<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-configuration-management---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: Configuration Management - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of Configuration Management.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Configuration Management</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM26DevelopmentandTestEnvironments"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-2-_6__-development-and-test-environments/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-2 (6): Development and Test Environments</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-2 (6): Development and Test Environments.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM33AutomatedChangeImplementation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-3-_3__-automated-change-implementation/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-3 (3): Automated Change Implementation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-3 (3): Automated Change Implementation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM34SecurityRepresentative"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-3-_4__-security-representative/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-3 (4): Security Representative</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-3 (4): Security Representative.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM35AutomatedSecurityResponse"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-3-_5__-automated-security-response/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-3 (5): Automated Security Response</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-3 (5): Automated Security Response.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM36CryptographyManagement"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-3-_6__-cryptography-management/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-3 (6): Cryptography Management</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-3 (6): Cryptography Management.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM42VerificationofSecurityFunctions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-4-_2__-verification-of-security-functions/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-4 (2): Verification of Security Functions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-4 (2): Verification of Security Functions.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM54DualAuthorization"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-5-_4__-dual-authorization/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-5 (4): Dual Authorization</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-5 (4): Dual Authorization.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM55LimitProductionOperationalPrivileges"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-5-_5__-limit-production-_-operational-privileges/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-5 (5): Limit Production / Operational Privileges</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-5 (5): Limit Production / Operational Privileges.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM56LimitLibraryPrivileges"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-5-_6__-limit-library-privileges/4/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-5 (6): Limit Library Privileges</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-5 (6): Limit Library Privileges.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM73RegistrationCompliance"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-7-_3__-registration-compliance/4/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-7 (3): Registration Compliance</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-7 (3): Registration Compliance.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM86AssessedConfigurationsApprovedDeviations"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-8-_6__-assessed-configurations-_-approved-deviations/4/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-8 (6): Assessed Configurations / Approved Deviations</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-8 (6): Assessed Configurations / Approved Deviations.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM87CentralizedRepository"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-8-_7__-centralized-repository/4/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-8 (7): Centralized Repository</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-8 (7): Centralized Repository.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM88AutomatedLocationTracking"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-8-_8__-automated-location-tracking/4/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-8 (8): Automated Location Tracking</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-8 (8): Automated Location Tracking.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM89AssignmentofComponentstoSystems"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-8-_9__-assignment-of-components-to-systems/4/</tf:Identifier><tf:Number>14</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-8 (9): Assignment of Components to Systems</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-8 (9): Assignment of Components to Systems.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM91AssignmentofResponsibility"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-9-_1__-assignment-of-responsibility/4/</tf:Identifier><tf:Number>15</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-9 (1): Assignment of Responsibility</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-9 (1): Assignment of Responsibility.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM101OpenSourceSoftware"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-10-_1__-open-source-software/4/</tf:Identifier><tf:Number>16</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-10 (1): Open Source Software</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-10 (1): Open Source Software.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM111AlertsforUnauthorizedInstallations"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-11-_1__-alerts-for-unauthorized-installations/4/</tf:Identifier><tf:Number>17</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-11 (1): Alerts for Unauthorized Installations</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-11 (1): Alerts for Unauthorized Installations.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCM112ProhibitInstallationWithoutPrivilegedStatus"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-11-_2__-prohibit-installation-without-privileged-status/4/</tf:Identifier><tf:Number>18</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CM-11 (2): Prohibit Installation Without Privileged Status</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-11 (2): Prohibit Installation Without Privileged Status.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlCM26DevelopmentandTestEnvironments and TIP_NISTSP80053r4SecurityControlCM33AutomatedChangeImplementation and TIP_NISTSP80053r4SecurityControlCM34SecurityRepresentative and TIP_NISTSP80053r4SecurityControlCM35AutomatedSecurityResponse and TIP_NISTSP80053r4SecurityControlCM36CryptographyManagement and TIP_NISTSP80053r4SecurityControlCM42VerificationofSecurityFunctions and TIP_NISTSP80053r4SecurityControlCM54DualAuthorization and TIP_NISTSP80053r4SecurityControlCM55LimitProductionOperationalPrivileges and TIP_NISTSP80053r4SecurityControlCM56LimitLibraryPrivileges and TIP_NISTSP80053r4SecurityControlCM73RegistrationCompliance and TIP_NISTSP80053r4SecurityControlCM86AssessedConfigurationsApprovedDeviations and TIP_NISTSP80053r4SecurityControlCM87CentralizedRepository and TIP_NISTSP80053r4SecurityControlCM88AutomatedLocationTracking and TIP_NISTSP80053r4SecurityControlCM89AssignmentofComponentstoSystems and TIP_NISTSP80053r4SecurityControlCM91AssignmentofResponsibility and TIP_NISTSP80053r4SecurityControlCM101OpenSourceSoftware and TIP_NISTSP80053r4SecurityControlCM111AlertsforUnauthorizedInstallations and TIP_NISTSP80053r4SecurityControlCM112ProhibitInstallationWithoutPrivilegedStatus]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>