<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://blog.everydayidentity.tech/tags/access-management/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/everydayidentity/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/iam/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/iam/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2026/03/iam-101-identity-governance-and-administration-iga-the-blueprint-for-secure-access/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-governance/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/iga/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/posts/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/</loc><lastmod>2026-03-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/api/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/api-security/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2026/03/iam-101-api-security-identity-protecting-your-digital-connectors/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/federated-identity/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam-101-federated-identity-sso/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/single-sign-on/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/sso/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ciam/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/customer-identity/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam-101-ciam-beyond-enterprise/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/aws/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/azure/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/best-practices/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ciem/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2026/03/cloud-iam-best-practices-securing-identity-across-aws-azure-and-gcp/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/cloud-security/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/cloud-iam/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/gcp/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/iam-101/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/least-privilege/</loc><lastmod>2026-03-04T00:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam-101-cloud-iam-best-practices/</loc><lastmod>2026-03-03T09:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/cloud-native/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-security/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/microservices/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/security-architecture/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/service-mesh/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/zero-trust/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/zero-trust/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/zero-trust-architecture-modern-applications/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/zero-trust-architecture/</loc><lastmod>2026-03-02T22:00:00-05:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/pam-securing-the-keys/</loc><lastmod>2026-02-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/pam/</loc><lastmod>2026-02-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/privileged-access-management/</loc><lastmod>2026-02-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/deep-dive/</loc><lastmod>2026-02-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/zero-standing-privilege-deep-dive/</loc><lastmod>2026-02-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ai/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/automation/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/governance/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/human-in-the-loop/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/mfa-first-line-of-defense/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/mfa/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/multi-factor-authentication/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/open-claw-identity-guardrails/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/prompt-injection/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/caching/</loc><lastmod>2026-01-26T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/databasesharding/</loc><lastmod>2026-01-26T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/distributedsystems/</loc><lastmod>2026-01-26T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/performance/</loc><lastmod>2026-01-26T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/performance-engineering/</loc><lastmod>2026-01-26T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/scalability/</loc><lastmod>2026-01-26T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/scaling-identity-100k/</loc><lastmod>2026-01-26T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/system-architecture/</loc><lastmod>2026-01-26T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/data-quality/</loc><lastmod>2026-01-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/datahygiene/</loc><lastmod>2026-01-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/dataquality/</loc><lastmod>2026-01-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/goldenrecord/</loc><lastmod>2026-01-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/identity-data-hygiene/</loc><lastmod>2026-01-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/identity-governance/</loc><lastmod>2026-01-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identitygovernance/</loc><lastmod>2026-01-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/reconciliation/</loc><lastmod>2026-01-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/auditcontrols/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/compliance/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/compliance/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/compliance-driven-iam/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/gdpr/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/hipaa/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/iam-architecture/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/pcidss/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/soc2/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/sox/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/access-governance/</loc><lastmod>2026-01-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/accessgovernance/</loc><lastmod>2026-01-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/ai-ml-access-governance/</loc><lastmod>2026-01-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/machine-learning/</loc><lastmod>2026-01-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/machinelearning/</loc><lastmod>2026-01-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