<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://docs.witnessops.com/</loc>
</url>
<url>
<loc>https://docs.witnessops.com/security-education</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/audiences</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/decisions</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence-mapping</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/governance</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/how-it-works</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/integrations</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/operations</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/reference</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/scenarios</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-systems</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/getting-started</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/faq</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/glossary</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/scenarios/phishing-investigation</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/decisions/scope-check</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/audiences/new-operator</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/phishing</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-systems/witnessops-architecture</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/governance/authorization-model</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/reference/commands</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/decisions/escalation</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-systems/governed-execution</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/audiences/manager-approver</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence-mapping/nist-csf-2-0</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/password-reuse</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/reference/proof-artifact-classes</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/how-it-works/proof-model</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence/receipts</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/operations/runbooks</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/integrations/witnessops-catalog</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/audiences/defender</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence-mapping/dora</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/how-it-works/evidence-bundles</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence/execution-chains</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/governance/lab-mode-and-scope-bypass</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-systems/policy-gates</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-systems/threat-model</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/decisions/evidence-required</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/mfa</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence-mapping/eu-ai-act</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/how-it-works/verification</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/audiences/integration-author</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence/receipt-spec</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-systems/security-practices</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/cost-of-a-click</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-systems/three-layer-stack</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/how-it-works/anchored-replay</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/attacker-perspective</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/evidence/sensitive-artifact-handling</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/how-it-works/standards</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/software-updates</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/safe-downloads</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/phishing-tricks</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/real-phishing-example</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
<url>
<loc>https://docs.witnessops.com/security-education/what-if-you-clicked</loc>
<lastmod>2026-04-12T19:02:09.000Z</lastmod>
</url>
</urlset>
