<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://crace.io/blog</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/blog/2025-06-05-why-who</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/blog/archive</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/blog/authors</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/blog/authors/fisehara</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/blog/tags</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/blog/tags/cra</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/conformity-assessment</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/conformity-assessment-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/core-concepts-for-software-developers</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/core-concepts-for-software-developers-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/cra-essential-cybersecurity-requirements</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/cra-essential-cybersecurity-requirements-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/cybersecurity-risk-assessment</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/cybersecurity-risk-assessment-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/cybersecurity-risk-assessment-2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/declaration-of-conformity</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/declaration-of-conformity-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/declaration-of-conformity-2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/eu-cra-for-developers</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/eu-cra-for-developers-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/eu-cyber-resilience-act</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/information-and-instructions-to-the-user</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/information-and-instructions-to-the-user-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/instructions-and-documentation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/practical-guides-and-checklists</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/practical-guides-and-checklists-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/resources--further-reading</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/resources--further-reading-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/software-vulnerability-management-and-reporting</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/specific-concepts-for-app-developers-mobile-web-desktop</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/specific-concepts-for-app-developers-mobile-web-desktop-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/specific-concepts-for-game-developers</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/specific-concepts-for-game-developers-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/technical-documentation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/technical-documentation-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/understanding-the-eu-cyber-resilience-act-cra</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/category/understanding-the-eu-cyber-resilience-act-cra-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-00-the-eu-declaration-of-conformity-doc-for-software-purpose-and-importance</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-01-mandatory-contents-of-the-eu-doc-for-software-a-detailed-breakdown-annex-v</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-02-who-signs-the-eu-doc-for-your-software-product</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-03-language-requirements-for-the-eu-doc-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-04-keeping-your-software-s-eu-doc-up-to-date</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-05-single-eu-doc-if-your-software-is-covered-by-multiple-eu-acts</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-06-providing-the-eu-doc-to-users-and-authorities-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-07-simplified-eu-declaration-of-conformity-annex-vi-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-08-making-your-software-s-doc-accessible-permalinks-websites</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/declaration/the-eu-declaration-of-conformity-doc-annex-v-for-software/08-09-template-example-of-an-eu-doc-for-a-software-product</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-00-purpose-of-technical-documentation-for-software-under-cra-annex-vii</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-00-elements-of-technical-documentation-for-software-a-checklist</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-01-general-description-of-the-software-product-intended-purpose-versions</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-02-software-design-development-and-production-process-overview</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-03-software-vulnerability-handling-processes-documentation</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-04-cybersecurity-risk-assessment-documentation-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-05-software-bill-of-materials-sbom-in-your-technical-documentation</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-06-list-of-harmonised-standards-common-specifications-applied-to-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-07-descriptions-of-solutions-if-standards-not-applied-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-08-reports-of-software-security-tests-carried-out</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-09-copy-of-the-eu-declaration-of-conformity-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-10-user-instructions-for-software-as-part-of-technical-documentation</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-01-11-information-on-software-support-period-determination</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-02-keeping-software-technical-documentation-up-to-date-and-available</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-03-language-requirements-for-software-technical-documentation</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/technical-documentation-annex-vii-for