/realitycheck/</loc><lastmod>2026-01-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/rolemining/</loc><lastmod>2026-01-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/vendorhype/</loc><lastmod>2026-01-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/access-analytics-ueba/</loc><lastmod>2025-12-29T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/anomalydetection/</loc><lastmod>2025-12-29T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/behavioranalytics/</loc><lastmod>2025-12-29T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/insiderthreat/</loc><lastmod>2025-12-29T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/security-analytics/</loc><lastmod>2025-12-29T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/threat-detection/</loc><lastmod>2025-12-29T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/threatdetection/</loc><lastmod>2025-12-29T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ueba/</loc><lastmod>2025-12-29T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/consent-delegation/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/application-security/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/appsecurity/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/consent/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/consentphishing/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/delegatedpermissions/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/oauth/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/oauth/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/scopemanagement/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/casb/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/cloudsecurity/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identityanalytics/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/riskscoring/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/saas/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/deep-dive-shadow-it-discovery/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/shadowit/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/azuread/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/b2b/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/cross_domain_federation_trust_architectures/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/crossdomain/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/enterprise-architecture/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/federation/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/identity-security/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ma/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/saml/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/trustarchitecture/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/apikeys/</loc><lastmod>2025-12-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/m2m/</loc><lastmod>2025-12-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/managing_non_human_identities_at_scale/</loc><lastmod>2025-12-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/nonhumanidentities/</loc><lastmod>2025-12-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/secretsmanagement/</loc><lastmod>2025-12-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/serviceaccounts/</loc><lastmod>2025-12-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/workloadidentity/</loc><lastmod>2025-12-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/behavioralanalytics/</loc><lastmod>2025-11-25T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/credentialstuffing/</loc><lastmod>2025-11-25T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/identity_threat_detection_response_itdr_practice/</loc><lastmod>2025-11-25T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identitysecurity/</loc><lastmod>2025-11-25T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/itdr/</loc><lastmod>2025-11-25T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/lateralmovement/</loc><lastmod>2025-11-25T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/siem/</loc><lastmod>2025-11-25T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/soar/</loc><lastmod>2025-11-25T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/practical-identity-management/enterprise-iga-foundations/</loc><lastmod>2025-11-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/enterprisesecurity/</loc><lastmod>2025-11-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/practical-identity-management/</loc><lastmod>2025-11-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/zerotrust/</loc><lastmod>2025-11-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/access-governance/</loc><lastmod>2025-11-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/access-management/</loc><lastmod>2025-11-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-deep-dive/account_recertification_in_depth/</loc><lastmod>2025-11-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/practical-identity-management/enterprise-iam-foundations/</loc><lastmod>2025-11-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/practical-identity-management/mid-market-iga-foundations/</loc><lastmod>2025-11-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/midmarketsecurity/</loc><lastmod>2025-11-05T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/practical-identity-management/mid-market-iam-foundations/</loc><lastmod>2025-10-28T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/smb-security/</loc><lastmod>2025-10-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/practical-identity-management/startup-iga-foundations/</loc><lastmod>2025-10-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/startupsecurity/</loc><lastmod>2025-10-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/practical-identity-management/startup-iam-foundations/</loc><lastmod>2025-10-14T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/enterprise-security/</loc><lastmod>2025-10-08T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/practical-identity-management/practical-identity-management--governance-a-right-sized-roadmap-for-every-stage/</loc><lastmod>2025-10-08T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/access-recertification/</loc><lastmod>2025-10-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/10/account-recertification-in-depth-beyond-annual-reviews-with-continuous-event-driven-and-ai-assisted-governance/</loc><lastmod>2025-10-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/continuous-compliance/</loc><lastmod>2025-10-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/iam-careers/</loc><lastmod>2025-10-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/mentorship/</loc><lastmod>2025-10-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