<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://kie.ie/principle-cards/principle_001.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_001.png</image:loc>
      <image:title>Principle 001: Crisis Decision Hierarchy — Executive Governance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Organisations do not lose systems first. They lose decision authority — then everything else follows. Principle 001/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Executive Governance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_002.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_002.png</image:loc>
      <image:title>Principle 002: Board-Survivable Cyber Architecture™ — Executive Governance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Boards do not buy cyber technology. They buy the absence of unrecoverable downside. Principle 002/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Executive Governance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_003.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_003.png</image:loc>
      <image:title>Principle 003: Evidence Chain Model™ — Evidence &amp; Regulation Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>If the evidence chain breaks before the regulator opens the file, the control was never a control. Principle 003/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Evidence &amp; Regulation.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_004.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_004.png</image:loc>
      <image:title>Principle 004: Decision Rights Architecture™ — Executive Governance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Authority that cannot be exercised under pressure is decorative. Document it as theatre or redesign it as power. Principle 004/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Executive Governance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_005.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_005.png</image:loc>
      <image:title>Principle 005: Recoverability Mandate™ — Resilience &amp; Recovery Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Recovery is not a phase. It is the discipline that proves whether the programme is real. Principle 005/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Resilience &amp; Recovery.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_006.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_006.png</image:loc>
      <image:title>Principle 006: Contract Control Matrix™ — Contracts &amp; Suppliers Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every clause your counterparty would not sign on incident day must be removed or rewritten today. Principle 006/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Contracts &amp; Suppliers.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_007.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_007.png</image:loc>
      <image:title>Principle 007: AI Accountability Stack™ — AI Governance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Autonomy without accountability is liability dressed as innovation. Govern both with the same instrument. Principle 007/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. AI Governance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_008.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_008.png</image:loc>
      <image:title>Principle 008: Operational Defensibility — Evidence &amp; Regulation Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Time-to-defensible is the only metric your supervisor, board, and insurer will ever agree on. Principle 008/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Evidence &amp; Regulation.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_009.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_009.png</image:loc>
      <image:title>Principle 009: Doctrine Durability — Doctrine &amp; Talent Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Control posture survives leadership turnover only when doctrine outlives the doctrine's author. Principle 009/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Doctrine &amp; Talent.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_010.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_010.png</image:loc>
      <image:title>Principle 010: Asymmetric Disclosure Doctrine™ — Disclosure &amp; Crisis Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Counterparties forgive incidents. They do not forgive the second disclosure that contradicts the first. Principle 010/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Disclosure &amp; Crisis.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_011.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_011.png</image:loc>
      <image:title>Principle 011: Third-Party Liability Inversion™ — Suppliers &amp; Liability Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Your supplier's weakest control becomes your strongest liability when the regulator names you together. Principle 011/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Suppliers &amp; Liability.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_012.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_012.png</image:loc>
      <image:title>Principle 012: Cyber Insurance Renegotiation Principle™ — Insurance &amp; Claims Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>The pre-incident premium is tuition. The renewal is the exam your control posture sits in writing. Principle 012/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Insurance &amp; Claims.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_013.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_013.png</image:loc>
      <image:title>Principle 013: Identity-as-Perimeter Doctrine™ — Identity &amp; Access Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>There is no boundary left to harden. Identity is the control plane and every assertion is an audit contract. Principle 013/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Identity &amp; Access.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_014.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_014.png</image:loc>
      <image:title>Principle 014: Crypto-Agility Mandate™ — Quantum &amp; Crypto Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Quantum-resilient cryptography is not research. It is next decade's audit finding written today. Principle 014/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Quantum &amp; Crypto.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_015.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_015.png</image:loc>
      <image:title>Principle 015: Operational Resilience Threshold™ — Resilience &amp; Continuity Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>The hour you cannot operate degraded is the hour your continuity plan becomes evidence against you. Principle 015/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Resilience &amp; Continuity.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_016.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_016.png</image:loc>
