-kiberbiztonsagi-incidensek-kezelese</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-hungary-9-ss-adatosztalyozasi-szabalyok</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-15-3-threat-notifications-to-recipients-of-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-15-incident-notification-requirements-for-csirt-and-service-recipients</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-28-1-top-management-commitment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-28-3-top-management-monitoring-for-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-a-risk-management-and-information-system-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-b-incidents-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-b-logs-logging-and-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-c-business-continuity-and-backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-d-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-e-secure-system-acquisition-and-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-f-assessing-effectiveness-of-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-g-cyber-hygiene-practices-and-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-h-encryption</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-i-access-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-i-assets-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-i-hr-human-resource-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-4-j-multi-factor-authentication-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-5-defining-and-monitoring-required-supply-chain-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-29-6-non-conformities-and-corrective-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-30-use-of-cyber-security-certification-schemes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-33-1-voluntary-information-sharing-arrangements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-33-2-cybersecurity-information-sharing-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-33-4-notification-of-participation-in-information-exchange-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-ireland-34-voluntary-notification-of-relevant-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-23-1-approvano-le-modalita-di-implementazione</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-23-2-formazione-in-materia-di-sicurezza-informatica</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-23-3-comunicazione</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-a-politiche-di-analisi-dei-rischi-e-di-sicurezza-dei-sistemi-informativi-e-di-rete</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-b-1-gestione-degli-incidenti-incidenti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-b-2-gestione-degli-incidenti-registrazione-e-rilevamento</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-c-continuita-operativa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-d-sicurezza-della-catena-di-approvvigionamento</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-e-1-sicurezza-dellacquisizione</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-e-2-sicurezza-dellacquisizione</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-f-valutare-lefficacia-delle-misure-di-gestione-del-rischio-di-sicurezza-informatica</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-g-igiene-della-sicurezza-informatica</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-h-politiche-e-procedure-relative-alluso-della-crittografia-e-ove-opportuno-della-cifratura</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-i-1-risorse-umane-sicurezza-e-affidabilita-del-personale-politiche-di-controllo-dellaccesso-e-gestione-dei-beni-e-degli-assetti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-i-2-controllo-degli-accessi-sicurezza-e-affidabilita-del-personale-politiche-di-controllo-dellaccesso-e-gestione-dei-beni-e-degli-assetti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-i-3-assetti-sicurezza-e-affidabilita-del-personale-politiche-di-controllo-dellaccesso-e-gestione-dei-beni-e-degli-assetti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-2-l-autenticazione-multifattoriale</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-3-sicurezza-della-catena-di-approvvigionamento</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-24-4-non-conformita-e-azioni-correttive</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-25-1-obblighi-in-materia-di-notifica-di-incidente</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-25-10-notifiche-di-minacce-ai-destinatari-dei-servizi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-25-2-incidenti-transfrontalieri</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-25-5-notifiche-di-incidenti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-25-9-notifiche-di-incidenti-ai-destinatari-del-servizio</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-26-1-notifica-volontaria-di-informazioni-pertinenti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-27-uso-di-schemi-di-certificazione-della-cybersicurezza</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-italy-art-30-1-elencazione-caratterizzazione-e-categorizzazione-delle-attivita-e-dei-servizi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-25-1-kiberdrosibas-parvaldibu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-25-2-pazinojums-par-kiberdrosibas-vaditaja-iecelsanu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-25-3-kiberdrosibas-parvaldnieka-atbilstiba</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-25-4-pazinojums-par-izmainam</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-25-5-kiberdrosibas-parvaldnieka-pienakumi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-a-riska-parvaldiba-un-informacijas-sistemu-drosiba</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-b-1-incidentu-incidentu-parvaldiba-registresana-un-atklasana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-b-2-egistresana-un-atklasana-incidentu-parvaldiba-registresana-un-atklasana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-c-piegades-kedes-drosiba</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-d-sistemas-un-aktivu-parvaldiba</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-e-dublejumi-un-sifresana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-f-cilvekresursi-un-apmaciba</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-g-piekluves-kontrole-un-daudzfaktoru-autentifikacija-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-27-h-drosa-sistemas-iegade-un-izstrade</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-28-1-kiberriska-parvaldibas-un-nepartrauktibas-plani</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-29-agras-bridinasanas-sensori</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-30-1-infromacijas-sistemas-atbilstosa-infrastruktura-vai-datu-centros</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-31-centralizeta-aizsardziba-pret-pakalpojumatteices-kiberuzbrukumiem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-33-kiberhigienas-prasibas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-34-1-incidentu-noversana-un-informesana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-34-2-agrina-bridinasana-par-nozimigu-kiberincidentu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-34-3-zinojums-par-nozimigu-kiberincidentu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-34-4-incidentu-un-draudu-pazinojumi-pakalpojumu-sanemejiem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-34-5-galigais-zinojums-par-incidentu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-34-6-progresa-zinojums-par-incidentu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-34-9-brivpratiga-zinosana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-38-kiberuzbrukumu-attiecinasana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-39-koordineta-ievainojamibu-atklasana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-40-1-ievainojamibu-atklasana-un-noversana</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-40-2-neaizsargatibu-noversanas-grafiks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-43-1-atbilstibas-pasnovertejums</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-latvia-45-3-neatbilstibas-un-korigejosas-darbibas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-1-tinklu-ir-informaciniu-sistemu-atitiktis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-2-kibernetinio-saugumo-reikalavimu-terminas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-3-igyvendinimo-duomenu-pateikimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-1-kibernetinio-saugumo-politika-ir-rizikos-analizes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-10-a-zmogiskuju-istekliu-saugumas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-10-b-prieigos-kontrole</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-10-c-turto-valdymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-11-daugiafaktorinis-autentifikavimas-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-12-kibernetinio-saugumo-prieigos-ir-duomenu-teisiu-politika</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-13-kitus-taikomus-kibernetinio-saugumo-reikalavimus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-2-auksciausiosios-vadovybes-atsakomybe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-3-a-kibernetiniu-incidentu-valdyma</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-3-b-zurnalai-ir-aptikimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-4-veiklos-testinuma</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-5-tiekimo-grandines-sauguma</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-6-tinklu-ir-informaciniu-sistemu-sauguma</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-7-kibernetinio-saugumo-reikalavimu-veiksmingumui</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-8-kibernetines-higienos-praktika-ir-mokymus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-5-9-kriptografijos-ir-sifravimo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-6-vadovybes-atsakomybe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-7-kibernetinio-saugumo-mokymai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-14-8-kibernetinio-saugumo-auditai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-15-1-paskirti-kibernetinio-saugumo-vadova</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-15-2-paskirti-saugos-igaliotini</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-15-3-kibernetinio-saugumo-vaidmenys-ir-atsakomybe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-15-4-kibernetinio-saugumo-valdymo-uzsakymas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-15-5-kibernetinio-saugumo-vadovas-ir-saugos-igaliotinis-reikalavimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-16-4-esminiai-subjektai-sudary-salygas-nacionaliniam-kibernetinio-saugumo-centrui-technines-kibernetinio-saugumo-priemones</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-18-1-pranesimai-apie-incidentus-csirt-ir-paslaugu-gavejams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-18-4-nukreipti-pranesimai-apie-incidentus-csirt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-19-1-kibernetinio-saugumo-informacine-sistema</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-19-3-kibernetinio-saugumo-informacines-sistemos-naudojimas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-19-4-dalijimosi-informacija-susitarimai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-37-1-saugus-instituciju-tinklas-valstybes-ir-savivaldybiu-institucijos-ir-istaigos-valstybes-valdomos-imones-ir-viesosios-istaigos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-lithuania-38-1-duomenu-centru-naudojimas-saugaus-tinklo-naudotojams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-1-mesures-de-securite-et-gestion-des-risques</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-10deg-authentification-multifactorielle-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-1deg-gestion-des-risques-et-securite-des-systemes-dinformation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-2deg-buches-journalisation-et-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-2deg-incidents-gestion-des-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-3deg-continuite-des-activites-et-sauvegardes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-4deg-securite-de-la-chaine-dapprovisionnement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-5deg-acquisition-et-developpement-de-systemes-securises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-6deg-evaluation-de-lefficacite-des-mesures-de-securite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-7deg-pratiques-et-formation-en-matiere-de-cyberhygiene</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-8deg-chiffrement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-9deg-actifs-gestion-des-biens</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-9deg-dacces-controle-dacces</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-2-9deg-ressources-humaines-securite-des-ressources-humaines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-4-considerations-sur-les-risques-lies-a-la-chaine-dapprovisionnement-et-evaluations-coordonnees</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-12-5-non-conformites-et-actions-correctives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-13-1-responsabilite-de-lexecutif-en-matiere-de-gestion-du-risque-cybernetique</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-13-2-formation-obligatoire-a-la-cybersecurite-pour-les-dirigeants-et-le-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-14-1-notification-des-incidents-importants</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-14-2-notification-des-cybermenaces-majeures-pour-les-beneficiaires-de-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-14-3-incident-significatif</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-14-4-calendrier-de-notification-des-incidents-et-exigences-en-matiere-de-rapports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-19-1-partage-volontaire-dinformations-sur-la-cybersecurite</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-19-2-communautes-et-accords-de-partage-de-linformation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-19-3-notification-de-participation-a-des-accords-de-partage-dinformations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-luxembourg-20-notification-volontaire</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-14-1-appointment-and-approval-of-a-qualified-auditor-for-the-verification-of-cybersecurity-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-18-1-responsibilities-and-liability-of-the-management-body-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-18-3-mandatory-training-for-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-18-4-regular-cybersecurity-training-for-employees</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-a-risk-management-and-information-system-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-b-incident-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-blogs-logging-and-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-c-business-continuity-and-backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-d-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-e-secure-system-acquisition-and-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-f-effectiveness-assessment-of-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-g-cyber-hygiene-practices-and-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-h-encryption</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-i-access-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-i-assets-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-i-human-resources-human-resources-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-i-risk-management-insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-j-multi-factor-authentication-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-2-k-information-systems-traceability-and-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-3-supply-chain-and-supplier-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-19-4-taking-corrective-action-for-non-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-20-1-notification-of-significant-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-20-2-information-to-service-recipients-about-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-20-3-notification-of-cross-border-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-20-4-communication-of-threats-and-countermeasures-to-service-recipients</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-20-5-timeline-and-procedure-for-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-21-1-the-use-of-certified-products-services-and-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-26-1-arrangements-for-sharing-cybersecurity-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-26-4-notification-of-participation-in-information-sharing-arrangements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-malta-27-1-voluntary-notification-of-relevant-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-24-risicobeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-a-risicobeheer-en-beveiliging-van-informatiesystemen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-b-incidenten-incidentbeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-b-logboeken-logboekregistratie-en-detectie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-c-bedrijfscontinuiteit-en-reservekopieen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-d-beveiliging-van-de-toeleveringsketen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-e-veilige-aanschaf-en-ontwikkeling-van-systemen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-f-beoordeling-van-de-effectiviteit-van-beveiligingsmaatregelen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-g-cyberhygienepraktijken-en-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-h-versleuteling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-i-actief-activabeheer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-i-personeelszaken-veiligheid-van-het-personeel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-i-toegang-toegangscontrole</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-23-3-j-multi-factor-authenticatie-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-26-1-bestuurlijke-verantwoordelijkheid</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-26-2-vermogen-om-cybersecurityrisicos-te-identificeren</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-26-3-implementatietermijn-voor-bestuurders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-26-4-verplichting-tot-bijhouden-van-kennis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-26-5-bewijsplicht-van-training-via-certificering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-27-meldplicht-significante-incidenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-28-vroegtijdige-waarschuwing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-29-melding-update-en-initiele-beoordeling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-30-tussentijds-verslag</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-31-1-eindverslag</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-31-2-voortgangsverslag</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-32-1-ontvangers-informeren-over-belangrijke-incidenten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-32-2-ontvangers-informeren-over-cyberdreigingen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-netherlands-35-vrijwillige-meldingen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-10-a-autentisering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-10-b-adgangskontroll</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-10-c-nettverkssegmentering-og-privilegier</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-10-d-systemrobusthet-og-gjenoppretting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-10-e-systemrobusthet-og-tilgjengelighet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-10-f-systemutvikling-og-vedlikehold</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-10-g-overvaking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-10-krav-om-sikkerhet-for-tilbydere-av-digitale-tjenester</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-11-fysiske-sikkerhetstiltak</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-11-krav-om-varsling-for-tilbydere-av-digitale-tjenester</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-12-sikkerhetstiltak-for-personell</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-13-1-beredskapsplanlegging-for-hendelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-13-2-hendelseshandtering-og-respons</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-13-3-beredskapsplanlegging-og-ovelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-14-1-leverandorsikkerhetssikring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-14-2-leverandorsikkerhetsavtaler</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-14-opplysningsplikt-og-tilgang-til-lokaler-og-utstyr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-17-varslingsplikt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-19-behandling-av-personopplysninger</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-6-1-sikkerhetsstyringssystem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-6-2-ledelsens-ansvar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-7-krav-om-sikkerhet-for-tilbydere-av-samfunnsviktige-tjenester</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-7-risikovurdering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-8-krav-om-varsling-for-tilbydere-av-samfunnsviktige-tjenester</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-8-risikohandtering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-no-ss-9-organisatoriske-sikkerhetstiltak</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-10-dokumentacja-bezpieczenstwa-systemow-informacyjnych</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-11-zglaszanie-incydentow-do-csirt-oraz-odbiorcow-uslug</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-12-wczesne-ostrzezenie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-12a-sprawozdanie-koncowe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-12b-sprawozdania-z-obslugi-powaznych-incydentow</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-13-informacje-przekazywane-do-csirt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-14-struktury-organizacyjne</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-15-wymogi-audytu-bezpieczenstwa-dla-operatorow-uslug-kluczowych</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-1-szacowanie-ryzyka-wystapienia-incydentu-i-zarzadzanie-tym-ryzykiem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-a-polityki-bezpieczenstwa-systemu-informacyjnego</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-b-bezpieczne-pozyskiwanie-i-rozwoj-systemow</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-c-bezpieczenstwo-fizyczne-i-srodowiskowe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-d-bezpieczenstwo-zasobow-ludzkich</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-e-bezpieczenstwo-lancucha-dostaw</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-f-zarzadzanie-ciagloscia-dzialania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-g-ciagle-monitorowanie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-h-skutecznosc-srodkow-technicznych-i-organizacyjnych</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-i-szkolenie-z-zakresu-cyberbezpieczenstwa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-j-higiena-cybernetyczna</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-k-kryptografia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-l-uwierzytelnianie-wieloskladnikowe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-m-zarzadzanie-aktywam</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-2-n-polityki-kontroli-dostepu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-3-zagrozenia-i-podatnosci-cybernetyczne</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-4-dzienniki-rejestrowanie-i-wykrywanie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-4-incydenty-zarzadzanie-incydentami</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-1-5-zapobiegac-i-ograniczac-skutki-incydentow</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8-2-definiowanie-wymaganych-srodkow-bezpieczenstwa-lancucha-dostaw</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8c-odpowiedzialnosc-kierownicza-za-zgodnosc-z-cyberbezpieczenstwem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8d-odpowiedzialnosc-menedzerska</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8e-szkolenie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8f-weryfikacja-przeszlosci-kryminalnej-personelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-8h-wymiana-informacji-o-cyberbezpieczenstwie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-poland-9-wspolpraca-z-podmiotami-krajowego-systemu-cyberbezpieczenstwa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-24deg-cooperacao-com-o-sector-privado</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-25deg-1-a-c-responsabilidade-da-alta-direcao</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-25deg-1-d-formacao-obrigatoria-e-sensibilizacao-da-gestao</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-26deg-gestao-de-riscos-de-ciberseguranca-e-medidas-de-protecao</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-a-incidentes-gestao-de-incidentes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-a-registos-gravacao-e-detecao</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-b-continuidade-das-atividades</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-c-seguranca-da-cadeia-de-abastecimento</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-d-seguranca-na-aquisicao-desenvolvimento-e-manutencao</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-e-avaliacao-da-eficacia-das-medidas-de-seguranca</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-f-ciber-higiene-e-formacao</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-g-politicas-de-criptografia-e-cifragem</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-h-acesso-controlo-de-acesso</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-h-ativos-gestao-de-ativos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-h-recursos-humanos-seguranca-dos-recursos-humanos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-1-i-autenticacao-multifator-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-27deg-2-obrigacao-de-adotar-medidas-corretivas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-28deg-definir-e-monitorizar-as-medidas-de-seguranca-necessarias-na-cadeia-de-fornecimento</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-29deg-1-obrigacao-de-analise-de-risco</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-29deg-2-adocao-de-medidas-de-ciberseguranca</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-29deg-3-documentacao-da-analise-de-risco</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-30deg-relatorio-anual</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-31deg-designacao-do-responsavel-de-ciberseguranca</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-32deg-ponto-de-contacto-permanente</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-38deg-vulnerabilidades-em-sistemas-de-informacao</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-40deg-notificacao-obrigatoria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-42deg-notificacao-inicial</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-43deg-notificacao-do-fim-de-impacto-significativo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-44deg-relatorios-final-e-intercalar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-45deg-notificacoes-voluntarias-de-informacoes-pertinentes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-portugal-48deg-comunicacao-aos-destinatarios-dos-servicos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-11-1-gestionarea-riscurilor-de-securitate</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-11-4-abordare-cuprinzatoare-a-securitatii-cibernetice</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-11-5-auditului-de-securitate</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-11-7-listei-de-active-si-riscuri</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-11-8-definirea-si-monitorizarea-masurilor-necesare-de-securitate-a-lantului-de-aprovizionare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-12-3-aplicarea-masurilor-corective-in-caz-de-nerespectare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-12-4-transmiterea-autoevaluarii-anuale-a-maturitatii-cibernetice</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-12-5-planul-de-masuri-pentru-remedierea-deficientelor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-a-gestionarea-riscurilor-si-securitatea-sistemelor-informatice</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-b-evaluarea-eficacitatii-masurilor-de-securitate</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-c-criptarea</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-d-securitatea-lantului-de-aprovizionare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-e-achizitionarea-si-dezvoltarea-de-sisteme-sigure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-f-acces-controlul-accesului</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-f-activ-gestionarea-activelor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-f-resurse-umane-securitatea-resurselor-umane</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-g-incidente-gestionarea-incidentelor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-g-jurnale-inregistrare-si-detectare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-h-continuitatea-activitatii-si-backup-uri</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-i-practici-si-formare-in-domeniul-igienei-cibernetice</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-13-1-j-autentificare-cu-mai-multi-factori-mfa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-14-1-responsabilitatea-conducerii-pentru-masurile-de-securitate</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-14-2-formarea-profesionala-in-securitate-cibernetica-pentru-conducere</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-14-3-alocarea-resurselor-si-desemnarea-responsabililor-de-securitate</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-14-4-cerinte-pentru-responsabilul-cu-securitatea</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-15-1-obligatia-generala-de-raportare-si-notificare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-15-2-modalitatea-de-raportare</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-15-3-informatii-privind-impactul-transfrontalier-al-incidentelor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-15-5-comunicarea-amenintarilor-si-a-masurilor-corective-catre-destinatari</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-15-7-notificarea-obligatorie-a-incidentelor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-16-raportarea-voluntara-a-incidentelor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-30-infiintarea-si-autorizarea-csirt-urilor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-31-obligatiile-si-autorizarea-csirt-urilor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-32-cerintele-operationale-de-securitate-si-de-cooperare-pentru-csirt-uri</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-romania-33-responsabilitatile-si-serviciile-csirt-urilor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-1-povinnost-vedenia-presadzovat-bezpecnostne-opatrenia-tretich-stran</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-2-zmluvne-povinnosti-pre-bezpecnost-tretich-stran</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-6-a-povinnost-riesit-incidenty</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-6-b-hlasenie-zavaznych-incidentov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-6-c-povinnost-spolupracovat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-6-d-forenzna-ochrana-udajov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-6-e-oznamenie-organom-cinnym-v-trestnom-konani</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-6-f-analyza-rizik-dodavatelskeho-retazca</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-6-g-implementacia-bezpecnostnych-opatreni</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-19-6-h-interne-hlasenie-a-eskalacia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-1-bezpecnostne-opatrenia-zalozene-na-analyze-rizik</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-a-sprava-bezpecnosti-informacii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-b-zranitelnost-a-riadenie-hrozieb</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-c-aktiva-sprava-aktiv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-d-incidenty-riadenie-incidentov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-e-podnikatelska-kontinuita-a-obnovenie-po-katastrofe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-f-bezpecny-vyvoj-a-udrzba</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-g-ucinnost-opatreni-riadenia-rizik</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-h-politiky-kryptografie-a-sifrovania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-i-ludske-zdroje-bezpecnost-ludskych-zdrojov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-j-pristup-kontrola-pristupu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-k-prevadzkova-bezpecnost</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-l-skodlivy-kod-a-zabezpecenie-obsahu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-m-zabezpecenie-systemu-a-komunikacie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-n-monitorovanie-a-podavanie-sprav</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-o-fyzicka-a-environmentalna-bezpecnost</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-p-ochrana-udajov-a-sukromie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-q-zabezpecenie-dodavatelskeho-retazca</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-2-r-bezpecny-nakup-a-pouzivanie-certifikovanych-ikt-systemov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-a-vymenovanie-nezavisleho-manazera-kybernetickej-bezpecnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-b-detekcia-kybernetickych-bezpecnostnych-incidentov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-c-denniky-zaznamenavanie-a-detekcia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-d-riesenie-kybernetickych-bezpecnostnych-incidentov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-e-urcenie-kontaktnej-osoby-na-prijimanie-hlaseni</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-f-hlasenie-incidentov-a-vcasne-varovanie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-g-dohlad-vrcholoveho-manazmentu-nad-ulohami-a-skoleniami</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-h-urcenie-zodpovednosti-za-schvalovanie-bezpecnostnych-opatreni</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-4-i-praktiky-a-skolenia-v-oblasti-kybernetickej-hygieny</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-20-5-hodnotenie-kybernetickych-a-politickych-rizik-tretich-stran</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-24-3-postup-pri-hlaseni-kybernetickych-bezpecnostnych-incidentov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-24-5-hlasenie-kybernetickych-hrozieb-a-zranitelnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-27-6-hlasenie-vykonanych-reaktivnych-opatreni</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-29-1-povinnost-a-ucel-auditu-kybernetickej-bezpecnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-29-2-povinnost-auditu-pri-bezpecnostnych-zmenach</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-29-5-odovzdanie-vysledkov-auditu-a-napravne-opatrenia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovakia-ss-29-8-vykonanie-samohodnotenia-kybernetickej-bezpecnosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-20-1-odgovornost-najvisjega-vodstva</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-20-2-odgovornost-za-upravljanje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-20-3-obvezno-usposabljanje-odgovornih-oseb</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-20-4-usposabljanje-zaposlenih</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-20-5-usposabljanje-skrbnikov-sistemov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-21-1-1-varnost-informacijskih-sistemov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-21-1-2-varnostni-in-kontinuitetni-ukrepi-z-evidenco-sredstev</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-21-1-3-analiza-upravljanja-tveganj</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-21-1-4-nacrt-neprekinjenega-poslovanja</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-21-1-5-nacrt-za-obnovo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-21-1-6-obvladovanje-incidentov-upravljanje-incidentov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-21-1-7-analiza-tveganj-in-varnost-informacijskih-sistemov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-21-1-8-presoja-ucinkovitosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-1-obveznost-sprejema-varnostnih-ukrepov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-1-podpora-vodstva-in-nacrtovanje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-10-varnost-dobavne-verige</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-11-fizicna-in-tehnicna-zascita-dostopov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-12-pridobivanje-razvoj-in-vzdrzevanje-omrezij-in-informacijskih-sistemov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-13-upravljanje-ranljivosti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-14-zascita-pred-zlonamerno-kodo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-15-mehanizmi-avtentikacije</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-16-vecfaktorska-avtentikacija</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-17-uporaba-oblacnih-storitev</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-2-preverjanje-integritete-kadrov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-3-kibernetska-higiena-in-usposabljanje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-4-cloveski-viri-varnost-cloveskih-virov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-4-dostop-nadzor-dostopa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-4-sredstva-upravljanje-sredstev</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-5-upravljanje-varnostnih-kopij</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-6-dnevniki-belezenje-in-zaznavanje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-7-upravljanje-omrezij-in-sistemov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-8-kriptografija-in-sifriranje</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-2-9-upravljanje-omrezja-in-komunikacij</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-4-ocena-tveganj-v-dobavni-verigi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-5-neskladnosti-in-korektivni-ukrepi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-22-8-uporaba-ranljivih-ikt-resitev</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-23-preverjanje-preteklosti-za-dostop-do-kljucnih-sistemov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-24-spremljanje-in-hranjenje-dnevnikov-za-odziv-na-incidente</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-25-ocena-skladnosti-in-samoocenjevanje-organizacij</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-27-16-uporaba-certificiranih-in-zaupanja-vrednih-resitev-ikt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-29-obveznosti-porocanja-o-incidentih-in-kibernetskih-groznjah</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-30-postopek-za-priglasitev-pomembnih-incidentov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-34-1-prostovoljna-izmenjava-informacij</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-34-2-skupnosti-in-protokol-izmenjave</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-34-3-vsebina-in-spodbujanje-dogovorov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-34-4-obvescanje-o-sodelovanju-ali-izstopu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-slovenia-clen-49-dolocitev-revizorja-informacijskih-sistemov</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-14-1-responsabilidad-de-los-organos-de-direccion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-14-2-formacion-para-directivos-y-personal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-a-politicas-de-seguridad-y-analisis-de-riesgos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-b-incidentes-gestion-de-incidentes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-b-registros-gestion-de-incidentes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-c-continuidad-de-actividades-y-gestion-de-crisis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-d-seguridad-en-la-cadena-de-suministro</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-e-seguridad-en-desarrollo-y-gestion-de-vulnerabilidades</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-f-evaluacion-de-la-eficacia-de-las-medidas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-g-ciberhigiene-y-formacion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-h-criptografia-y-cifrado</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-i-acceso-control-de-acceso</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-i-activos-gestion-de-activos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-i-hr-seguridad-de-los-recursos-humanos</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-2-j-autenticacion-y-comunicaciones-de-emergencia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-4-demostracion-y-certificacion-de-cumplimiento</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-15-5-declaracion-de-aplicabilidad-de-sistemas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-16-1-designacion-del-responsable-de-la-seguridad-de-la-informacion</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-16-2-comunicacion-de-la-designacion-del-responsable</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-16-4-cualificaciones-y-posicion-organizativa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-18-1-notificacion-a-la-autoridad-de-control-y-a-los-destinatarios-afectados</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-18-5-comunicacion-de