/10/mentorship-in-identity-security-building-the-next-generation-in-an-ai-accelerated-world/</loc><lastmod>2025-10-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/workforce-identity/</loc><lastmod>2025-10-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/09/cloud-entitlement-management-ciem-taming-permissions-creep-in-aws-azure-gcp/</loc><lastmod>2025-09-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/cloud-security/</loc><lastmod>2025-09-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/a-30-day-plan-to-eliminate-your-top-10-identity-risks/</loc><lastmod>2025-09-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/jml/</loc><lastmod>2025-09-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/nhi/</loc><lastmod>2025-09-17T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/biometrics/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/digital-identity/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/09/ditch-the-password-ctos-guide-to-passwordless-auth/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/eid/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/enterprise-passwordless-login/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-proofing/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/09/identity-proofing-digital-onboarding-whats-changing-in-2025/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/liveness-checks/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/modern-identity-security/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/onboarding/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/passwordless-authentication/</loc><lastmod>2025-09-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/adaptive-access/</loc><lastmod>2025-09-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/zero-trust-model/</loc><lastmod>2025-09-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/zero-trust-principles/</loc><lastmod>2025-09-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/zero-trust-security/</loc><lastmod>2025-09-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/zero-trust-security-your-ultimate-beginners-guide/</loc><lastmod>2025-09-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/08/ai-as-the-new-cybercrime-weapon-a-2025-briefing-for-it-leaders/</loc><lastmod>2025-08-28T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/cybersecurity/</loc><lastmod>2025-08-28T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/it-operations/</loc><lastmod>2025-08-28T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/identity--access-management/</loc><lastmod>2025-08-27T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-orchestration/</loc><lastmod>2025-08-27T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/machine-learning/</loc><lastmod>2025-08-27T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/the_future_of_iam_ai_and_automation/</loc><lastmod>2025-08-27T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/delegated-admin/</loc><lastmod>2025-08-20T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/delegated_admin_and_just_in_time_access/</loc><lastmod>2025-08-20T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/jit-access/</loc><lastmod>2025-08-20T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/privileged-access/</loc><lastmod>2025-08-20T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/risk-reduction/</loc><lastmod>2025-08-20T09:00:00-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/access-control/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/adaptive-security/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/api-keys/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/cloud/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/conditional-access/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/context-aware-access/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/08/context-aware-access-the-next-level-of-adaptive-security/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_in_the_cloud_and_saas_era/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/policy-management/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/risk-based-authentication/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/security/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/shadow-it/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-management/</loc><lastmod>2025-08-13T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security-policy/</loc><lastmod>2025-08-13T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/security-policy/</loc><lastmod>2025-08-13T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/08/six-essential-iam-policies-every-business-needs/</loc><lastmod>2025-08-13T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/directories/</loc><lastmod>2025-08-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/directories/</loc><lastmod>2025-08-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_the_iam_backbone_a_unified_and_secure_foundation/</loc><lastmod>2025-08-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/iam-backbone/</loc><lastmod>2025-08-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-federation/</loc><lastmod>2025-08-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/identity-federation/</loc><lastmod>2025-08-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/lifecycle-management/</loc><lastmod>2025-08-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/access-reviews/</loc><lastmod>2025-08-06T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/08/access-reviews-certifications-why-and-how/</loc><lastmod>2025-08-06T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/audit/</loc><lastmod>2025-08-06T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/it-leadership/</loc><lastmod>2025-07-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/leadership/</loc><lastmod>2025-07-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/project-management/</loc><lastmod>2025-07-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/project-management/</loc><lastmod>2025-07-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/07/project-management-for-iam-success/</loc><lastmod>2025-07-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security-delivery/</loc><lastmod>2025-07-31T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/auth0/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/authentication/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/authentication/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/aws-cognito/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/breached-passwords/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/07/breached-passwords-and-modern-authentication-how-clerk-protects-your-app-from-known-risks/