{
  "$TMF_VERSION": "1.4",
  "PublicationDateTime": "2021-04-26T00:00:00.000Z",
  "Description": "Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of System and Communications Protection.",
  "Keywords": [
    "800-53",
    "Communications Protection",
    "NIST",
    "Security",
    "System",
    "Supplemental"
  ],
  "Issuer": {
    "Identifier": "https://trustmarkinitiative.org/",
    "PrimaryContact": {
      "Email": "help@trustmarkinitiative.org",
      "Telephone": "555-555-5555",
      "Kind": "PRIMARY",
      "WebsiteURL": "https://trustmarkinitiative.org/",
      "Responder": ""
    },
    "Name": "TMI"
  },
  "Sources": [{
    "Identifier": "SP800-53R4",
    "Reference": "NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at <a href=\"http://dx.doi.org/10.6028/NIST.SP.800-53r4\">http://dx.doi.org/10.6028/NIST.SP.800-53r4<\/a>.",
    "$id": "source-2112165102"
  }],
  "Name": "NIST SP 800-53 r4 - Security Control Family: System and Communications Protection - Supplemental Controls",
  "TrustExpression": "TIP_NISTSP80053r4SecurityControlSC21InterfacesforNonPrivilegedUsers and TIP_NISTSP80053r4SecurityControlSC31HardwareSeparation and TIP_NISTSP80053r4SecurityControlSC32AccessFlowControlFunctions and TIP_NISTSP80053r4SecurityControlSC33MinimizeNonsecurityFunctionality and TIP_NISTSP80053r4SecurityControlSC34ModuleCouplingandCohesiveness and TIP_NISTSP80053r4SecurityControlSC35LayeredStructures and TIP_NISTSP80053r4SecurityControlSC42PeriodsProcessing and TIP_NISTSP80053r4SecurityControlSC51RestrictInternalUsers and TIP_NISTSP80053r4SecurityControlSC52ExcessCapacityBandwidthRedundancy and TIP_NISTSP80053r4SecurityControlSC53DetectionMonitoring and TIP_NISTSP80053r4SecurityControlSC6ResourceAvailability and TIP_NISTSP80053r4SecurityControlSC79RestrictThreateningOutgoingCommunicationsTraffic and TIP_NISTSP80053r4SecurityControlSC710PreventUnauthorizedExfiltration and TIP_NISTSP80053r4SecurityControlSC711RestrictIncomingCommunicationsTraffic and TIP_NISTSP80053r4SecurityControlSC712HostBasedProtection and TIP_NISTSP80053r4SecurityControlSC713IsolationofSecurityToolsMechanismsSupportComponents and TIP_NISTSP80053r4SecurityControlSC714ProtectsAgainstUnauthorizedPhysicalConnections and TIP_NISTSP80053r4SecurityControlSC715RoutePrivilegedNetworkAccesses and TIP_NISTSP80053r4SecurityControlSC716PreventDiscoveryofComponentsDevices and TIP_NISTSP80053r4SecurityControlSC717AutomatedEnforcementofProtocolFormats and TIP_NISTSP80053r4SecurityControlSC719BlocksCommunicationfromNonOrganizationallyConfiguredHosts and TIP_NISTSP80053r4SecurityControlSC720DynamicIsolationSegregation and TIP_NISTSP80053r4SecurityControlSC722SeparateSubnetsforConnectingtoDifferentSecurityDomains and TIP_NISTSP80053r4SecurityControlSC723DisableSenderFeedbackonProtocolValidationFailure and TIP_NISTSP80053r4SecurityControlSC82PrePostTransmissionHandling and TIP_NISTSP80053r4SecurityControlSC83CryptographicProtectionforMessageExternals and TIP_NISTSP80053r4SecurityControlSC84ConcealRandomizeCommunications and TIP_NISTSP80053r4SecurityControlSC11TrustedPath and TIP_NISTSP80053r4SecurityControlSC111LogicalIsolation and TIP_NISTSP80053r4SecurityControlSC122SymmetricKeys and TIP_NISTSP80053r4SecurityControlSC123AsymmetricKeys and TIP_NISTSP80053r4SecurityControlSC151PhysicalDisconnect and TIP_NISTSP80053r4SecurityControlSC153DisablingRemovalinSecureWorkAreas and TIP_NISTSP80053r4SecurityControlSC154ExplicitlyIndicateCurrentParticipants and TIP_NISTSP80053r4SecurityControlSC16TransmissionofSecurityAttributes and TIP_NISTSP80053r4SecurityControlSC161IntegrityValidation and TIP_NISTSP80053r4SecurityControlSC181IdentifyUnacceptableCodeTakeCorrectiveActions and TIP_NISTSP80053r4SecurityControlSC182AcquisitionDevelopmentUse and TIP_NISTSP80053r4SecurityControlSC183PreventDownloadingExecution and TIP_NISTSP80053r4SecurityControlSC184PreventAutomaticExecution and TIP_NISTSP80053r4SecurityControlSC185AllowExecutionOnlyinConfinedEnvironments and TIP_NISTSP80053r4SecurityControlSC202DataOriginIntegrity and TIP_NISTSP80053r4SecurityControlSC231InvalidateSessionIdentifiersatLogout and TIP_NISTSP80053r4SecurityControlSC233UniqueSessionIdentifierswithRandomization and TIP_NISTSP80053r4SecurityControlSC235AllowedCertificateAuthorities and TIP_NISTSP80053r4SecurityControlSC25ThinNodes and TIP_NISTSP80053r4SecurityControlSC26Honeypots and TIP_NISTSP80053r4SecurityControlSC27PlatformIndependentApplications and TIP_NISTSP80053r4SecurityControlSC281CryptographicProtection and TIP_NISTSP80053r4SecurityControlSC282OffLineStorage and TIP_NISTSP80053r4SecurityControlSC29Heterogeneity and TIP_NISTSP80053r4SecurityControlSC291VirtualizationTechniques and TIP_NISTSP80053r4SecurityControlSC30ConcealmentandMisdirection and TIP_NISTSP80053r4SecurityControlSC302Randomness and TIP_NISTSP80053r4SecurityControlSC303ChangeProcessingStorageLocations and TIP_NISTSP80053r4SecurityControlSC304MisleadingInformation