<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.aliceandbob.company</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/services</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/ueber-uns</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/kontakt</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/datenschutz</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/impressum</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/search</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/shaping-the-future-of-gen-ai</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/observabilityCON-dach-community-event</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/new-event-form-template</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/aufbau-dsgvo-konformer-data-lake-aws</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/aws-migration-cloud-native-backup-strategien-vertama</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/beschleunigung-cloud-bereitschaft-vertriebsabteilung-technologieanbieter</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/bootstrapping-sichere-cloud-plattform-lifetrust</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/cloud-sicherheit-notebooksbilliger-aws-well-architected</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/cloud-sicherheitsberatung-handelsunternehmen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/digitale-transformation-im-mobelhandel-devsecops-cloud-support</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/edge-fog-computing-transport-logistik-marktstudie</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/erfolgreiche-migration-der-mikroworx-gmbh-in-die-public-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/erreichen-der-gdpr-konformitat-verschlusselungsstrategie-in-der-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/gdpr-konforme-s3-nutzung-digitale-assets</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/kritis-konformitaet-cloud-migration</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/langjahrige-partnerschaft-fur-umfassende-technologieberatung-und-sicherheit</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/maximale-qualitat-cloud-implementierungen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/obi-sichere-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/online-banking-sicherheit-solaris-aws-security</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/schneller-sicherer-skalierbarer-cloud-migration-mit-alice-bob-you</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/sichere-cloud-migration-validierung-konzepte-architekturen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/sicherheitslage-verbesserung-omnius</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/success-stories/staerkung-aws-cloud-security-bloxxon-ag</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/agile-threat-modeling-workshop</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/alice-bob-you--your-digital-foundation</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-account-management-fuer-den-public-sector</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-control-tower-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-einfuehrung-bereich-public-sector</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-genai-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-landing-zone-development-fur-den-bereich-des-offentlichen-sektors</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-rds-database-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-web-application-firewall-waf-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/aws-well-architected-review</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/backup-and-desaster-recovery</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/backup-disaster-recovery</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/ci-cd-pipeline-building</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/cloud-migration-workshop</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/cloud-security-training</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/ddos-protection</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/digital-foundation---alice-bob-you</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/digital-foundation-workshop</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/gdpr-compliance-in-der-aws-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/grafana-cloud-platform</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/kubernetes-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/nis2-fuer-aws-workshop</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/okta-customer-identity-cloud-cic</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/okta-customer-identity-implemenation-consulting-cic</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/okta-workforce-identity-cloud-wic</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/security-champions-program</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/solutions/smart-city-starter-paket</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/services/cloud-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/services/cost-optimization</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/services/data-and-ai</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/services/devsecops</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/services/integration</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/services/security-compliance</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/admission-controller-teil-iii</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/admission-controllers-part-i</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/admission-controllers-teil-ii</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/amazon-macie-identifizierung-und-schutz-privater-kundendaten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/aqua-security-und-aws---eine-wunderbare-freundschaft</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/automatisierte-reaktion-auf-vorfalle</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/aws-abrechnungsdaten-grafisch-darstellen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/aws-config-verstehen-was-es-ist-warum-sie-es-brauchen-und-wie-sie-es-verwenden</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/aws-control-tower</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/aws-security-bereit-fur-die-quantencomputer-ara</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/cloud-checklist</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/cloud-native</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/die-5-besten-aws-sicherheitsdienste-von-a-b</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/die-bedeutung-der-cloud-transformation</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/erweitern-sie-ihr-aws-backup</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/harten-sie-ihre-aws-einrichtung-in-10-einfachen-schritten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/master-cloud-security-mit-a-b-und-aqua-security</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/mehrere-aws-konten-ohne-komplexitat</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/mit-cloudtracker-uberprivilegierte-benutzer-in-aws-finden</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/multicloudmanagement-ssch</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/sce-tools---implementierung-von-security-chaos-engineering-4</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/scp-best-practices</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/security-chaos-engineering---alternative-fur-cloud-sicherheitsanforderungen-2</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/security-chaos-engineering-1-notwendigkeit-neuartiger-sicherheitskonzepte</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/security-chaos-engineering-vs-traditionelle-sicherheitsansatze-3</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/sichern-sie-ihre-webanwendungen-automatisch-mit-aws-firewall-manager-unternehmensweit</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/so-hilft-ihnen-a-b-bei