      <image:title>Principle 016: Model Risk Governance Doctrine™ — AI Governance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every AI decision touching a customer leaves a paper trail. Write it before the regulator does. Principle 016/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. AI Governance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_017.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_017.png</image:loc>
      <image:title>Principle 017: Sovereign Risk Geometry™ — Data Sovereignty Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Data residency is not policy. It is the geometry of who can compel disclosure and from where. Principle 017/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Data Sovereignty.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_018.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_018.png</image:loc>
      <image:title>Principle 018: Zero Trust Engineering Admission™ — Zero Trust Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Zero Trust is not a product line. It is the admission that inherited trust was already wrong. Principle 018/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Zero Trust.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_019.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_019.png</image:loc>
      <image:title>Principle 019: First Call Hierarchy™ — Crisis Command Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>The first call after breach is not legal. It is the executive who owns the consequence. Principle 019/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Crisis Command.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_020.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_020.png</image:loc>
      <image:title>Principle 020: Vendor Concentration Trap™ — Supplier Concentration Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>A single-provider stack is efficiency until the regulator calls it concentration risk. Principle 020/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Supplier Concentration.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_021.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_021.png</image:loc>
      <image:title>Principle 021: Insider Threat Realism™ — Insider Risk Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>The insider does not merely appear in the threat model. The insider often builds it. Govern accordingly. Principle 021/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Insider Risk.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_022.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_022.png</image:loc>
      <image:title>Principle 022: SBOM Provenance Mandate™ — Software Supply Chain Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Code you cannot enumerate is risk you cannot disclose. The SBOM is the receipt for every signature. Principle 022/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Software Supply Chain.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_023.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_023.png</image:loc>
      <image:title>Principle 023: Run-Time Truth Doctrine™ — Runtime Assurance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Build-time guarantees expire when the workload starts. Runtime evidence is what regulators accept. Principle 023/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Runtime Assurance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_024.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_024.png</image:loc>
      <image:title>Principle 024: Defaults-Become-Decisions Doctrine™ — Configuration Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every configuration you did not change is a decision you signed without reading. Principle 024/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Configuration.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_025.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_025.png</image:loc>
      <image:title>Principle 025: Critical Skill Concentration Risk™ — Talent Concentration Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>When the one engineer who understands the control leaves, the control leaves with them. Principle 025/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Talent Concentration.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_026.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_026.png</image:loc>
      <image:title>Principle 026: Programme Discipline — Programme Discipline Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>A programme that cannot state its next decision in one sentence is not a programme. It is a process. Principle 026/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Programme Discipline.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_027.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_027.png</image:loc>
      <image:title>Principle 027: Operating Tempo Doctrine — Operating Model Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Tempo is the only governance metric that compounds. Improve it and every other metric follows. Principle 027/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Operating Model.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_028.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_028.png</image:loc>
      <image:title>Principle 028: Single-Threaded Authority — Authority Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Distributed authority is theatre. Real authority is single-threaded, accountable, and revocable. Principle 028/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Authority.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_029.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_029.png</image:loc>
      <image:title>Principle 029: Threat Intelligence Hierarchy — Threat Intelligence Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Intelligence that does not change a decision is content. Intelligence that does is doctrine. Principle 029/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Threat Intelligence.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_030.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_030.png</image:loc>
      <image:title>Principle 030: Crown-Jewel Inversion Principle — Crown Jewels Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Crown jewels are not where value sits. They are where consequence collapses if compromised. Principle 030/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Crown Jewels.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_031.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_031.png</image:loc>
      <image:title>Principle 031: Detection Engineering Mandate — Detection Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every detection that triggers without an owned response is a notification, not a control. Principle 031/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Detection.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_032.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_032.png</image:loc>
      <image:title>Principle 032: Forensic Readiness Discipline — Forensics Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>If your incident investigation begins after the incident, you have already lost it. Principle 032/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Forensics.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_033.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_033.png</image:loc>