and TIP_NISTSP80053r4SecurityControlSC305ConcealmentofSystemComponents and TIP_NISTSP80053r4SecurityControlSC31CovertChannelAnalysis and TIP_NISTSP80053r4SecurityControlSC311TestCovertChannelsforExploitability and TIP_NISTSP80053r4SecurityControlSC312MaximumBandwidth and TIP_NISTSP80053r4SecurityControlSC313MeasureBandwidthinOperationalEnvironments and TIP_NISTSP80053r4SecurityControlSC32InformationSystemPartitioning and TIP_NISTSP80053r4SecurityControlSC34NonModifiableExecutablePrograms and TIP_NISTSP80053r4SecurityControlSC341NoWritableStorage and TIP_NISTSP80053r4SecurityControlSC342IntegrityProtectionReadOnlyMedia and TIP_NISTSP80053r4SecurityControlSC343HardwareBasedProtection and TIP_NISTSP80053r4SecurityControlSC35Honeyclients and TIP_NISTSP80053r4SecurityControlSC36DistributedProcessingandStorage and TIP_NISTSP80053r4SecurityControlSC361PollingTechniques and TIP_NISTSP80053r4SecurityControlSC37OutOfBandChannels and TIP_NISTSP80053r4SecurityControlSC371EnsureDeliveryTransmission and TIP_NISTSP80053r4SecurityControlSC38OperationsSecurity and TIP_NISTSP80053r4SecurityControlSC391HardwareSeparation and TIP_NISTSP80053r4SecurityControlSC392ThreadIsolation and TIP_NISTSP80053r4SecurityControlSC40WirelessLinkProtection and TIP_NISTSP80053r4SecurityControlSC401ElectromagneticInterference and TIP_NISTSP80053r4SecurityControlSC402ReduceDetectionPotential and TIP_NISTSP80053r4SecurityControlSC403ImitativeorManipulativeCommunicationsDeception and TIP_NISTSP80053r4SecurityControlSC404SignalParameterIdentification and TIP_NISTSP80053r4SecurityControlSC41PortandIODeviceAccess and TIP_NISTSP80053r4SecurityControlSC42SensorCapabilityandData and TIP_NISTSP80053r4SecurityControlSC421ReportingtoAuthorizedIndividualsorRoles and TIP_NISTSP80053r4SecurityControlSC422AuthorizedUse and TIP_NISTSP80053r4SecurityControlSC423ProhibitUseofDevices and TIP_NISTSP80053r4SecurityControlSC43UsageRestrictions and TIP_NISTSP80053r4SecurityControlSC44DetonationChambers",
  "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-system-and-communications-protection---supplemental-controls/4/",
  "Version": "4",
  "References": {"TrustInteroperabilityProfileReferences": [
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-2-_1__-interfaces-for-non-privileged-users/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-2 (1): Interfaces for Non-Privileged Users.",
      "Number": 1,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-2 (1): Interfaces for Non-Privileged Users",
      "$id": "TIP_NISTSP80053r4SecurityControlSC21InterfacesforNonPrivilegedUsers"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_1__-hardware-separation/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (1): Hardware Separation.",
      "Number": 2,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-3 (1): Hardware Separation",
      "$id": "TIP_NISTSP80053r4SecurityControlSC31HardwareSeparation"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_2__-access-_-flow-control-functions/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (2): Access / Flow Control Functions.",
      "Number": 3,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-3 (2): Access / Flow Control Functions",
      "$id": "TIP_NISTSP80053r4SecurityControlSC32AccessFlowControlFunctions"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_3__-minimize-nonsecurity-functionality/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (3): Minimize Nonsecurity Functionality.",
      "Number": 4,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-3 (3): Minimize Nonsecurity Functionality",
      "$id": "TIP_NISTSP80053r4SecurityControlSC33MinimizeNonsecurityFunctionality"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_4__-module-coupling-and-cohesiveness/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (4): Module Coupling and Cohesiveness.",
      "Number": 5,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-3 (4): Module Coupling and Cohesiveness",
      "$id": "TIP_NISTSP80053r4SecurityControlSC34ModuleCouplingandCohesiveness"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_5__-layered-structures/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (5): Layered Structures.",
      "Number": 6,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-3 (5): Layered Structures",
      "$id": "TIP_NISTSP80053r4SecurityControlSC35LayeredStructures"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-4-_2__-periods-processing/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-4 (2): Periods Processing.",
      "Number": 7,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-4 (2): Periods Processing",
      "$id": "TIP_NISTSP80053r4SecurityControlSC42PeriodsProcessing"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-5-_1__-restrict-internal-users/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (1): Restrict Internal Users.",
      "Number": 8,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-5 (1): Restrict Internal Users",
