<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.secureleap.tech</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/about</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/service/compliance-tool-support</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/service/iso-27001-consulting</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/service/pentest</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/service/soc-2-consulting-services</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-categories</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/10-mistakes-you-should-avoid-before-your-iso-27001-or-soc2-audit</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/accelerating-soc-2-compliance-for-a-growing-tech-startup</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/ai-agent-security-risks-autonomous-systems</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/best-penetration-testing-companies-europe-startups</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/best-soc-2-auditors-for-your-company</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/best-time-for-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/black-box-pentest</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/business-logic-flaws-explained</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/cloud-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/compliance-on-a-startup-budget</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/cost-of-iso-27001-certification-for-saas-startup</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/drata-review-pricing-top-alternatives-for-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/gdpr-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/guide-to-pentesting-for-startups</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/how-long-does-soc-2-take</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/how-q5-networks-fast-tracked-soc-2-type-1-without-the-vendor-chaos</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/is-soc-2-the-same-as-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/iso-27001-audit-a-roadmap-for-saas-founders</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/iso-27001-checklist-for-audit</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/iso-27001-consulting-for-startups</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/iso-27001-explained-simply</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/iso-27001-for-startup</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/iso-27001-internal-audit-startups-clause-9-2</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/iso-27001-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/penetration-test-automated-vs-manual</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/penetration-testing-checklist</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/penetration-testing-cost-startup-pricing</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/pentest-frequency-guide</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/pentest-report-startup</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/red-team-vs-blue-team-differences</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/scoping-your-soc-2-audit</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/secureframe-review-pricing-top-alternatives-for-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-1-vs-soc-2-whats-the-difference</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-and-iso-27001-audits-a-startups-complete-guide</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-audit-saas-guide</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-bridge-letter-practical-guide</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-certification-cost</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-compliance-checklist-saas</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-compliance-consultant</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-for-startups</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-hipaa</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-password-requirements</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-penetration-testing-requirements</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-policies-compliance</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-readiness-assessment</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-tools-vanta-drata-secureframe-guide-2025</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-trust-services-criteria</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-type-1-guide</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-type-1-vs-type-2</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-type-2-guide</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-type-2-report</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-vendor-management-for-startups</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-vs-soc-3</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/soc-2-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/startup-cybersecurity-avoid-5-common-and-costly-mistakes</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/the-hidden-dangers-of-vibe-coding-your-security-team-doesnt-want-you-to-know-about</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/trescudo-vciso</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/types-of-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/vanta-alternatives</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/vanta-review-pricing-top-alternatives-for-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/vanta-vs-drata</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/vciso-cost-for-startups</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/vciso-success-how-secureleap-transformed-a-tech-startups-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/vulnerability-vs-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/web-application-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/what-are-iso-27001-standards</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/what-are-the-5-stages-of-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/what-is-a-vciso</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/what-is-an-acceptable-use-policy-aup-best-practices-and-template</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/what-is-gray-box-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/what-is-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog/what-is-pentest</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-category/case-study</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-category/compliance</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-category/iso27001</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-category/pentest</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-category/risk</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-category/soc2</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-category/tools</loc>
    </url>
    <url>
        <loc>https://www.secureleap.tech/blog-category/vciso</loc>
    </url>
</urlset>