      <image:title>Principle 033: Encryption Decree — Encryption Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Encryption without key custody is decorative. Custody without rotation is fossilised. Principle 033/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Encryption.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_034.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_034.png</image:loc>
      <image:title>Principle 034: Public-Cloud Sovereignty Test — Cloud Sovereignty Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Sovereignty in cloud is measured in keys you hold and clauses you signed — nothing else. Principle 034/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Cloud Sovereignty.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_035.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_035.png</image:loc>
      <image:title>Principle 035: Configuration Drift Doctrine — Configuration Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Configuration drift is the slowest, costliest breach. It has no perimeter and no headline. Principle 035/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Configuration.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_036.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_036.png</image:loc>
      <image:title>Principle 036: Patch Cadence Realism — Vulnerability Management Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Patch cadence is published as policy and audited as legend. Reconcile or remove. Principle 036/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Vulnerability Management.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_037.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_037.png</image:loc>
      <image:title>Principle 037: Vulnerability Triage Hierarchy — Vulnerability Management Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Severity ratings sort vulnerabilities. Exploitability decides which ones move you out of bed. Principle 037/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Vulnerability Management.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_038.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_038.png</image:loc>
      <image:title>Principle 038: Logging Sufficiency Test — Logging Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Logs that cannot reconstruct the timeline within minutes are storage costs, not security. Principle 038/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Logging.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_039.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_039.png</image:loc>
      <image:title>Principle 039: Identity Lifecycle Discipline — Identity Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Joiners, movers, leavers: the boring loop that decides whether identity is governance or theatre. Principle 039/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Identity.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_040.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_040.png</image:loc>
      <image:title>Principle 040: Privileged Access Minimum — Privileged Access Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Standing privileged access is liability dressed as convenience. Default it to ephemeral. Principle 040/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Privileged Access.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_041.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_041.png</image:loc>
      <image:title>Principle 041: Shadow IT Recognition — Shadow IT Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Shadow IT is not policy failure. It is a measurement of how easily the organisation can be told no. Principle 041/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Shadow IT.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_042.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_042.png</image:loc>
      <image:title>Principle 042: Vendor Onboarding Mandate — Supplier Onboarding Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>A vendor onboarded without evidence becomes a vendor offboarded under provable loss. Principle 042/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Supplier Onboarding.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_043.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_043.png</image:loc>
      <image:title>Principle 043: Contractual Asymmetry Principle — Contracts Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every clause not actively negotiated is a clause negotiated for someone else. Principle 043/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Contracts.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_044.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_044.png</image:loc>
      <image:title>Principle 044: Procurement Cyber Gate — Procurement Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Procurement that skips cyber pre-qualification is procurement that bypasses governance. Principle 044/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Procurement.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_045.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_045.png</image:loc>
      <image:title>Principle 045: Insurance Underwriting Realism — Insurance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Cyber underwriters price what they can see. Make sure it survives forensic review. Principle 045/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Insurance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_046.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_046.png</image:loc>
      <image:title>Principle 046: Claim-Defensibility Doctrine — Claims Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>A control that cannot defend a claim is a control that will become an exclusion. Principle 046/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Claims.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_047.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_047.png</image:loc>
      <image:title>Principle 047: Quantification Sobriety — Risk Quantification Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Quantification is useful only when it changes a decision. Otherwise, it is performance. Principle 047/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Risk Quantification.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_048.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_048.png</image:loc>
      <image:title>Principle 048: Risk Appetite Coherence — Risk Appetite Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Risk appetite means nothing until exceeded. Put the tripwires in before the breach. Principle 048/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Risk Appetite.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_049.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_049.png</image:loc>
      <image:title>Principle 049: Risk-Register Realism — Risk Register Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>A risk register without owners, dates, and money is a literature review. Principle 049/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Risk Register.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_050.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_050.png</image:loc>
