<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://identityfirst.net/</loc></url>
  <url><loc>https://identityfirst.net/platform</loc></url>
  <url><loc>https://identityfirst.net/products</loc></url>
  <url><loc>https://identityfirst.net/products/mri</loc></url>
  <url><loc>https://identityfirst.net/products/core</loc></url>
  <url><loc>https://identityfirst.net/products/enhanced</loc></url>
  <url><loc>https://identityfirst.net/products/aisf</loc></url>
  <url><loc>https://identityfirst.net/products/substantia</loc></url>
  <url><loc>https://identityfirst.net/demo</loc></url>
  <url><loc>https://identityfirst.net/for-msps</loc></url>
  <url><loc>https://identityfirst.net/for-cisos</loc></url>
  <url><loc>https://identityfirst.net/for-grc</loc></url>
  <url><loc>https://identityfirst.net/for-soc</loc></url>
  <url><loc>https://identityfirst.net/active-directory-security-audit</loc></url>
  <url><loc>https://identityfirst.net/entra-id-security-audit</loc></url>
  <url><loc>https://identityfirst.net/identity-security-posture-management</loc></url>
  <url><loc>https://identityfirst.net/identity-security-assessment-hub</loc></url>
  <url><loc>https://identityfirst.net/hybrid-identity-security-risks</loc></url>
  <url><loc>https://identityfirst.net/iam-security-assessment-smes-uk</loc></url>
  <url><loc>https://identityfirst.net/pricing</loc></url>
  <url><loc>https://identityfirst.net/assessment-booking</loc></url>
  <url><loc>https://identityfirst.net/about</loc></url>
  <url><loc>https://identityfirst.net/why-identityfirst</loc></url>
  <url><loc>https://identityfirst.net/comparison</loc></url>
  <url><loc>https://identityfirst.net/integrations</loc></url>
  <url><loc>https://identityfirst.net/services</loc></url>
  <url><loc>https://identityfirst.net/resources</loc></url>
  <url><loc>https://identityfirst.net/case-studies</loc></url>
  <url><loc>https://identityfirst.net/faq</loc></url>
  <url><loc>https://identityfirst.net/trust</loc></url>
  <url><loc>https://identityfirst.net/security</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/security-overview</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/security</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/compliance</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/data-protection</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/gdpr</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/dpa</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/sub-processors</loc></url>
  <url><loc>https://identityfirst.net/trust-centre/uptime</loc></url>
  <url><loc>https://identityfirst.net/evidence-first</loc></url>
  <url><loc>https://identityfirst.net/evidence-register</loc></url>
  <url><loc>https://identityfirst.net/product-status</loc></url>
  <url><loc>https://identityfirst.net/blog</loc></url>
  <url><loc>https://identityfirst.net/insights/</loc></url>
  <url><loc>https://identityfirst.net/whitepapers</loc></url>
  <url><loc>https://identityfirst.net/webinars</loc></url>
  <url><loc>https://identityfirst.net/glossary</loc></url>
  <url><loc>https://identityfirst.net/community</loc></url>
  <url><loc>https://identityfirst.net/partners</loc></url>
  <url><loc>https://identityfirst.net/contact</loc></url>
  <url><loc>https://identityfirst.net/privacy</loc></url>
  <url><loc>https://identityfirst.net/terms</loc></url>

  <url><loc>https://identityfirst.net/industries/central-government</loc></url>
  <url><loc>https://identityfirst.net/industries/defence</loc></url>
  <url><loc>https://identityfirst.net/industries/financial-services</loc></url>
  <url><loc>https://identityfirst.net/industries/healthcare</loc></url>
  <url><loc>https://identityfirst.net/industries/legal</loc></url>
  <url><loc>https://identityfirst.net/industries/local-government</loc></url>
  <url><loc>https://identityfirst.net/industries/msp</loc></url>
  <url><loc>https://identityfirst.net/industries/police</loc></url>

  <url><loc>https://identityfirst.net/services/board-executive.html</loc></url>
  <url><loc>https://identityfirst.net/services/compliance-audit.html</loc></url>
  <url><loc>https://identityfirst.net/services/cyber-insurance.html</loc></url>
  <url><loc>https://identityfirst.net/services/mergers-acquisitions.html</loc></url>
  <url><loc>https://identityfirst.net/services/mssp-security-operations.html</loc></url>
  <url><loc>https://identityfirst.net/services/ongoing-assurance.html</loc></url>

  <url><loc>https://identityfirst.net/topics/cloud-identity-management.html</loc></url>
  <url><loc>https://identityfirst.net/topics/compliance-and-identity-security.html</loc></url>
  <url><loc>https://identityfirst.net/topics/identity-threat-detection.html</loc></url>
  <url><loc>https://identityfirst.net/topics/multi-factor-authentication-best-practices.html</loc></url>
  <url><loc>https://identityfirst.net/topics/zero-trust-architecture.html</loc></url>