-ciberamenazas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-18-6-requisitos-de-notificacion-de-incidentes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-spain-articulo-28-4-intercambio-de-informacion-sobre-ciberseguridad</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-10-ss-information-vid-betydande-cyberhot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-1-8-sakrade-losningar-for-kommunikation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-2-engagemang-fran-hogsta-ledningen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-1-riskhantering-och-informationssystemsakerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-10-saker-kommunikation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-2-incidenter-incidenthantering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-2-loggar-loggning-och-upptackt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-3-kontinuitet-och-sakerhetskopiering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-4-sakerhet-i-leveranskedjan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-5-saker-systemanskaffning-och-utveckling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-6-bedomning-av-sakerhetsatgardernas-effektivitet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-7-cyberhygienrutiner-och-utbildning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-8-kryptering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-9-atkomst-atkomstkontroll</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-9-hr-sakerhet-inom-personalomradet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-3-ss-9-tillgangar-tillgangshantering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-4-ss-ledningens-engagemang-och-ledarskapsutbildning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-5-ss-initial-anmalan-av-betydande-incidenter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-6-ss-incidentanmalningar</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-7-ss-delrapport</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-8-ss-slutrapport</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nis2-sweden-9-ss-information-vid-betydande-incidenter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-ae-02-potentially-adverse-events-are-analyzed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-ae-03-information-from-multiple-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-ae-04-impact-and-scope-of-adverse-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-ae-06-information-on-adverse-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-ae-07-information-from-cyber-threat-intelligence-and-other-contextual-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-ae-08-incidents-declaration-criteria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-cm-01-monitoring-network-and-network-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-cm-02-monitoring-the-physical-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-cm-03-monitoring-personnel-activity-and-technology-usage</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-cm-06-monitoring-external-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-de-cm-09-monitoring-it-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-oc-01-cybersecurity-risk-management-aligned-with-the-organizational-mission</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-oc-02-stakeholders-needs-in-cybersecurity-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-oc-03-legal-regulatory-and-contractual-cybersecurity-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-oc-04-critical-objectives-and-services-for-external-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-oc-05-organizational-dependencies-on-outcomes-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-ov-01-cybersecurity-risk-management-strategy-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-ov-02-coverage-of-organization-requirements-in-cybersecurity-risk-management-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-ov-03-organizational-cybersecurity-risk-management-performance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-po-01-policy-for-managing-cybersecurity-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-po-02-policy-for-managing-cybersecurity-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rm-01-establishing-and-agreeing-on-risk-management-objectives-with-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rm-02-risk-appetite-and-tolerance-statements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rm-03-cybersecurity-risk-management-in-enterprise-risk-management-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rm-04-strategic-direction-of-risk-response-options</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rm-05-communication-lines-for-cybersecurity-risks-across-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rm-06-standardized-method-for-cybersecurity-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rm-07-strategic-opportunities-in-organizational-cybersecurity-risk-discussions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rr-01-leadership-accountability-and-responsibility-for-fostering-a-risk-aware-cybersecurity-culture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rr-02-roles-and-responsibilities-in-cybersecurity-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rr-03-adequate-resources-for-cybersecurity-risk-strategy-and-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-rr-04-cybersecurity-in-human-resources-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-01-cybersecurity-supply-chain-risk-management-program-and-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-02-establishing-and-communicating-cybersecurity-roles-for-suppliers-customers-and-partners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-03-integrating-cybersecurity-supply-chain-risk-management-into-overall-risk-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-04-prioritizing-suppliers-by-criticality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-05-cybersecurity-risk-requirements-in-contracts-with-suppliers-and-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-06-due-diligence-and-planning-with-suppliers-and-third-party-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-07-supplier-and-third-party-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-08-including-relevant-suppliers-and-third-parties-in-incident-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-09-supply-chain-security-practices-in-risk-management-programs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-gv-sc-10-post-partnership-activities-in-cybersecurity-supply-chain-risk-management-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-am-01-inventory-of-organizational-hardware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-am-02-inventory-of-organizational-software-services-and-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-am-03-organizational-network-communication-and-data-flows-are-mapped</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-am-04-inventory-of-external-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-am-05-prioritizing-criteria-for-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-am-07-inventory-of-data-and-metadata</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-am-08-managing-organizational-it-assets-throughout-their-life-cycles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-im-01-improvements-from-evaluations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-im-02-improvements-from-security-tests-and-exercises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-im-03-improvements-from-operational-processes-procedures-and-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-im-04-incident-response-and-cybersecurity-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-01-asset-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-02-cyber-threat-intelligence-from-forums-and-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-03-internal-and-external-threats-to-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-04-impacts-and-likelihoods-of-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-05-risk-evaluation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-06-risk-responses</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-07-changes-and-exceptions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-08-processes-for-handling-vulnerability-disclosures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-09-reviewing-hardware-and-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-id-ra-10-critical-suppliers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-aa-01-management-of-identities-and-credentials</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-aa-02-binding-identities-to-credentials-based-on-interaction-context</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-aa-03-authentication-before-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-aa-04-identity-assertions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-aa-05-principles-of-least-privilege-and-separation-of-duties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-aa-06-risk-based-physical-access-to-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-at-01-awareness-and-training-of-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-at-02-individuals-in-specialized-roles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ds-01-data-at-rest-is-protected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ds-02-data-in-transit-is-protected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ds-10-data-in-use-is-protected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ds-11-backup-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ir-01-unauthorized-access-to-networks-and-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ir-02-environmental-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ir-03-meeting-resilience-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ir-04-resource-capacity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ps-01-configuration-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ps-02-software-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ps-03-hardware-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ps-04-log-records-for-continuous-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ps-05-unauthorized-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-pr-ps-06-secure-software-development-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rc-co-03-recovery-activities-and-progress-communication-to-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rc-co-04-public-updates-on-incident-recovery-are-shared</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rc-rp-01-recovery-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rc-rp-02-recovery-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rc-rp-03-integrity-of-backups-and-other-restoration-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rc-rp-04-critical-mission-functions-and-cybersecurity-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rc-rp-05-integrity-of-restored-assets-is-verified-systems-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rc-rp-06-end-of-incident-recovery</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-an-03-incident-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-an-06-records-of-investigation-of-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-an-07-incident-data-and-metadata</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-an-08-incidents-magnitude</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-co-02-notifying-stakeholders-of-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-co-03-sharing-information-with-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-ma-01-incident-response-plan-execution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-ma-02-incident-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-ma-03-incident-classification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-ma-04-incidents-escalation-and-elevating</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-ma-05-incident-recovery-criteria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-mi-01-incident-containment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-20-rs-mi-02-incident-eradication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-ae-1-baseline-of-network-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-ae-2-analyze-detected-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-ae-3-event-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-ae-4-impact-of-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-ae-5-incident-alert-thresholds</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-cm-1-the-network-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-cm-2-the-physical-environment-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-cm-3-personnel-activity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-cm-4-malicious-code-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-cm-5-unauthorized-mobile-code-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-cm-6-external-service-provider-activity-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-cm-7-monitoring-for-unauthorized-activity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-cm-8-vulnerability-scans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-dp-1-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-dp-2-detection-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-dp-3-detection-processes-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-dp-4-event-detection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-de-dp-5-detection-processes-improvment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-am-1-physical-device-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-am-2-software-and-app-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-am-3-communication-and-data-flows</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-am-4-external-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-am-5-resource-prioritization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-am-6-cybersecurity-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-be-1-role-in-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-be-2-place-in-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-be-3-organizational-mission-objectives-and-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-be-4-dependencies-and-critical-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-be-5-resilience-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-gv-1-cybersecurity-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-gv-2-cybersecurity-role-coordination</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-gv-3-legal-and-regulatory-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-gv-4-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-ra-1-asset-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-ra-2-cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-ra-3-threat-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-ra-4-impacts-on-business</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-ra-5-risk-evaluation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-ra-6-risk-responses</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-rm-1-risk-management-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-rm-2-risk-tolerance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-rm-3-informing-of-risk-tolerance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-sc-1-cyber-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-sc-2-suppliers-and-third-party-partners-of-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-sc-3-contracts-with-suppliers-and-third-party-partners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-sc-4-audit-suppliers-and-third-party-partners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-id-sc-5-response-and-recovery</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ac-1-identity-and-credential-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ac-2-physical-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ac-3-remote-access-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ac-4-access-permissions-and-authorizations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ac-5-network-integrity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ac-6-proof-of-identity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ac-7-user-device-and-other-asset-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-at-1-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-at-2-privileged-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-at-3-third-party-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-at-4-senior-executives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-at-5-physical-and-cybersecurity-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ds-1-data-at-rest</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ds-2-data-in-transit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ds-3-asset-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ds-4-availability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ds-5-data-leak-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ds-6-integrity-checking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ds-7-the-development-and-testing-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ds-8-integrity-checking-hardware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-1-a-baseline-configuration-of-information-technology-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-10-response-and-recovery-plan-tests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-11-cybersecurity-in-human-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-12-vulnerability-management-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-2-a-system-development-life-cycle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-3-configuration-change-control-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-4-backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-5-physical-operating-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-6-data-destruction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-7-protection-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-8-protection-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ip-9-response-and-recovery-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ma-1-asset-management-and-repair</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-ma-2-asset-remote-management-and-repair</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-pt-1-auditlog-records</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-pt-2-removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-pt-3-principle-of-least-functionality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-pt-4-communications-and-control-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-pr-pt-5-mechanisms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rc-co-1-public-relations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rc-co-2-reputation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rc-co-3-recovery-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rc-im-1-recovery-plan-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rc-im-2-recovery-strategies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rc-rp-1-recovery-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rc-rp-recovery-planning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-an-1-notifications-from-detection-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-an-2-the-impact-of-the-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-an-3-forensics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-an-4-incident-categorization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-an-5-vulnerability-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-co-1-personnel-roles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-co-2-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-co-3-information-sharing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-co-4-coordination-with-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-co-5-voluntary-information-sharing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-im-1-response-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-im-2-response-strategies-update</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-mi-1-incident-containment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-mi-2-incident-mitigation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-mi-3-new-vulnerability-mitigation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-rp-1-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nist-rs-rp-response-planning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/non-electronic-data-and-copies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-1-1-identify-the-organisations-strategy-and-priorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-1-2-identify-the-organisations-structures-and-processes-for-security-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-1-3-identify-the-organisations-processes-for-ict-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-1-4-identify-the-organisations-tolerances-for-ict-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-1-5-identify-the-organisations-deliverables-information-systems-and-supporting-ict-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-1-6-identify-information-processing-and-data-flow</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-2-1-establish-a-process-to-identify-devices-and-software-in-use-at-the-organisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-2-2-establish-organisational-guidelines-for-approved-devices-and-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-2-3-identify-devices-in-use-at-the-organisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-2-4-identify-the-software-in-use-at-the-organisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-3-1-identify-the-users-of-the-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-3-2-identify-and-define-the-different-user-categories</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-1-3-3-identify-roles-and-responsibilities-linked-especially-to-ict-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-1-include-security-in-the-organisations-procurement-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-10-review-the-service-providers-security-when-outsourcing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-2-procure-modern-and-up-to-date-hardware-and-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-3-prefer-ict-products-which-have-been-certified-and-evaluated-by-a-trusted-third-party</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-4-reduce-the-risk-of-targeted-manipulation-of-ict-products-in-the-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-5-use-a-secure-software-development-method</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-6-use-separate-environments-for-development-test-and-production</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-7-implement-adequate-testing-throughout-the-development-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-8-maintain-the-software-code-developedused-by-the-organisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-1-9-maintain-security-responsibility-during-outsourcing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-10-1-include-security-in-the-organisations-change-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-10-2-involve-necessary-ict-security-staff-when-making-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-10-3-test-affected-security-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-10-4-integrate-security-into-the-organisations-urgent-change-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-2-1-establish-and-maintain-a-comprehensive-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-2-2-design-the-ict-system-using-ict-products-which-integrate-well</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-2-3-segment-the-organisations-network-in-accordance-with-its-risk-profile</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-2-4-physically-isolate-the-most-critical-subnets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-2-5-partition-the-domain-architecture-in-accordance-with-the-organisations-needs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-2-6-control-access-to-services-based-on-knowledge-of-users-and-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-2-7-establish-a-robust-and-resilient-ict-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-1-establish-centrally-managed-practices-for-security-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-10-reduce-the-risk-posed-by-iot-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-2-configure-clients-so-that-only-software-known-to-the-organisation-is-able-to-execute</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-3-deactivate-unnecessary-functionality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-4-establish-and-maintain-standard-security-configurations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-5-verify-that-activated-security-configurations-comply-with-the-organisations-approved-security-configurations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-6-ensure-that-maintenance-of-all-configurations-installations-and-operations-are-done-securely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-7-change-all-standard-passwords-on-ict-products-before-deployment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-8-do-not-deactivate-exploit-protection-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-3-9-synchronize-time-across-devices-and-use-trusted-time-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-4-1-establish-access-control-on-as-many-network-ports-as-possible</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-4-2-encrypt-all-wireless-and-wired-connections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-4-3-identify-physical-access-to-switches-and-cables</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-4-4-activate-firewall-on-all-clients-and-servers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-5-1-control-data-flow-between-network-zones</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-5-2-restrict-access-to-internal-services-from-external-locations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-5-3-block-all-direct-traffic-between-clients</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-5-4-isolate-vulnerable-and-low-trust-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-5-5-control-the-data-flow-of-especially-exposed-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-5-6-protect-particularly-critical-services-with-their-own-data-flow</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-5-7-maintain-control-of-data-flow-between-the-organisation-and-its-partners-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-5-8-direct-all-data-flow-to-and-from-managed-mobile-clients-via-the-organisations-network</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-6-1-create-guidelines-for-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-6-2-establish-a-formal-process-for-administration-of-accounts-access-rights-and-privileges</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-6-3-use-a-centralised-tool-to-manage-accounts-access-rights-and-privileges</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-6-4-minimise-privileges-for-end-users-and-special-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-6-5-minimise-privileges-for-management-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-6-6-manage-access-to-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-6-7-use-multifactor-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-7-1-establish-crypto-strategy-in-the-organisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-7-2-activate-encryption-in-services-which-offer-such-functionality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-7-3-encrypt-storage-media-which-contain-confidential-data-and-which-can-easily-be-lost-or-compromised</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-7-4-use-encryption-when-transferring-confidential-information-or-when-trust-in-the-information-channel-is-low</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-7-5-define-security-levels-for-different-types-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-8-1-verify-the-sender-address-of-incoming-emails</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-8-2-activate-starttls-on-the-organisations-email-server</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-8-3-only-use-supported-email-clients-browsers-and-plugins</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-8-4-only-permit-organisation-approved-plugins</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-9-1-plan-for-regular-backups-of-all-the-organisations-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-9-2-include-backups-of-software-to-ensure-recovery</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-9-3-test-backups-regularly</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-2-9-4-protect-backups-against-intentional-and-unintentional-deletion-manipulation-and-reading</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-1-1-conduct-regular-vulnerability-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-1-2-subscribe-to-vulnerability-intelligence-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-1-3-use-automated-and-centralised-tools-to-handle-known-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-2-1-determine-a-strategy-and-guidelines-for-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-2-2-comply-with-laws-regulations-and-the-organisations-guidelines-on-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-2-3-decide-which-parts-of-the-ict-system-to-monitor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-2-4-decide-which-data-is-security-relevant-and-should-be-collected</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-2-5-verify-that-the-monitoring-is-working-as-intended</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-2-6-prevent-manipulation-of-monitoring-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-2-7-review-the-security-relevant-monitoring-data-regularly-and-if-necessary-reconfigure-the-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-3-1-create-a-plan-for-analysing-data-from-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-3-2-establish-and-maintain-expertise-on-the-desired-state-of-the-organisations-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-3-3-select-tools-that-support-manual-and-automated-searches-including-criteria-based-alerts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-3-4-obtain-and-process-threat-information-from-relevant-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-3-5-continually-assess-whether-the-collected-data-is-sufficiently-relevant-and-detailed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-3-6-establish-a-procedure-for-escalating-alerts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-3-7-use-analytics-tools-technology-and-algorithms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-4-1-plan-penetration-testing-with-defined-goals-and-scope</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-4-2-involve-relevant-stakeholders-in-advance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-4-3-use-vulnerability-scanning-tools-and-attack-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-4-4-perform-regular-penetration-testing-at-least-annually-to-identify-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-4-5-test-the-organisations-routines-for-detection-and-preparedness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-3-4-6-communicate-the-results-of-penetration-tests-to-relevant-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-1-1-establish-plans-for-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-1-2-perform-a-business-impact-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-1-3-describe-roles-and-responsibilities-for-personnel-involved-in-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-1-4-establish-agreements-with-relevant-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-1-5-determine-which-communication-channels-to-use-in-the-event-of-an-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-1-6-test-and-rehearse-the-plans-regularly-so-that-they-are-established</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-2-1-review-log-data-and-collect-relevant-data-on-the-incident-to-create-a-good-basis-for-making-decisions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-2-2-determine-the-severity-level-of-the-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-2-3-inform-relevant-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-3-1-identify-extent-and-impact-on-business-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-3-2-determine-whether-the-incident-is-under-control-and-take-the-necessary-reactive-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-3-3-log-all-activities-results-and-relevant-decisions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-3-4-launch-recovery-plan-during-or-after-the-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-3-5-co-ordinate-and-communicate-with-internal-and-external-stakeholders-while-managing-the-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-3-6-perform-necessary-activities-after-the-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-4-1-identify-experiences-and-lessons-learnt-from-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-4-2-review-identified-compromised-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-4-3-assess-the-effectiveness-of-processes-procedures-reporting-formats-and-organisational-structures-related-to-incident-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/nsm-ict-sp-4-4-4-communicate-and-share-findings-with-relevant-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-1-tietojarjestelmien-kayttajilta-vaadittava-koulutus-ja-kokemus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-2-tietojarjestelmien-asianmukaisen-kayton-kannalta-tarpeelliset-kayttoohjeet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-3-tietojarjestelmien-kaytto-valmistajan-antaman-ohjeistuksen-mukaisesti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-4-menettelytavat-virhe-ja-ongelmatilanteissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-5-tietojarjestelmien-asennus-yllapito-ja-paivitys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-6-1-tietoturvan-ja-tietosuojan-seuranta-ja-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-6-2-kayttovaltuushallinta-ja-tunnistautuminen-jarjestelmiin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-6-3-tekniset-vaatimukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-6-4-fyysisten-tilojen-laitteiden-ja-tulosteiden-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-6-5-tyoasemien-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-6-yleiset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-7-asiakas-ja-potilastietojarjestelmat-niihin-liitetyt-tietojarjestelmat-ja-muut-tietojarjestelmat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/omavalvontasuunnitelma-6-8-valtakunnallisiin-tietojarjestelmapalveluihin-liittyminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ot-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/partner-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-10-means-of-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-11-1-2-processing-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-12-1-3-withdrawal-of-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-12-4-5-appropriate-controller-measures-upon-withdrawal-of-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-13-processing-personal-data-through-legal-guardians</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-14-processing-to-serve-the-actual-interest-of-data-subject</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-15-processing-data-from-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-16-1-2-processing-for-limited-interest</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-16-3-4-assessment-of-proposed-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-17-1-choosing-the-processor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-17-2-controller-instructions-to-the-processor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-17-3-4-periodic-assessment-of-processor-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-17-5-guarantees-for-sub-processor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-18-1-further-processing-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-18-2-processing-obligations-for-the-controller</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-19-data-minimisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-2-2-limitations-on-the-transfer-or-disclosure-of-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-2-3-ensuring-transfer-or-disclosure-does-not-impact-the-privacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-20-1-2-disclosure-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-20-3-data-disclosure-in-response-to-requests-from-public-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-20-4-necessary-care-and-guarantees-to-ensure-the-privacy-of-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-20-5-6-disclosure-operations-in-the-records-of-personal-data-processing-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-21-controls-for-processing-personal-data-for-public-interest-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-22-1-4-correction-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-22-5-measures-to-avoid-the-impact-of-processing-inaccurate-incomplete-or-outdated-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-23-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-24-1-2-notification-of-personal-data-breach</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-24-3-4-reporting-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-24-5-notification-of-data-subjects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-25-1-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-25-2-3-contents-and-communication-of-data-protection-impact-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-25-4-grounds-to-re-conduct-the-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-26-processing-health-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-27-processing-credit-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-28-1-2-processing-data-for-advertising-or-awareness-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-28-3-controller-obligations-when-advertising</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-29-direct-marketing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-3-1-procedure-upon-receipt-of-request-from-the-data-subject</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-3-2-grounds-for-refusal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-3-3-exercising-of-rights-by-a-legal-guardian</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-30-collection-and-processing-of-data-for-scientific-research-or-statistical-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-31-photographing-or-copying-official-documents-that-reveal-the-identity-of-data-subjects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-32-1-2-appointment-of-a-data-protection-officer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-32-3-responsibilities-of-the-data-protection-officer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-33-1-4-records-of-personal-data-processing-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-33-5-minimum-requirements-for-personal-data-processing-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-36-1-2-auditing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-37-filing-and-processing-complaints</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-4-1-4-right-to-be-informed-about-the-collection-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-4-5-enhanced-transparency-for-high-risk-and-automated-data-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-4-6-processing-personal-data-for-other-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-4-7-provision-of-information-in-an-appropriate-language</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-5-1-right-of-access-to-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-5-2-ensuring-non-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-6-right-to-request-access-to-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-7-1-right-to-request-correction-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-7-2-supporting-documentation-or-evidence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-7-3-notification-of-concerned-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-7-conditions-for-the-cessation-of-personal-data-transfer-or-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-8-1-right-to-request-destruction-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-8-1-risk-assessment-of-transferring-or-disclosing-personal-data-outside-the-kingdom</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-8-2-3-notification-of-parties-and-destruction-of-copies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-8-2-elements-of-the-data-transfer-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pdpl-article-9-1-2-anonymisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/personnel-quality-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/personnel-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/physical-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pr-ac-identity-management-authentication-and-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pr-at-awareness-and-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pr-ds-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pr-ip-information-protection-processes-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pr-ma-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pr-protect</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/pr-pt-protective-technology</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/principles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/privacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/privacy-by-design-and-default</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/process-management-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/processing-principles-and-accountability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/products-services-and-customer-focus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/property-