<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://konsult.pro/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://konsult.pro/category/uncategorized/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/asset-management-system-ams/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/asset-management-system-ams/compliance-standards-asset-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/business-continuity-management-system-bcms/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/business-continuity-management-system-bcms/business-continuity-management-bcm-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/business-continuity-management-system-bcms/business-continuity-management-bcm-framework/business-continuity-management-policy/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/business-continuity-management-system-bcms/business-continuity-management-process/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/business-continuity-management-system-bcms/compliance-frameworks-bcm/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/business-continuity-management-system-bcms/principles-of-business-continuity-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/compliance-management-system-cms/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/compliance-management-system-cms/compliance-management-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/compliance-management-system-cms/compliance-standards-for-compliance-management-systems/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/compliance-standards-enterprise-risk-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/compliance-standards-enterprise-risk-management/iso-31k-family-of-standards/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/compliance-standards-enterprise-risk-management/iso-31k-family-of-standards/iso-31010-risk-management-risk-assessment-techniques/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/enterprise-risk-management-erm-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/enterprise-risk-management-process/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/enterprise-risk-management-process/risk-management-smartnis2/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/enterprise-risk-management-process/risk-management-smartnis2/risk-assessments/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/enterprise-risk-management-system-erms/principles-of-enterprise-risk-management-erm/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/funding-fod-gezondheid/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/funding-fod-gezondheid/smartnis2-gezondheidszorg/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/glossary/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/compliance-frameworks-cybersecurity/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/compliance-frameworks-cybersecurity/cyfun-framework-2025/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/compliance-frameworks-cybersecurity/cyfun-framework-2025/detect-de/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/compliance-frameworks-cybersecurity/cyfun-framework-2025/identify-id/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/compliance-frameworks-cybersecurity/cyfun-framework-2025/protect-pr/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/compliance-frameworks-cybersecurity/cyfun-framework-2025/recover-rc/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/compliance-frameworks-cybersecurity/cyfun-framework-2025/respond-rs/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/compliance-standards-information-security/iso-iec-27k-family-of-standards/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/detect/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/detect/guidelines-monitoring-logging-control/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/govern/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/govern/organisational-context-cyfun-2025-oc/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/govern/organisational-context-cyfun-2025-oc/the-world-around-the-hospital/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/govern/policies-cyfun-2025-po/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/govern/policies-cyfun-2025-po/information-security-policy/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/govern/policies-cyfun-2025-po/information-security-policy/cybersecurity-policy/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/govern/roles-responsibilities-cyfun-2025-rr/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/govern/roles-responsibilities-cyfun-2025-rr/appointment-of-the-chief-information-security-officer-ciso/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/identify/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/identify/asset-management-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/identify/asset-management-framework/asset-management-policy/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/authentication-access-control-policy/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/authentication-mechanisms/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/authentication-mechanisms/authorization-role-model/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/authentication-mechanisms/authorization-role-model/privileged-access-management-pam/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/authentication-mechanisms/multi-factor-authentication-mfa-strategy/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/authentication-mechanisms/password-guidelines-best-practices/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/continuity-recovery-of-authentication-access-control/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/identity-access-management-iam/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/identity-access-management-iam/technical-implementations/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/wireless-network-access-control/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/data-security-ds/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/data-security-ds/information-data-protection-policy/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/infrastructure-resilience-ir/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/personnel-security-at/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/platform-security-ps/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/recover/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/respond/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/respond/guidelines-incident-response-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/respond/guidelines-incident-response-management/cyber-crisis-management-kit/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/respond/guidelines-incident-response-management/cyber-crisis-management-kit/centraal-crisis-en-recoverybeheer/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/respond/incident-response-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/respond/incident-response-management/incident-response-plan-irp-healthcare/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-management-process/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/principles-of-information-security/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/license-statement/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-foundations/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/organisational-context-oc/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/organisational-context-oc/6-capitals-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/organisational-context-oc/external-context/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/organisational-context-oc/internal-context/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/organisational-context-oc/internal-context/mckinsey-7s-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/policies/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/policies/policy-statements/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/governance-framework/target-operating-model-tom-security/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/organisation-wide-grc-management-system/strategic-alignment/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/physical-security-management-system-psms/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/physical-security-management-system-psms/compliance-frameworks-physical-security/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/physical-security-management-system-psms/physical-security-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/physical-security-management-system-psms/principles-of-physical-security/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/privacy-management-system-pms/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/privacy-management-system-pms/compliance-standards-privacy-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/privacy-management-system-pms/compliance-standards-privacy-management/iso-standards-related-to-privacy-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/privacy-management-system-pms/compliance-standards-privacy-management/nist-standards-related-to-privacy-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/privacy-management-system-pms/principles-of-privacy-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/privacy-management-system-pms/privacy-management-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/quality-patient-safety-management-system/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/quality-patient-safety-management-system/conformity-standards-quality-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/resilience-management-system-rems/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/resilience-management-system-rems/compliance-standards-resilience/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/resilience-management-system-rems/compliance-standards-resilience/iso-22316-security-and-resilience-organizational-resilience-guidelines/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/sustainability-management-system-sums/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/sustainability-management-system-sums/conformity-standards-sustainability/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/templates/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/third-party-supply-chain-management-system-tpscms/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/third-party-supply-chain-management-system-tpscms/compliance-standards-third-party-supply-chain-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/third-party-supply-chain-management-system-tpscms/principles-of-third-party-supply-chain-management/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/third-party-supply-chain-management-system-tpscms/third-party-supply-chain-management-framework/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/third-party-supply-chain-management-system-tpscms/third-party-supply-chain-management-framework/third-party-supply-chain-management-policy/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/continuity-recovery-of-authentication-access-control/ad/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/identity-access-management-iam/technical-implementations/azure-ad/</loc></url><url><loc>https://konsult.pro/category/smartnis2/overview/information-security-management-system-isms/information-security-framework/protect/authentication-access-control-aa/guidelines-for-authentication-access-control/identity-access-management-iam/technical-implementations/domain-services-ds/</loc></url></urlset>