      "$id": "TIP_NISTSP80053r4SecurityControlSC51RestrictInternalUsers"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-5-_2__-excess-capacity-_-bandwidth-_-redundancy/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (2): Excess Capacity / Bandwidth / Redundancy.",
      "Number": 9,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-5 (2): Excess Capacity / Bandwidth / Redundancy",
      "$id": "TIP_NISTSP80053r4SecurityControlSC52ExcessCapacityBandwidthRedundancy"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-5-_3__-detection-_-monitoring/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (3): Detection / Monitoring.",
      "Number": 10,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-5 (3): Detection / Monitoring",
      "$id": "TIP_NISTSP80053r4SecurityControlSC53DetectionMonitoring"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-6_-resource-availability/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-6: Resource Availability.",
      "Number": 11,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-6: Resource Availability",
      "$id": "TIP_NISTSP80053r4SecurityControlSC6ResourceAvailability"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_9__-restrict-threatening-outgoing-communications-traffic/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (9): Restrict Threatening Outgoing Communications Traffic.",
      "Number": 12,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (9): Restrict Threatening Outgoing Communications Traffic",
      "$id": "TIP_NISTSP80053r4SecurityControlSC79RestrictThreateningOutgoingCommunicationsTraffic"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_10__-prevent-unauthorized-exfiltration/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (10): Prevent Unauthorized Exfiltration.",
      "Number": 13,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (10): Prevent Unauthorized Exfiltration",
      "$id": "TIP_NISTSP80053r4SecurityControlSC710PreventUnauthorizedExfiltration"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_11__-restrict-incoming-communications-traffic/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (11): Restrict Incoming Communications Traffic.",
      "Number": 14,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (11): Restrict Incoming Communications Traffic",
      "$id": "TIP_NISTSP80053r4SecurityControlSC711RestrictIncomingCommunicationsTraffic"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_12__-host-based-protection/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (12): Host-Based Protection.",
      "Number": 15,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (12): Host-Based Protection",
      "$id": "TIP_NISTSP80053r4SecurityControlSC712HostBasedProtection"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_13__-isolation-of-security-tools-_-mechanisms-_-support-components/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (13): Isolation of Security Tools / Mechanisms / Support Components.",
      "Number": 16,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (13): Isolation of Security Tools / Mechanisms / Support Components",
      "$id": "TIP_NISTSP80053r4SecurityControlSC713IsolationofSecurityToolsMechanismsSupportComponents"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_14__-protects-against-unauthorized-physical-connections/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (14): Protects Against Unauthorized Physical Connections.",
      "Number": 17,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (14): Protects Against Unauthorized Physical Connections",
      "$id": "TIP_NISTSP80053r4SecurityControlSC714ProtectsAgainstUnauthorizedPhysicalConnections"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_15__-route-privileged-network-accesses/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (15): Route Privileged Network Accesses.",
      "Number": 18,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (15): Route Privileged Network Accesses",
      "$id": "TIP_NISTSP80053r4SecurityControlSC715RoutePrivilegedNetworkAccesses"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_16__-prevent-discovery-of-components-_-devices/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (16): Prevent Discovery of Components / Devices.",
      "Number": 19,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (16): Prevent Discovery of Components / Devices",
      "$id": "TIP_NISTSP80053r4SecurityControlSC716PreventDiscoveryofComponentsDevices"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_17__-automated-enforcement-of-protocol-formats/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (17): Automated Enforcement of Protocol Formats.",
      "Number": 20,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (17): Automated Enforcement of Protocol Formats",
