<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://keys.courses/</loc><lastmod>2026-03-09</lastmod><priority>1.0</priority></url>
<url><loc>https://keys.courses/blog/rotate-api-keys-without-downtime.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/api-key-vs-oauth-token.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/secrets-management-tools-comparison.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/api-keys-environment-variables-best-practices.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/api-key-rotation-automation-vault.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/accidentally-committed-api-key-git.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/aws-iam-vs-api-keys.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/api-key-security-checklist-production.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/what-happens-when-api-key-leaked.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
<url><loc>https://keys.courses/blog/jwt-vs-api-key-authentication.html</loc><lastmod>2026-03-09</lastmod><priority>0.8</priority></url>
</urlset>