-der-entwicklung-von-security-champions</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/solaris---nutzung-der-leistung-von-uber-40-aws-sicherheitsdiensten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/blog/wie-unternehmen-in-der-cloud-in-ubereinstimmung-mit-der-gdpr-arbeiten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/event/another-event-upon-a-time-in-the-past</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/event/event-template-test-1</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/event/event-template-test-2</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/event/event-template-test-3</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/event/once-upon-a-time-in-the-past</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/event/past-event-test</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/aws-consulting-ist-aws-consulting-sicher-fur-unternehmensdaten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/grafana-cloud-was-ist-grafana-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-aws-account-management-sicher-und-compliant-fuer-behoerden</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-das-security-champions-program-fur-alle-mitarbeiter-geeignet</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-der-managed-service-sicher-fur-produktivumgebungen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-grafana-cloud-sicher-fur-unternehmensdaten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-grafana-enterprise-sicher-fur-unternehmensdaten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-kubernetes-auf-aws-sicher-fur-unternehmensdaten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-okta-customer-identity-cloud-sicher-fur-unternehmensdaten</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-okta-workforce-identity-cloud-sicher-fur-unternehmen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/ist-penetration-testing-sicher-fur-laufende-systeme</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/kann-ich-von-anderen-cloud-providern-zu-aws-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/kann-ich-von-anderen-iam-losungen-zu-okta-wic-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/kann-ich-von-anderen-monitoring-tools-zu-grafana-cloud-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/kann-ich-von-anderen-monitoring-tools-zu-grafana-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/kann-ich-von-auth0-oder-anderen-identity-losungen-zu-okta-cic-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/koennen-wir-von-generischen-security-trainings-zu-spezialisierten-cloud-security-trainings-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/koennen-wir-von-on-premise-oder-anderen-clouds-zu-aws-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/konnen-wir-von-anderen-container-losungen-zu-kubernetes-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/konnen-wir-von-anderen-security-trainings-zum-security-champions-program-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/konnen-wir-von-internen-security-audits-zu-professionellem-penetration-testing-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/konnen-wir-von-selbst-gehosteten-grafana-installationen-zum-managed-service-wechseln</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/sind-die-trainings-fuer-verschiedene-erfahrungsstufen-geeignet</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-aws-account-management-fur-den-public-sector</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-aws-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-cloud-security-training</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-ein-managed-service-fur-grafana</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-ein-security-champions-program</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-grafana-implementation-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-kubernetes-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-okta-customer-identity-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-okta-workforce-identity-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/was-ist-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-aws-dienste-werden-unterstuetzt</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-aws-services-werden-fuer-public-sector-verwaltet</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-cloud-technologien-werden-in-den-trainings-behandelt</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-ergebnisse-erhalte-ich-nach-dem-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-grafana-komponenten-werden-im-managed-service-betreut</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-kubernetes-technologien-werden-unterstutzt</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-systeme-kann-grafana-cloud-uberwachen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-systeme-kann-grafana-uberwachen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-systeme-kann-okta-customer-identity-cloud-integrieren</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-systeme-kann-okta-workforce-identity-cloud-integrieren</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-systeme-konnen-durch-penetration-testing-gepruft-werden</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-themen-deckt-das-security-champions-training-ab</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-unterstuetzung-erhalten-wir-nach-den-trainings</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-unterstutzung-erhalten-wir-beim-kubernetes-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-unterstutzung-erhalten-wir-beim-managed-service</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welche-unterstutzung-erhalten-wir-wahrend-des-programms</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welchen-support-erhalte-ich</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welchen-support-erhalte-ich-bei-der-grafana-implementierung</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welchen-support-erhalte-ich-bei-der-nutzung-von-okta-cic</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welchen-support-erhalte-ich-bei-okta-wic</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welchen-support-erhalte-ich-beim-aws-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/welchen-support-erhalten-oeffentliche-institutionen</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauern-cloud-security-trainings</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-das-onboarding-fur-den-managed-service</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-das-security-champions-program</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-die-einrichtung-des-account-management</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-die-grafana-cloud-implementierung</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-die-grafana-implementierung</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-die-okta-cic-implementierung</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-die-okta-wic-implementierung</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-ein-aws-consulting-projekt</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-ein-kubernetes-consulting-projekt</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-lange-dauert-ein-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kosten-cloud-security-trainings</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-aws-account-management-fur-behoerden</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-aws-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-ein-managed-service-fur-grafana</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-ein-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-ein-security-champions-program</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-eine-grafana-implementierung</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-grafana-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-kubernetes-consulting</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-okta-customer-identity-cloud</loc>
    </url>
    <url>
        <loc>https://www.aliceandbob.company/faq/wie-viel-kostet-okta-workforce-identity-cloud</loc>
    </url>
</urlset>