      "$id": "TIP_NISTSP80053r4SecurityControlSC717AutomatedEnforcementofProtocolFormats"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_19__-blocks-communication-from-non-organizationally-configured-hosts/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (19): Blocks Communication from Non-Organizationally Configured Hosts.",
      "Number": 21,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (19): Blocks Communication from Non-Organizationally Configured Hosts",
      "$id": "TIP_NISTSP80053r4SecurityControlSC719BlocksCommunicationfromNonOrganizationallyConfiguredHosts"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_20__-dynamic-isolation-_-segregation/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (20): Dynamic Isolation / Segregation.",
      "Number": 22,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (20): Dynamic Isolation / Segregation",
      "$id": "TIP_NISTSP80053r4SecurityControlSC720DynamicIsolationSegregation"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_22__-separate-subnets-for-connecting-to-different-security-domains/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (22): Separate Subnets for Connecting to Different Security Domains.",
      "Number": 23,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (22): Separate Subnets for Connecting to Different Security Domains",
      "$id": "TIP_NISTSP80053r4SecurityControlSC722SeparateSubnetsforConnectingtoDifferentSecurityDomains"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_23__-disable-sender-feedback-on-protocol-validation-failure/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (23): Disable Sender Feedback on Protocol Validation Failure.",
      "Number": 24,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-7 (23): Disable Sender Feedback on Protocol Validation Failure",
      "$id": "TIP_NISTSP80053r4SecurityControlSC723DisableSenderFeedbackonProtocolValidationFailure"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-8-_2__-pre-_-post-transmission-handling/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (2): Pre / Post Transmission Handling.",
      "Number": 25,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-8 (2): Pre / Post Transmission Handling",
      "$id": "TIP_NISTSP80053r4SecurityControlSC82PrePostTransmissionHandling"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-8-_3__-cryptographic-protection-for-message-externals/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (3): Cryptographic Protection for Message Externals.",
      "Number": 26,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-8 (3): Cryptographic Protection for Message Externals",
      "$id": "TIP_NISTSP80053r4SecurityControlSC83CryptographicProtectionforMessageExternals"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-8-_4__-conceal-_-randomize-communications/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (4): Conceal / Randomize Communications.",
      "Number": 27,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-8 (4): Conceal / Randomize Communications",
      "$id": "TIP_NISTSP80053r4SecurityControlSC84ConcealRandomizeCommunications"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-11_-trusted-path/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11: Trusted Path.",
      "Number": 28,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-11: Trusted Path",
      "$id": "TIP_NISTSP80053r4SecurityControlSC11TrustedPath"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-11-_1__-logical-isolation/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11 (1): Logical Isolation.",
      "Number": 29,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-11 (1): Logical Isolation",
      "$id": "TIP_NISTSP80053r4SecurityControlSC111LogicalIsolation"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-12-_2__-symmetric-keys/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (2): Symmetric Keys.",
      "Number": 30,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-12 (2): Symmetric Keys",
      "$id": "TIP_NISTSP80053r4SecurityControlSC122SymmetricKeys"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-12-_3__-asymmetric-keys/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (3): Asymmetric Keys.",
      "Number": 31,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-12 (3): Asymmetric Keys",
      "$id": "TIP_NISTSP80053r4SecurityControlSC123AsymmetricKeys"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-15-_1__-physical-disconnect/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (1): Physical Disconnect.",
      "Number": 32,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-15 (1): Physical Disconnect",
      "$id": "TIP_NISTSP80053r4SecurityControlSC151PhysicalDisconnect"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-15-_3__-disabling-_-removal-in-secure-work-areas/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (3): Disabling / Removal in Secure Work Areas.",
      "Number": 33,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-15 (3): Disabling / Removal in Secure Work Areas",
