<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-audit-and-accountability---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: Audit and Accountability - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of Audit and Accountability.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Accountability</tf:Keyword><tf:Keyword>Audit</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU41TransfertoAlternateStorage"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-4-_1__-transfer-to-alternate-storage/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-4 (1): Transfer to Alternate Storage</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-4 (1): Transfer to Alternate Storage.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU53ConfigurableTrafficVolumeThresholds"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-5-_3__-configurable-traffic-volume-thresholds/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-5 (3): Configurable Traffic Volume Thresholds</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-5 (3): Configurable Traffic Volume Thresholds.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU54ShutdownonFailure"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-5-_4__-shutdown-on-failure/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-5 (4): Shutdown on Failure</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-5 (4): Shutdown on Failure.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU64CentralReviewandAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-6-_4__-central-review-and-analysis/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-6 (4): Central Review and Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6 (4): Central Review and Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU67PermittedActions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-6-_7__-permitted-actions/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-6 (7): Permitted Actions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6 (7): Permitted Actions.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU68FullTextAnalysisofPrivilegedCommands"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-6-_8__-full-text-analysis-of-privileged-commands/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-6 (8): Full Text Analysis of Privileged Commands</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6 (8): Full Text Analysis of Privileged Commands.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU69CorrelationwithInformationfromNontechnicalSources"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-6-_9__-correlation-with-information-from-nontechnical-sources/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-6 (9): Correlation with Information from Nontechnical Sources</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6 (9): Correlation with Information from Nontechnical Sources.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU610AuditLevelAdjustment"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-6-_10__-audit-level-adjustment/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-6 (10): Audit Level Adjustment</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6 (10): Audit Level Adjustment.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU72AutomaticSortandSearch"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-7-_2__-automatic-sort-and-search/4/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-7 (2): Automatic Sort and Search</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-7 (2): Automatic Sort and Search.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU82SecondaryAuthoritativeTimeSource"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-8-_2__-secondary-authoritative-time-source/4/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-8 (2): Secondary Authoritative Time Source</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-8 (2): Secondary Authoritative Time Source.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU91HardwareWriteOnceMedia"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-9-_1__-hardware-write-once-media/4/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-9 (1): Hardware Write-Once Media</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (1): Hardware Write-Once Media.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU95DualAuthorization"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-9-_5__-dual-authorization/4/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-9 (5): Dual Authorization</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (5): Dual Authorization.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU96ReadOnlyAccess"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-9-_6__-read-only-access/4/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-9 (6): Read Only Access</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (6): Read Only Access.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU101AssociationofIdentities"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-10-_1__-association-of-identities/4/</tf:Identifier><tf:Number>14</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-10 (1): Association of Identities</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10 (1): Association of Identities.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU102ValidateBindingofInformationProducerIdentity"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-10-_2__-validate-binding-of-information-producer-identity/4/</tf:Identifier><tf:Number>15</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-10 (2): Validate Binding of Information Producer Identity</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10 (2): Validate Binding of Information Producer Identity.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU103ChainofCustody"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-10-_3__-chain-of-custody/4/</tf:Identifier><tf:Number>16</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-10 (3): Chain of Custody</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10 (3): Chain of Custody.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU104ValidateBindingofInformationReviewerIdentity"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-10-_4__-validate-binding-of-information-reviewer-identity/4/</tf:Identifier><tf:Number>17</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-10 (4): Validate Binding of Information Reviewer Identity</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10 (4): Validate Binding of Information Reviewer Identity.