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/quality-and-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/quality-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rajapinnat-ja-luovutukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rc-co-communications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rc-im-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rc-recover</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rekisterinpitaja-ja-henkilotietojen-kasittelija</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rekisteroidyn-oikeudet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/remedies-liability-and-penalties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/remote-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/remote-work-and-mobile-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/risk-management-and-leadership</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rs-an-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rs-co-communications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rs-im-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rs-mi-mitigation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/rs-respond</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/secure-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/security-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/security-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/security-of-patient-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/security-responsibilities-ssrm</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/security-systems-and-logging</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-4-1-sikkerhetsstyring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-4-2-vurdering-av-risiko</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-4-3-1-2-plikt-til-a-gjennomfore-sikkerhetstiltak</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-4-3-3-plikt-til-a-gjennomfore-ovelser</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-4-4-krav-til-dokumentasjon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-4-5-1-varslingsplikt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-4-5-2-varsling-av-tilsynsmyndigheten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-5-2-beskyttelse-av-skjermingsverdig-informasjon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-5-3-sikkerhetsgradert-informasjon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-5-4-tilgang-til-og-taushetsplikt-med-hensyn-til-sikkerhetsgradert-informasjon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-5-6-kryptosikkerhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-6-2-beskyttelse-av-skjermingsverdige-informasjonssystemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-6-3-godkjenning-av-skjermingsverdige-informasjonssystemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-6-4-1-3-overvaking-av-skjermingsverdige-informasjonssystemer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-6-4-4-handtering-av-overvakingsdata</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-6-4-5-delegert-sikkerhetsovervaking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-6-4-6-informere-autoriserte-brukere-om-overvaking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-7-3-beskyttelse-av-objekter-og-infrastruktur</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-8-1-1-krav-om-sikkerhetsklarering-adgangsklarering-og-autorisasjon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-8-1-2-krav-om-konfidensiell-og-kritisk-sikkerhetsklarering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-8-10-nedsettelse-suspensjon-og-tilbakekallelse-av-autorisasjon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-8-2-sikkerhetsklarering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-8-9-autorisasjon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-9-2-sikkerhetsavtale-med-levererandor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-9-4-1-myndighet-til-a-fatte-vedtak-ved-anskaffelser-til-skjermingsverdig-informasjonssystem-objekt-og-infrastruktur</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/sikkerhetsloven-ss-9-4-2-varsling-til-departementet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-a1-1-evaluation-of-current-processing-capacity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-a1-2-recovery-of-infrastructure-according-to-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-a1-3-testing-of-recovery-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-c1-1-identification-and-maintainment-of-confidental-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-c1-2-disposal-of-confidental-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc1-1-management-commitment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc1-2-board-of-directors-oversight</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc1-3-established-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc1-4-competence-of-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc1-5-accountability-for-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc2-1-quality-information-to-support-internal-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc2-2-internal-communication-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc2-3-communication-with-external-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc3-1-sufficient-specifying-of-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc3-2-identification-of-risks-related-to-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc3-3-potential-of-fraud-is-considered</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc3-4-identification-and-assesment-of-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc4-1-evaluation-of-internal-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc4-2-evaluation-and-communication-of-internal-control-deficiencies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc4-security-monitoring-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc5-1-control-activities-for-mitigation-of-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc5-2-control-activities-for-achievement-of-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc5-3-establishment-of-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-1a-identification-and-listing-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-1b-logical-access-control-for-protected-information-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-1c-technical-security-for-protected-information-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-2-registering-and-authorizing-new-users-before-granting-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-3-management-of-access-to-data-based-on-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-4-physical-access-control-to-facilities-and-protected-information-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-5-discontinuation-of-logical-physical-protections-when-no-longer-required</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-6-logical-access-security-measures-against-threats-from-sources-outside-system-boundries</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-7-restriction-and-protection-of-information-in-transmission-movement-or-removal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc6-8-detection-and-prevention-of-unauthorized-or-malicious-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc7-1-procedures-for-monitoring-changes-to-configurations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc7-2-monitoring-of-system-components-for-anomalies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc7-3-evaluation-of-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc7-4-responding-to-identified-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc7-5-recovery-from-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc8-1-change-management-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc8-security-change-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc9-1-treatment-plans-for-business-disruption-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-cc9-2-partner-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p1-1-providing-notice-to-data-subjects-about-privacy-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p2-1-communication-of-choices-about-personal-information-to-data-subjects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p3-1-collection-of-personal-information-is-consistent-with-objects-related-to-privacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p3-2-additional-measures-when-processing-requires-explicit-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p4-1-limiting-use-of-personal-information-to-purposes-according-to-objectives-related-to-privacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p4-2-retention-of-personal-information-according-to-objectives-related-to-privacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p4-3-secure-disposal-of-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p5-1-granting-access-to-stored-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p5-2-correction-of-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p6-1-disclosure-of-personal-information-to-third-parties-with-consent-of-the-data-subjects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p6-2-record-of-authorized-disclosures-of-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p6-3-record-of-unauthorized-disclosures-of-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p6-4-obtaining-privacy-commitments-from-third-parties-and-assesment-of-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p6-5-notification-of-unauthorized-disclosure-of-personal-information-from-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p6-6-notification-about-breaches-and-incidents-to-affected-data-subjects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p6-7-providing-an-accounting-of-personal-information-upon-data-subjects-request</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p7-1-collection-and-maintainment-of-accurate-and-relevant-personal-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-p8-1-periodic-monitoring-of-privacy-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-pi1-1-definitions-of-processed-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-pi1-2-implementation-of-policies-and-procedures-for-system-inputs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-pi1-3-procedures-for-system-processing-to-produce-results-accodring-to-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-pi1-4-procedures-for-availability-accodring-to-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/soc-2-pi1-5-procedures-for-storing-inputs-items-in-processing-and-outputs-in-accordance-with-system-spefications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-2-1-skyldigheter-for-den-som-bedriver-sakerhetskanslig-verksamhet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-2-2-1-konfidentialitet-informationssakerhetsskyddsatgarder</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-2-2-2-skydd-informationssakerhetsskyddsatgarder</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-2-3-fysiska-sakerhetsskyddsatgarder</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-2-4-personalsakerhetsskyddsatgarder</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-2-5-sakerhetsskyddsklassificering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-2-6-anmalningsplikt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-2-7-sakerhetsskyddschef</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-3-1-sakerhetsprovning-for-sakerhetskansliga-aktiviteter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-3-3-kriterier-for-sakerhetsprovning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-3-4-ansvar-for-sakerhetsprovningen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-1-sakerhetsskyddsavtal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-13-sarskild-sakerhetsskyddsbedomning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-14-sakerhetsbedomning-for-sekretessbelagd-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-15-skyldigheten-att-samrada</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-20-upplysning-om-sakerhetsskyldigheter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-5-motpartens-efterlevnad-av-sakerhetsavtal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-7-skyldigheter-infor-forfaranden-som-kraver-sakerhetsskyddsavtal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-8-tillgang-till-sekretessbelagd-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/ssl-ss-4-9-lamplighetsprovningen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/suojaaminen-salakatselulta-ja-salakuuntelulta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/supplier-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/system-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/technical-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/technical-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tiedonhallinnan-jarjestaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tiedonhallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tiedonhallintamalli</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoaineistoturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietojarjestelmaturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoliikenneturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-3-vastuut-tietoturvan-seka-asiakastietojen-asianmukaisen-kasittelyn-varmistamisessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-1-yleiset-tietoturvakaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-10-tyoasemien-mobiililaitteiden-ja-kayttoympariston-tukipalveluiden-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-11-alusta-ja-verkkopalvelujen-tietoturvallinen-kaytto-tietosuojan-ja-varautumisen-kannalta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-12-kanta-palvelujen-liittymisen-ja-kayton-tietoturvakaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-2a-jatkuvuuden-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-2b-hairioiden-hallinta-ja-menettelyt-ongelmatilanteissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-3-henkiloston-koulutus-seka-osaamisen-yllapito-ja-kehittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-4-tietojarjestelmien-kayttoohjeet-ja-ohjeiden-mukainen-kaytto</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-5-tietojarjestelmien-perustiedot-kuvaukset-ja-olennaisten-vaatimusten-tayttyminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-6-tietojarjestelmien-asennus-yllapito-ja-paivitys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-7-kayttovaltuuksien-hallinnan-ja-tunnistautumisen-kaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-8-asiakas-ja-potilastietojarjestelmien-paasynhallinnan-ja-kayton-seurannan-kaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tietoturvasuunnitelma-6-9-fyysinen-turvallisuus-osana-tietojarjestelmien-kayttoympariston-turvallisuutta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-12-ss-luotettavuutta-edellyttavien-tehtavien-tunnistaminen-ja-luotettavuudesta-varmistuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-13-a-ss-hairiotilanteista-tiedottaminen-ja-varautuminen-hairiotilanteisiin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-13-ss-tietoaineistojen-ja-tietojarjestelmien-tietoturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-14-ss-tietojen-siirtaminen-tietoverkossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-15-ss-tietoaineistojen-turvallisuuden-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-16-ss-tietojarjestelmien-kayttooikeuksien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-17-ss-lokitietojen-keraaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-19-ss-tietoaineistojen-sahkoiseen-muotoon-muuttaminen-ja-saatavuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-20-ss-tietoaineistojen-keraaminen-viranomaisen-tehtavia-varten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-21-ss-tietoaineistojen-sailytystarpeen-maarittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-22-ss-tietojen-luovuttaminen-teknisen-rajapinnan-avulla-viranomaisten-valilla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-23-ss-katseluyhteyden-avaaminen-viranomaiselle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-24-ss-tietoaineistojen-luovuttaminen-teknisen-rajapinnan-avulla-muille-kuin-viranomaisille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-25-ss-rekisterointi-asiarekisteriin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-26-ss-asiarekisteriin-rekisteroitavat-tiedot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-27-ss-tietoaineistojen-hallinta-palveluja-tuotettaessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-28-a-ss-tehtavajaon-ja-kasittelysaantojen-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-28-b-ss-laadun-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-28-c-ss-laadunvalvonta-ja-virhetilanteiden-kasittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-28-d-ss-paatos-kayttoonotosta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-28-e-ss-tiedottaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-28-f-ss-tietojen-kaytto</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-28-ss-kuvaus-asiakirjajulkisuuden-toteuttamiseksi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-4-ss-tiedonhallinnan-jarjestaminen-tiedonhallintayksikossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-5-ss-tiedonhallintamalli-ja-muutosvaikutuksen-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-1-tietoturvallisuusvastuiden-maarittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-2-erityista-luotettavuutta-edellyttavat-tehtavat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-3-tietoturvallisuus-tiedonhallintamallissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-4-luokittelu-ja-turvallisuusluokittelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-5-riskienhallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-6-ohjeet-ja-koulutus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-7-varautuminen-hairiotilanteisiin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-8-hairiotilanteista-tiedottaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-2-9-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-3-1-tietoaineistojen-tietoturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-3-2-toimitilaturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-3-3-tietoaineistojen-sahkoiseen-muotoon-muuttaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-3-4-tietoturvallinen-arkistointi-ja-tuhoaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-4-1-tietojarjestelmien-tietoturvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-4-2-tietojarjestelmien-hankinnat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-4-3-vikasietoisuuden-ja-toiminnallisen-kaytettavyyden-testaus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-4-4-salassa-pidettavien-tietojen-siirtaminen-yleisissa-tietoverkoissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-4-5-kayttooikeuksien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-4-6-lokitietojen-keraaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tihl-tietoturvavaatimukset-4-7-tietojarjestelmien-suunnittelu-asiakirjajulkisuuden-toteuttamiseksi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tiloja-ja-laitteita-koskevat-vaatimukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-1-1-availability-of-information-security-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-2-1-scope-of-information-security-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-2-2-information-security-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-2-3-information-security-requirements-in-projects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-2-4-definition-of-responsibilities-with-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-3-1-identification-of-information-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-3-2-classification-of-information-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-3-3-use-of-approved-external-it-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-3-4-use-of-approved-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-4-1-management-of-information-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-5-1-assessment-of-policies-and-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-5-2-external-review-of-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-6-1-reporting-of-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-6-2-management-of-reported-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-1-6-3-crisis-preparedness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-2-1-1-competence-of-employees</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-2-1-2-staff-compliance-with-information-security-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-2-1-3-staff-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-2-1-4-regulation-for-remote-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-3-1-1-management-of-secure-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-3-1-3-management-of-supporting-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-3-1-4-management-of-it-and-mobile-data-storage-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-4-1-1-management-of-access-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-4-1-2-security-of-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-4-1-3-management-of-users-in-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-4-2-1-access-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-1-1-cryptography-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-1-2-information-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-1-change-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-2-seperation-of-testing-and-development-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-3-malware-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-4-log-management-and-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-5-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-6-it-system-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-7-network-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-8-it-service-continuity-planning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-2-9-backup-and-recovery-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-3-1-information-security-in-new-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-3-2-network-device-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-3-3-secure-removal-of-it-assets-from-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-5-3-4-information-protection-in-external-it-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-6-1-1-partner-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-6-1-2-non-disclosure-agreement-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-7-1-1-compliance-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-7-1-2-protection-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-1-1-data-protection-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-1-data-protection-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-2-1-data-protection-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-3-1-data-processing-activities-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-3-processing-directory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-4-1-data-protection-impact-assesment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-5-1-management-of-data-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-5-2-management-of-contractual-obligations-with-partners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-5-3-management-of-data-transfers-to-third-countries</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-6-1-management-of-data-subject-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-6-2-managment-of-data-protection-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-7-1-personnel-commitment-to-confidentiality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-7-2-employee-data-protection-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-8-1-instructions-for-data-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/tisax-9-8-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/transparency-and-user-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/update-and-patch-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/requirement/virtualization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/a-strategy-for-cyber-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/aanieristys-turvallisuusluokitellun-tiedon-keskusteluun-kaytetyilla-alueilla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ability-to-provide-the-data-subject-with-personal-data-ready-for-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ability-to-request-restriction-of-the-processing-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/acceptance-of-overall-residual-ai-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/access-control-for-secure-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/access-control-on-datacenter-perimeter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/access-control-to-premises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/access-management-for-files-stored-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/access-management-for-personal-data-in-files-and-papers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/access-requests-to-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/access-rights-are-managed-by-the-principle-of-the-least-privilege</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/access-to-electronic-protected-health-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/accessibility-of-business-continuity-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/accessibility-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/account-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/account-reviews-and-reporting-of-non-compliant-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/account-suspension-for-inactivity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/accreditation-of-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/acknowledgement-of-cyber-security-policies-before-granting-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/acquisition-and-instructions-for-a-vpn-service</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/activate-starttls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/activation-of-encryption-keys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/addressing-disasters-in-continuity-planning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/adequacy-of-digital-security-resourcing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/adopting-a-code-of-practice-for-general-purpose-ai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/adoption-and-implementation-of-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/advance-notification-of-planned-cybersecurity-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/advanced-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/agreement-for-cybersecurity-audit-with-registered-auditor-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/agreement-with-a-cybersecurity-service-provider</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-cybersecurity-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-data-gap-identification-and-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-management-system-awareness-and-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-management-system-resource-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-objective-setting-and-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-objectives-and-organizational-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-personnel-competence-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-policy-development-and-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-policy-review-and-validation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-related-concern-reporting-mechanism</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-risk-and-opportunity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-risk-assessment-process-establishment-and-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-supplier-management-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-data-and-performance-transparency</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-data-quality-standards</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-deployment-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-design-and-development-lifecycle-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-event-logging-planning-and-implementation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-impact-assessment--report-publishing-informing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-impact-assessment-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-impact-assessment-on-individuals-and-groups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-listing-and-applicable-ai-transparency-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-operational-procedures-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-technical-documentation-for-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-use-verification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ai-system-verification-and-validation-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/aineiston-sahkoinen-valitys-st-iv-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/aineiston-valitys-postilla-tai-kuriirilla-st-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/aineiston-valitys-postilla-tai-kuriirilla-st-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/aineiston-valitys-postilla-tai-kuriirilla-st-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ajantasaisen-ohjeistuksen-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/alarm-systems-for-equipment-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/align-iacs-cybersecurity-policies-with-organizational-risk-management-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/alkuperaisten-turvatoimien-soveltaminen-tietojen-kopioihin-ja-kaannoksiin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/alkuperaisten-turvatoimien-soveltaminen-tietojen-kopioihin-ja-kaannoksiin-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/alternative-communication-channels-for-emergencies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/alternative-compliance-demonstration-for-gpai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/alternative-recovery-methods-for-ot-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/amendment-decision-criteria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/amendment-denial-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/amendment-disagreement-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/amendment-notification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/amendment-request-timeliness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/amendments-from-other-covered-entities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/amount-competence-and-adequacy-of-human-oversight-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/amount-competence-and-adequacy-of-key-cyber-security-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/analysis-and-evaluation-of-quality-related-metrics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/analysis-of-costs-and-benefits-for-business-continuity-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/analysis-of-human-oversight-measures-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/analyzing-authentication-processes-of-critical-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/annual-cybersecurity-assessment-and-reporting-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/annual-cybersecurity-maturity-self-assessment-and-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/annual-security-report-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/anomaly-criteria-for-triggering-incident-respone</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/anonymization-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/anticipating-capacity-related-problems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/application-interfaces-for-downloading-information-in-offered-digital-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/application-security-components-of-leveraging-vetted-modules-or-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointing-a-qualified-cybersecurity-auditor-malta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointing-an-authorization-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-and-responsibilities-of-a-security-officer-for-information-systems-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-and-responsibilities-of-the-authorised-representative-of-providers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-and-responsibilities-of-the-personal-data-protection-officer-pdpo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-and-role-of-the-cybersecurity-manager</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-and-role-of-the-security-protection-manager</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-of-a-chief-information-security-officer-greece</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-of-a-chief-information-security-officer-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-of-a-cyber-security-officer-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-of-a-cyber-security-officer-romania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-of-a-representative-in-the-union</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-of-an-authorised-representative-for-gpai-model-providers-from-outside-the-eu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-of-personnel-to-monitor-changes-to-ai-system-classifications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-tasks-and-position-of-a-cyber-security-manager</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/appointment-tasks-and-position-of-a-data-protection-officer-dpo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/approval-from-the-data-owner-for-using-production-data-for-testing-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/approval-of-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/approval-of-data-transfers-outside-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/approval-of-new-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/approval-of-the-risk-management-procedure-description</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/approval-process-that-includes-the-customer-for-high-risk-administrator-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/archiving-and-destruction-processes-for-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/archiving-and-retaining-outdated-security-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/archiving-and-signing-logs-at-regular-intervals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/arranging-suitable-equipment-and-storage-equipment-for-teleworking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/arranging-training-and-guidance-during-orientation-or-before-granting-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/asiakirjajulkisuuskuvaus-raportin-julkaisu-ja-yllapito</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/asiakirjojen-julkisuutta-tukeva-tiedonhallintasuunnittelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/asiakstietojen-kasittelyyn-tarkoitetun-tietojarjestelman-tuotantokayton-vaatimukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/asianmukaisten-tyovalineiden-tarjoaminen-henkilostolle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/asioiden-rekisterointi-asiarekisteriin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assesment-of-residual-risks-dora</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessing-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-for-processing-personal-data-for-public-interest</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-business-continuity-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-climate-change-impact-on-business-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-communication-needs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-conformity-belgium</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-facility-redundancy-for-service-delivery</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-foreseeable-ai-system-abuses</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-internal-governance-for-ai-act-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-residual-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-residual-risks-in-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-the-impact-and-likelihood-of-the-risks-and-the-scales-used</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-the-need-for-ai-interaction-notification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessment-of-the-open-source-exemption-for-gpai-model-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assessments-for-defining-the-scope-for-threat-led-penetration-testing-tlpt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/asset-classification-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/asset-management-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assigning-of-a-public-relations-officer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assigning-responsibility-of-ict-risk-management-to-appropriate-function</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assigning-roles-related-to-access-management-and-managing-privileged-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/assisting-customer-in-fulfilling-data-subject-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/attack-signature-update-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/audit-programme-planning-and-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/auditing-of-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/auditing-the-information-and-documentation-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/authenticated-proxy-servers-for-critical-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/authentication-mechanisms-for-remote-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/authentication-of-identities-and-binding-to-user-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/authority-approval-for-cryptosystems-and-cryptographic-algorithms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/authorized-users-and-rules-for-installing-software-and-libraries</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automaattisen-ratkaisumenettelyn-tehtavanjako-ja-kasittelysaantojen-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automated-alerts-for-audit-log-failures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automated-secure-code-deployment-and-release</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automatic-blocking-and-detecting-of-unauthorized-hardware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automatic-blocking-and-detecting-of-unauthorized-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automatic-file-scan-by-malware-protection-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automatic-log-data-analyzation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automatic-log-generation-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automatic-website-scan-by-malware-protection-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automatically-updating-and-running-malware-prevention-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/automating-the-handling-of-technical-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/avainten-hallintajarjestelma</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/avaustunnisteiden-hallintakaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/avoiding-and-documenting-shared-user-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/awareness-and-mitigation-of-automation-bias-in-ai-system-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/awareness-and-training-of-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/awareness-of-emergency-preparedness-and-response-roles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/background-checks-for-access-to-critical-systems-slovenia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/backup-facilities-for-business-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/backup-master-images-of-operating-systems-and-installation-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/baseline-configuration-for-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/baseline-for-normal-network-traffic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/basic-service-testing-fault-tolerance-evaluation-and-verification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/bcms-performance-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/blacklisting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/block-all-direct-traffic-between-clients</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/blocking-auto-forwarding-of-mailboxes-to-external-domains</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/blocking-downloads-of-confidential-information-on-external-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/blocking-unnecessary-types-of-files</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/built-in-and-default-cyber-security-in-system-development-security-by-design</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/built-in-and-default-data-protection-in-systems-development-privacy-by-design</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/built-in-human-oversight-mechanisms-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/burden-of-proof-for-breach-notifications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-associate-contracts-and-subcontractor-obligations-regarding-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-exercise-outcome-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-exercise-planning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-legal-and-policy-compliance-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-management-system-establishment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-management-system-improvement-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-plan-activation-and-initial-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-plan-scope</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-policy-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-policy-documentation-and-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-procedure-design-and-adaptability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/business