      <image:title>Principle 050: Audit Findings Discipline — Audit Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>An audit finding without a board-approved remediation date is a finding the board does not own. Principle 050/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Audit.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_051.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_051.png</image:loc>
      <image:title>Principle 051: Continuous Assurance Mandate — Assurance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Annual attestation is a snapshot. Continuous assurance is a contract. Principle 051/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Assurance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_052.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_052.png</image:loc>
      <image:title>Principle 052: Three-Lines Operational Truth — Governance Lines Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Three lines of defence collapse to one when only the first knows what is happening. Principle 052/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Governance Lines.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_053.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_053.png</image:loc>
      <image:title>Principle 053: Internal-Audit Independence Test — Internal Audit Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Audit independence is measured by what the auditor may write to the board. Principle 053/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Internal Audit.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_054.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_054.png</image:loc>
      <image:title>Principle 054: Whistleblower Doctrine — Ethics Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>If anomaly-to-accountability runs through command, it is not a route. It is a filter. Principle 054/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Ethics.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_055.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_055.png</image:loc>
      <image:title>Principle 055: Crisis Communications Mandate — Crisis Comms Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Crisis communications drafted during crisis confess that there was no plan. Principle 055/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Crisis Comms.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_056.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_056.png</image:loc>
      <image:title>Principle 056: Forensic Custody Chain — Forensics Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Chain of custody preserved badly is chain of custody not preserved at all. Principle 056/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Forensics.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_057.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_057.png</image:loc>
      <image:title>Principle 057: Tabletop Exercise Realism — Exercises Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Tabletop exercises that do not end in a board decision are calendar entries. Principle 057/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Exercises.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_058.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_058.png</image:loc>
      <image:title>Principle 058: Restoration-Tested Backups — Backups Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Backups that have not been restored are not backups. They are encrypted hope. Principle 058/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Backups.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_059.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_059.png</image:loc>
      <image:title>Principle 059: Recovery-Time Honesty — Recovery Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Recovery-time objectives unverified by drills are aspirations the board should reject. Principle 059/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Recovery.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_060.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_060.png</image:loc>
      <image:title>Principle 060: Operational-Resilience Inversion — Resilience Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Resilience is not what technology does. It is what the institution does when technology does not. Principle 060/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Resilience.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_061.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_061.png</image:loc>
      <image:title>Principle 061: Severance &amp; Liability Doctrine — Liability Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Liability that cannot be transferred, insured, or absorbed must be reduced. There is no fourth option. Principle 061/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Liability.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_062.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_062.png</image:loc>
      <image:title>Principle 062: Data Sovereignty Discipline — Data Sovereignty Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Data sovereignty is decided at the contract, not at the data centre. Principle 062/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Data Sovereignty.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_063.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_063.png</image:loc>
      <image:title>Principle 063: Cross-Border Transfer Mandate — Cross-Border Data Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every cross-border transfer is a contract. Absence of one is a breach in waiting. Principle 063/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Cross-Border Data.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_064.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_064.png</image:loc>
      <image:title>Principle 064: Privacy-by-Design Realism — Privacy Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Privacy retrofitted is privacy lost. Build it in or rebuild around it. Principle 064/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Privacy.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_065.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_065.png</image:loc>
      <image:title>Principle 065: Subject-Rights Operating Model — Data Rights Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Subject-rights requests test the operating model. If you fail at scale, fix the model. Principle 065/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Data Rights.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_066.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_066.png</image:loc>
      <image:title>Principle 066: Data Minimisation Mandate — Data Minimisation Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every field you do not collect is a breach you do not suffer. Discipline shows in what is absent. Principle 066/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Data Minimisation.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_067.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_067.png</image:loc>