      "$id": "TIP_NISTSP80053r4SecurityControlSC153DisablingRemovalinSecureWorkAreas"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-15-_4__-explicitly-indicate-current-participants/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (4): Explicitly Indicate Current Participants.",
      "Number": 34,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-15 (4): Explicitly Indicate Current Participants",
      "$id": "TIP_NISTSP80053r4SecurityControlSC154ExplicitlyIndicateCurrentParticipants"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-16_-transmission-of-security-attributes/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16: Transmission of Security Attributes.",
      "Number": 35,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-16: Transmission of Security Attributes",
      "$id": "TIP_NISTSP80053r4SecurityControlSC16TransmissionofSecurityAttributes"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-16-_1__-integrity-validation/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16 (1): Integrity Validation.",
      "Number": 36,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-16 (1): Integrity Validation",
      "$id": "TIP_NISTSP80053r4SecurityControlSC161IntegrityValidation"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_1__-identify-unacceptable-code-_-take-corrective-actions/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (1): Identify Unacceptable Code / Take Corrective Actions.",
      "Number": 37,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-18 (1): Identify Unacceptable Code / Take Corrective Actions",
      "$id": "TIP_NISTSP80053r4SecurityControlSC181IdentifyUnacceptableCodeTakeCorrectiveActions"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_2__-acquisition-_-development-_-use/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (2): Acquisition / Development / Use.",
      "Number": 38,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-18 (2): Acquisition / Development / Use",
      "$id": "TIP_NISTSP80053r4SecurityControlSC182AcquisitionDevelopmentUse"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_3__-prevent-downloading-_-execution/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (3): Prevent Downloading / Execution.",
      "Number": 39,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-18 (3): Prevent Downloading / Execution",
      "$id": "TIP_NISTSP80053r4SecurityControlSC183PreventDownloadingExecution"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_4__-prevent-automatic-execution/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (4): Prevent Automatic Execution.",
      "Number": 40,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-18 (4): Prevent Automatic Execution",
      "$id": "TIP_NISTSP80053r4SecurityControlSC184PreventAutomaticExecution"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_5__-allow-execution-only-in-confined-environments/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (5): Allow Execution Only in Confined Environments.",
      "Number": 41,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-18 (5): Allow Execution Only in Confined Environments",
      "$id": "TIP_NISTSP80053r4SecurityControlSC185AllowExecutionOnlyinConfinedEnvironments"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-20-_2__-data-origin-_-integrity/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-20 (2): Data Origin / Integrity.",
      "Number": 42,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-20 (2): Data Origin / Integrity",
      "$id": "TIP_NISTSP80053r4SecurityControlSC202DataOriginIntegrity"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-23-_1__-invalidate-session-identifiers-at-logout/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (1): Invalidate Session Identifiers at Logout.",
      "Number": 43,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-23 (1): Invalidate Session Identifiers at Logout",
      "$id": "TIP_NISTSP80053r4SecurityControlSC231InvalidateSessionIdentifiersatLogout"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-23-_3__-unique-session-identifiers-with-randomization/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (3): Unique Session Identifiers with Randomization.",
      "Number": 44,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-23 (3): Unique Session Identifiers with Randomization",
      "$id": "TIP_NISTSP80053r4SecurityControlSC233UniqueSessionIdentifierswithRandomization"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-23-_5__-allowed-certificate-authorities/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (5): Allowed Certificate Authorities.",
      "Number": 45,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-23 (5): Allowed Certificate Authorities",
      "$id": "TIP_NISTSP80053r4SecurityControlSC235AllowedCertificateAuthorities"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-25_-thin-nodes/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-25: Thin Nodes.",