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/clerk/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/developer-best-practices/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/developer-security/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/microsoft-entra-id/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/okta/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/password-hygiene/</loc><lastmod>2025-07-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/continuous-verification/</loc><lastmod>2025-07-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/device-security/</loc><lastmod>2025-07-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/07/iam-101-zero-trust-and-identity-continuous-verification-in-practice/</loc><lastmod>2025-07-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-and-access-management/</loc><lastmod>2025-07-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/google-cloud/</loc><lastmod>2025-07-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/iam-101-series/</loc><lastmod>2025-07-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/iam-101-series/</loc><lastmod>2025-07-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam-101-why-identity-in-the-cloud-must-be-your-1-security-priority-for-aws-azure-and-google/</loc><lastmod>2025-07-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-in-the-cloud/</loc><lastmod>2025-07-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ats/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/audit-failures/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/hidden-workers/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/07/hidden-workers-lost-in-the-ats-hiring-black-hole/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/hiring/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/hiring/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/hitl/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/hr-tech/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/hr-tech/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_common_misconfigurations/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/iam-misconfigurations/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-risk/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/opinion/</loc><lastmod>2025-07-09T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/cybersecurity/</loc><lastmod>2025-07-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/phishing/</loc><lastmod>2025-07-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/privilege-escalation/</loc><lastmod>2025-07-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/privileged-access/</loc><lastmod>2025-07-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/privileged-access-management/</loc><lastmod>2025-07-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security-breach/</loc><lastmod>2025-07-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/07/when-a-phished-employee-has-admin-rights/</loc><lastmod>2025-07-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/career-advice/</loc><lastmod>2025-07-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/it-careers/</loc><lastmod>2025-07-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/it-management/</loc><lastmod>2025-07-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security-leadership/</loc><lastmod>2025-07-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/07/what-does-an-iam-manager-actually-do/</loc><lastmod>2025-07-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/data-protection/</loc><lastmod>2025-06-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_privileged_access_management/</loc><lastmod>2025-06-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/online-safety/</loc><lastmod>2025-06-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/personal-security/</loc><lastmod>2025-06-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/06/protecting-your-digital-identity-essential-strategies-for-2025/</loc><lastmod>2025-06-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/06/ai--human-in-the-loop-iam-compliance-mapping-guide/</loc><lastmod>2025-06-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ai-governance/</loc><lastmod>2025-06-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/ai-governance/</loc><lastmod>2025-06-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ai-in-iam/</loc><lastmod>2025-06-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/06/ai-in-iam-why-human-in-the-loop-still-matters/</loc><lastmod>2025-06-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/responsible-ai/</loc><lastmod>2025-06-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security-automation/</loc><lastmod>2025-06-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/security-automation/</loc><lastmod>2025-06-12T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_multi_factor_authentication_why_mfa_still_matters_2025/</loc><lastmod>2025-06-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-framework/</loc><lastmod>2025-06-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/06/mastering-identity-security-with-nist-csf-a-practical-guide-for-iam-pros/</loc><lastmod>2025-06-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/nist-csf/</loc><lastmod>2025-06-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/risk-management/</loc><lastmod>2025-06-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security-compliance/</loc><lastmod>2025-06-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/security-frameworks/</loc><lastmod>2025-06-11T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/automation-security/</loc><lastmod>2025-06-08T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/06/handling-enhanced-non-human-identities-nhis-in-2025-risks-signals-and-safeguards/</loc><lastmod>2025-06-08T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/iam-risk/</loc><lastmod>2025-06-08T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-lifecycle/</loc><lastmod>2025-06-08T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/identity-risk/</loc><lastmod>2025-06-08T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/non-human-identities/</loc><lastmod>2025-06-08T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_single_sign_on_sso_the_magic_of_one_login/</loc><lastmod>2025-06-04T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_lifecycle_management_joiners_movers_and_leavers_done_right/</loc><lastmod>2025-05-28T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/joiners-movers-leavers/</loc><lastmod>2025-05-28T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/user-provisioning/</loc><lastmod>2025-05-28T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/abac/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