-continuity-program-evaluation-and-documentation-update</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cabling-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/camera-surveillance-in-real-estates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/capacity-and-performance-managemenet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/carrying-out-information-security-inspections-periodically-and-in-exceptional-situations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/categorizing-iacs-devices-into-logical-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ce-marking-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/centralized-record-of-user-s-access-rights-to-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/centralizing-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/centralizing-account-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/centralizing-network-authentication-authorization-and-auditing-aaa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/certificate-based-authentication-for-system-to-system-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/certificate-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/change-management-for-the-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/change-management-procedure-for-significant-changes-to-data-processing-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/changing-default-passwords</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/choosing-and-using-network-protection-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/classification-of-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/classify-security-sensitive-information-based-on-potential-damage-level</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/classifying-logical-information-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/classifying-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/clear-and-accessible-user-information-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/clear-communication-about-the-effects-of-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/clear-communication-of-organisation-and-data-storage-location-in-relation-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/clear-desk-and-monitors-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/clock-synchronization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/code-of-conduct-for-business-ethics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/code-of-conduct-for-organisations-deploying-or-providing-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/code-of-practice-for-systemic-risk-governance-of-gpai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/coducting-digital-operational-resilience-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collaboration-with-reporting-deployers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collecting-command-line-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collecting-detailed-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collecting-dns-query-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collecting-feedback-on-security-suggestions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collecting-service-provider-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collecting-url-request-audit-logs-on-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collection-and-documentation-of-explicit-consents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collection-and-monitoring-of-supplier-specific-privacy-commitments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collection-of-log-data-on-the-use-of-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/collection-of-logs-from-all-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicate-guidelines-to-staff</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-cyber-security-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-recovery-measures-to-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-responsibilities-to-suppliers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-shared-security-responsibility-model-ssrm-to-the-clients</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-the-environmental-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-the-quality-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-the-results-of-cyber-security-incident-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-the-results-of-penetration-tests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communicating-with-relevant-parties-after-an-incident-including-certs-and-nsm-ncsc</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-about-information-security-threats-and-protective-measures-affecting-users-of-the-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-about-potential-security-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-channels-for-data-subject-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-in-accordance-with-the-incident-response-plan-in-the-event-of-a-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-methods-for-refusing-to-implement-data-protection-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-of-bcms-management-review-results</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-of-redundancy-requirements-to-responsible-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-of-the-incident-response-plan-to-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-plan-for-business-continuity-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-plan-for-environmental-emergencies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-plan-for-environmental-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-plan-for-information-security-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-plan-for-quality-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-plan-for-the-use-of-high-risk-ai-systems-in-the-workplace</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-process-for-the-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-to-stakeholders-on-continuity-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communication-with-data-subjects-lacking-legal-capacity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/communications-and-disclosures-of-confidential-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/competence-requirements-for-security-monitoring-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/compliance-and-government-interaction-protocol-for-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/compliance-of-used-cryptographic-controls-in-relation-to-applicable-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/compliance-procedure-for-external-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/compliance-with-harmonised-standards-for-gpai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/compliance-with-the-regulatory-guidelines-of-competent-cybersecurity-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/comprehensive-basis-for-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/comprehensiveness-of-contractual-terms-for-cloud-service-provisioning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conduct-and-document-a-protective-security-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-an-external-audit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-and-documenting-ai-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-and-documenting-ai-system-impact-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-automated-vulnerability-scans-of-externally-exposed-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-automated-vulnerability-scans-of-internal-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-business-impact-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-incident-response-exercises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-role-specific-security-awareness-and-skills-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-threat-led-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conducting-vulnerability-and-impact-analysis-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/confidentiality-of-gpai-model-information-and-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/confidentiality-of-security-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/configuration-management-and-change-log</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/configuration-of-generic-error-messages</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/configuring-automatic-anti-malware-scanning-of-removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/configuring-trusted-dns-servers-on-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/confirming-information-security-roles-and-responsibilities-related-to-utilized-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conformity-assessment-and-registration-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conformity-assessment-process-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/conformity-process-for-distributors-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consent-condition-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-critical-functions-in-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-environmental-threats-in-risk-and-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-external-goals-when-setting-information-security-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-information-security-goals-in-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-partner-risks-in-information-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-risk-management-results-in-continuity-planning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-shared-security-responsibility-model-ssrm-responsibilities-when-doing-internal-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-technical-societal-and-legal-environment-in-ai-impact-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/consideration-of-threat-intelligence-findings-in-the-information-security-risk-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/considering-access-control-decisions-for-individuals-and-groups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/considering-ai-risks-in-the-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/considering-cyber-security-breaches-in-continuity-planning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/considering-encryption-and-cryptographic-key-management-in-risk-management-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/considering-the-possibility-of-fraud-in-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/contact-information-for-reporting-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/contact-with-industry-specific-interest-groups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/context-analysis-for-ai-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/contextual-relevance-assessment-of-ai-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/contingency-planning-for-physical-production-and-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continual-improvement-of-the-business-continuity-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuity-planning-for-defined-scenarios</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-development-of-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-environmental-improvement-and-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-environmental-improvement-and-documentation-e2468</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-improvement-and-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-improvement-of-continuation-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-improvement-of-the-risk-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-improvement-of-the-risk-management-process-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-incident-response-capability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-monitoring-of-acquired-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-monitoring-of-physical-access-to-critical-facilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/continuous-quality-improvement-and-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/control-and-lifecycle-management-of-documented-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/control-and-monitoring-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/control-of-outsourced-processes-and-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/control-of-physical-and-logical-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/control-the-data-flow-of-exposed-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/controls-for-ensuring-the-proper-recipient-of-personal-data-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/controls-for-externally-provided-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cooperation-mechanisms-to-strengthen-cybersecurity-coordination</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cooperation-with-national-competent-authorities-for-providers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cooperation-with-supervisory-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/coordinated-notification-and-secure-destruction-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/copyright-compliance-policy-for-gpai-model-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/country-of-origin-marking-for-classified-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/create-and-maintain-a-system-architecture-and-risk-assessment-document</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-a-unique-identifier-for-employees</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-an-allowlist-for-approved-libraries</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-documenting-continuity-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-a-continuity-management-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-a-statement-of-applicability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-an-access-control-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-an-asset-management-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-encryption-and-cryptography-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-incident-response-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-physical-and-environmental-security-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-report-on-the-review-of-the-ict-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-risk-assessment-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-and-maintaining-risk-management-framework--report</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creating-post-market-monitoring-plans-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creation-and-maintaining-of-hr-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creation-and-maintenance-of-governance-and-control-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/creation-management-and-maintenance-of-declarations-of-conformity-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/credentials-are-not-transmitted-via-email</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/criminal-background-check-for-key-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/criteria-for-high-priority-partners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/criteria-for-refusing-data-subject-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/criteria-for-selection-of-encryption-and-cryptographic-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/criteria-for-suppliers-of-high-priority-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cryptographic-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/customer-oriented-description-of-personal-data-return-transfer-and-disposal-processes-for-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/customer-satisfaction-processes-for-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cyber-security-information-system-usage-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cyber-security-policy-and-procedure-compliance-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cybersecurity-auditing-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cybersecurity-compliance-requirements-for-essential-and-important-entities-spain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cybersecurity-cooperation-duties-for-organizations-poland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cybersecurity-management-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cybersecurity-measures-for-the-protection-of-gpai-models-with-systemic-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/cybersecurity-requirements-related-to-the-use-of-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-asset-management-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-breach-response-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-classification-for-offices-and-physical-data-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-collection-and-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-erasure-processes-and-the-right-to-be-forgotten</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-governance-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-handling-for-vulnerability-reports-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-location-for-critical-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-management-procedures-for-ai-system-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-preparation-and-quality-assurance-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-preparation-criteria-and-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-preparation-process-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-privacy-statement-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-processing-agreement-analysis-for-most-important-system-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-processing-partner-listing-and-owner-assignment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-protection-certifications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-provenance-procedure-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-quality-criteria-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-security-and-compliance-with-legal-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-set-documentation-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-set-validation-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-store-listing-and-owner-assignment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-subject-s-right-facilitation-through-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-system-listing-and-owner-assignment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/data-system-log-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deactivating-encryption-keys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deciding-which-parts-of-the-ict-system-to-monitor</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/declaration-of-conformity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/decommissioning-of-information-systems-and-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/dedicated-log-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/default-strong-encryption-for-data-in-transit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/define-and-document-internal-notification-triggers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defined-security-arrangements-for-providing-critical-network-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-a-backup-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-ai-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-communicating-ai-management-system-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-accepted-authentication-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-access-roles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-ai-system-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-cyber-security-metrics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-environmental-metrics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-environmental-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-environmental-objectives-02e62</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-exemptions-from-ai-content-marking-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-quality-metrics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-quality-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-retention-times-for-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-risk-management-metrics-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-documenting-security-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-implementing-masking-for-confidential-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-and-monitoring-product-and-service-acceptance-criteria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-business-continuity-roles-responsibilities-and-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-controlled-conditions-for-product-service-provision</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-criteria-for-activation-and-deactivation-of-continuity-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-cyber-security-metrics-for-cyber-security-breaches</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-cyber-security-responsibilities-and-tasks-in-employment-contracts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-events-that-need-to-be-logged</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-measures-to-detect-a-failure-of-logging-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-metrics-related-to-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-needed-organizational-knowledge-related-to-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-objectives-for-responsible-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-permitted-uses-and-disclosures-of-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-process-monitoring-and-related-metrics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-required-personnel-competences</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-required-personnel-competences-bcms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-required-personnel-competences-for-ems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-requirements-for-malware-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-responsibilities-for-ai-system-lifecycle-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-security-events-and-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-security-maintenance-in-customer-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-security-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-standard-templates-for-secure-configurations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-suitable-locations-and-needed-protections-for-remote-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-supplier-types-that-can-access-confidential-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-system-auditing-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-core-stakeholder-team-composition</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-frameworks-that-serve-as-the-basis-of-the-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-frequency-and-criteria-for-risk-and-vulnerability-reassessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-information-needed-to-maintain-the-services-or-products-offered</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-organization-s-continuity-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-policy-for-the-shared-security-responsibility-model-ssrm-in-offered-digital-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-scope-of-the-information-security-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-types-of-removable-media-used</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-the-units-of-your-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-threshold-for-cyber-security-breach</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-threshold-for-cyber-security-breach-czech-republic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-threshold-for-incident-recovery-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/defining-triggers-for-evaluating-the-information-security-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-and-documentation-of-the-bcms-scope</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-and-monitoring-of-alarm-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-data-classifications-and-class-specific-security-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-done-and-testing-principles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-information-sharing-agreements-and-notification-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-measures-permitted-in-remote-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-recovery-objectives-and-resource-dependencies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-supplier-specific-responsible-persons</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-testing-metrics-and-thresholds-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-the-business-rationale-for-managing-the-information-security-of-iacs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definition-of-tolerable-outages</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/definitions-and-instructions-on-information-classifications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/delaying-breach-notifications-for-law-enforcement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/delegated-security-monitoring-for-shared-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/delegating-security-decision-making-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deleting-or-disabling-any-dormant-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deletion-of-special-categories-of-personal-data-for-ai-bias-correction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/denial-issuing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deploying-a-host-based-intrusion-detection-solution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deploying-a-host-based-intrusion-prevention-solution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deploying-a-network-intrusion-detection-solution</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deploying-and-maintaining-anti-malware-protections-of-email-server</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deploying-port-level-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deployment-and-regular-analysis-of-security-system-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/deregistration-of-personnel-from-security-checks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/describing-customer-s-data-rights-in-terms-of-the-agreement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/description-of-administrative-data-flows</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/description-of-cyber-security-structure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/descriptions-of-used-cryptography-in-relation-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/design-and-development-output-requirements-and-verification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/design-and-development-processes-for-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/design-and-development-requirements-and-inputs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/design-the-ict-system-using-ict-products-which-integrate-well</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/designate-privacy-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/designating-incident-management-key-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/designation-of-a-24-7-point-of-contact-with-cncs-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/designation-of-an-incident-management-team</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/designation-of-data-set-owners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/designation-of-the-information-security-officer-spain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/designing-secure-software-development-life-cycle-ssdlc-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/destruction-of-encryption-keys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detailed-assessment-of-the-risk-of-data-breach-for-data-subjects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detailed-descriptions-of-implemented-security-measures-on-contracts-related-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detailed-descriptions-of-required-security-measures-for-subcontractors-on-contracts-related-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detailed-iacs-vulnerability-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detailed-rules-for-the-management-of-removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detecting-and-blocking-access-to-dangerous-websites</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detecting-unconfirmed-mobile-apps</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detection-of-non-compliance-with-the-change-management-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/detection-process-testing-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determination-and-adequacy-of-the-cyber-security-budget</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determination-of-post-market-monitoring-requirement-equivalencies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determine-a-strategy-and-guidelines-for-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determining-environmental-roles-responsibilities-and-authorizations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determining-needed-resources-and-people-for-environmental-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determining-needed-resources-and-people-for-quality-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determining-quality-related-roles-responsibilities-and-authorizations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determining-responsibilities-for-backing-up-important-information-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determining-the-baseline-for-network-and-data-system-usage-for-monitoring-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/determining-the-responsibility-of-network-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/develop-and-maintain-an-ict-project-management-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/develop-network-diagrams-for-each-logically-integrated-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/developing-a-program-for-monitoring-the-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/developing-a-strategy-for-communicating-ai-incidents-to-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/developing-an-incident-response-plan-for-critical-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/developing-and-executing-a-recovery-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/developing-and-implementing-policies-and-conducting-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/development-and-implementation-of-physical-security-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/development-and-maintenance-of-the-operator-security-plan-o-s-p-belgium</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/development-of-business-continuity-strategies-covering-the-full-disruption-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/development-of-security-policies-for-changes-in-the-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/device-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/device-list-maintenance-in-a-mobile-device-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/direct-data-entry-of-the-electronic-transfer-standard</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disabling-auto-run-of-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disabling-autorun-and-autoplay-for-removable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disabling-default-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disciplinary-process-for-non-conformance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disciplinary-process-for-security-breaches</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disclose-phi-to-family-caregivers-and-in-emergencies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disclosure-of-phi-for-research-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disclosure-of-phi-related-to-abuse-and-neglect</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disclosure-of-phi-to-business-associates-and-subcontractors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disclosure-of-phi-to-public-health-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disclosure-of-protected-health-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disclosures-for-decedent-and-organ-donation-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/displaying-the-end-date-of-the-support-period</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/disposal-of-media-and-hardware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/dissemination-of-security-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/document-complaints-and-their-disposition</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/document-the-identity-life-cycle-management-processes-c08c9</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-and-governance-of-technical-test-results-and-residual-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-and-notifications-of-phi-breaches</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-and-treatment-of-environmental-related-non-conformities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-and-treatment-of-non-conforming-outputs-from-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-and-treatment-of-quality-related-non-conformities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-maintenance-and-six-year-retention-rule-hipaa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-ai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-ai-system-accuracy-and-metrics-in-user-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-ai-system-design-and-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-ai-system-resources-and-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-assets-inventories-outside-the-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-bases-for-personal-data-transfer-for-relevant-partners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-changes-and-their-impact-on-digital-elements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-conditions-of-consent-for-relevant-processing-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-customer-groups-whose-information-is-processed-by-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-data-and-metadata-for-designated-datatypes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-data-classes-for-data-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-data-disclosures-for-data-stores</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-data-owned-by-cloud-service-customers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-data-sets-for-data-stores</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-health-data-processing-stages-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-high-risk-ai-system-characteristics-and-intended-purpose</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-interfaces-for-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-lawful-personal-data-processing-and-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-linked-risks-for-identified-incidents-in-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-linked-risks-for-identified-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-open-source-usage-in-gpai-model-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-organization-s-dependencies-on-external-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-other-protected-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-other-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-partner-contract-status</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-personal-data-outside-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-personal-data-processing-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-personal-data-processing-purposes-for-data-stores</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-personal-data-sources-for-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-security-metrics-related-to-application-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-security-related-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-security-vetting-results</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-significant-environmental-aspects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-stakeholders-relevant-for-the-ems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-stakeholders-relevant-for-the-qms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-system-logs-for-self-maintained-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-the-change-management-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-the-responsibility-for-organizing-csa-ccm-controls-for-provided-digital-service</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-of-usage-instructions-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documentation-retention-in-connection-with-software-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documented-information-for-the-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documented-methodology-for-technical-security-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documented-procedures-and-supervision-for-critical-admin-operations-on-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documented-procedures-and-supervision-for-critical-admin-operations-on-used-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-and-delegating-ownership-of-own-backup-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-and-managing-the-firewall-administration-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-and-presenting-bcms-evaluation-results</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-incident-activities-by-establishing-a-response-timeline</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-partners-who-are-related-to-offered-digital-services-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-personnel-skills-and-roles-in-ai-system-life-cycle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-security-related-responsibilities-for-offered-cloud-services-and-utilized-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-states-and-international-organizations-receiving-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-the-business-continuity-response-structure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/documenting-the-outcomes-of-the-top-management-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/dual-verification-for-high-risk-ai-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/due-diligence-in-the-selection-of-software-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/early-orientation-of-security-guidelines-for-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/early-warning-notification-details-for-major-incidents-poland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ei-sahkoisten-tietojen-fyysinen-tuhoaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ei-sahkoisten-tietojen-tuhoaminen-tl-iv-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/electromagnetic-data-breach-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/electronic-information-system-security-classification-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/electronic-information-system-security-classification-hungary-7c1f4</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/email-authentication-dkim</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/email-authentication-dmarc</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/email-authentication-dnssec</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/email-authentication-spf</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/email-monitoring-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ems-description-maintenance-and-scope-definition</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ems-internal-audit-procedure---report-publishing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enabling-and-configuring-mailbox-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enabling-asset-based-risk-management-in-the-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enabling-features-of-anti-exploitation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enabling-multi-factor-authentication-for-all-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enabling-remote-locating-on-endpoint-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enabling-remote-wipe-on-endpoint-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-key-archival</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-key-inventory-and-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-key-recovery</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-key-temporary-revocation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-keys-provisioned-for-unique-purpose</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-of-backup-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-of-data-in-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-of-laptops</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-of-portable-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-of-public-network-traffic-for-application-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-of-stored-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-of-user-password-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encryption-solution-and-guidelines-for-personnel-to-encrypt-transferred-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/encyption-of-server-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/endpoint-pin-protection-and-automated-locking</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/endpoint-security-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enforcing-an-automatic-device-lockout-on-portable-end-user-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enforcing-mfa-for-administrative-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enforcing-mfa-for-external-applications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/enriching-incident-information-to-ensure-an-effective-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-a-compliant-and-updated-notice-of-privacy-practices-npp</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-accurate-standard-transaction-transformation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-csirt-compliance-with-national-operational-and-security-requirements-romania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-hipaa-privacy-rule-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-reporting-of-cybersecurity-incidents-through-pnrisc-romania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-that-maintenance-of-configurations-installations-and-operations-are-done-securely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-that-the-necessary-security-functions-are-implemented-in-an-ict-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-the-integrity-of-critical-national-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensure-the-integrity-of-downloaded-software-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-access-to-technical-documentation-of-imported-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-and-documenting-the-accuracy-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-and-testing-the-resilience-of-data-processing-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-authorized-software-is-supported</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-collected-data-relevance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-collected-data-relevance-d21af</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-communication-availability-during-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-compatibility-and-data-portability-in-offered-digital-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-hardware-integrity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-incident-management-capabilities-and-external-support-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-minimal-retention-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-personnel-environmental-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-personnel-quality-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-resource-allocation-for-continuity-strategies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-secure-anonymisation-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-sorting-of-cyber-security-events</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-suitable-environment-for-operating-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-system-hardening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-that-security-updates-remain-available-after-their-release</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-the-accessibility-of-the-support-period-and-the-notification-of-its-end</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-the-completeness-and-accuracy-of-the-information-entering-the-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-the-quality-of-equipment-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-the-quality-of-the-automatic-decision-making-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-the-safe-failure-of-the-critical-systems-in-a-network-loss</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-the-timeliness-of-privacy-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ensuring-use-of-fully-supported-browsers-and-email-clients</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/environmental-emergency-exercise-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/environmental-impact-assessment-for-normal-and-abnormal-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/environmental-policy-commitment-to-pollution-prevention</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/environmental-policy-documentation-and-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/environmental-policy-publishing-and-informing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/environmental-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/equipment-maintenance-log</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/erityista-luotettavuutta-edellyttavien-tehtavien-tunnistaminen-ja-luotettavuudesta-varmistuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establish-a-allowlist-for-approved-scripts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establish-a-review-process-for-previously-vetted-individuals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establish-comprehensive-inventory-of-critical-infrastructure-points</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-a-data-collection-transparency-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-agreements-with-third-parties-to-provide-consultation-during-an-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-a-cyber-security-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-a-service-account-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-a-service-provider-management-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-a-severity-rating-system-for-application-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-an-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-an-audit-log-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-an-incident-response-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-an-inventory-of-the-enterprise-s-authentication-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-an-isolated-instance-of-recovery-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-dedicated-computing-resources-for-all-administrative-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-diagram-s-of-architecture</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-remediation-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-maintaining-the-comprehensive-ephi-security-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-managing-an-inventory-of-third-party-software-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-and-monitoring-business-continuity-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-change-management-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-documented-processes-for-the-responsible-use-of-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-external-reporting-channels-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-leadership-roles-in-preparedness-and-security-denmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-risk-profile</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishing-risk-tolerance-level</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishment-of-an-independent-security-management-body</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/establishment-of-security-policies-and-measures-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/etakayton-rajaaminen-turvallisuusalueille-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/etakaytto-turvallisuuden-lisavaatimkset-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluating-and-managing-systemic-risk-in-gpai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluating-and-testing-patches-before-deployment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluating-compliance-with-hipaa-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluating-the-efficiency-of-ai-literacy-and-awareness-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluating-the-efficiency-of-arranged-ai-awareness-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluating-the-efficiency-of-arranged-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluating-the-efficiency-of-internal-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluating-the-efficiency-viability-and-needs-for-security-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-and-selection-of-business-continuity-strategies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-of-ai-risk-management-measures-in-the-risk-management-phase</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-of-business-continuity-strategies-and-solutions-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-of-data-processing-agreement-for-important-data-processors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-of-prospective-suppliers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-of-risk-management-strategy-results-and-performance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-of-risks-from-foreseeable-misuse-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-process-and-documentation-of-significant-changes-to-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/evaluation-process-and-documentation-of-significant-security-related-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/exceptions-for-informing-individuals-about-ai-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/executing-an-incident-response-plan-with-stakeholders</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/executing-and-documenting-data-protection-impact-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/executing-and-documenting-internal-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/executing-and-documenting-internal-audits-for-ems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/execution-of-bcms-improvement-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/exit-strategies-for-critical-ict-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/external-reporting-process-for-the-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/facility-physical-security-and-resilience</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/fast-and-accurate-data-transmission</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/features-and-instructions-for-access-management-in-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/features-and-instructions-for-user-registration-and-de-registration-in-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/firewall-administration-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/first-request-and-subsequent-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/fitness-for-purpose-of-the-monitoring-and-measurement-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/five-year-plan-and-evalutation-for-cyber-security-exercises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/follow-up-analysis-for-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/forensic-investigation-of-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/formal-adoption-of-security-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/formal-approval-and-identification-of-bcms-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/formal-approval-of-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/formal-business-impact-analysis-for-prioritized-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/formal-change-management-process-for-bcms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/formal-list-of-administrator-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/formalized-program-for-managing-operational-interruptions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/forming-a-business-continuity-team</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/free-availability-of-software-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/functional-testing-of-technical-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/fundamental-rights-assessment--report-publishing-informing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/fyysisen-turvallisuuden-riskien-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/fyysisen-turvallisuuden-tavoitteet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/general-principles-regarding-the-use-of-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/general-risk-based-encryption-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/general-rules-for-reviewing-and-publishing-code</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/general-rules-for-the-acquisition-of-iot-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/general-rules-for-the-procurement-of-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/general-security-competence-and-awareness-of-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/general-security-guidelines-for-staff</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/getting-a-proper-consent-for-potential-commercial-utilization-purposes-of-customer-owned-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/goals-related-to-restrictions-of-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/good-encryption-key-management-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/grant-access-to-inspect-and-obtain-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guideline-for-reporting-security-incidents-to-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-about-processing-customer-and-patient-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-a-separate-training-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-disclosing-ai-generated-content</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-human-oversight-of-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-human-oversight-of-ai-systems-1ccd3</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-identifying-reportable-cyberattacks-switzerland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-information-exchange-with-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-marketing-and-awareness-communications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-operating-in-processing-areas-for-confidential-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-password-safety-for-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-providing-explanations-of-ai-driven-decisions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/guidelines-for-secure-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/haittaohjelmasuojaus-julkisista-verkoista-eristetyissa-jarjestelmissa-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/haittaohjelmasuojaus-tietojarjestelmissa-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hajasateilyn-tempest-vastatoimet-ja-riittavyyden-toteaminen-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hajasateilyn-tempest-vastatoimet-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hajasateilyn-tempest-vastatoimet-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hallinnollisen-alueen-suojauskaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hallinnollisen-alueen-ulkoraja-ja-rajaavat-rakenteet-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hallintayhteyksien-rajaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hallintayhteyksien-rajaaminen-turvallisuusluokittain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hallintayhteyksien-salaaminen-julkisessa-verkossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hallintayhteyksien-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hallintayhteyksien-vahva-tunnistaminen-julkisessa-verkossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/handling-and-protection-of-official-identification-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/handling-network-information-security-complaints-and-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/handling-non-conformities-in-imported-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/handling-of-instructions-from-controller-regarding-the-processing-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/handling-requests-and-consent-from-legal-guardians</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/handling-sensitive-information-and-support-requests-in-incident-reporting-poland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/handling-the-loss-misuse-damage-and-theft-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/handling-vulnerability-reports-from-national-csirts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hankitun-jarjestelman-koodin-tarkistettavuus-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hardening-of-virtual-machines-utilized-in-cloud-service-offering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/health-oversight-cooperation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/henkilokohtaiset-tunnukset-hallintayhteyksien-kaytossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/henkiloston-informointi-seurannasta-ja-seuraamuksista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/henkiloston-tietoisuus-jatkuvuussuunnitelmista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/henkilotietojen-kayttotarkoitussidonnaisuuden-tarkistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/henkilotietojen-sailytyksen-rajoittamisen-tarkistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/henkilotietojen-tarpeellisuuden-ja-oikeasuhtaisuuden-tarkistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/henkilotunnuksen-kasittelyperusteiden-tunnistaminen-ja-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/host-based-data-loss-prevention-tool</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/how-the-system-assets-are-used</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/hyvaksytyt-laitteet-etakaytossa-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/iacs-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ict-project-management-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-documentation-of-assets-czech-republic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-documentation-of-cyber-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-documentation-of-environmental-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-documentation-of-major-product-service-related-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-documentation-of-quality-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-documentation-of-risks-in-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-evaluation-criteria-of-externally-provided-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-evaluation-of-compliance-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-evaluation-of-environmental-aspects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-management-of-shadow-it</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-mitigation-of-ai-model-flaws</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-monitoring-of-event-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-traceability-of-ai-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-and-traceability-of-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-documentation-and-management-of-other-information-security-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-of-confidential-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-of-harmful-effects-about-privacy-violations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-of-iacs-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-of-internal-and-external-factors-for-business-continuity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identification-of-risks-endangering-the-continuity-of-operations-and-their-handling-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identify-and-document-critical-telecommunication-services-and-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identify-the-organisation-s-strategy-and-priorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identify-who-is-responsible-for-making-the-final-suitability-decision</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-and-complying-with-additional-requirements-related-to-automated-decision-making</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-and-filling-post-delivery-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-and-reacting-to-logging-errors-in-protection-systems-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-and-testing-the-continuity-capabilities-required-from-ict-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-critical-functions-and-related-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-critical-it-partners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-interested-parties-for-the-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-specific-risks-of-harm-in-ai-fundamental-rights-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-the-hardware-that-is-connecting-to-the-datacenter</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identifying-the-impact-on-business-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identity-and-authority-verification-for-phi-disclosures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/identity-management-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/immediate-reporting-of-critical-risks-to-top-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/impact-assessment-procedure-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implement-siem-as-part-of-the-ict-system-c895a</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implement-standardized-log-format</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-and-documentation-of-balance-tests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-and-documentation-of-ems-management-reviews</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-and-documentation-of-management-reviews</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-and-verification-of-responsible-ai-development-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-of-automated-decision-making-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-of-business-continuity-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-of-confidential-communication-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-of-cyber-security-measures-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-of-emergency-ephi-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-of-non-material-policy-or-procedure-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementation-of-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementing-a-continuous-improvement-process-for-the-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementing-a-crisis-response-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementing-and-monitoring-shared-security-responsibility-model</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementing-changes-to-ai-system-classifications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementing-formal-access-control-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementing-operational-controls-for-the-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementing-processes-for-improving-resilience</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/implementing-verifying-and-updating-the-ai-risk-treatment-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-containing-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-management-and-response-capability</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-management-resourcing-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-notifications-for-users-of-own-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-reporting-and-early-warning-system-alignment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-reporting-channels-and-procedures-czech-republic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-reporting-for-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-reporting-for-trusted-service-operators-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-response-documentation-and-integrity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incident-warning-and-communication-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/includin-third-party-providers-in-continuity-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/including-suppliers-in-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/inclusion-of-preparedness-physical-and-cybersecurity-requirements-in-supplier-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/incorporating-real-life-security-incidents-in-staff-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/information-and-instructions-for-user</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/information-and-training-for-deployers-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/information-protection-and-secure-data-exchange</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/information-security-policy-report-publishing-informing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/information-sharing-related-to-network-and-data-systems-usage-anomalies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/information-system-documentation-maintenance-and-protection-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/information-to-market-surveillance-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/informed-consent-process-for-ai-system-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/informing-about-cyber-security-responsibilities-that-continue-after-employment-relationship-has-ended</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/informing-acquirers-of-security-protection-obligations-during-transfers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/informing-of-infringing-processing-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/informing-staff-about-new-relevant-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/informing-the-controller-of-the-processors-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/informing-third-parties-about-relevant-changes-to-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/initial-assessment-of-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/initial-incident-notification-process-to-the-swedish-civil-contingencies-agency-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/initial-treatment-of-identified-technical-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/instructing-and-training-staff-regarding-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/instructions-for-reporting-changes-affecting-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/instructions-for-use-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/integrating-customer-expectations-into-ai-development-and-usage</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/integrating-environmental-requirements-into-the-product-service-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/integrating-security-into-the-organization-s-urgent-change-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/integration-of-change-management-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/integration-of-external-risk-and-vulnerability-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/integration-of-vulnerability-management-with-change-and-incident-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/integrity-protection-of-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internal-audit-procedure-report-publishing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internal-communication-about-the-organization-s-risk-situation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internal-communication-in-a-incident-situation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internal-communication-plan-for-environmental-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internal-conformity-assessment-procedure-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internal-control-procedure-for-conformity-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internal-governance-and-complaint-mechanisms-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internal-reporting-channels-for-ai-system-concerns</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/international-disclosure-of-classified-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/internet-service-agreement-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/inventory-and-documentation-of-data-processing-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/inventory-of-ai-solution-infrastructure-and-computing-capacity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/inventory-of-security-classified-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/involving-clearing-members-and-interdependent-institutions-in-continuity-testing-central-counterparty</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/involving-users-and-interdependent-institutions-in-continuity-testing-central-securities-depository</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ipr-complaint-process-in-relation-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/irm-protection-of-files</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/isms-description-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/isolate-vulnerable-and-low-trust-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/isolation-of-high-risk-iacs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/jaettujen-kayttajatunnusten-estaminen-a-luokan-jarjestelmissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/jarjestelmakovennus-turvallisuusluokitelluissa-ymparistoissa-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/jarjestelmakuvauksen-vaatiminen-hankittavien-tarkeiden-tietojarjestelmien-toimittajilta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/jarjestelman-kayton-perehdytys-vahaisen-kokemuksen-tyontekijoille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/jarjestelmien-kayttoohjeiden-noudattamisen-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/jarjestelmien-koventaminen-kaytossa-olevien-palveluiden-minimoinnilla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/joint-controller-identification-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/joint-notice-of-privacy-practices-for-an-organized-health-care</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/justification-for-special-category-data-processing-in-ai-bias-correction-records</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kansainvalisen-turvallisuusluokitellun-sahkoisen-tiedon-tuhoaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kansainvalisen-turvallisuusluokitellun-tiedon-kasittely-turva-alueilla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kansallisten-ja-kansainvalisten-turvallisuusluokiteltujen-tietojen-kasittely-ja-sailytys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kanta-palveluiden-huomiointi-hairio-ja-erityistilanteiden-ohjeistamisessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kanta-palveluiden-huomiointi-henkiloston-ohjeistamisessa-ja-kouluttamisessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kanta-palveluiden-yleisen-kayton-valvonnan-kuvaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kanta-palveluihin-arkistoitavan-tiedon-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kanta-palveluista-tehdyn-tietojenhaun-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kanta-palvelujen-virhetilanteiden-selvityksessa-tehtava-tietojen-kasittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kanta-palveluun-yhteydessa-olevien-palvelinten-kellon-synkronointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kanta-tietoliikenteen-salaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kasautumisvaikutuksen-huomiointi-suojattavien-kohteiden-luokittelussa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kasautumisvaikutuksen-huomiointi-tietojenkasittely-ympariston-suojauksessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kasittelyn-turvallisuuden-lisatoimenpiteet-erityisia-henkilotietoja-kasiteltaessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/katseluyhteyden-avaaminen-viranomaiselle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kayttajatunnusten-lukittuminen-toistuvista-epaonnistuneista-tunnistuksista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kayttajien-vahva-tunnistaminen-etakaytossa-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kayttoohjeiden-paivittaminen-ja-tiedottaminen-muutosten-yhteydessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kayttooikeudet-kanta-osoitehakemistossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kayttooikeuspyyntoja-hyvaksyvien-henkiloiden-ja-roolien-maarittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/keeping-contact-with-relevant-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/keeping-documentation-available-after-release</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/keeping-licensed-software-up-to-date</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/keeping-open-source-software-up-to-date</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/key-contractual-requirements-for-service-providers-supporting-critical-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/koulutussuunnitelman-laatiminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kriittisten-ohjelmistojen-toteutuksen-saannollinen-tarkastaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/kriittisten-tehtavien-jatkuvuus-erityistilanteissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/labelling-and-marking-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/laitetunnistus-etakayton-yhteydessa-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/laitteiden-liityntojen-rajoittaminen-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/laitteistojen-suojaus-luvattomia-laitteita-vastaan-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/lakisaateisten-vaatimusten-huomiointi-tietoluokitteluun-liittyvissa-merkinnoissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/langattomien-yhteyksien-salaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/leadership-commitment-to-the-effective-management-of-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/learning-from-testing-operational-resilience</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/legal-bases-for-personal-data-transfers-between-different-legal-zones</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/legal-basis-for-background-checks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/legal-disclosures-of-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/legal-risks-related-to-the-service</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/legally-authorized-personal-representatives-with-respect-to-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/legitimate-interest-assessment-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/lifecycle-management-for-iacs-related-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/lightning-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limitation-of-privileged-of-utility-programs-in-relation-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limitation-of-privileged-utility-programs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limitations-on-fees-for-clearinghouse-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limitations-on-processing-sensitive-data-under-legitimate-interest</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limited-access-and-monitoring-of-support-staff</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limited-data-set-usage-and-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limiting-disclosure-of-phi-to-a-specific-covered-function</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limiting-hard-copy-creation-of-material-displaying-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/limiting-marketing-and-advertising-use-of-personal-data-processed-under-a-contract</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/list-of-security-functions-for-iacs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/listing-and-monitoring-allowed-applications-on-endpoints</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/listing-authorized-users-for-publishing-code-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/listing-essential-cybersecurity-requirements-related-to-the-product-and-cyber-security-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/listing-of-non-recurring-data-disclosures-and-contractual-commitment-to-informing-them-to-customers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/listing-offered-digital-services-and-activities-to-competent-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/listing-offered-digital-services-and-naming-owners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/local-storage-of-personal-information-and-important-data-china</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/locked-cabinets-for-storing-confidential-paper-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/locked-cabinets-for-storing-devices-including-confidential-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/log-coverage-retention-and-storage-compliance-slovenia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/log-data-deletion-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/log-retention-for-high-risk-ai-systems-provided-by-financial-institutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/log-retention-for-provided-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/log-retention-policy-for-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/logging-and-review-of-admin-and-security-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/logging-capabilities-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/loki-manuaalisten-salassa-pidettavien-aineistojen-kasittelysta-st-iv-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/lokitietojen-keraamiseen-liittyvien-vaatimusten-tunnistaminen-ja-lokitietojen-riittavyys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/lokitietojen-suojaaminen-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/long-term-compliance-for-imported-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/luettelo-salassa-pidettavan-tiedon-kasittelya-edellyttavista-tyotehtavista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/luettelo-turvaluokiteltuja-asiakirjoja-kasittelevista-henkiloista-valtionhallinnossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/mailbox-audit-log-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-a-coordinated-vulnerability-disclosure-policy-and-reporting-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-a-log-of-ai-literacy-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-a-log-of-cyber-security-trainings</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-a-log-of-monitoring-activities-of-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-a-release-log</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-an-inventory-of-ai-system-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-and-documenting-records-of-personal-data-processing-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-and-enforcing-url-filters-based-on-network</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-chosen-theme-specific-policy-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-confidentiality-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-contact-with-cloud-related-special-interest-groups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-privacy-notice-records</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-secure-access-to-iacs-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintaining-system-hardening</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintenance-and-updates-of-security-systems-that-detect-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/maintenance-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/make-use-of-automated-software-inventory-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/manage-authorizations-and-core-validity-requirements-for-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/manage-permitted-uses-consent-and-disclosures-of-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-and-documentation-of-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-and-retention-of-security-configuration-rules</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-and-use-of-information-received-from-csirts-and-competent-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-approval-of-key-risk-and-preparedness-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-commitment-to-cyber-security-management-and-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-commitment-to-the-business-continuity-management-system-bcms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-access-rights-to-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-ai-specific-cybersecurity-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-approved-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-audit-nonconformities-and-follow-up</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-business-continuity-management-system-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-changes-to-privacy-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-credit-data-consent-and-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-crisis-situations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-cryptographic-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-device-and-system-identities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-documented-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-encryption-keys-activation-and-end-dates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-environmental-objectives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-filtering-and-monitoring-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-identification-and-access-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-information-systems-and-devices-in-systems-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-legal-and-regulatory-requirements-for-business-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-obsolete-and-archival-documented-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-operational-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-partner-contractual-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-personal-data-deletion-capabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-planned-and-unintended-operational-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-procurement-and-use-of-external-it-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-prohibited-content-and-secure-information-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-protected-physical-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-sensitive-data-in-software-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-serious-incidents-during-real-world-ai-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-supporting-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-technical-specifications-and-standards-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-temporary-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-of-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-process-for-preventing-log-editing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-process-for-software-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-reporting-on-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/management-responsibility-for-cyber-security-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-actively-exploited-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-and-assessing-cross-border-data-transfers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-and-documenting-data-subject-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-and-maintaining-ems-documented-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-and-sharing-data-protection-impact-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-changes-to-supplier-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-compromised-encryption-keys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-contracts-with