      "Number": 46,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-25: Thin Nodes",
      "$id": "TIP_NISTSP80053r4SecurityControlSC25ThinNodes"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-26_-honeypots/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-26: Honeypots.",
      "Number": 47,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-26: Honeypots",
      "$id": "TIP_NISTSP80053r4SecurityControlSC26Honeypots"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-27_-platform-independent-applications/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-27: Platform-Independent Applications.",
      "Number": 48,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-27: Platform-Independent Applications",
      "$id": "TIP_NISTSP80053r4SecurityControlSC27PlatformIndependentApplications"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-28-_1__-cryptographic-protection/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (1): Cryptographic Protection.",
      "Number": 49,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-28 (1): Cryptographic Protection",
      "$id": "TIP_NISTSP80053r4SecurityControlSC281CryptographicProtection"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-28-_2__-off-line-storage/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (2): Off-Line Storage.",
      "Number": 50,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-28 (2): Off-Line Storage",
      "$id": "TIP_NISTSP80053r4SecurityControlSC282OffLineStorage"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-29_-heterogeneity/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29: Heterogeneity.",
      "Number": 51,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-29: Heterogeneity",
      "$id": "TIP_NISTSP80053r4SecurityControlSC29Heterogeneity"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-29-_1__-virtualization-techniques/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29 (1): Virtualization Techniques.",
      "Number": 52,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-29 (1): Virtualization Techniques",
      "$id": "TIP_NISTSP80053r4SecurityControlSC291VirtualizationTechniques"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30_-concealment-and-misdirection/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30: Concealment and Misdirection.",
      "Number": 53,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-30: Concealment and Misdirection",
      "$id": "TIP_NISTSP80053r4SecurityControlSC30ConcealmentandMisdirection"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30-_2__-randomness/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (2): Randomness.",
      "Number": 54,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-30 (2): Randomness",
      "$id": "TIP_NISTSP80053r4SecurityControlSC302Randomness"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30-_3__-change-processing-_-storage-locations/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (3): Change Processing / Storage Locations.",
      "Number": 55,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-30 (3): Change Processing / Storage Locations",
      "$id": "TIP_NISTSP80053r4SecurityControlSC303ChangeProcessingStorageLocations"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30-_4__-misleading-information/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (4): Misleading Information.",
      "Number": 56,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-30 (4): Misleading Information",
      "$id": "TIP_NISTSP80053r4SecurityControlSC304MisleadingInformation"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30-_5__-concealment-of-system-components/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (5): Concealment of System Components.",
      "Number": 57,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-30 (5): Concealment of System Components",
      "$id": "TIP_NISTSP80053r4SecurityControlSC305ConcealmentofSystemComponents"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-31_-covert-channel-analysis/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31: Covert Channel Analysis.",
      "Number": 58,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-31: Covert Channel Analysis",
      "$id": "TIP_NISTSP80053r4SecurityControlSC31CovertChannelAnalysis"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-31-_1__-test-covert-channels-for-exploitability/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (1): Test Covert Channels for Exploitability.",
      "Number": 59,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-31 (1): Test Covert Channels for Exploitability",
      "$id": "TIP_NISTSP80053r4SecurityControlSC311TestCovertChannelsforExploitability"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-31-_2__-maximum-bandwidth/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (2): Maximum Bandwidth.",
