<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-physical-and-environmental-protection---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: Physical and Environmental Protection - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of Physical and Environmental Protection.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Environmental Protection</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Physical</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE21AccessbyPositionRole"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-2-_1__-access-by-position-_-role/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-2 (1): Access by Position / Role</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-2 (1): Access by Position / Role.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE22TwoFormsofIdentification"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-2-_2__-two-forms-of-identification/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-2 (2): Two Forms of Identification</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-2 (2): Two Forms of Identification.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE23RestrictUnescortedAccess"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-2-_3__-restrict-unescorted-access/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-2 (3): Restrict Unescorted Access</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-2 (3): Restrict Unescorted Access.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE32FacilityInformationSystemBoundaries"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-3-_2__-facility-_-information-system-boundaries/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-3 (2): Facility / Information System Boundaries</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-3 (2): Facility / Information System Boundaries.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE33ContinuousGuardsAlarmsMonitoring"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-3-_3__-continuous-guards-_-alarms-_-monitoring/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-3 (3): Continuous Guards / Alarms / Monitoring</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-3 (3): Continuous Guards / Alarms / Monitoring.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE34LockableCasings"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-3-_4__-lockable-casings/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-3 (4): Lockable Casings</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-3 (4): Lockable Casings.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE35TamperProtection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-3-_5__-tamper-protection/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-3 (5): Tamper Protection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-3 (5): Tamper Protection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE36FacilityPenetrationTesting"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-3-_6__-facility-penetration-testing/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-3 (6): Facility Penetration Testing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-3 (6): Facility Penetration Testing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE51AccesstoOutputbyAuthorizedIndividuals"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-5-_1__-access-to-output-by-authorized-individuals/4/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-5 (1): Access to Output by Authorized Individuals</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-5 (1): Access to Output by Authorized Individuals.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE52AccesstoOutputbyIndividualIdentity"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-5-_2__-access-to-output-by-individual-identity/4/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-5 (2): Access to Output by Individual Identity</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-5 (2): Access to Output by Individual Identity.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE53MarkingOutputDevices"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-5-_3__-marking-output-devices/4/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-5 (3): Marking Output Devices</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-5 (3): Marking Output Devices.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE62AutomatedIntrusionRecognitionResponses"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-6-_2__-automated-intrusion-recognition-_-responses/4/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-6 (2): Automated Intrusion Recognition / Responses</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-6 (2): Automated Intrusion Recognition / Responses.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE63VideoSurveillance"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-6-_3__-video-surveillance/4/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-6 (3): Video Surveillance</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-6 (3): Video Surveillance.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE91RedundantCabling"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-9-_1__-redundant-cabling/4/</tf:Identifier><tf:Number>14</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-9 (1): Redundant Cabling</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-9 (1): Redundant Cabling.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE92AutomaticVoltageControls"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-9-_2__-automatic-voltage-controls/4/</tf:Identifier><tf:Number>15</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-9 (2): Automatic Voltage Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-9 (2): Automatic Voltage Controls.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE112LongTermAlternatePowerSupplySelfContained"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-11-_2__-long-term-alternate-power-supply---self-contained/4/</tf:Identifier><tf:Number>16</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-11 (2): Long-Term Alternate Power Supply - Self-Contained</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-11 (2): Long-Term Alternate Power Supply - Self-Contained.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE121EssentialMissionsBusinessFunctions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-12-_1__-essential-missions-_-business-functions/4/</tf:Identifier><tf:Number>17</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-12 (1): Essential Missions / Business Functions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-12 (1): Essential Missions / Business Functions.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE134Inspections"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-13-_4__-inspections/4/</tf:Identifier><tf:Number>18</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-13 (4): Inspections</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-13 (4): Inspections.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE141AutomaticControls"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-14-_1__-automatic-controls/4/</tf:Identifier><tf:Number>19</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-14 (1): Automatic Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-14 (1): Automatic Controls.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE142MonitoringwithAlarmsNotifications"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-14-_2__-monitoring-with-alarms-_-notifications/4/</tf:Identifier><tf:Number>20</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-14 (2): Monitoring with Alarms / Notifications</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-14 (2): Monitoring with Alarms / Notifications.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE181FacilitySite"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-18-_1__-facility-site/4/</tf:Identifier><tf:Number>21</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-18 (1): Facility Site</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-18 (1): Facility Site.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE19InformationLeakage"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-19_-information-leakage/4/</tf:Identifier><tf:Number>22</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-19: Information Leakage</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-19: Information Leakage.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE191NationalEmissionsTempestPoliciesandProcedures"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-19-_1__-national-emissions-_-tempest-policies-and-procedures/4/</tf:Identifier><tf:Number>23</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-19 (1): National Emissions / Tempest Policies and Procedures</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-19 (1): National Emissions / Tempest Policies and Procedures.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlPE20AssetMonitoringandTracking"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pe-20_-asset-monitoring-and-tracking/4/</tf:Identifier><tf:Number>24</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control PE-20: Asset Monitoring and Tracking</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PE-20: Asset Monitoring and Tracking.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlPE21AccessbyPositionRole and TIP_NISTSP80053r4SecurityControlPE22TwoFormsofIdentification and TIP_NISTSP80053r4SecurityControlPE23RestrictUnescortedAccess and TIP_NISTSP80053r4SecurityControlPE32FacilityInformationSystemBoundaries and TIP_NISTSP80053r4SecurityControlPE33ContinuousGuardsAlarmsMonitoring and TIP_NISTSP80053r4SecurityControlPE34LockableCasings and TIP_NISTSP80053r4SecurityControlPE35TamperProtection and TIP_NISTSP80053r4SecurityControlPE36FacilityPenetrationTesting and TIP_NISTSP80053r4SecurityControlPE51AccesstoOutputbyAuthorizedIndividuals and TIP_NISTSP80053r4SecurityControlPE52AccesstoOutputbyIndividualIdentity and TIP_NISTSP80053r4SecurityControlPE53MarkingOutputDevices and TIP_NISTSP80053r4SecurityControlPE62AutomatedIntrusionRecognitionResponses and TIP_NISTSP80053r4SecurityControlPE63VideoSurveillance and TIP_NISTSP80053r4SecurityControlPE91RedundantCabling and TIP_NISTSP80053r4SecurityControlPE92AutomaticVoltageControls and TIP_NISTSP80053r4SecurityControlPE112LongTermAlternatePowerSupplySelfContained and TIP_NISTSP80053r4SecurityControlPE121EssentialMissionsBusinessFunctions and TIP_NISTSP80053r4SecurityControlPE134Inspections and TIP_NISTSP80053r4SecurityControlPE141AutomaticControls and TIP_NISTSP80053r4SecurityControlPE142MonitoringwithAlarmsNotifications and TIP_NISTSP80053r4SecurityControlPE181FacilitySite and TIP_NISTSP80053r4SecurityControlPE19InformationLeakage and TIP_NISTSP80053r4SecurityControlPE191NationalEmissionsTempestPoliciesandProcedures and TIP_NISTSP80053r4SecurityControlPE20AssetMonitoringandTracking]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>