<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-configuration-management---controls-for-low-impact-systems/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: Configuration Management - Controls for LOW Impact Systems</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all LOW impact security controls in NIST Special Publication 800-53, r4, under the control family of Configuration Management.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Configuration Management</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Low</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM1ConfigurationManagementPolicyandProcedures"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-1_-configuration-management-policy-and-procedures/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-1: Configuration Management Policy and Procedures</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-1: Configuration Management Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM2BaselineConfiguration"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-2_-baseline-configuration/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-2: Baseline Configuration</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-2: Baseline Configuration. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM4SecurityImpactAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-4_-security-impact-analysis/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-4: Security Impact Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-4: Security Impact Analysis. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM6ConfigurationSettings"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-6_-configuration-settings/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-6: Configuration Settings</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-6: Configuration Settings. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM7LeastFunctionality"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-7_-least-functionality/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-7: Least Functionality</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-7: Least Functionality. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM8InformationSystemComponentInventory"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-8_-information-system-component-inventory/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-8: Information System Component Inventory</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-8: Information System Component Inventory. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM10SoftwareUsageRestrictions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-10_-software-usage-restrictions/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-10: Software Usage Restrictions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-10: Software Usage Restrictions. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM11UserInstalledSoftware"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-11_-user-installed-software/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-11: User-Installed Software</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-11: User-Installed Software. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlCM1ConfigurationManagementPolicyandProcedures and TIP_NISTSP80053r4SecurityControlCM2BaselineConfiguration and TIP_NISTSP80053r4SecurityControlCM4SecurityImpactAnalysis and TIP_NISTSP80053r4SecurityControlCM6ConfigurationSettings and TIP_NISTSP80053r4SecurityControlCM7LeastFunctionality and TIP_NISTSP80053r4SecurityControlCM8InformationSystemComponentInventory and TIP_NISTSP80053r4SecurityControlCM10SoftwareUsageRestrictions and TIP_NISTSP80053r4SecurityControlCM11UserInstalledSoftware]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>