      <image:title>Principle 067: Retention Mandate — Retention Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Data kept past purpose becomes evidence in someone else's case. Retention is governance, not storage. Principle 067/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Retention.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_068.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_068.png</image:loc>
      <image:title>Principle 068: Cyber-Physical Engineering Mandate — OT / ICS Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>OT cyber is engineering, not IT. Apply IT thinking and the plant teaches you the difference. Principle 068/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. OT / ICS.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_069.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_069.png</image:loc>
      <image:title>Principle 069: Safety-Cyber Convergence — Safety Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Safety integrity and cyber integrity now share a budget, regulator, and failure mode. Principle 069/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Safety.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_070.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_070.png</image:loc>
      <image:title>Principle 070: ICS Patch Doctrine — ICS Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>ICS patching is a maintenance window, a safety case, and a vendor negotiation — in that order. Principle 070/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. ICS.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_071.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_071.png</image:loc>
      <image:title>Principle 071: Critical-Infrastructure Inversion — Critical Infrastructure Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Critical infrastructure is critical until incident. After incident it is public consequence. Principle 071/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Critical Infrastructure.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_072.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_072.png</image:loc>
      <image:title>Principle 072: National-Resilience Mandate — Essential Services Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Operators of essential services answer to two regimes: the supervisor's and the public's. Principle 072/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Essential Services.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_073.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_073.png</image:loc>
      <image:title>Principle 073: Geopolitical Cyber Realism — Geopolitics Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Your threat model is your geography. Update it as the map changes. Principle 073/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Geopolitics.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_074.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_074.png</image:loc>
      <image:title>Principle 074: Sanctions Compliance Mandate — Sanctions Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Sanctions compliance is a cyber control. Treat it as one and your blast radius shrinks. Principle 074/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Sanctions.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_075.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_075.png</image:loc>
      <image:title>Principle 075: State-Aligned Threat Doctrine — State Threats Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>State-aligned threats are now baseline threats. Architecting around them is architecting for everyone. Principle 075/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. State Threats.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_076.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_076.png</image:loc>
      <image:title>Principle 076: Quantum-Risk Time Horizon — Quantum Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Quantum risk is a 2026 problem because 2030 data is being copied today. Principle 076/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Quantum.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_077.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_077.png</image:loc>
      <image:title>Principle 077: Post-Quantum Migration Mandate — Post-Quantum Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Crypto migration is a multi-year programme. Start it the day you classify the data. Principle 077/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Post-Quantum.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_078.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_078.png</image:loc>
      <image:title>Principle 078: Cipher Inventory Discipline — Crypto Inventory Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>If you cannot list every cipher in your estate, you cannot migrate any of them. Principle 078/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Crypto Inventory.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_079.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_079.png</image:loc>
      <image:title>Principle 079: Hardware Trust Doctrine — Hardware Trust Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Hardware roots of trust are policy, supply chain, and physics. Lose one and you lose the root. Principle 079/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Hardware Trust.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_080.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_080.png</image:loc>
      <image:title>Principle 080: Firmware Governance Mandate — Firmware Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Firmware is the controlled substance of cyber. Track it like one or expect the breach equivalent. Principle 080/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Firmware.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_081.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_081.png</image:loc>
      <image:title>Principle 081: SBOM Mandate — SBOM Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>If your supplier cannot produce an SBOM, you cannot produce a defence. Principle 081/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. SBOM.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_082.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_082.png</image:loc>
      <image:title>Principle 082: Open-Source Stewardship — Open Source Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Open source is a dependency, not a gift. Govern it as a supplier with no SLA. Principle 082/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Open Source.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_083.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_083.png</image:loc>
      <image:title>Principle 083: AI Provenance Mandate — AI Provenance Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every AI decision must be traceable to data, weights, and authority. Lose one and accountability collapses. Principle 083/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. AI Provenance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_084.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_084.png</image:loc>