-software/10-04-simplified-technical-documentation-for-micro-small-software-enterprises</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-00-annex-ii-overview-what-software-users-need-to-know</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-01-annex-ii-item-1-manufacturer-contact-details-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-02-annex-ii-item-2-single-point-of-contact-for-software-vulnerability-reporting</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-03-annex-ii-item-3-software-product-identification-name-type-version</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-04-annex-ii-item-4-intended-purpose-and-security-properties-of-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-05-annex-ii-item-5-known-foreseeable-cybersecurity-risks-of-software-use</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-06-annex-ii-item-6-link-to-eu-declaration-of-conformity-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-07-annex-ii-item-7-software-security-support-type-and-support-period-end-date</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-08-annex-ii-item-8a-secure-software-installation-and-use-instructions</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-09-annex-ii-item-8b-how-software-changes-affect-data-security</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-10-annex-ii-item-8c-installing-security-relevant-software-updates</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-11-annex-ii-item-8d-secure-software-decommissioning-and-data-removal</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-12-annex-ii-item-8e-disabling-automatic-software-security-updates-how-to</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-13-annex-ii-item-8f-information-for-integrators-of-your-software-component</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/documentation/user-information-and-instructions-annex-ii-for-software-products/05-14-annex-ii-item-9-access-to-software-bill-of-materials-sbom-if-provided-to-user</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-00-what-is-self-assessment-module-a-for-software-products</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-01-is-your-game-app-or-software-eligible-for-self-assessment</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-02-steps-in-performing-a-self-assessment-module-a-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-03-manufacturer-s-responsibilities-under-module-a-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-04-technical-documentation-requirements-for-software-self-assessment</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-05-drawing-up-the-eu-declaration-of-conformity-after-software-self-assessment</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-06-affixing-the-ce-marking-to-your-software-product</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-07-when-is-third-party-assessment-needed-for-software-brief-overview-of-important-critical-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/conformity-assessment-for-most-software-self-assessment-module-a/07-08-record-keeping-for-software-self-assessment-how-long</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-00-navigating-annex-i-for-software-products-structure-and-importance</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-01-annex-i-part-1-requirement-1-appropriate-level-of-cybersecurity-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-02-annex-i-part-1-requirement-2a-no-known-exploitable-vulnerabilities-in-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-03-annex-i-part-1-requirement-2b-secure-by-default-configuration-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-04-annex-i-part-1-requirement-2c-addressing-vulnerabilities-through-software-security-updates</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-05-annex-i-part-1-requirement-2d-protection-from-unauthorised-access-in-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-06-annex-i-part-1-requirement-2e-confidentiality-of-data-in-software-encryption</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-07-annex-i-part-1-requirement-2f-integrity-of-data-and-code-in-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-08-annex-i-part-1-requirement-2g-data-minimisation-in-software-functionality</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-09-annex-i-part-1-requirement-2h-availability-of-essential-software-functions</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-10-annex-i-part-1-requirement-2i-minimising-negative-impact-on-other-devices-networks-by-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-11-annex-i-part-1-requirement-2j-limiting-software-attack-surfaces</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-12-annex-i-part-1-requirement-2k-reducing-impact-of-incidents-software-exploitation-mitigation</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-13-annex-i-part-1-requirement-2l-security-related-information-logging-in-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-14-annex-i-part-1-requirement-2m-secure-data-removal-from-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-15-annex-i-part-2-overview-vulnerability-handling-requirements-for-software-manufacturers</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-16-annex-i-part-2-requirement-1-identifying-documenting-software-vulnerabilities-and-components</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-17-annex-i-part-2-requirement-2-addressing-remediating-software-vulnerabilities-promptly</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-18-annex-i-part-2-requirement-3-effective-and-regular-software-security-testing</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-19-annex-i-part-2-requirement-4-publicly-disclosing-fixed-software-vulnerabilities</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-20-annex-i-part-2-requirement-5-coordinated-software-vulnerability-disclosure-policy</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-21-software-bill-of-materials-sbom-for-your-codebase-and-libraries</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-22-annex-i-part-2-requirement-6-facilitating-sharing-of-potential-software-vulnerability-info</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-23-annex-i-part-2-requirement-7-secure-distribution-of-software-updates</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/deep-dive-the-cra-s-essential-cybersecurity-requirements-annex-i-for-software/04-24-annex-i-part-2-requirement-8-free-and-timely-software-security-updates-with-advisories</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-00-are-you-a-manufacturer-under-the-cra-your-role-as-a-software-developer</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-01-defining-products-with-digital-elements-pdes-in-your-apps-games-and-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-02-understanding-economic-operators-importers-distributors-of-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-03-what-is-a-cybersecurity-risk-assessment-for-your-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-04-essential-cybersecurity-requirements-annex-i-a-software-developer-s-overview</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-05-what-is-a-conformity-assessment-for-your-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-06-what-is-an-eu-declaration-of-conformity-doc-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-07-ce-marking-for-software-what-does-it-mean</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-08-understanding-technical-documentation-for-software-overview</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-09-software-vulnerability-handling-and-disclosure-an-introduction</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/core-cra-concepts-for-software-developers/01-10-your-software-s-journey-to-cra-conformity-a-step-by-step-overview</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-00-introduction-why-app-developers-need-to-know-the-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-01-is-my-app-a-product-with-digital-elements-under-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-02-apis-and-third-party-services-in-apps-cra-due-diligence</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-03-databases-and-data-storage-for-apps-cra-security</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-04-user-authentication-and-authorization-in-apps-cra-best-practices</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-05-sdk-and-library-integration-in-apps-cra-responsibilities</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-06-app-stores-distribution-platforms-and-cra-for-app-devs</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-07-user-data-privacy-and-security-cra-and-gdpr-for-apps</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-08-vulnerability-management-for-apps-updates-and-responsible-disclosure</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-09-progressive-web-apps-pwas-and-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-10-desktop-applications-and-cra-specifics</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-11-iot-companion-apps-and-their-link-to-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-12-app-specific-risk-assessment-example-walkthrough</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-app-developers-mobile-web-desktop/03-13-communicating-security-info-to-app-users-annex-ii-for-apps</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-00-introduction-why-game-developers-need-to-know-the-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-01-is-my-game-a-product-with-digital-elements-under-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-02-game-engines-and-cra-unity-unreal-godot-custom-engines</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-03-assets-and-third-party-libraries-in-games-cra-due-diligence</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-04-online-features-multiplayer-servers-and-cra-for-games</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-05-in-app-purchases-virtual-currencies-and-cra-in-games</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-06-user-generated-content-ugc-in-games-cra-considerations</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-07-player-data-privacy-and-security-cra-and-gdpr-for-games</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-08-vulnerability-management-for-games-patching-and-updates</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-09-age-ratings-parental-controls-and-cra-in-games</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-10-cloud-gaming-streaming-services-and-cra-implications</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-11-esports-and-competitive-gaming-cra-aspects</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-12-game-specific-risk-assessment-example-walkthrough</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/eu-cra-for-developers/eu-cra-specifically-for-game-developers/02-13-communicating-security-info-to-game-users-annex-ii-for-games</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-00-cra-compliance-checklist-for-game-developers</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-01-cra-compliance-checklist-for-app-software-developers</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-02-quick-guide-to-ce-marking-your-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-03-secure-software-development-lifecycle-ssdlc-and-the-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-04-sbom-generation-and-management-tools-for-software-devs</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-05-setting-up-a-cvd-policy-template-for-software-projects</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-06-how-to-handle-an-actively-exploited-vulnerability-report-for-your-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-07-communicating-end-of-support-for-your-software-product</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/practical-guides-checklists-for-software-developers/11-08-cra-for-solo-devs-and-micro-software-businesses-key-priorities</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/resources-further-reading-for-software-developers/12-00-official-eu-cra-legal-text-and-guidance-links</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/resources-further-reading-for-software-developers/12-01-enisa-resources-relevant-to-software-cybersecurity</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/resources-further-reading-for-software-developers/12-02-relevant-iso-standards-for-software-security-brief-overview</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/resources-further-reading-for-software-developers/12-03-nist-cybersecurity-framework-and-its-relevance-to-software-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/resources-further-reading-for-software-developers/12-04-open-source-tools-for-sbom-software-vulnerability-scanning</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/resources-further-reading-for-software-developers/12-05-glossary-of-cra-and-software-cybersecurity-terms</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/resources-further-reading-for-software-developers/12-06-faq-common-cra-questions-from-software-developers</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/resources-further-reading-for-software-developers/12-07-how-craca-io-can-help-with-your-software-s-cra-compliance</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/understanding-the-eu-cyber-resilience-act-cra-the-software-developers-big-picture/00-00-what-is-the-eu-cyber-resilience-act-cra-for-software-products</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/understanding-the-eu-cyber-resilience-act-cra-the-software-developers-big-picture/00-01-key-objectives-and-benefits-of-the-cra-for-software-developers-and-users</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/understanding-the-eu-cyber-resilience-act-cra-the-software-developers-big-picture/00-02-cra-timeline-and-key-deadlines-for-software-developers</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/understanding-the-eu-cyber-resilience-act-cra-the-software-developers-big-picture/00-03-does-the-cra-apply-to-my-software-scope-and-software-specific-exemptions</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/understanding-the-eu-cyber-resilience-act-cra-the-software-developers-big-picture/00-04-how-the-cra-interacts-with-other-key-eu-regulations-for-software-nis2-gdpr-ai-act</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/understanding-the-eu-cyber-resilience-act-cra-the-software-developers-big-picture/00-05-understanding-product-categories-for-software-under-cra-default-vs-important-critical</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/understanding-the-eu-cyber-resilience-act-cra-the-software-developers-big-picture/00-06-consequences-of-non-compliance-for-software-products</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/eucra/understanding-the-eu-cyber-resilience-act-cra-the-software-developers-big-picture/00-07-the-role-of-enisa-and-national-authorities-for-software-compliance</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/intro</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-00-why-a-cybersecurity-risk-assessment-is-crucial-for-your-software-under-cra</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-01-cra-article-13-requirements-for-software-risk-assessment</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-02-key-elements-of-a-software-risk-assessment-intended-use-foreseeable-use</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-03-documenting-your-software-risk-assessment-what-to-include</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-04-software-risk-assessment-methodologies-overview-iso-27005-etsi-nist-for-context</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-05-00-practical-property-based-risk-assessment-for-apps-games-and-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-05-01-identifying-assets-and-data-in-your-software-product</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-05-02-threat-modeling-for-software-developers-stride-light-for-apps-games</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-05-03-vulnerability-identification-in-your-codebase-and-dependencies</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-05-04-risk-analysis-and-evaluation-for-software-likelihood-and-impact</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-05-05-risk-treatment-mitigation-and-acceptance-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-06-integrating-risk-assessment-into-your-software-development-lifecycle-ssdlc</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-07-when-to-update-your-software-risk-assessment-new-features-vulnerabilities</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/risk/performing-a-cybersecurity-risk-assessment-for-software/06-08-common-pitfalls-in-software-risk-assessments-and-how-to-avoid-them</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-00-cra-s-approach-to-ongoing-software-security-beyond-market-placement</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-01-establishing-a-coordinated-vulnerability-disclosure-cvd-policy-for-your-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-02-setting-up-channels-for-receiving-software-vulnerability-reports</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-03-internal-processes-for-assessing-and-prioritizing-reported-software-vulnerabilities</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-04-developing-and-testing-software-security-patches-and-updates</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-05-securely-distributing-software-updates-to-users</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-06-sbom-maintenance-keeping-your-software-component-list-current</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-07-communicating-software-vulnerabilities-and-fixes-to-users-and-authorities</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-08-timeline-for-addressing-software-vulnerabilities-without-delay</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-09-free-security-updates-vs-paid-feature-updates-for-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-10-support-period-defining-and-communicating-it-for-your-software-product</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-11-incident-response-plan-for-security-breaches-affecting-your-software</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/docs/vulnerability/09-12-reporting-actively-exploited-vulnerabilities-and-severe-incidents-for-software-article-14</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://crace.io/</loc><lastmod>2025-06-06</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>