      "Number": 60,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-31 (2): Maximum Bandwidth",
      "$id": "TIP_NISTSP80053r4SecurityControlSC312MaximumBandwidth"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-31-_3__-measure-bandwidth-in-operational-environments/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (3): Measure Bandwidth in Operational Environments.",
      "Number": 61,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-31 (3): Measure Bandwidth in Operational Environments",
      "$id": "TIP_NISTSP80053r4SecurityControlSC313MeasureBandwidthinOperationalEnvironments"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-32_-information-system-partitioning/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-32: Information System Partitioning.",
      "Number": 62,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-32: Information System Partitioning",
      "$id": "TIP_NISTSP80053r4SecurityControlSC32InformationSystemPartitioning"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34_-non-modifiable-executable-programs/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34: Non-Modifiable Executable Programs.",
      "Number": 63,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-34: Non-Modifiable Executable Programs",
      "$id": "TIP_NISTSP80053r4SecurityControlSC34NonModifiableExecutablePrograms"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34-_1__-no-writable-storage/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (1): No Writable Storage.",
      "Number": 64,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-34 (1): No Writable Storage",
      "$id": "TIP_NISTSP80053r4SecurityControlSC341NoWritableStorage"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34-_2__-integrity-protection-_-read-only-media/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (2): Integrity Protection / Read-Only Media.",
      "Number": 65,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-34 (2): Integrity Protection / Read-Only Media",
      "$id": "TIP_NISTSP80053r4SecurityControlSC342IntegrityProtectionReadOnlyMedia"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34-_3__-hardware-based-protection/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (3): Hardware-Based Protection.",
      "Number": 66,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-34 (3): Hardware-Based Protection",
      "$id": "TIP_NISTSP80053r4SecurityControlSC343HardwareBasedProtection"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-35_-honeyclients/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-35: Honeyclients.",
      "Number": 67,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-35: Honeyclients",
      "$id": "TIP_NISTSP80053r4SecurityControlSC35Honeyclients"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-36_-distributed-processing-and-storage/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36: Distributed Processing and Storage.",
      "Number": 68,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-36: Distributed Processing and Storage",
      "$id": "TIP_NISTSP80053r4SecurityControlSC36DistributedProcessingandStorage"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-36-_1__-polling-techniques/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36 (1): Polling Techniques.",
      "Number": 69,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-36 (1): Polling Techniques",
      "$id": "TIP_NISTSP80053r4SecurityControlSC361PollingTechniques"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-37_-out-of-band-channels/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37: Out-Of-Band Channels.",
      "Number": 70,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-37: Out-Of-Band Channels",
      "$id": "TIP_NISTSP80053r4SecurityControlSC37OutOfBandChannels"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-37-_1__-ensure-delivery-_-transmission/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37 (1): Ensure Delivery / Transmission.",
      "Number": 71,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-37 (1): Ensure Delivery / Transmission",
      "$id": "TIP_NISTSP80053r4SecurityControlSC371EnsureDeliveryTransmission"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-38_-operations-security/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-38: Operations Security.",
      "Number": 72,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-38: Operations Security",
      "$id": "TIP_NISTSP80053r4SecurityControlSC38OperationsSecurity"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-39-_1__-hardware-separation/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (1): Hardware Separation.",
      "Number": 73,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-39 (1): Hardware Separation",
      "$id": "TIP_NISTSP80053r4SecurityControlSC391HardwareSeparation"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-39-_2__-thread-isolation/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (2): Thread Isolation.",
      "Number": 74,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-39 (2): Thread Isolation",
      "$id": "TIP_NISTSP80053r4SecurityControlSC392ThreadIsolation"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40_-wireless-link-protection/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40: Wireless Link Protection.",
      "Number": 75,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-40: Wireless Link Protection",
      "$id": "TIP_NISTSP80053r4SecurityControlSC40WirelessLinkProtection"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_1__-electromagnetic-interference/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (1): Electromagnetic Interference.",
      "Number": 76,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-40 (1): Electromagnetic Interference",
      "$id": "TIP_NISTSP80053r4SecurityControlSC401ElectromagneticInterference"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_2__-reduce-detection-potential/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (2): Reduce Detection Potential.",
      "Number": 77,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-40 (2): Reduce Detection Potential",
      "$id": "TIP_NISTSP80053r4SecurityControlSC402ReduceDetectionPotential"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_3__-imitative-or-manipulative-communications-deception/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (3): Imitative or Manipulative Communications Deception.",
      "Number": 78,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-40 (3): Imitative or Manipulative Communications Deception",
      "$id": "TIP_NISTSP80053r4SecurityControlSC403ImitativeorManipulativeCommunicationsDeception"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_4__-signal-parameter-identification/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (4): Signal Parameter Identification.",
      "Number": 79,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-40 (4): Signal Parameter Identification",
      "$id": "TIP_NISTSP80053r4SecurityControlSC404SignalParameterIdentification"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-41_-port-and-i_o-device-access/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-41: Port and I/O Device Access.",
      "Number": 80,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-41: Port and I/O Device Access",
      "$id": "TIP_NISTSP80053r4SecurityControlSC41PortandIODeviceAccess"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-42_-sensor-capability-and-data/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42: Sensor Capability and Data.",
      "Number": 81,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-42: Sensor Capability and Data",
      "$id": "TIP_NISTSP80053r4SecurityControlSC42SensorCapabilityandData"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-42-_1__-reporting-to-authorized-individuals-or-roles/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (1): Reporting to Authorized Individuals or Roles.",
      "Number": 82,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-42 (1): Reporting to Authorized Individuals or Roles",
      "$id": "TIP_NISTSP80053r4SecurityControlSC421ReportingtoAuthorizedIndividualsorRoles"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-42-_2__-authorized-use/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (2): Authorized Use.",
      "Number": 83,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-42 (2): Authorized Use",
      "$id": "TIP_NISTSP80053r4SecurityControlSC422AuthorizedUse"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-42-_3__-prohibit-use-of-devices/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (3): Prohibit Use of Devices.",
      "Number": 84,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-42 (3): Prohibit Use of Devices",
      "$id": "TIP_NISTSP80053r4SecurityControlSC423ProhibitUseofDevices"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-43_-usage-restrictions/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-43: Usage Restrictions.",
      "Number": 85,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-43: Usage Restrictions",
      "$id": "TIP_NISTSP80053r4SecurityControlSC43UsageRestrictions"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-44_-detonation-chambers/4/",
      "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-44: Detonation Chambers.",
      "Number": 86,
      "Version": "4",
      "$Type": "TrustInteroperabilityProfileReference",
      "Name": "NIST SP 800-53 r4 Security Control SC-44: Detonation Chambers",
      "$id": "TIP_NISTSP80053r4SecurityControlSC44DetonationChambers"
    }
  ]},
  "Primary": "false",
  "LegalNotice": "This document and the information contained herein is provided on an \"AS IS\" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
  "$Type": "TrustInteroperabilityProfile"
}