<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://auditifysecurity.com/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/web-application-security-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/mobile-application-security-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/network-penetration-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/iot-security-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/cloud-penetration-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/threat-modeling-service</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/thick-client-penetration-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/source-code-review-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/red-teaming-services</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/vulnerability-management-services</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/configuration-management-service</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/standard-compliance</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/iso-iec-27001-compliance</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/soc2-compliance</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/gdpr-compliance</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/hipaa-compliance</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/pci-dss-compliance</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/nist-cybersecurity-framework</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/hitrust-compliance-services</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/vciso-services</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/about-us</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/contact-us</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/privacy-policy</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/terms-and-conditions</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/cloud-security/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/compliance/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/cybersecurity/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/vapt/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/how-to-choose-the-right-red-teaming-service-provider</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/the-importance-of-configuration-management-services</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/how-soc-2-compliance-builds-customer-trust-for-saas-companies</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/navigating-nist-cybersecurity-framework-2-0-for-your-business</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/nist-cybersecurity-framework-audit-services-auditify-security</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/regulatory-compliance-and-penetration-testing-white-box-vs-black-box</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/page/1/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/page/2/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/page/3/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/page/4/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/page/5/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/page/6/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/privacy-policy</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/differences-between-soc-2-type-1-and-type-2</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/what-is-hipaa-compliance-a-complete-guide</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/virtual-ciso-for-small-and-mid-sized-businesses</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/guide-to-white-box-and-black-box-penetration-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/focus-on-penetration-testing-for-devices</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/the-cost-of-ignoring-mobile-app-security</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/cloud-security/page/1/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/cloud-security/page/2/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/compliance/page/1/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/cybersecurity/page/1/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/compliance-services-for-business</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/importance-vapt-for-business-security</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/category/vapt/page/1/</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/black-box-penetration-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/iot-device-security-why-your-smart-office-is-a-hackers-dream</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/why-your-company-should-hire-a-cyber-security-company</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/how-to-choose-the-right-soc-2-auditor</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/behind-the-scenes-of-a-successful-soc-2-audit</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/how-to-identify-and-fix-weak-controls-before-your-soc-2-audit</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/mobile-application-penetration-testing-services-with-auditify-security</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/how-hitrust-supports-long-term-compliance-cyber-risk-management</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/Why-iso-27001-essential-for-organization-security</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/securing-your-mobile-app-best-practices</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/iot-devices-cyberattack-defense-guide</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/top-10-benefits-of-regular-vapt-for-your-business</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/understanding-gdpr-a-simple-guide-for-small-businesses</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/getting-started-with-iot-security-tools-techniques-tips</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/choose-the-right-cybersecurity-partner-for-your-business</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/what-is-web-application-security-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://auditifysecurity.com/blog/critical-importance-web-penetration-testing</loc>
  <lastmod>2025-08-12T09:42:08+00:00</lastmod>
  <priority>0.51</priority>
</url>


</urlset>