  <url><loc>https://identityfirst.net/blog/posts/12-hidden-identity-risks-smes.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/30-minute-identity-risk-review.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/ai-agents-identity-governance-risks.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/aisf-context-engine-understand-identity-behaviour.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/case-study-fintech-startup-14-days-identity-assessment.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/coming-wave-identity-failures-ai-organisations.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/competitor-comparison-identityfirst-vs-traditional-iga.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/compliance-guide-gdpr-identity-requirements.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/compliance-guide-soc2-identity-requirements.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/eliminate-dormant-accounts-saas-tools.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/identity-drift-what-it-is-and-why-it-matters.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/identity-failures-behind-modern-sme-breach.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/identity-primary-failure-surface-smes.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/inside-identityfirstmri-reveal-drift-erosion.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/introducing-augmented-identity-security-fabric.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/new-uk-cyber-insurance-requirements-smes.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/policy-erosion-turned-minor-incident-into-major-breach.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/saas-sprawl-accelerating-identity-risk-2026.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/technical-tutorial-access-review-best-practices.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/technical-tutorial-mfa-implementation-guide.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/uk-identity-security-landscape-2026.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/uk-regulators-guidance-identity-security.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/uk-sme-identity-security-challenges.html</loc></url>
  <url><loc>https://identityfirst.net/blog/posts/why-zero-trust-failed-smes.html</loc></url>

  <url><loc>https://identityfirst.net/insights/ai-accountability.html</loc></url>
  <url><loc>https://identityfirst.net/insights/board-identity-questions.html</loc></url>
  <url><loc>https://identityfirst.net/insights/cyber-essentials-identity-controls.html</loc></url>
  <url><loc>https://identityfirst.net/insights/cyber-insurance-identity-controls.html</loc></url>
  <url><loc>https://identityfirst.net/insights/dora-audit-evidence.html</loc></url>
  <url><loc>https://identityfirst.net/insights/dora-board-accountability.html</loc></url>
  <url><loc>https://identityfirst.net/insights/dora-identity-controls.html</loc></url>
  <url><loc>https://identityfirst.net/insights/dora-privileged-access.html</loc></url>
  <url><loc>https://identityfirst.net/insights/explainable-probabilistic.html</loc></url>
  <url><loc>https://identityfirst.net/insights/incident-response-playbooks.html</loc></url>
  <url><loc>https://identityfirst.net/insights/kerberoasting-detection-prevention.html</loc></url>
  <url><loc>https://identityfirst.net/insights/ma-identity-risks.html</loc></url>
  <url><loc>https://identityfirst.net/insights/ncsc-caf-b2-identity-access-control.html</loc></url>
  <url><loc>https://identityfirst.net/insights/nis2-access-controls.html</loc></url>
  <url><loc>https://identityfirst.net/insights/nis2-identity-requirements.html</loc></url>
  <url><loc>https://identityfirst.net/insights/nis2-incident-reporting.html</loc></url>
  <url><loc>https://identityfirst.net/insights/non-human-identity-security.html</loc></url>
  <url><loc>https://identityfirst.net/insights/service-account-security.html</loc></url>
  <url><loc>https://identityfirst.net/insights/zero-standing-privilege.html</loc></url>

  <url><loc>https://identityfirst.net/case-studies/enterprise-okta.html</loc></url>
  <url><loc>https://identityfirst.net/case-studies/msp-sailpoint.html</loc></url>
  <url><loc>https://identityfirst.net/case-studies/post-breach-recovery.html</loc></url>
  <url><loc>https://identityfirst.net/case-studies/sme-cloud-identity.html</loc></url>

  <url><loc>https://identityfirst.net/whitepapers/autonomous-cleanroom-automation-framework.html</loc></url>
  <url><loc>https://identityfirst.net/whitepapers/fragmented-trust-hybrid-identity-estates.html</loc></url>
  <url><loc>https://identityfirst.net/whitepapers/hybrid-identity-resilience-playbook.html</loc></url>
  <url><loc>https://identityfirst.net/whitepapers/when-identity-fails-resilience-recovery-tenant-lockout.html</loc></url>
  <url><loc>https://identityfirst.net/whitepapers/zero-trust-without-identity-governance.html</loc></url>

  <url><loc>https://identityfirst.net/webinars/ai-accountability-webinar.html</loc></url>
  <url><loc>https://identityfirst.net/webinars/explainable-security-webinar.html</loc></url>
  <url><loc>https://identityfirst.net/webinars/incident-recovery-webinar.html</loc></url>
  <url><loc>https://identityfirst.net/webinars/trust-access-fundamentals-webinar.html</loc></url>
</urlset>
