<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-incident-response---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: Incident Response - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of Incident Response.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Incident Response</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR31AutomatedTesting"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-3-_1__-automated-testing/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-3 (1): Automated Testing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-3 (1): Automated Testing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR42DynamicReconfiguration"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-4-_2__-dynamic-reconfiguration/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-4 (2): Dynamic Reconfiguration</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-4 (2): Dynamic Reconfiguration.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR43ContinuityofOperations"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-4-_3__-continuity-of-operations/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-4 (3): Continuity of Operations</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-4 (3): Continuity of Operations.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR45AutomaticDisablingofInformationSystem"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-4-_5__-automatic-disabling-of-information-system/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-4 (5): Automatic Disabling of Information System</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-4 (5): Automatic Disabling of Information System.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR46InsiderThreatsSpecificCapabilities"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-4-_6__-insider-threats---specific-capabilities/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-4 (6): Insider Threats - Specific Capabilities</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-4 (6): Insider Threats - Specific Capabilities.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR47InsiderThreatsIntraOrganizationCoordination"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-4-_7__-insider-threats---intra-organization-coordination/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-4 (7): Insider Threats - Intra-Organization Coordination</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-4 (7): Insider Threats - Intra-Organization Coordination.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR48CorrelationwithExternalOrganizations"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-4-_8__-correlation-with-external-organizations/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-4 (8): Correlation with External Organizations</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-4 (8): Correlation with External Organizations.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR49DynamicResponseCapability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-4-_9__-dynamic-response-capability/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-4 (9): Dynamic Response Capability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-4 (9): Dynamic Response Capability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR410SupplyChainCoordination"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-4-_10__-supply-chain-coordination/4/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-4 (10): Supply Chain Coordination</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-4 (10): Supply Chain Coordination.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR62VulnerabilitiesRelatedtoIncidents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-6-_2__-vulnerabilities-related-to-incidents/4/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-6 (2): Vulnerabilities Related to Incidents</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-6 (2): Vulnerabilities Related to Incidents.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR63CoordinationwithSupplyChain"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-6-_3__-coordination-with-supply-chain/4/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-6 (3): Coordination with Supply Chain</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-6 (3): Coordination with Supply Chain.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR72CoordinationwithExternalProviders"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-7-_2__-coordination-with-external-providers/4/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-7 (2): Coordination with External Providers</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-7 (2): Coordination with External Providers.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR9InformationSpillageResponse"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-9_-information-spillage-response/4/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-9: Information Spillage Response</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-9: Information Spillage Response.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR91ResponsiblePersonnel"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-9-_1__-responsible-personnel/4/</tf:Identifier><tf:Number>14</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-9 (1): Responsible Personnel</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-9 (1): Responsible Personnel.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR92Training"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-9-_2__-training/4/</tf:Identifier><tf:Number>15</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-9 (2): Training</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-9 (2): Training.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR93PostSpillOperations"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-9-_3__-post-spill-operations/4/</tf:Identifier><tf:Number>16</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-9 (3): Post-Spill Operations</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-9 (3): Post-Spill Operations.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR94ExposuretoUnauthorizedPersonnel"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-9-_4__-exposure-to-unauthorized-personnel/4/</tf:Identifier><tf:Number>17</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-9 (4): Exposure to Unauthorized Personnel</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-9 (4): Exposure to Unauthorized Personnel.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlIR10IntegratedInformationSecurityAnalysisTeam"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ir-10_-integrated-information-security-analysis-team/4/</tf:Identifier><tf:Number>18</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control IR-10: Integrated Information Security Analysis Team</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-10: Integrated Information Security Analysis Team.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlIR31AutomatedTesting and TIP_NISTSP80053r4SecurityControlIR42DynamicReconfiguration and TIP_NISTSP80053r4SecurityControlIR43ContinuityofOperations and TIP_NISTSP80053r4SecurityControlIR45AutomaticDisablingofInformationSystem and TIP_NISTSP80053r4SecurityControlIR46InsiderThreatsSpecificCapabilities and TIP_NISTSP80053r4SecurityControlIR47InsiderThreatsIntraOrganizationCoordination and TIP_NISTSP80053r4SecurityControlIR48CorrelationwithExternalOrganizations and TIP_NISTSP80053r4SecurityControlIR49DynamicResponseCapability and TIP_NISTSP80053r4SecurityControlIR410SupplyChainCoordination and TIP_NISTSP80053r4SecurityControlIR62VulnerabilitiesRelatedtoIncidents and TIP_NISTSP80053r4SecurityControlIR63CoordinationwithSupplyChain and TIP_NISTSP80053r4SecurityControlIR72CoordinationwithExternalProviders and TIP_NISTSP80053r4SecurityControlIR9InformationSpillageResponse and TIP_NISTSP80053r4SecurityControlIR91ResponsiblePersonnel and TIP_NISTSP80053r4SecurityControlIR92Training and TIP_NISTSP80053r4SecurityControlIR93PostSpillOperations and TIP_NISTSP80053r4SecurityControlIR94ExposuretoUnauthorizedPersonnel and TIP_NISTSP80053r4SecurityControlIR10IntegratedInformationSecurityAnalysisTeam]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>