-sub-processors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-evidence-information-for-information-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-licensed-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-nonconformities-and-implementing-corrective-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-security-authorization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-shared-user-credential-through-password-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/managing-user-privileges</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/mandatory-acceptance-of-standard-transactions-and-incentives</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/manner-and-accessibility-of-ai-interaction-notification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/manufacturer-s-contact-information-on-the-packaging-or-accompanying-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/manufacturers-inform-about-the-cessation-of-operations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/map-the-flow-of-information-between-work-processes-users-devices-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/mapping-of-data-classification-to-communication-channels</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/marking-of-ai-generated-content</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/marking-of-equipment-that-needs-safe-disposal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/measures-against-feedback-loops-in-learning-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/measures-for-data-transfer-of-services-in-accordance-with-information-security-goals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/measures-for-the-implementation-of-information-security-objectives-in-the-offered-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/measures-for-the-storage-of-incoming-information-information-being-processed-and-outgoing-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/measuring-and-developing-a-data-protection-culture-in-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/mechanisms-to-prevent-or-minimize-negative-impacts-on-other-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/minimization-of-information-outside-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/minimize-the-risk-posed-by-the-software-that-accompanies-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/minimizing-and-monitoring-log-data-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/minimizing-the-risk-of-attack-by-limiting-attack-surfaces</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/minimizing-the-use-and-disclosure-of-protected-health-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/minimum-necessary-access-to-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/minimum-requirements-for-partner-companies-to-gain-access-to-different-levels-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/mitigation-and-control-measures-for-ai-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/mitigation-and-control-measures-for-residual-ai-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/mitigation-of-harm-from-privacy-violations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/mobile-device-security-policies-and-their-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitasoisen-suojauksen-periaate</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-and-analysing-effectiveness-of-digital-operational-resilience-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-and-testing-of-the-warning-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-compliance-with-security-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-configurations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-equivalencies-for-high-risk-ai-systems-deployed-by-financial-institutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-management-of-encryption-and-encryption-keys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-of-cloud-based-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-of-privileged-user-activity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-of-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-of-security-standards-and-trends</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-of-technical-and-regulatory-developments-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-of-technical-vulnerability-communications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-policy-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-suppliers-compliance-with-security-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-the-status-of-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-the-use-of-the-available-capacity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/monitoring-the-use-of-the-network-and-information-systems-to-identify-anomalies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/muiden-tietojarjestelmien-aiheuttamien-riskien-hallinta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/muiden-tietoturvavaatimusten-seuranta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/multiple-authentication-methods-for-iacs-with-critical-control-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/multiple-providers-for-critical-network-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/muutoshallintamenettelyt-tietojenkasittely-ymparistoissa-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/muutosvaikutusten-arviointien-toteuttaminen-ja-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/national-cybersecurity-ict-system-usage-poland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/national-provider-identifier</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/need-to-know-principle-in-access-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/network-areas-and-structurally-secure-network-design</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/network-configuration-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/network-perimeter-security-and-firewall-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/network-security-and-segregation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/network-segmentation-for-secure-communications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/network-segmentation-strategy-for-iacs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/network-usage-log-and-process-for-detecting-inappropriate-network-traffic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/non-disclousure-agreements-for-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/non-essential-communications-are-blocked</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/nonstandard-to-standard-outbound-transactions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notice-for-users-of-emotion-recognition-or-biometric-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-and-documentation-of-personal-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-channel-for-the-registered-for-reporting-privacy-problems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-of-a-significant-incident-with-cross-border-and-cross-sectoral-impact</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-of-an-incident-affecting-the-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-of-exploited-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-of-fundamental-rights-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-of-participation-in-information-exchange-agreements-estonia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-of-the-appointment-of-a-cybersecurity-officer-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-of-the-data-protection-officer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-of-users-for-significant-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-procedure-for-risks-in-distributed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-process-for-security-protection-agreements-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-process-for-violations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notification-process-in-case-of-loss-of-physical-identifiers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notify-start-of-security-sensitive-activity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notify-termination-of-security-sensitive-activity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notifying-authorities-of-high-risk-procurements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notifying-the-administrative-body-of-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/notifying-the-public-of-a-significant-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/npp-delivery-and-acknowledgment-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/numeroyhdistelmien-vaihtamiskaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/offboarding-process-and-immediate-removal-of-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ohjeiden-saatavuuden-varmistaminen-poikkeustilanteissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ohjeistukset-tiedonhallintatyohon</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ohjeistukset-tyosuhteen-elinkaaren-huomioimiseksi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ohjelmistohaavoittuvuuksien-saannollinen-tarkastelu-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/ohjelmistohaavoittuvuuksien-saannollinen-tarkastelu-st-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/operational-contact-point-management-denmark-energy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/operational-control-for-environmental-aspects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/operational-plan-for-coordinated-emergency-preparedness-denmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/operational-process-for-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/operational-process-planning-and-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/opt-out-mechanism-for-internal-activity-recording</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/organisaation-rooli-kasiteltyjen-henkilotietojen-osalta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/organising-the-distribution-of-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/organizing-long-term-records-retrieval</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/organizing-supplier-management-meetings-to-discuss-digital-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/owasp-web-application-security-testing-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/paakayttajien-asiakastietoihin-paasyn-rajoittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/paasyoikeuksien-myontaminen-hallinnollisille-alueille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/paatelaitteiden-tekninen-tunnistaminen-ennen-verkkoon-paasya-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/palomuurisuojaus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/palvelinvarmenteen-yksiloivyys-ja-vastaavuus-kanta-osoitehakemiston-tietoihin</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/palvelujen-tuottamisen-yhteydessa-muodostuvan-tietoaineiston-rekisterointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/palveluntarjoajien-siirtojen-huomiointi-jatkuvuussuunnitelmissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/palveluriippuvuuksien-huomiointi-vikasietoisuuden-suunnittelussa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/participation-in-mandatory-domestic-cybersecurity-exercises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/partners-data-protection-commitments-and-its-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/password-creation-and-management-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/patch-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/patient-identification-on-system-outputs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/performance-management-of-used-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/performing-a-special-security-protection-assessment-before-starting-sensitive-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/performing-a-suitability-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/performing-application-layer-filtering</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/performing-automated-backups-of-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/performing-root-cause-analysis-on-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/performing-traffic-filtering-between-network-segments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/periodic-and-triggered-review-of-bia-and-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/periodic-assessment-of-the-iacs-security-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/periodic-audits-of-the-iacs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/periodic-review-and-documentation-of-it-lifecycle-management-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/periodic-review-of-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/periodic-review-of-the-information-security-policy-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/periodic-review-of-the-supply-chain-security-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/periodically-reviewing-training-records</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personal-data-destruction-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personal-data-verification-and-correction-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-authorization-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-awareness-of-business-continuity-non-conformance-consequences</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-clearance-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-compliance-with-information-security-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-data-protection-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-approved-devices-and-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-avoiding-phishing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-file-usage-and-local-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-gpai-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-reporting-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-safe-copying</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-safe-data-system-and-authentication-info-usage</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-safe-disposal-of-paper-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-safe-processing-of-personal-and-confidential-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-safe-usage-of-mobile-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-secure-remote-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-guidelines-for-the-safe-usage-of-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-security-clearance-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-security-policies-for-accessing-ephi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-security-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/personnel-training-for-environmental-emergency-response</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/phasing-out-outdated-ict-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/phi-amend-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/phi-de-identification-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/phi-disclosure-accounting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/phi-re-identification-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/physical-access-control-to-building-offices-and-other-premises</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/physical-security-measures-for-facilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/physical-switch-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/physically-isolate-the-most-critical-subnets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/plan-for-ai-system-withdrawal-disabling-and-recall</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/plan-for-remedying-non-compliances</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/plan-for-technical-security-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/planned-transition-to-modern-network-communication-protocols</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/planning-and-documenting-facility-security-inspections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/planning-and-evaluating-risk-and-opportunity-responses</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/planning-and-formalizing-the-internal-audit-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/poikkeamien-havainnoinnin-ja-toipumisen-lisavaatimukset-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policies-and-procedures-for-hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policies-regarding-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-for-cryptography-and-key-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-for-personnel-background-checks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-for-processing-credit-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-for-real-identity-verification-for-network-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-for-secure-emergency-communication-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-for-secure-internal-communication-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-for-the-issuance-of-temporary-passwords</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-for-workstation-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-on-ce-marking-responsibility-and-usage-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/policy-portfolio-harmonization-for-ai-alignment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/post-market-monitoring-and-corrective-actions-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/potilaiden-informointi-kanta-palveluista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/practice-of-communication-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/practicing-disaster-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/pre-commitment-review-process-of-product-service-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/pre-market-declaration-of-conformity-preparation-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/preparation-for-information-campaign-against-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/preparing-and-documenting-inputs-for-management-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/preparing-for-quick-data-recovery-after-faults</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/preparing-the-input-package-for-the-top-management-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/preventing-downloads-of-confidential-information-on-unsupported-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/preventing-eavesdropping</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/preventing-outdated-authentication-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/preventing-unauthorized-viewing-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/principles-for-personal-data-protection-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/prioritization-of-identified-technical-vulnerabilities-and-remediation-goals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/prioritization-of-partners-based-on-the-confidentiality-of-the-information-processed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/prioritization-of-security-alerts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/priority-classification-of-an-organization-s-information-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/privacy-and-data-protection-policy--report-publishing-informing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/privacy-notices-report-publishing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/privacy-related-codes-of-conduct-and-certification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-advisory-assignments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-alarm-handling-and-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-applying-pseudonymisation-and-privacy-enhancing-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-classification-of-projects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-emergency-notifications-to-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-handling-official-orders-denmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-identifying-software-licensing-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-implementing-and-managing-a-firewall-on-servers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-information-exchange-with-authorities-belgium</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-initial-incident-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-introducing-new-personal-data-processing-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-managing-data-protection-complaints</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-official-communication-with-the-danish-energy-agency-denmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-reporting-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-secure-procurement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-security-assessments-in-transfers-of-sensitive-activities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-serious-ai-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedure-for-system-auditing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedures-and-data-sources-for-gathering-reliable-information-about-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedures-and-log-for-data-restoration-efforts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/procedures-for-national-crisis-management-participation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-and-metrics-for-customer-success-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-documentation-and-owner-assignment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-documentation-and-owner-assignment-of-ems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-evaluations-and-change-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-evaluations-and-change-management-for-ems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-addressing-unauthorized-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-ai-risk-treatment-and-control-implementation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-ai-system-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-authorised-representative-s-withdrawal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-authority-notifications-on-ai-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-automating-session-locking-on-enterprise-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-categorization-of-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-ce-marking-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-ceasing-data-processing-after-consent-withdrawal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-checking-integrity-of-data-after-an-incident</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-clarifying-reporting-obligations-switzerland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-conformity-assessment-of-ai-systems-under-existing-legislation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-consultation-with-the-supervisory-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-cooperating-with-competent-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-cooperation-with-competent-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-data-disclosure-to-public-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-data-subjects-to-edit-or-cancel-a-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-data-subjects-to-object-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-data-subjects-to-rectify-inaccurate-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-deleting-data-from-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-destruction-of-temporary-files</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-detecting-and-reporting-security-breaches-related-to-the-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-disclosing-ai-generated-content</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-disclosure-of-cybersecurity-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-establishing-and-maintaining-an-inventory-of-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-evaluating-compliance-with-environmental-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-evaluating-the-necessity-of-using-special-category-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-granting-access-rights-at-the-start-of-employment-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-handling-and-sharing-vulnerability-disclosures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-handling-supplementary-information-requests-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-identifying-and-responding-to-system-log-faults</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-immediate-notification-to-the-information-and-communication-center-belgium</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-including-information-security-aspects-in-project-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-information-exchange-with-bacs-switzerland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-informing-individuals-about-ai-system-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-initiating-data-breach-treatment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-managing-classification-changes-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-managing-modifications-to-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-managing-substantial-modifications-to-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-managing-technical-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-managing-unique-patient-identifiers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-monitoring-and-tracking-outsourced-development-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-monitoring-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-monitoring-protective-security-and-reporting-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-notifying-stakeholders-about-ai-system-non-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-post-market-data-collection-and-analysis</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-processing-based-on-the-data-subject-s-actual-interest</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-receiving-and-handling-data-subject-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-removal-or-return-of-customer-assets-after-cloud-service-agreement-cancellation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-removing-hardware-and-access-rights-at-termination-of-employment-relationship</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-reporting-minor-cyber-incidents-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-reporting-security-threatening-incidents-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-reporting-significant-incidents-to-the-provincial-government-aland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-responding-to-ems-inquiries</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-reviewing-and-approving-hardware-before-deployment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-safe-destruction-of-temporary-files-and-data-from-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-secure-configuration-of-network-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-secure-disposal-of-removable-media-containing-confidential-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-securing-enterprise-assets-and-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-security-classified-employment-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-supplementary-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-system-classification-and-authority-approval</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-temporary-network-access-for-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-testing-the-compatibility-of-endpoints</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-theft-disappearance-of-mobile-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-transferring-security-sensitive-activities-or-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-unlocking-user-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-using-a-dynamic-host-configuration-protocol-dhcp-logging-to-update-enterprise-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-using-a-passive-asset-discovery-tool</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-using-central-systems-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-utilizing-an-active-discovery-tool</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-vulnerability-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-for-vulnerability-remediation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-request-and-provide-accounting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/process-sequences-and-related-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/processes-for-reporting-information-security-events-related-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/processing-of-a-child-s-personal-data-in-connection-with-the-provision-of-information-society-services-based-on-consent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/processing-of-personal-data-related-to-criminal-convictions-and-offenses</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/processing-personal-data-collected-from-third-party-sources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/product-security-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/products-are-designed-to-reduce-the-impact-of-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/prohibition-of-password-storage-in-browsers-and-applications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/prohibition-of-unencrypted-portable-storage-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/proof-obligations-for-operators-of-critical-infrastructure-germany</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/prosessi-itsenaisen-paasyoikeuden-myontamiseen-turva-alueelle-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/prosessi-ja-ohjeistukset-henkilostolle-salassapidettavan-sahkoisen-tiedon-turvallisesta-tuhoamisesta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protect-critical-services-with-their-own-data-flow</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protecting-backups-against-intentional-and-unintentional-deletion-and-manipulation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protecting-connections-from-physical-tampering-or-damage</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protecting-credentials-and-identity-assertions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protecting-hipaa-rights-from-being-waived</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protecting-log-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protecting-recovery-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-and-minimisation-of-test-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-from-retaliation-and-intimidation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-of-critical-systems-from-denial-of-service-dos-attacks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-of-data-at-rest</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-of-data-in-transit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-of-data-in-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-of-data-systems-during-audit-related-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-of-information-in-transfer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/protection-of-wireless-connections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/provider-and-operational-details-for-ai-system-usage-instructions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/provider-support-for-the-authorised-representative</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/providing-customers-with-encryption-key-management-capabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/providing-information-for-fulfilling-customer-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/providing-necessary-system-documentation-and-information-to-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/providing-notice-of-privacy-practices-npp-to-individuals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/providing-the-security-managers-information-to-a-competent-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/providing-the-security-managers-information-to-a-competent-authority-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/provision-of-model-documentation-to-competent-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/provision-of-product-information-to-the-market-surveillance-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/provisioning-of-unique-cryptographic-keys-for-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/pseudonymisation-of-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/public-communication-on-incident-recovery-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/public-software-archive</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/public-summary-of-training-data-for-gpai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/publication-and-maintenance-of-privacy-notice-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/publication-of-decision-to-implement-automatic-decision-making-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/publicly-disclosing-information-about-fixed-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/purpose-limitation-of-processed-customer-owned-data-in-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/qms-description-maintenance-and-scope-definition</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/qualifications-of-the-auditor-poland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/quality-control-and-assurance-in-ai-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/quality-control-of-matters-to-be-decided-automatically-and-treatment-of-errors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/quality-management-equivalencies-for-financial-institutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/quality-policy-publishing-and-informing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/re-conducting-data-protection-impact-assessments-after-identifying-privacy-harm</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/readiness-to-provide-a-list-of-data-transfers-to-the-data-subject</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/recognizing-and-listing-sensitive-work-fields-and-jobs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/recognizing-the-technology-needed-to-accomplish-the-cybersecurity-goals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/record-keeping-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/record-keeping-for-environmental-emergency-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/record-keeping-for-the-ai-quality-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/record-of-disclosures-of-protected-health-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/record-of-serious-ai-incidents-and-corrective-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/records-of-personal-data-disclosures-to-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/records-of-personal-data-transfers-to-third-parties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/records-of-processing-activities-report-publishing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/recycling-encryption-keys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reducing-false-positives-and-false-negatives-in-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/redundancy-of-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/register-of-ce-marking-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/register-of-environmental-compliance-obligations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/registration-for-official-communication-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/registration-of-ai-systems-before-market-placement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/registration-of-ai-systems-concluded-as-not-high-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/registration-of-ai-systems-in-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/registration-of-high-risk-ai-system-registration-before-deployment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/registration-of-users-accessing-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-analysis-and-utilization-of-information-related-to-information-security-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-asset-scope-review-and-justification-of-exclusions-czech-republic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-communication-of-the-general-risk-situation-to-the-organization-s-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-compliance-self-assessment-of-cybersecurity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-critical-code-identification-and-verification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-external-auditing-of-privacy-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-external-auditing-of-security-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-feedback-discussions-on-employee-performance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-inspection-of-the-technical-condition-of-the-facilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-internal-monitoring-of-the-implementation-of-the-information-security-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-internal-review-of-privacy-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-malware-inspection-of-data-systems-supporting-critical-business-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-monitoring-of-the-vulnerability-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-periodic-analysis-and-learning-of-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-practice-of-security-incident-situations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-review-of-staff-training-themes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-review-of-the-cyber-security-risk-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-reviewing-of-data-system-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-reviews-of-the-account-administration-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-security-assessment-of-partners-in-the-supply-chain-of-provided-digital-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-security-audits-of-it-systems-poland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-security-updates-for-offered-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-self-evaluation-of-the-lawfulness-of-processing-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-testing-and-documentation-of-security-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-testing-and-review-of-continuity-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-testing-evaluation-and-recovery-instructions-for-backups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-testing-of-the-vulnerability-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-unit-based-cyber-security-communication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-updating-and-maintenance-of-hardware</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regular-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regularly-auditing-encryption-and-encryption-key-management-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regularly-conducting-penetration-testing-with-predefined-goals-and-scope-0526d</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/regulating-and-monitoring-physical-provider-access-when-performing-maintenance-on-ict-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/rejecting-any-non-legally-binding-requests-for-personal-data-disclosure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/rejection-of-standard-transactions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/rekisteroidyn-kaytettavissa-olevien-oikeuksien-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/remediation-of-vulnerabilities-in-third-party-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/remediation-plan-for-identified-deficiencies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reminding-personnel-about-their-cyber-security-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/remote-connection-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/remote-login-and-connection-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/remote-maintenance-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/removal-of-assets-from-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/removing-unnecessary-software-and-network-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reporting-data-security-incidents-to-the-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reporting-of-cybersecurity-service-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reporting-of-major-incidents-to-competent-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reporting-of-phi-to-supervisory-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reporting-of-threats-near-cybersecurity-incidents-and-cybersecurity-incidents-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reporting-personal-data-breaches-to-authorities-data-subjects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/required-security-objectives-for-cloud-service-subcontractors-related-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/requirements-about-information-security-continuity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/requirements-and-related-communication-to-external-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/requirements-for-coordinating-benefits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/requirements-for-creating-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/requirements-for-testing-ict-tools-and-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/requiring-mfa-for-remote-network-access</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/requiring-security-assessments-before-engagement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/resilient-design-of-the-public-warning-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/resource-management-for-the-business-continuity-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/responding-to-mandatory-reactive-cybersecurity-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/responsibilities-for-assessing-the-effectiveness-of-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/responsibility-for-communicating-ai-system-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/responsible-network-and-cybersecurity-practices-china</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