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU111LongTermRetrievalCapability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-11-_1__-long-term-retrieval-capability/4/</tf:Identifier><tf:Number>18</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-11 (1): Long-Term Retrieval Capability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-11 (1): Long-Term Retrieval Capability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU122StandardizedFormats"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-12-_2__-standardized-formats/4/</tf:Identifier><tf:Number>19</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-12 (2): Standardized Formats</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-12 (2): Standardized Formats.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU13MonitoringforInformationDisclosure"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-13_-monitoring-for-information-disclosure/4/</tf:Identifier><tf:Number>20</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-13: Monitoring for Information Disclosure</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-13: Monitoring for Information Disclosure.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU131UseofAutomatedTools"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-13-_1__-use-of-automated-tools/4/</tf:Identifier><tf:Number>21</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-13 (1): Use of Automated Tools</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-13 (1): Use of Automated Tools.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU132ReviewofMonitoredSites"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-13-_2__-review-of-monitored-sites/4/</tf:Identifier><tf:Number>22</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-13 (2): Review of Monitored Sites</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-13 (2): Review of Monitored Sites.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU14SessionAudit"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-14_-session-audit/4/</tf:Identifier><tf:Number>23</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-14: Session Audit</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-14: Session Audit.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU141SystemStartUp"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-14-_1__-system-start-up/4/</tf:Identifier><tf:Number>24</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-14 (1): System Start-Up</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-14 (1): System Start-Up.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU142CaptureRecordandLogContent"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-14-_2__-capture_record-and-log-content/4/</tf:Identifier><tf:Number>25</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-14 (2): Capture/Record and Log Content</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-14 (2): Capture/Record and Log Content.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU143RemoteViewingListening"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-14-_3__-remote-viewing-_-listening/4/</tf:Identifier><tf:Number>26</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-14 (3): Remote Viewing / Listening</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-14 (3): Remote Viewing / Listening.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU15AlternateAuditCapability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-15_-alternate-audit-capability/4/</tf:Identifier><tf:Number>27</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-15: Alternate Audit Capability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-15: Alternate Audit Capability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU16CrossOrganizationalAuditing"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-16_-cross-organizational-auditing/4/</tf:Identifier><tf:Number>28</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-16: Cross-Organizational Auditing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-16: Cross-Organizational Auditing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU161IdentityPreservation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-16-_1__-identity-preservation/4/</tf:Identifier><tf:Number>29</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-16 (1): Identity Preservation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-16 (1): Identity Preservation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlAU162SharingofAuditInformation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-au-16-_2__-sharing-of-audit-information/4/</tf:Identifier><tf:Number>30</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control AU-16 (2): Sharing of Audit Information</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-16 (2): Sharing of Audit Information.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlAU41TransfertoAlternateStorage and TIP_NISTSP80053r4SecurityControlAU53ConfigurableTrafficVolumeThresholds and TIP_NISTSP80053r4SecurityControlAU54ShutdownonFailure and TIP_NISTSP80053r4SecurityControlAU64CentralReviewandAnalysis and TIP_NISTSP80053r4SecurityControlAU67PermittedActions and TIP_NISTSP80053r4SecurityControlAU68FullTextAnalysisofPrivilegedCommands and TIP_NISTSP80053r4SecurityControlAU69CorrelationwithInformationfromNontechnicalSources and TIP_NISTSP80053r4SecurityControlAU610AuditLevelAdjustment and TIP_NISTSP80053r4SecurityControlAU72AutomaticSortandSearch and TIP_NISTSP80053r4SecurityControlAU82SecondaryAuthoritativeTimeSource and TIP_NISTSP80053r4SecurityControlAU91HardwareWriteOnceMedia and TIP_NISTSP80053r4SecurityControlAU95DualAuthorization and TIP_NISTSP80053r4SecurityControlAU96ReadOnlyAccess and TIP_NISTSP80053r4SecurityControlAU101AssociationofIdentities and TIP_NISTSP80053r4SecurityControlAU102ValidateBindingofInformationProducerIdentity and TIP_NISTSP80053r4SecurityControlAU103ChainofCustody and TIP_NISTSP80053r4SecurityControlAU104ValidateBindingofInformationReviewerIdentity and TIP_NISTSP80053r4SecurityControlAU111LongTermRetrievalCapability and TIP_NISTSP80053r4SecurityControlAU122StandardizedFormats and TIP_NISTSP80053r4SecurityControlAU13MonitoringforInformationDisclosure and TIP_NISTSP80053r4SecurityControlAU131UseofAutomatedTools and TIP_NISTSP80053r4SecurityControlAU132ReviewofMonitoredSites and TIP_NISTSP80053r4SecurityControlAU14SessionAudit and TIP_NISTSP80053r4SecurityControlAU141SystemStartUp and TIP_NISTSP80053r4SecurityControlAU142CaptureRecordandLogContent and TIP_NISTSP80053r4SecurityControlAU143RemoteViewingListening and TIP_NISTSP80053r4SecurityControlAU15AlternateAuditCapability and TIP_NISTSP80053r4SecurityControlAU16CrossOrganizationalAuditing and TIP_NISTSP80053r4SecurityControlAU161IdentityPreservation and TIP_NISTSP80053r4SecurityControlAU162SharingofAuditInformation]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>