      <image:title>Principle 084: Model Drift Discipline — Model Drift Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Models drift. Decisions drift with them. Govern drift or stop calling it governance. Principle 084/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Model Drift.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_085.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_085.png</image:loc>
      <image:title>Principle 085: Training-Data Custody — Training Data Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Training data is a regulated asset. Treat it as one or watch it become evidence. Principle 085/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Training Data.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_086.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_086.png</image:loc>
      <image:title>Principle 086: Prompt-Injection Realism — Prompt Injection Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Prompt injection is the new SQL injection. The lesson is unchanged: trust no input. Principle 086/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Prompt Injection.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_087.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_087.png</image:loc>
      <image:title>Principle 087: Agentic-Autonomy Test — Agentic AI Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Every autonomous action your system can take must have a named human accountable for its outcome. Principle 087/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Agentic AI.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_088.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_088.png</image:loc>
      <image:title>Principle 088: AI-Assisted Decision Provenance — AI Decisions Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>If you cannot explain why the AI agreed, you cannot defend why you did. Principle 088/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. AI Decisions.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_089.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_089.png</image:loc>
      <image:title>Principle 089: Bias-Audit Mandate — Bias Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Bias audited annually is bias governed. Bias audited at incident is bias litigated. Principle 089/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Bias.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_090.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_090.png</image:loc>
      <image:title>Principle 090: Disinformation Operational Test — Disinformation Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Operational disinformation is now cyber risk. Reputation is an attack surface. Principle 090/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Disinformation.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_091.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_091.png</image:loc>
      <image:title>Principle 091: Insider Threat Realism Update — Insider Risk Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Insider threat is no longer the disgruntled employee. It is the privileged identity used by anyone. Principle 091/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Insider Risk.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_092.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_092.png</image:loc>
      <image:title>Principle 092: Talent Concentration Inversion — Talent Risk Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Talent that cannot be cross-trained becomes risk. Talent that cannot be retained becomes liability. Principle 092/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Talent Risk.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_093.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_093.png</image:loc>
      <image:title>Principle 093: Hiring-Pipeline Discipline — Hiring Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>A hiring pipeline is governance infrastructure. Underfund it and audit findings repeat. Principle 093/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Hiring.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_094.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_094.png</image:loc>
      <image:title>Principle 094: Skills-Currency Mandate — Skills Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Skills lapse faster than certifications. Audit currency, not credentials. Principle 094/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Skills.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_095.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_095.png</image:loc>
      <image:title>Principle 095: Doctrine-Author Continuity — Doctrine Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Doctrine that depends on its author ends with its author. Codify or expect collapse. Principle 095/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Doctrine.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_096.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_096.png</image:loc>
      <image:title>Principle 096: Knowledge-Capture Discipline — Knowledge Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Tribal knowledge is a fault line. Convert it to doctrine before the senior leaver takes production with them. Principle 096/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Knowledge.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_097.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_097.png</image:loc>
      <image:title>Principle 097: Board-Reporting Honesty — Board Reporting Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Board reports that omit what went wrong are confidence trades. Eventually one fails. Principle 097/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Board Reporting.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_098.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_098.png</image:loc>
      <image:title>Principle 098: Materiality Calibration — Materiality Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Materiality is decided by the board before the incident — or by the regulator after. Principle 098/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Materiality.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_099.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_099.png</image:loc>
      <image:title>Principle 099: Disclosure-Timing Discipline — Disclosure Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>Disclosure timing is a board-level decision. Push it down and it will land on the news cycle. Principle 099/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Disclosure.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://kie.ie/principle-cards/principle_100.html</loc>
    <lastmod>2026-05-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://kie.ie/principle-cards/principle_100.png</image:loc>
      <image:title>Principle 100: Doctrine Closing Principle — Institutional Architecture Doctrine Card by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University</image:title>
      <image:caption>A doctrine that survives twenty years and three regulators is no longer doctrine. It is institutional architecture. Principle 100/100 from 100 Cyber Doctrine Principles by Professor Kieran Upadrasta, CISSP CISM CRISC, Schiphol University. Institutional Architecture.</image:caption>
    </image:image>
  </url>
</urlset>