/restoration-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/restriction-of-access-rights-at-high-risk-times-of-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/restriction-of-processing-for-personal-data-processed-on-behalf-of-a-customer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/restriction-of-unnecessary-https-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/retaining-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/retention-of-communication-records</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/retention-of-documented-information-for-operational-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/retention-of-supplementary-incident-data-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/return-of-assets-at-termination-of-employment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reusing-identities-across-systems-sub-systems-and-applications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-and-approval-of-the-incident-management-plan-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-and-redirection-facilitation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-and-update-change-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-of-access-right-for-changed-employee-roles</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-of-ai-management-system-resource-sufficiency</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-of-data-classification-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-of-explanation-obligations-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-of-information-security-management-system-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-of-the-access-control-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-of-the-security-of-the-operational-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-reporting-of-simplified-ict-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/review-update-and-communication-of-cryptography-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reviewing-and-revoking-physical-access-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reviewing-confidentiality-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reviewing-password-practices-on-password-protected-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reviewing-security-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reviewing-shared-security-responsibility-model-documentation-for-critical-data-systems-in-use</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/reviewing-the-execution-of-data-minimisation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/revision-of-encryption-methods-and-assessment-of-adequacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/revoking-encryption-keys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/riittavan-valvonnan-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/riittavat-organisaation-turvallisuusperiaatteet-turvallisuusluokiteltujen-tietojen-kannalta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assesment-of-legacy-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessment-and-considerations-for-contracting-ict-services-supporting-critical-functions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessment-background-information-for-participants</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessment-for-cloud-services-and-foreign-data-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessment-for-new-acquisitions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessment-in-technical-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessment-methodology-for-iacs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessment-of-iacs-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessment-of-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-assessments-and-results-are-integrated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-based-application-of-cryptography-to-network-and-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-based-authentication-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-based-encryption-for-data-transferred-inside-secure-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-based-justification-for-excluding-security-patches</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-based-selection-of-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-based-seperation-of-development-and-operational-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-level-accepted-by-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-management-policy--report-publishing-informing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-management-procedure-report-publishing-and-maintenance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-rating-system-for-logical-control-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/risk-tolerance-reassessment-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/riskiarvioihin-perustuvien-valmiussuunnitelmien-laatiminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/riskien-kasittelyvaiheessa-maariteltyjen-tietoturvallisuustoimenpiteiden-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/riskien-tunnistaminen-ja-arviointi-tietoaineistojen-luokittelun-perusteella</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/roles-and-responsibilities-in-supplier-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/roolipohjaisista-kayttooikeuksista-poikkeamien-kasittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/rules-and-formal-management-process-for-admin-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/rules-for-deviating-from-the-change-management-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/rules-for-handling-of-data-in-non-production-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/rules-for-the-use-of-nonmedical-standard-code-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/saannollinen-kattava-haavoittuvuusskannaus-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/saannollinen-kattava-haavoittuvuusskannaus-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/saatavuusvaatimuksia-omaavien-jarjestelmien-valvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safe-destruction-of-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safe-disposal-of-laptops</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safe-limited-use-of-data-storage-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safe-placement-of-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safe-re-use-of-data-storage-space-for-cloud-service-customers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safe-running-of-unknown-code</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safe-termination-of-critical-relationships</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safeguards-for-processing-data-for-research-purposes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safeguards-to-protect-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/safeguards-to-protect-the-confidentiality-of-group-health-plans</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/sahkoiseen-muotoon-muutettujen-asiakirjojen-eheyden-ja-luotettavuuden-varmsitaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/sahkoisen-allekirjoituksen-salaus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/sahkoisessa-muodossa-olevien-tietojen-tuhoaminen-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/sahkoisessa-muodossa-olevien-tietojen-tuhoaminen-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/sahkoisessa-muodossa-olevien-tietojen-tuhoamisen-suorittaja-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salaaminen-turva-alueiden-ulkopuolella</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavaa-tietoa-sisaltavien-tietoaineistojen-havittaminen-st-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavaa-tietoa-sisaltavien-tietoaineistojen-havittaminen-st-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavaa-tietoa-sisaltavien-tietoaineistojen-havittaminen-st-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavaa-tietoa-sisaltavien-varmuuskopioiden-suojaus-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavaa-tietoa-sisaltavien-varmuuskopioiden-suojaus-st-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavien-tietojen-etakaytto-ja-etahallinta-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavien-tietojen-etakaytto-ja-etahallinta-st-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavien-tietojen-jaljentaminen-tulostus-ja-kopiointi-st-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavien-tietojen-jaljentaminen-tulostus-ja-kopiointi-st-iv-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavien-tietojen-kasittely-fyysisesti-suojattujen-alueiden-sisalla-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassa-pidettavien-tietojen-kasittely-fyysisesti-suojattujen-alueiden-sisalla-st-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassapidettavien-tietojen-kasittelyyn-tarkoitettujen-alueiden-maarittely-ja-suojauksen-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salassapidettavien-tietojen-turvallinen-siirtaminen-tietoverkossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/salaus-yleisissa-tietoverkoissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/scheduled-execution-review-and-management-reporting-of-security-tests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/screenings-and-background-checks-before-recruitment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-configuration-of-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-deletion-of-session-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-deployment-of-iot-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-disposal-of-cloud-service-specific-resources</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-email-communications-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-handling-of-property-belonging-to-customers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-handling-of-property-belonging-to-stakeholders-in-the-development-of-ai-products-and-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-hosting-of-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-identification-of-systems-with-admin-rights</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-management-of-de-activated-or-expired-user-ids</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-network-design-and-encryption-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-remote-access-integration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-setting-and-distribution-of-temporary-login-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-storage-and-transport-of-distributed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-storage-of-ai-system-impact-assessment-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-teleworking-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-transfer-of-confidential-data-outside-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/secure-usage-of-maintenance-tools-and-portable-devices-for-organization-s-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/securely-delivering-a-copy-of-data-subject-s-personal-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/securing-data-transfer-when-switching-to-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/securing-the-physical-transport-of-data-devices-and-media</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-agreement-with-a-supplier</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-and-privacy-measures-for-special-category-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-assessment-and-approval-for-new-sensitive-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-contact-point-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-controls-for-ict-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-impact-assessment-and-definition-of-protection-levels-for-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-in-the-product-development-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-instructions-and-account-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-management-process-for-ephi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-management-process-for-ephi-1a06d</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-measures-of-devices-used-to-transfer-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-of-teleworking-and-privatively-owned-endpoints</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-of-transfer-of-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-of-used-data-centers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-officer-appointment-and-responsibilities-hipaa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-operations-center-soc-structure-competence-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-performance-evaluation-through-other-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-plan-development-and-implementation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-practices-and-methodologies-for-acquisition-development-and-maintenance-of-ict-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-related-policies-and-procedures-for-all-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-reporting-point-of-contact</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-requirements-for-supporting-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-requirements-for-system-procurement-and-development</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-requirements-for-users-of-a-central-system-hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-responsibilities-for-personal-health-information-in-job-descriptions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-roles-responsibilities-and-objectives-derived-from-the-organization-s-goals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-rules-for-the-development-and-acquisition-of-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-services-in-real-estates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-strategy-and-treatment-selection-criteria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-testing-of-iacs-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-testing-plan</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-vetting-for-security-sensitive-activities-and-follow-up-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/security-when-travelling</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/segment-data-processing-and-storaging-based-on-the-sensitivity-of-the-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/segregation-of-customer-s-virtual-environments-in-relation-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/segregation-of-environment-in-external-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/segregation-of-information-security-related-duties</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/segregation-of-network-access-related-to-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/segregation-of-tasks-in-information-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/selecting-and-tracking-data-sources-for-vulnerability-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/selection-and-use-of-malware-detection-software-on-all-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/selection-of-a-notified-body-for-combined-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/selection-of-a-notified-body-for-conformity-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/self-assessment-using-harmonised-standards</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/self-declaration-submission-austria</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/self-service-channel-for-data-subjects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/separate-duties-for-different-parts-of-the-iacs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/separation-of-critical-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/separation-of-production-testing-and-development-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/server-room-air-conditioning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/service-level-requirements-in-contracts-related-to-the-data-processing-environment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/setting-up-and-resourcing-backup-equipment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/sharing-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/signing-contract-before-getting-access-to-the-organizations-information-and-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/simplified-technical-documentation-for-smes-and-start-ups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/single-point-of-contact-for-reporting-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/smartphone-and-tablet-encryption</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/societal-impact-assessment-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/software-bill-of-materials-sbom</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/software-firewall-on-endpoint-devices</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/source-code-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/source-code-reviews-as-part-of-acquisition-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/sovereignty-of-encryption-keys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/special-supervision-of-dismissed-workers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/specific-documentation-for-combined-conformity-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/specific-safeguards-for-production-data-used-for-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/specification-of-ai-system-log-content</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/specifications-for-new-it-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/staff-guidance-and-training-procedure-in-ai-literacy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/staff-guidance-and-training-procedure-in-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/standards-for-submitting-vulnerability-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/statement-of-applied-security-measures-spain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/strategic-directions-of-risk-response-options</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/strategic-opportunities-and-positive-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/strategic-thinking-process-and-identifying-relevant-issues-for-environmental-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/strategic-thinking-process-and-identifying-relevant-issues-for-quality-work</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/strategy-for-cyber-security-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/stress-testing-after-major-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/strong-authentication-for-processing-or-storage-areas-of-highly-confidential-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/structured-periodic-update-of-cybersecurity-training-programs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/submission-of-cybersecurity-documents-to-nksc-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/submission-of-project-risk-assessments-to-the-danish-energy-agency-denmark</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/submission-of-the-quality-management-system-and-technical-documentation-to-a-notified-body</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/submitting-a-monthly-progress-report</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/submitting-a-progress-report</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/sufficient-resourcing-of-ict-environment-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supervision-carried-out-by-the-board-of-the-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supervision-of-access-to-secure-areas</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supervisor-approval-and-mandatory-training-for-employees-with-security-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supplier-agreement-review-and-non-compliance-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supplier-business-continuity-capability-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supplier-due-diligence-for-distributed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supply-chain-cyber-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/support-for-authorised-representatives-of-gpai-model-providers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/support-period-determined-for-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supporting-data-subject-requests-with-administrative-and-technical-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supporting-organizational-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/supporting-the-product-throughout-the-support-period</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-administrator-appointment-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-capacity-planning-and-resilience</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-development-reporting-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-error-handling-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-isolation-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-owner-responsibilities-for-information-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-portfolio-management-and-proactive-design-of-portfolio</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-testing-as-a-part-of-acquisition-procedure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/system-to-check-trade-report-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/taking-risk-management-into-account-in-strategic-decision-making-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/taking-the-results-of-risk-management-into-account-in-audit-procedures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tamper-proof-endopoint-security-measures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tarvittavan-koulutuksen-huolehtiminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tasmakoulutukset-potilastietojen-kasittelyyn</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tasmakoulutusten-jarjestaminen-tietojarjestelmien-kayttajille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-and-personnel-requirements-in-supplier-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-cyber-security-measures-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-documentation-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-documentation-for-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-documentation-of-the-iacs-and-process-descriptions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-implementation-of-ai-system-log-retention</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-limitations-on-re-use-of-special-category-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-plan-for-capacity-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-requirements-for-ai-system-performance-and-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/technical-review-of-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/teknisen-turva-alueen-suojauskaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/temporal-information-for-all-system-and-security-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/termination-clause-in-the-authorised-representative-s-mandate</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/terms-and-conditions-related-to-the-offered-digital-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/terms-and-conditions-to-limit-changes-directly-affecting-customer-environments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/test-data-management-for-high-risk-ai-systems-without-model-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-and-documentation-of-emergency-communication-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-and-reviewing-continuity-plans-related-to-cyber-security-breaches</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-and-validation-of-business-continuity-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-and-validation-plan-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-business-continuity-plans-with-severe-scenarios</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-of-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-of-new-systems-before-deployment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-plan-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-security-functions-that-are-affected-by-the-changes-to-ict-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-switching-to-backup-and-redundant-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/testing-the-clarity-of-privacy-communications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-competence-and-responsibilites-of-the-personnel-maintaining-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-first-level-response-process-to-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-goals-of-threat-intelligence-and-the-collection-of-information-related-to-information-security-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-principle-of-least-functionality-in-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-review-and-security-of-event-logs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-role-of-the-organization-in-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-role-of-the-organization-in-the-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-step-by-step-process-of-notification-of-incidents-to-the-authorities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-step-by-step-process-of-notification-of-incidents-to-the-authorities-aland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-step-by-step-process-of-notification-of-incidents-to-the-authorities-cyprus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-step-by-step-process-of-notification-of-incidents-to-the-authorities-czech-republic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-step-by-step-process-of-notification-of-incidents-to-the-authorities-denmark-energy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-step-by-step-process-of-notification-of-incidents-to-the-authorities-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-step-by-step-process-of-notification-of-incidents-to-the-authorities-sweden</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/the-step-by-step-process-of-notification-of-incidents-to-the-national-security-authority</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/third-party-access-to-security-information</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/third-party-endpoint-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/third-party-political-risk-assessment-slovakia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/threat-prevention-disclosures-of-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tiedon-salaaminen-langattomassa-tiedonsiirrossa-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tiedon-salaamisen-lisavaatimukset-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tiedon-salaamisen-lisavaatimukset-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tiedonhallinnan-vastuiden-maarittaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tiedonhallintaan-oleellisesti-vaikuttavien-muutosten-tunnistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tiedonhallintamalli-raportin-julkaisu-ja-yllapito</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tiedottaminen-hairiotilanteissa-ja-varautuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tieto-omaisuuden-valisten-riippuvuuksien-tunnistaminen-ja-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoaineistojen-arkistointi-tai-tuhoamisprosessit-sailytysajan-paattyessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoaineistojen-luovuttaminen-teknisen-rajapinnan-avulla-muille-kuin-viranomaisille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoaineistojen-sahkoiseen-muotoon-muuttaminen-ja-saatavuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoaineistojen-tuhoaminen-osana-laitteiden-elinkaaren-hallintaa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoaineistojen-turvalliset-sailytystilat</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojajestelmien-ei-sallitun-kayton-tekninen-estaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelman-kayttajien-kokemuksen-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelman-kayttoohjeiden-ja-tukipalvelujen-kuvaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-kayttotarkoitukseensa-soveltuvuuden-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-luokittelu-ja-versiotiedot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-luotettavuuden-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-saatavuus-ja-saatavuutta-suojaavat-menettelyt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-tarkeimpien-yllapitotehtavien-valvonta-ja-eriyttaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-turvallisuusluokiteltujen-tietojen-erittely</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-vaatimusten-poikkeamasta-ilmoittaminen-tuottajalle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-vikasietoisuus-ja-toiminnallinen-kaytettavyys</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojarjestelmien-yllapito-ja-paivittaminen-valmistajan-ohjeiden-mukaisesti</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojekasittely-ympariston-ohjelmien-suojaus-verkkohyokkayksilta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojen-erottelumenettelyt-varmistusjarjestelmissa-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojen-fyysisen-kuljettamisen-turvallisuusvaatimukset</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojen-fyysisen-kuljettamisen-turvallisuusvaatimukset-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojen-fyysisen-kuljettamisen-turvallisuusvaatimukset-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojen-fyysisen-kuljettamisen-turvallisuusvaatimukset-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojen-luovuttaminen-teknisen-rajapinnan-avulla-viranomaisten-valilla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojen-tuhoaminen-pilvipalveluissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojenkasittely-ymparistojen-erottelu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojenkasittely-ymparistojen-erottelu-palomuurilla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojenkasittely-ymparistojen-turvallisuusdokumentaation-yllapito</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojenkasittely-ymparistojen-yhdistaminen-yhdyskaytavaratkaisulla-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojenkasittely-ympariston-kayttajien-tehostettu-seuranta-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojenkasittely-ympariston-toimijoiden-tunnistaminen-tl-iii-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietojenkasittely-ympariston-toimijoiden-tunnistaminen-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoliikenneverkon-vyohykkeistaminen-ja-suodatuskaytannot-suojaustason-sisalla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoliikenteen-toimivuuden-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietosuojan-seuranta-ja-valvontasuunnitelma</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoteknisten-ymparistojen-toimivuuden-varmistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoturvallisuuteen-liittyvan-dokumentaation-ajantasaisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietoturvasuunnitelma-raportin-luominen-ja-yllapito</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietovarantojen-ja-tietojarjestelmien-sijoittaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tietovarantojen-ja-tietojarjestelmien-sijoittaminen-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tila-ja-laitetarkastukset-turvallisuusalueilla-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tl-i-tiedon-kasittely-ja-sailytys-ainoastaan-turva-alueilla-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tlpt-tester-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/toimintaprosessien-listaus-ja-omistajien-nimeaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/toisen-viranomaisen-laatimien-sahkoisten-tietojen-tuhoaminen-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/toisen-viranomaisen-tietoaineistojen-hyodyntaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/top-management-commitment-to-customer-focus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/top-management-commitment-to-ems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/top-management-commitment-to-qms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/top-management-cyber-security-training</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/top-management-cyber-security-training-poland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/top-management-s-commitment-to-the-ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/total-record-of-authorized-users-for-offered-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-against-unauthorized-ingress-and-egress</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-for-employees-with-access-to-iacs-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-for-support-personnel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-in-risk-assessment-methodology</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-own-it-personnel-for-security-system-usage</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-personnel-with-a-changed-role</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-the-use-of-security-systems-and-reporting-of-malware-attacks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-workforce-on-causes-of-unintentional-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/training-workforce-on-identifying-and-reporting-of-missing-security-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/transparency-in-advanced-data-processing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/transparency-in-the-ai-development-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/treatment-process-and-documentation-of-identified-non-conformities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/treatment-process-and-documentation-of-occurred-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tunkeutumisen-ilmaisujarjestelmien-kaytto</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tunkeutumisen-ilmaisujarjestelmien-kaytto-hallinnollisilla-alueilla-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tunkeutumisen-ilmaisujarjestelmien-kaytto-hallinnollisilla-alueilla-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turva-alueen-kulunvalvontajarjestelman-lisavaatimukset-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turva-alueen-sailytysyksikoiden-avaimet-ja-paasykoodit-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turva-alueen-suojauskaytannot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turva-alueen-ulkoraja-ja-rajaavat-rakenteet-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turva-alueen-vierailijakaytannot-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turva-aluekohtaiset-turvallisuusohjeet-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvalliset-toimintatavat-tiedon-sisaantuontiin-ja-ulosvientiin-jarjestelmista-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvalliset-toimintatavat-tiedon-sisaantuontiin-ja-ulosvientiin-jarjestelmista-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuuden-ja-suorituskyvyn-varmistamisen-kuvaaminen-hyodynnettavista-sovelluksista-ja-tietojarjestelmista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusalueiden-paasyoikeuksien-ja-avaintenhallinnan-menettelyt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusalueiden-vierailijakaytannot-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusjarjestelmien-seka-laitteiden-turvallisuus-ja-testaus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-kasittely-fyysisesti-suojatuilla-alueilla</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-kasittelyn-kieltaminen-julkisilla-paikoilla-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-kasittelyn-lokitus-ja-lokitietojen-sailytys-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-kasittelyn-lokitus-ja-lokitietojen-sailytys-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-kirjaamo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-salaaminen-siirrettaessa-turvallisuusalueiden-sisalla-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-salaaminen-siirrettaessa-turvallisuusalueiden-ulkopuolelle-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-turvallinen-sailyttaminen-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-turvallinen-sailyttaminen-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-turvallinen-sailyttaminen-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitellun-tiedon-turvallinen-sailyttaminen-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltua-tietoa-sisaltavien-hallintayhteyksien-turvallisuus-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltua-tietoa-sisaltavien-hallintayhteyksien-turvallisuus-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltua-tietoa-sisaltavien-hallintayhteyksien-turvallisuus-tl-iv-c1f08</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltuja-tietoja-kasittelevan-henkilon-luotettavuuden-arviointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltujen-tietoihin-kohdistuvien-riskien-huomioiminen-riskienhallinnassa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltujen-tietojen-erottelu-ja-salaaminen-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltujen-tietojen-huomiointi-hairioiden-hallinnassa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltujen-tietojen-siirtamisen-kirjaaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokiteltuun-tietoon-kohdistuvien-ja-tyotehtaviin-liittyvien-uhkien-ja-ohjeistusten-jakaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusluokitettujen-tietojen-ja-tietoliikenteen-salaaminen-etakaytossa-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuuspoikkeamista-ilmoittaminen-viranomaisille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuusselvitysten-tarpeen-arviointi-ja-toteuttaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/turvallisuustoimenpiteiden-maarittely-tietoaineistojen-turvallisuuden-varmistamiseksi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/two-way-communication-channels-for-environmental-feedback</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/tyoasemien-automaattinen-lukittuminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/unauthorized-access-to-digital-products-is-prevented</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/understanding-threat-actor-capabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/unified-technical-documentation-for-ai-systems-in-regulated-products</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/unit-or-role-specific-ai-literacy-program</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/unit-or-role-specific-security-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/updating-and-implementing-cryptographic-technology</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/updating-requested-amends</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/updating-the-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/upper-obligations-regime-incident-notification-procedure-czech-republic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/usage-of-data-centers-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/usage-of-the-secure-network-lithuania</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-a-centralised-tool-to-check-password-quality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-and-disclosure-of-de-identified-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-and-evaluation-of-password-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-malware-systems-from-multiple-vendors</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-a-dlp-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-a-software-firewall-to-protect-provided-digital-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-anti-phishing-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-certified-ict-products-services-and-processes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-correct-and-valid-medical-code-sets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-dedicated-admin-accounts-in-critical-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-industry-approved-cryptographic-libraries</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-multi-factor-authentication-for-important-data-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-of-vulnerability-scanning-and-attack-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-previous-impact-assessments-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-provider-information-in-the-fundamental-rights-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-standard-transactions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-surge-protectors-and-uninterruptible-power-supplies-ups</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/use-of-unique-identifiers-for-data-separation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/user-notification-of-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/user-notification-procedure-for-significant-service-disruptions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-a-mobile-device-management-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-a-selected-web-browser-and-checking-for-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-behavior-based-anti-malware-software</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-data-loss-prevention-policies</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-encryption-when-downloading-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-keys-and-other-ids-that-produce-electronic-movement-log</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-multi-factor-authentication-for-admins</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-of-dns-filtering-services</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-of-secure-communication-protocols-and-network-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-trust-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-unique-passwords</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-unique-user-names</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/using-visible-ids</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vaatimukset-ei-sahkoisten-tietojen-fyysiselle-tuhoamiselle-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vaatimukset-ei-sahkoisten-tietojen-fyysiselle-tuhoamiselle-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vaatimukset-ei-sahkoisten-tietojen-fyysiselle-tuhoamiselle-tl-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vaatimukset-ulkoiselle-liityntapisteen-toteuttajalle</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