{
  "$TMF_VERSION": "1.4",
  "PublicationDateTime": "2021-04-26T00:00:00.000Z",
  "Description": "Profile of requirements corresponding to all LOW impact security controls in NIST Special Publication 800-53, r4, under the control family of Access Control.",
  "Keywords": [
    "800-53",
    "Access Control",
    "NIST",
    "Security",
    "Low"
  ],
  "Issuer": {
    "Identifier": "https://trustmarkinitiative.org/",
    "PrimaryContact": {
      "Email": "help@trustmarkinitiative.org",
      "Telephone": "555-555-5555",
      "Kind": "PRIMARY",
      "WebsiteURL": "https://trustmarkinitiative.org/",
      "Responder": ""
    },
    "Name": "TMI"
  },
  "Sources": [{
    "Identifier": "SP800-53R4",
    "Reference": "NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at <a href=\"http://dx.doi.org/10.6028/NIST.SP.800-53r4\">http://dx.doi.org/10.6028/NIST.SP.800-53r4<\/a>.",
    "$id": "source-2112165102"
  }],
  "Name": "NIST SP 800-53 r4 - Security Control Family: Access Control - Controls for LOW Impact Systems",
  "TrustExpression": "TIP_NISTSP80053r4SecurityControlAC1AccessControlPolicyandProcedures and TIP_NISTSP80053r4SecurityControlAC2AccountManagement and TIP_NISTSP80053r4SecurityControlAC3AccessEnforcement and TIP_NISTSP80053r4SecurityControlAC7UnsuccessfulLogonAttempts and TIP_NISTSP80053r4SecurityControlAC8SystemUseNotification and TIP_NISTSP80053r4SecurityControlAC14PermittedActionsWithoutIdentificationorAuthentication and TIP_NISTSP80053r4SecurityControlAC17RemoteAccess and TIP_NISTSP80053r4SecurityControlAC18WirelessAccess and TIP_NISTSP80053r4SecurityControlAC19AccessControlforMobileDevices and TIP_NISTSP80053r4SecurityControlAC20UseofExternalInformationSystems and TIP_NISTSP80053r4SecurityControlAC22PubliclyAccessibleContent",
  "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-access-control---controls-for-low-impact-systems/4/",
  "Version": "4",
  "References": {"TrustInteroperabilityProfileReferences": [
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-1_-access-control-policy-and-procedures/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-1: Access Control Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 1,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-1: Access Control Policy and Procedures",
      "$id": "TIP_NISTSP80053r4SecurityControlAC1AccessControlPolicyandProcedures"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-2_-account-management/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2: Account Management. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 2,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-2: Account Management",
      "$id": "TIP_NISTSP80053r4SecurityControlAC2AccountManagement"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-3_-access-enforcement/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3: Access Enforcement. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 3,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-3: Access Enforcement",
      "$id": "TIP_NISTSP80053r4SecurityControlAC3AccessEnforcement"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-7_-unsuccessful-logon-attempts/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-7: Unsuccessful Logon Attempts. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 4,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-7: Unsuccessful Logon Attempts",
      "$id": "TIP_NISTSP80053r4SecurityControlAC7UnsuccessfulLogonAttempts"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-8_-system-use-notification/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-8: System Use Notification. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 5,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-8: System Use Notification",
      "$id": "TIP_NISTSP80053r4SecurityControlAC8SystemUseNotification"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-14_-permitted-actions-without-identification-or-authentication/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-14: Permitted Actions Without Identification or Authentication. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 6,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-14: Permitted Actions Without Identification or Authentication",
      "$id": "TIP_NISTSP80053r4SecurityControlAC14PermittedActionsWithoutIdentificationorAuthentication"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-17_-remote-access/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17: Remote Access. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 7,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-17: Remote Access",
      "$id": "TIP_NISTSP80053r4SecurityControlAC17RemoteAccess"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-18_-wireless-access/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18: Wireless Access. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 8,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-18: Wireless Access",
      "$id": "TIP_NISTSP80053r4SecurityControlAC18WirelessAccess"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-19_-access-control-for-mobile-devices/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-19: Access Control for Mobile Devices. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 9,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-19: Access Control for Mobile Devices",
      "$id": "TIP_NISTSP80053r4SecurityControlAC19AccessControlforMobileDevices"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-20_-use-of-external-information-systems/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20: Use of External Information Systems. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 10,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-20: Use of External Information Systems",
      "$id": "TIP_NISTSP80053r4SecurityControlAC20UseofExternalInformationSystems"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-22_-publicly-accessible-content/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-22: Publicly Accessible Content. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
      "Number": 11,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control AC-22: Publicly Accessible Content",
      "$id": "TIP_NISTSP80053r4SecurityControlAC22PubliclyAccessibleContent"
    }
  ]},
  "Primary": "false",
  "LegalNotice": "This document and the information contained herein is provided on an \"AS IS\" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
  "$Type": "TrustInteroperabilityProfile"
}