<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-risk-assessment---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: Risk Assessment - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of Risk Assessment.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Risk Assessment</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlRA53BreadthDepthofCoverage"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ra-5-_3__-breadth-_-depth-of-coverage/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control RA-5 (3): Breadth / Depth of Coverage</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control RA-5 (3): Breadth / Depth of Coverage.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlRA56AutomatedTrendAnalyses"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ra-5-_6__-automated-trend-analyses/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control RA-5 (6): Automated Trend Analyses</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control RA-5 (6): Automated Trend Analyses.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlRA58ReviewHistoricAuditLogs"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ra-5-_8__-review-historic-audit-logs/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control RA-5 (8): Review Historic Audit Logs</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control RA-5 (8): Review Historic Audit Logs.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlRA510CorrelateScanningInformation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ra-5-_10__-correlate-scanning-information/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control RA-5 (10): Correlate Scanning Information</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control RA-5 (10): Correlate Scanning Information.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlRA6TechnicalSurveillanceCountermeasuresSurvey"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ra-6_-technical-surveillance-countermeasures-survey/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control RA-6: Technical Surveillance Countermeasures Survey</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control RA-6: Technical Surveillance Countermeasures Survey.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlRA53BreadthDepthofCoverage and TIP_NISTSP80053r4SecurityControlRA56AutomatedTrendAnalyses and TIP_NISTSP80053r4SecurityControlRA58ReviewHistoricAuditLogs and TIP_NISTSP80053r4SecurityControlRA510CorrelateScanningInformation and TIP_NISTSP80053r4SecurityControlRA6TechnicalSurveillanceCountermeasuresSurvey]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>