<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://ancitus.com/learn/</loc></url><url><loc>https://ancitus.com/learn/assessment/</loc></url><url><loc>https://ancitus.com/learn/assessment/assessment-day/</loc></url><url><loc>https://ancitus.com/learn/assessment/process/</loc></url><url><loc>https://ancitus.com/learn/assessment/what-assessors-do/</loc></url><url><loc>https://ancitus.com/learn/evidence/</loc></url><url><loc>https://ancitus.com/learn/evidence/evidence-binder/</loc></url><url><loc>https://ancitus.com/learn/evidence/poam/</loc></url><url><loc>https://ancitus.com/learn/evidence/ssp/</loc></url><url><loc>https://ancitus.com/learn/foundations/</loc></url><url><loc>https://ancitus.com/learn/foundations/key-documents/</loc></url><url><loc>https://ancitus.com/learn/foundations/scoring/</loc></url><url><loc>https://ancitus.com/learn/foundations/timeline/</loc></url><url><loc>https://ancitus.com/learn/foundations/what-is-cmmc/</loc></url><url><loc>https://ancitus.com/learn/funding/</loc></url><url><loc>https://ancitus.com/learn/funding/faq/</loc></url><url><loc>https://ancitus.com/learn/glossary/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-7/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-8/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-9/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-10/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-11/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-12/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-13/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-14/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-15/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-16/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-17/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-18/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-19/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-20/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-21/</loc></url><url><loc>https://ancitus.com/learn/requirements/access-control/3-1-22/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-7/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-8/</loc></url><url><loc>https://ancitus.com/learn/requirements/audit-accountability/3-3-9/</loc></url><url><loc>https://ancitus.com/learn/requirements/awareness-training/</loc></url><url><loc>https://ancitus.com/learn/requirements/awareness-training/3-2-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/awareness-training/3-2-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/awareness-training/3-2-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-7/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-8/</loc></url><url><loc>https://ancitus.com/learn/requirements/configuration-management/3-4-9/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-7/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-8/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-9/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-10/</loc></url><url><loc>https://ancitus.com/learn/requirements/identification-authentication/3-5-11/</loc></url><url><loc>https://ancitus.com/learn/requirements/incident-response/</loc></url><url><loc>https://ancitus.com/learn/requirements/incident-response/3-6-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/incident-response/3-6-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/incident-response/3-6-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/maintenance/</loc></url><url><loc>https://ancitus.com/learn/requirements/maintenance/3-7-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/maintenance/3-7-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/maintenance/3-7-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/maintenance/3-7-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/maintenance/3-7-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/maintenance/3-7-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-7/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-8/</loc></url><url><loc>https://ancitus.com/learn/requirements/media-protection/3-8-9/</loc></url><url><loc>https://ancitus.com/learn/requirements/personnel-security/</loc></url><url><loc>https://ancitus.com/learn/requirements/personnel-security/3-9-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/personnel-security/3-9-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/physical-protection/</loc></url><url><loc>https://ancitus.com/learn/requirements/physical-protection/3-10-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/physical-protection/3-10-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/physical-protection/3-10-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/physical-protection/3-10-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/physical-protection/3-10-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/physical-protection/3-10-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/risk-assessment/</loc></url><url><loc>https://ancitus.com/learn/requirements/risk-assessment/3-11-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/risk-assessment/3-11-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/risk-assessment/3-11-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/security-assessment/</loc></url><url><loc>https://ancitus.com/learn/requirements/security-assessment/3-12-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/security-assessment/3-12-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/security-assessment/3-12-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/security-assessment/3-12-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-7/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-8/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-9/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-10/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-11/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-12/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-13/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-14/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-15/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-comms-protection/3-13-16/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-info-integrity/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-info-integrity/3-14-1/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-info-integrity/3-14-2/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-info-integrity/3-14-3/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-info-integrity/3-14-4/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-info-integrity/3-14-5/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-info-integrity/3-14-6/</loc></url><url><loc>https://ancitus.com/learn/requirements/system-info-integrity/3-14-7/</loc></url><url><loc>https://ancitus.com/learn/scoping/</loc></url><url><loc>https://ancitus.com/learn/scoping/boundary/</loc></url><url><loc>https://ancitus.com/learn/scoping/contractor-risk-managed/</loc></url><url><loc>https://ancitus.com/learn/scoping/cui-assets/</loc></url><url><loc>https://ancitus.com/learn/scoping/enclaves/</loc></url><url><loc>https://ancitus.com/learn/scoping/external-service-providers/</loc></url><url><loc>https://ancitus.com/learn/scoping/out-of-scope/</loc></url><url><loc>https://ancitus.com/learn/scoping/security-protection-assets/</loc></url><url><loc>https://ancitus.com/learn/scoping/separation/</loc></url><url><loc>https://ancitus.com/learn/scoping/specialized-assets/</loc></url><url><loc>https://ancitus.com/learn/shared-responsibility/</loc></url><url><loc>https://ancitus.com/learn/tools/diagnostic/</loc></url></urlset>