<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-contingency-planning---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: Contingency Planning - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of Contingency Planning.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Contingency Planning</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP26AlternateProcessingStorageSite"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-2-_6__-alternate-processing-_-storage-site/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-2 (6): Alternate Processing / Storage Site</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-2 (6): Alternate Processing / Storage Site.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP27CoordinatewithExternalServiceProviders"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-2-_7__-coordinate-with-external-service-providers/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-2 (7): Coordinate with External Service Providers</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-2 (7): Coordinate with External Service Providers.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP32AutomatedTrainingEnvironments"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-3-_2__-automated-training-environments/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-3 (2): Automated Training Environments</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-3 (2): Automated Training Environments.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP43AutomatedTesting"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-4-_3__-automated-testing/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-4 (3): Automated Testing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-4 (3): Automated Testing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP44FullRecoveryReconstitution"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-4-_4__-full-recovery-_-reconstitution/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-4 (4): Full Recovery / Reconstitution</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-4 (4): Full Recovery / Reconstitution.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP76InabilitytoReturntoPrimarySite"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-7-_6__-inability-to-return-to-primary-site/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-7 (6): Inability to Return to Primary Site</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-7 (6): Inability to Return to Primary Site.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP85AlternateTelecommunicationServiceTesting"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-8-_5__-alternate-telecommunication-service-testing/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-8 (5): Alternate Telecommunication Service Testing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-8 (5): Alternate Telecommunication Service Testing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP96RedundantSecondarySystem"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-9-_6__-redundant-secondary-system/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-9 (6): Redundant Secondary System</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9 (6): Redundant Secondary System.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP97DualAuthorization"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-9-_7__-dual-authorization/4/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-9 (7): Dual Authorization</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9 (7): Dual Authorization.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP106ComponentProtection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-10-_6__-component-protection/4/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-10 (6): Component Protection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-10 (6): Component Protection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP11AlternateCommunicationsProtocols"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-11_-alternate-communications-protocols/4/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-11: Alternate Communications Protocols</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-11: Alternate Communications Protocols.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP12SafeMode"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-12_-safe-mode/4/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-12: Safe Mode</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-12: Safe Mode.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlCP13AlternativeSecurityMechanisms"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cp-13_-alternative-security-mechanisms/4/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control CP-13: Alternative Security Mechanisms</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-13: Alternative Security Mechanisms.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlCP26AlternateProcessingStorageSite and TIP_NISTSP80053r4SecurityControlCP27CoordinatewithExternalServiceProviders and TIP_NISTSP80053r4SecurityControlCP32AutomatedTrainingEnvironments and TIP_NISTSP80053r4SecurityControlCP43AutomatedTesting and TIP_NISTSP80053r4SecurityControlCP44FullRecoveryReconstitution and TIP_NISTSP80053r4SecurityControlCP76InabilitytoReturntoPrimarySite and TIP_NISTSP80053r4SecurityControlCP85AlternateTelecommunicationServiceTesting and TIP_NISTSP80053r4SecurityControlCP96RedundantSecondarySystem and TIP_NISTSP80053r4SecurityControlCP97DualAuthorization and TIP_NISTSP80053r4SecurityControlCP106ComponentProtection and TIP_NISTSP80053r4SecurityControlCP11AlternateCommunicationsProtocols and TIP_NISTSP80053r4SecurityControlCP12SafeMode and TIP_NISTSP80053r4SecurityControlCP13AlternativeSecurityMechanisms]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>