vaatimukset-vastaanottopalveluille</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vahimpien-oikeuksien-periaate-verkkojen-vyohykkeistamisessa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vahva-tunnistautuminen-a-luokan-jarjestelmissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vaikutustenarviointiin-liittyva-tietosuojaviranomaisen-ennakkokuuleminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/validation-of-security-measuers-after-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/valviran-tietojarjestelmarekisterin-seuraaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/varautumista-ohjaavan-lainsaadannon-tunnistaminen-ja-dokumentointi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/varmenteen-tarkistaminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/varmuuskopioiden-rekisterointi-ja-kasittelyn-seuranta-tl-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vendor-management-procedures-and-security-requirements-in-supplier-agreements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verification-and-documentation-of-the-internal-conformity-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verification-of-ce-marking-for-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verification-of-network-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verification-of-recovery-capability-for-central-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verification-process-for-imported-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verify-manufacturer-enforces-coordinated-vulnerability-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verifying-network-configuration-consistency-between-virtual-and-physical-networks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verifying-the-registration-of-deployed-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verifying-the-security-of-external-system-connections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verkon-rakenteellinen-turvallisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verkon-rakenteellinen-turvallisuus-st-iii-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verkon-rakenteellinen-turvallisuus-st-iv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verkon-rakenteellinen-turvallisuus-tl-i-luokan-ymparistoissa-tl-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/verkon-rakenteellinen-turvallisuus-tl-ii-luokan-ymparistoissa-tl-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/viranomaisen-tehtavien-kannalta-oleellisten-tietojarjestelmien-testaus-ja-vikasietoisuus</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/viranomaishyvaksyttyjen-salausratkaisuijen-kaytto</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/virtualization-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/visitor-instructions-and-log</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/visualizing-high-risk-network-architectures</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/voluntary-notifications-of-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/voluntary-sharing-of-risk-assessment-results-and-technologies-with-csirts-poland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/voluntary-vulnerability-notifications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vulnerability-assessment-records-are-maintained</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vulnerability-management-plan-for-authority-approval</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vulnerability-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vulnerability-management-process-and-documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vulnerability-monitoring-in-used-third-party-or-open-source-libraries</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/vulnerability-reporting-to-cert-pt-portugal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/web-form-input-validation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/website-security-with-encryption</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/whistle-blowing-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/whitelisting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/withdrawal-or-recall-of-a-non-compliant-product</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/workforce-sanctions-about-privacy-violations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/yhteisrekisterinpitajana-toimiminen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/yhteys-kanta-organisaatiorekisterissa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/yhteys-kanta-osoitehakemistossa</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/yleiset-muutostenhallintamenettelyt-st-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/yleiset-muutostenhallintamenettelyt-st-iv-iii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/library/zero-trust-architecture-in-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/12-new-nis2-national-frameworks-now-live</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/7-new-frameworks-soon-available-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/academy-contents-now-available-inside-cyberday-app</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/activation-improvement-suggestions-on-dashboard</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/ad-integration-or-unit-employee-connections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/add-a-user-but-don-t-send-the-invite-yet</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/add-events-about-report-editing-to-log</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/add-more-content-to-tiedonhallintamalli-tietojen-kasittely-data-source-fixes-needed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/add-multiple-documentation-items-at-once</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/add-new-info-to-tietosuojaseloste-statement-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/add-participants-to-a-task</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/add-pl-language</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/add-se-lang-to-client</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/after-publish-fixes-documentation-risk-control-factor-stuff-to-risk-card</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/ai-assistant-internal-audit-agent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/ai-assistant-publish-v1-0</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/ai-assistant-risk-identifier-agent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/alamma-luomaan-tehtaville-esimerkkeja-toteutuksen-kuvauksista</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/asset-based-risk-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/beta-ai-document-import-tool</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/better-export-capabilities-on-data-systems-list</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/better-filtering-on-visual-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/better-role-management-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/big-orgs-sharing-parent-account-process-descs-to-subaccounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/changes-to-theme-navigation-fixes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/clearer-data-presentation-on-documentation-cards</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/clearer-page-navigation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/collected-features-small-fixes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/collected-small-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/collected-ui-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-soon-development-idea-forum</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-soon-risk-autopilot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-soon-ui-updates-especially-to-admin-navigation-and-dashboard</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-automated-isms-key-data-export</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-community-section-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-extensions-for-employee-actions-on-guidebook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-improvements-to-all-events-feed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-improvements-to-audits-table</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-iso-27001-2022-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-language-versions-for-custom-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-multiple-unit-based-process-descriptions-for-tasks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-risk-management-improvements-asset-based-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-trust-center-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-using-images-on-reports-and-description-texts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/coming-up-visual-view-to-documenation-item-connections</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/community-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/community-recent-development--feed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/content-kyberturvallisuuslaki-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/copy-a-direct-link-to-individual-privacy-notice</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/create-a-framework-report-connection-for-custom-tasks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/custom-stuff-for-report-front-page</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/cybercrm-security-grant-support-access-to-your-account</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/cyberday-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/cyberday-content-update-v46</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/dashboard-card-changes-and-sorting-version-12501-published-small-fix-pending</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/dashboard-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/development-ideas-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/display-links-to-documentation-topics-task-topics-on-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/do-log-comment-user-notifications-via-teams-if-user-has-teams-app</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/documentation-linkblock-adding-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/documentation-list-sub-type-test-on-live</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/documentation-page-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/edits-to-showing-data-on-item-list-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/emails-email-notifications-to-match-teams-notifications</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fast-track-disabling-ai-assistant-during-onboarding-low-prio</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fast-track-order-tasks-on-pre-filled-isms-screen-by-priority-low-prio</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/file-picker-issues-inside-teams-desktop-app</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/files-new-files-page-improvements-to-file-displaying-on-tasks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/final-fixes-files-smart-links-to-files-implementation-part-i</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fix-needed-add-new-language-fr-and-related-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fix-needed-add-search-to-owner-selects</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fix-needed-guideline-notification-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fix-needed-reporting-browse-an-old-report-version-left-menu-design-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fix-reporting-compliance-report-table-view</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-activation-improvement-suggestions-on-dashboard</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-big-orgs-account-page-improvements-design-updates-coming-187af</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-create-an-internal-audit-report</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-documentation-maintain-an-all-fields-tab-automatically-for-documentation-tables</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-documentation-mass-edit-functionality</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-adding-participants-for-securityincidents-list</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-allow-hiding-processors-info-on-embed-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-allow-selecting-no-review-for-selected-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-audits-add-non-conformity-types-on-selected-places</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-automatic-units-for-main-asset-owners</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-cia-classification-for-main-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-connect-a-unit-as-topic-participant</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-custom-date-for-first-review-interval</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-deactivate-a-user</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-documentation-date-filtering-for-documentation-tables</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-edits-for-linked-content-tab-on-task-cards-d</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-enable-multi-select-on-owner-filtering-on-all-events-view</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-expand-framework-enabled-message</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-external-user-types</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-form-input-topic-lists</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-framework-page-quick-links-featured-content-redesign</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-guideline-notifications-and-comments-page-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-integrate-to-stripe-customer-portal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-linked-frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-lists-e-g-used-dropdown-values-where-we-allow-local-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-make-scrollbar-visible-on-statement-client</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-many-accounts-view-0009e</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-multiple-groups-in-one-org-inside-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-new-data-source-for-reports-framework-summary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-other-ui-simplicity-changes-4</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-quick-links-to-all-tasks-view-overdue-pending-for-review</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-redesigned-log-for-documentation-cards-2-new-log-event-types</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-remember-selected-filters-paging-xx-per-page-for-table-user</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-remembering-filters-even-better-on-other-views</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-renewed-frameworks-page</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-report-owner-review-interval-reporting-page-tuning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-report-print-mode-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-reporting-compliance-report-tuning</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-reporting-free-notes-to-compliance-report-sections-on-internal-audits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-reporting-general-visual-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-reporting-print-mode-for-embed-reports-too</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-research-compliance-report-search</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-risk-management-table-changes-new-setting-to-settings</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-risk-management-themed-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-risk-mgmt-part-ii</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-select-your-language-on-guidebook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-setting-enable-access-requests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-sharepoint-file-stuff-new-file-picker</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-show-a-notification-when-user-has-guidebook-on-in-an-unsupported-language</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-show-a-page-for-employee-skill-test-results</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-show-inlinking-items-on-item-list-reports-on-documentation-card</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-show-owner-for-each-task-on-task-list</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-show-review-pending-or-overdue-tags-also-for-documentation-items-on-taskbook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-show-specified-linked-assets-possibly-from-multiple-steps-away-on-documentation-card</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-show-users-detailed-responsibilities-on-user-stats--page</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-slack-app-implementation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-task-card-preview-mode</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-taskbook-visual-ux-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-needed-team-page</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-reporting-share-a-report-for-anyone-with-a-link</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-security-auth0-login-mfa-updates-part-2---new-profile-page</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/fixes-show-allowed-teams-domains-in-settings-enter-case</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/framework-comparison-on-cyberday-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/framework-connection-manual-scripts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/frameworks-c2m2-level-1-testing-and-finalizations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/frameworks-cyberfundamentals-finalizations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/frameworks-dora-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/guidebook-ad-integration-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/guidebook-v2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/guidebook-will-be-expanded-with-case-examples-and-skill-tests</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/guideline-writer-agent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/hide-sidebar-when-on-academy-page</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/iec-62443-2-1-and-dora-rmf-frameworks-published</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/improved-make-an-order-ux-cybercrm-part-remaining</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/improved-reporting-page</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/improved-risk-matrix-presentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/improvements-to-compliance-reports</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/improvements-to-compliance-reports-2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/improving-filter-sorting-remembering-per-user-table</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/it-is-also-possible-to-arrange-the-documentation-table-with-the-information-in-the-owner-column</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/languages-add-new-languages-for</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/localization-translate-an-embed-report-45169</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/mass-policy-drafting-on-whats-next-page</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/merge-to-dev-all-guidelines-all-tasks-page-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/merge-to-dev-assessment-changes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/merge-to-dev-improvements-for-reporting-related-to-security-statement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/merge-to-dev-participants-to-tasks-too</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/more-comprehensive-summary-and-comparison-across-all-of-a-users-accounts</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/ms-login-connection-for-web</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/multiple-cyberday-accounts-inside-single-365-tenant</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/multiple-report-templates-for-policy-documenta-published</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/new-explore-content-link-and-tasks-page-fixes-needed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/new-framework-v63</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/new-language-versions-es-it-no</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/new-task-card-design-fixes-remaining</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/nist-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/one-fix-import-securitysystems-from-excel</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/order-language-selector-options-alphabetically</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/performance-optimize-documentation-topics-lists</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/phrase-live-translation-system-for-se-version</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/publish-risk-autopilot</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/published-automated-isms-key-data-export</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/published-cyberday-trust-centers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/published-trust-center-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/quick-search-to-product</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/reactivity-for-topic-events-log</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/recommended-tasks-for-a-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/remember-selected-filter-on-taskbook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/reporting-add-selected-reports-to-guidebook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/reporting-cyberday-trust-centers</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/reporting-defining-main-metrics-for-an-account</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/reporting-monthly-management-report</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/reporting-pick-reports-shown-on-a-report-sharing-view</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/reporting-report-sharing-views-to-web-client</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/risk-analysis-with-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/risk-level-showing-on-extended-row-linkblock</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/risk-management-improvements-asset-based-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/risk-management-report-fixes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/search-to-taskbook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/security-question-answerer-agent</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/security-when-task-guideline-doc-topic-description-is-edited-display-content-of-previous-version-on-log-item</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/selected-data-fields-in-the-documentation-that-link-to-the-tasks-also-display-suggestions-from-the-library</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/send-due-soon-and-due-today-notifications-via-teams-5</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/separation-to-selected-documentation-dropdowns-current-items-vs-suggestions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/show-resend-email-for-uninvited-members-too</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/small-fix-enable-editing-story-skill-test-content-for-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/small-fix-overdue-and-pending-for-review-info-to-all-documentation-table</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/small-fix-report-print-view-edits</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/small-fixes-audits-audit-a-theme-not-a-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/small-fixes-renewed-help-support-page-w-webinars-from-webflow</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/small-improvements-to-vendor-assessments-released</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/swap-dash-appcover-com---app-cyberday-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/sync-v38-related-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/sync-v39-moving-task-instances</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/sync-v52-iso-9001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/system-id-waiting-for-sync-v30</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/task-statuses-refactoring</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/tasks-adding-new-columns-customizing-the-tasks-table-visible-columns</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/teams-app-submission-fixes</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/theme-summary-view-improvements-fixes-needed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/tisax-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/topic-summary-tunings-for-record-type-lists-and-other-type-list-events-log</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/translations-publish</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/trust-center-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/unassigned-option-available-on-all-assignment-components</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/update-auth0-password-reqs-to-include-special-chars-when-translation-can-be-updated</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/upgraded-cyberday-academy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/users-owned-themes-on-taskbook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/vendor-security-assessment-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/visual-tuning-for-events-view-fixes-needed</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/product-development/when-a-task-status-is-changed-dont-reload-the-entire-task-list</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-1-demo-main-features-of-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-1-demo-quick-intro-to-basics-of-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-1-different-infromation-security-frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-1-isms-and-what-is-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-1-steps-to-becoming-skilled-in-using-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-2-demo-asset-identification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-2-demo-configuring-your-cyberday-account</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-2-demo-editing-documentation-card-templates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-2-identification-of-assets</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-2-what-are-information-security-frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-3-basics-of-risk-management-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-3-demo-find-your-baseline</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-3-demo-risk-treatment-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-3-what-are-information-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-3-what-standards-require-from-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-4-demo-dynamic-policy-documents</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-4-demo-personnel-guidance-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-4-demo-personnel-training-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-4-personnels-role-in-inforamtion-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-4-why-is-staffs-role-growing-in-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-5-continuous-improvement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-5-demo-improvements-management-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-5-demo-reacting-to-important-events-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-5-demo-running-your-isms-and-treating-issues</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/admin-5-improvements-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/assessing-your-security-measures-introduction-to-popular-methods</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/asset-management-in-cyberday-know-what-youre-protecting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/continuity-management-and-backups-being-prepared-also-for-the-worst</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/continuous-improvement-in-cyberday-overall-introduction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/cyber-hygiene-and-personnel-security-awareness-intro-to-guidelines-and-training-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/encryption-additional-protection-layer-for-your-data</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/getting-started-create-account</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/getting-started-in-cyberday-quick-evaluations-and-available-support</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/getting-started-navigation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/getting-started-onboarding</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/incident-management-from-identification-to-continuous-improvement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/internal-audits-in-cyberday-overall-introduction</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-1-demo-reports-end-results-for-auditor-or-you</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-1-demo-starting-your-iso-27001-journey-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-1-iso-27001-certification-and-popularity</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-1-what-is-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-1-what-is-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-2-demo-risk-evaluation-and-treatment-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-2-demo-statement-of-applicability-soa-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-2-intro-to-information-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-2-risk-management-process-and-automation-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-2-statement-of-applicability-in-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-3-demo-internal-audits-and-management-reviews</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-3-demo-share-reports-to-the-auditor-in-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-3-mandatory-documents-needed-in-the-audit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-3-what-does-the-auditor-do-and-phases-of-the-audit</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-3-why-get-certified</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-4-demo-automated-app-distribution-in-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-4-demo-personnel-security-guidance-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-4-demo-tips-on-policy-documtens-and-other-topics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-4-importance-of-personnel-awareness-to-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-4-iso-27001-requirements-for-perssonnel-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-5-demo-improvement-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-5-demo-incident-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-5-demo-operating-your-isms-without-problems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-5-different-improvements-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/iso-27001-5-iso-27001-and-continuous-improvement-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2-and-iso-27001-understanding-the-connection</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2-background-and-basics</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2-compliance-report-understanding-your-progress-and-standing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2-demo-build-your-nis2-compliant-plan-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2-demo-intro-to-important-nis2-topics-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2-nis-background</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2-what-is-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2-what-is-nis2-directive</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/nis2s-scope-and-main-requirements</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/other-important-nis2-topics-hr-security-access-mfa-and-system-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/risk-management-in-cyberday-automation-assisted-straightforward-process</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/supply-chain-security-in-cyberday-from-inventory-to-contracts-and-assessments</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/understanding-cyberday-an-overall-intro</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy/understanding-reporting-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-categories/admin-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-categories/cyberday-usage</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-categories/general</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-categories/getting-started</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-categories/other-features</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-categories/working-as-a-team</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/continuous-improvement</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/documentation</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/feature-community</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/framework-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/framework-nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/gdpr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/getting-started</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/internal-auditing</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/personnel-guidelines</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/personnel-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/product-security</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/settings-and-advanced</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/task-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/team-collaboration</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/trial-and-subscription</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/user-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/academy-topics/working-as-a-partner</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/video-course/basics-of-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/video-course/continuously-improving-your-isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/video-course/cyberday-overall-intro</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/video-course/iso-27001-and-personnel-awareness</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/video-course/iso-27001-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/admin-actions</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/app-installation-and-integrations</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/content</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/documentation-for-assets-stakeholders-and-records</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/getting-started-for-new-users</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/guideline-management-guidebook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/microsoft-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/partner-features</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/reporting</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/security-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/task-management-and-taskbook</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/tips</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/help-topics/using-ai-assistant-in-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/ai-act-base</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/ai-act-gpai-models</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/ai-act-high-risk-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/ai-act-limited-risk-systems</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/alandcybersecuritylaw</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/beredskabirenergisektoren</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/c2m2-1</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/caf-4-0</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/cer</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/cis18</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/cyber-essentials</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/cyber-fundamentals</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/cybersecuritylawprc</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/datamgmt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/dora</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/dora-risks1</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/gdpr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/iso-27701</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/iso9001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/julkri-4</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/katakri</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/katakri2020</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/kokonaiskuva</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/la-loi-nis2-belgique</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/loi-infrastructures-critiques-belgique</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/msbfs-2020-6</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/msbfs2020-7</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nen7510</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-at</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-bg</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-cy</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-de</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-directive</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-dk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-es</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-fi</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-gr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-guide-lt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-hr</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-hu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-ie</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-it</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-lt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-lu</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-lv</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-mt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-nl</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-no</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-pl</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-pt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-ro</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-se</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-si</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nis2-sk</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nist-csf</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nist2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/nsm-ict</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/omavalvonta</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/pdpl</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/sakerhetsskyddslagen</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/sikkerhetsloven</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/soc-2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/tihltt</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/tisax</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/assessment/ttsuun</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/category/company-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/category/compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/category/frameworks</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/category/isms</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/category/news-and-trends</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/category/partner-portal</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/category/product-updates</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/success-stories/above-it-boosts-client-confidence-with-cyberday</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/success-stories/ellie-ai-earns-enterprise-trust-with-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/success-stories/how-docue-earned-iso-27001-certification</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/success-stories/how-pirkanmaan-jatehuolto-made-cybersecurity-part-of-the-daily-routine</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/success-stories/how-protinus-helps-swedens-energy-sector-tackle-nis2</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/success-stories/normnest-solves-compliance-for-belgian-smbs</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/success-stories/translator-scandinavia-turns-chaos-into-a-manageable-system</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/countries/aland</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/countries/canada</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/countries/china</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/countries/hungary</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/countries/portugal-cy0k8</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/countries/saudi-arabia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/countries/slovakia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/countries/slovenia</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/events/asis-europe</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/events/cyber-security-executive-cio-nordic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/events/cyber-security-nordic</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/events/digiturvallisuusmessut</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/events/techspo</loc>
    </url>
    <url>
        <loc>https://www.cyberday.ai/events/v2-security-kopenhavn</loc>
    </url>
</urlset>