/authorization/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/automated-response/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/checklist/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/cisa-zero-trust-maturity-model/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/continuous-monitoring/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_rbac_abac_and_pbac_choosing_the_right_access_model/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/nist-sp-800207/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/pbac/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/rbac/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security-assessment/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/security-checklists/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/zero-trust-quiz/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/05/zero-trust-readiness-quiz/</loc><lastmod>2025-05-21T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_authentication_explained_the_front_door_to_your_digital_world/</loc><lastmod>2025-05-14T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/beginner-guide/</loc><lastmod>2025-05-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/series/iam-101/iam_101_what_is_identity_and_access_management_iam/</loc><lastmod>2025-05-07T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/best-practices/</loc><lastmod>2025-04-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/04/common-iam-misconfigurations-in-2025-and-how-to-fix-them/</loc><lastmod>2025-04-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/security-posture/</loc><lastmod>2025-04-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ai-ethics/</loc><lastmod>2025-04-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/checks-and-balances/</loc><lastmod>2025-04-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/ethics/</loc><lastmod>2025-04-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/04/responsible-use-of-ai-why-checks-balances-matter-more-than-ever/</loc><lastmod>2025-04-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/risk-mitigation/</loc><lastmod>2025-04-23T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/ai-in-iam/</loc><lastmod>2025-04-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ai-risks/</loc><lastmod>2025-04-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/automation/</loc><lastmod>2025-04-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/automation-errors/</loc><lastmod>2025-04-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/data-integrity/</loc><lastmod>2025-04-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-workflows/</loc><lastmod>2025-04-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/04/the-hidden-dangers-of-ai-in-receipts-and-identity-workflows/</loc><lastmod>2025-04-16T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/2fa/</loc><lastmod>2025-03-30T20:47:10-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/policies/comprehensive-password-and-2fa-identity-policy/</loc><lastmod>2025-03-30T20:47:10-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/password-policy/</loc><lastmod>2025-03-30T20:47:10-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/policies/</loc><lastmod>2025-03-30T20:47:10-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/policy-framework/</loc><lastmod>2025-03-30T20:47:10-04:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/03/ai-and-pii-the-privacy-risks-you-cant-ignore-in-2025/</loc><lastmod>2025-03-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/ai-ethics/</loc><lastmod>2025-03-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/ai-privacy/</loc><lastmod>2025-03-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/data-protection/</loc><lastmod>2025-03-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/data-security/</loc><lastmod>2025-03-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/pii-protection/</loc><lastmod>2025-03-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/privacy/</loc><lastmod>2025-03-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/risk-management/</loc><lastmod>2025-03-30T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/credential-hygiene/</loc><lastmod>2025-03-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/credential-management/</loc><lastmod>2025-03-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/data-breaches/</loc><lastmod>2025-03-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-protection/</loc><lastmod>2025-03-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/password-security/</loc><lastmod>2025-03-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/03/passwords-in-the-wild-why-credential-hygiene-still-matters-in-2025/</loc><lastmod>2025-03-18T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/security-risks/</loc><lastmod>2025-03-14T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/03/the-high-cost-of-poor-privileged-account-management/</loc><lastmod>2025-03-14T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/human-factor/</loc><lastmod>2025-03-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/tags/identity-verification/</loc><lastmod>2025-03-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/categories/identity-verification/</loc><lastmod>2025-03-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/2025/03/zero-trust-human-never-trust-a-ping-without-the-proof/</loc><lastmod>2025-03-03T00:00:00+00:00</lastmod></url><url><loc>https://blog.everydayidentity.tech/about/</loc></url><url><loc>https://blog.everydayidentity.tech/tags/acceptable-use/</loc></url><url><loc>https://blog.everydayidentity.tech/policies/acceptable_use_policy/</loc></url><url><loc>https://blog.everydayidentity.tech/policies/access_provisioning_deprovisioning_policy/</loc></url><url><loc>https://blog.everydayidentity.tech/checklists/</loc></url><url><loc>https://blog.everydayidentity.tech/contact/</loc></url><url><loc>https://blog.everydayidentity.tech/tags/data-classification/</loc></url><url><loc>https://blog.everydayidentity.tech/policies/data_protection_classification_policy/</loc></url><url><loc>https://blog.everydayidentity.tech/categories/data-security/</loc></url><url><loc>https://blog.everydayidentity.tech/tags/device-security/</loc></url><url><loc>https://blog.everydayidentity.tech/policies/device_security_policy/</loc></url><url><loc>https://blog.everydayidentity.tech/tags/encryption/</loc></url><url><loc>https://blog.everydayidentity.tech/tags/endpoint-protection/</loc></url><url><loc>https://blog.everydayidentity.tech/policies/least_privilege_rbac_policy/</loc></url><url><loc>https://blog.everydayidentity.tech/tags/offboarding/</loc></url><url><loc>https://blog.everydayidentity.tech/tags/policy/</loc></url></urlset>