<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-system-and-communications-protection---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: System and Communications Protection - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of System and Communications Protection.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Communications Protection</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>System</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC21InterfacesforNonPrivilegedUsers"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-2-_1__-interfaces-for-non-privileged-users/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-2 (1): Interfaces for Non-Privileged Users</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-2 (1): Interfaces for Non-Privileged Users.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC31HardwareSeparation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_1__-hardware-separation/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-3 (1): Hardware Separation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (1): Hardware Separation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC32AccessFlowControlFunctions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_2__-access-_-flow-control-functions/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-3 (2): Access / Flow Control Functions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (2): Access / Flow Control Functions.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC33MinimizeNonsecurityFunctionality"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_3__-minimize-nonsecurity-functionality/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-3 (3): Minimize Nonsecurity Functionality</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (3): Minimize Nonsecurity Functionality.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC34ModuleCouplingandCohesiveness"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_4__-module-coupling-and-cohesiveness/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-3 (4): Module Coupling and Cohesiveness</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (4): Module Coupling and Cohesiveness.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC35LayeredStructures"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-3-_5__-layered-structures/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-3 (5): Layered Structures</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (5): Layered Structures.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC42PeriodsProcessing"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-4-_2__-periods-processing/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-4 (2): Periods Processing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-4 (2): Periods Processing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC51RestrictInternalUsers"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-5-_1__-restrict-internal-users/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-5 (1): Restrict Internal Users</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (1): Restrict Internal Users.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC52ExcessCapacityBandwidthRedundancy"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-5-_2__-excess-capacity-_-bandwidth-_-redundancy/4/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-5 (2): Excess Capacity / Bandwidth / Redundancy</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (2): Excess Capacity / Bandwidth / Redundancy.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC53DetectionMonitoring"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-5-_3__-detection-_-monitoring/4/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-5 (3): Detection / Monitoring</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-5 (3): Detection / Monitoring.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC6ResourceAvailability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-6_-resource-availability/4/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-6: Resource Availability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-6: Resource Availability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC79RestrictThreateningOutgoingCommunicationsTraffic"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_9__-restrict-threatening-outgoing-communications-traffic/4/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (9): Restrict Threatening Outgoing Communications Traffic</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (9): Restrict Threatening Outgoing Communications Traffic.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC710PreventUnauthorizedExfiltration"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_10__-prevent-unauthorized-exfiltration/4/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (10): Prevent Unauthorized Exfiltration</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (10): Prevent Unauthorized Exfiltration.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC711RestrictIncomingCommunicationsTraffic"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_11__-restrict-incoming-communications-traffic/4/</tf:Identifier><tf:Number>14</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (11): Restrict Incoming Communications Traffic</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (11): Restrict Incoming Communications Traffic.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC712HostBasedProtection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_12__-host-based-protection/4/</tf:Identifier><tf:Number>15</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (12): Host-Based Protection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (12): Host-Based Protection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC713IsolationofSecurityToolsMechanismsSupportComponents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_13__-isolation-of-security-tools-_-mechanisms-_-support-components/4/</tf:Identifier><tf:Number>16</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (13): Isolation of Security Tools / Mechanisms / Support Components</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (13): Isolation of Security Tools / Mechanisms / Support Components.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC714ProtectsAgainstUnauthorizedPhysicalConnections"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_14__-protects-against-unauthorized-physical-connections/4/</tf:Identifier><tf:Number>17</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (14): Protects Against Unauthorized Physical Connections</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (14): Protects Against Unauthorized Physical Connections.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC715RoutePrivilegedNetworkAccesses"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_15__-route-privileged-network-accesses/4/</tf:Identifier><tf:Number>18</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (15): Route Privileged Network Accesses</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (15): Route Privileged Network Accesses.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC716PreventDiscoveryofComponentsDevices"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_16__-prevent-discovery-of-components-_-devices/4/</tf:Identifier><tf:Number>19</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (16): Prevent Discovery of Components / Devices</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (16): Prevent Discovery of Components / Devices.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC717AutomatedEnforcementofProtocolFormats"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_17__-automated-enforcement-of-protocol-formats/4/</tf:Identifier><tf:Number>20</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (17): Automated Enforcement of Protocol Formats</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (17): Automated Enforcement of Protocol Formats.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC719BlocksCommunicationfromNonOrganizationallyConfiguredHosts"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_19__-blocks-communication-from-non-organizationally-configured-hosts/4/</tf:Identifier><tf:Number>21</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (19): Blocks Communication from Non-Organizationally Configured Hosts</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (19): Blocks Communication from Non-Organizationally Configured Hosts.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC720DynamicIsolationSegregation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_20__-dynamic-isolation-_-segregation/4/</tf:Identifier><tf:Number>22</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (20): Dynamic Isolation / Segregation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (20): Dynamic Isolation / Segregation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC722SeparateSubnetsforConnectingtoDifferentSecurityDomains"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_22__-separate-subnets-for-connecting-to-different-security-domains/4/</tf:Identifier><tf:Number>23</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (22): Separate Subnets for Connecting to Different Security Domains</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (22): Separate Subnets for Connecting to Different Security Domains.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC723DisableSenderFeedbackonProtocolValidationFailure"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_23__-disable-sender-feedback-on-protocol-validation-failure/4/</tf:Identifier><tf:Number>24</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-7 (23): Disable Sender Feedback on Protocol Validation Failure</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (23): Disable Sender Feedback on Protocol Validation Failure.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC82PrePostTransmissionHandling"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-8-_2__-pre-_-post-transmission-handling/4/</tf:Identifier><tf:Number>25</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-8 (2): Pre / Post Transmission Handling</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (2): Pre / Post Transmission Handling.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC83CryptographicProtectionforMessageExternals"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-8-_3__-cryptographic-protection-for-message-externals/4/</tf:Identifier><tf:Number>26</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-8 (3): Cryptographic Protection for Message Externals</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (3): Cryptographic Protection for Message Externals.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC84ConcealRandomizeCommunications"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-8-_4__-conceal-_-randomize-communications/4/</tf:Identifier><tf:Number>27</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-8 (4): Conceal / Randomize Communications</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-8 (4): Conceal / Randomize Communications.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC11TrustedPath"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-11_-trusted-path/4/</tf:Identifier><tf:Number>28</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-11: Trusted Path</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11: Trusted Path.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC111LogicalIsolation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-11-_1__-logical-isolation/4/</tf:Identifier><tf:Number>29</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-11 (1): Logical Isolation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11 (1): Logical Isolation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC122SymmetricKeys"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-12-_2__-symmetric-keys/4/</tf:Identifier><tf:Number>30</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-12 (2): Symmetric Keys</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (2): Symmetric Keys.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC123AsymmetricKeys"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-12-_3__-asymmetric-keys/4/</tf:Identifier><tf:Number>31</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-12 (3): Asymmetric Keys</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (3): Asymmetric Keys.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC151PhysicalDisconnect"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-15-_1__-physical-disconnect/4/</tf:Identifier><tf:Number>32</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-15 (1): Physical Disconnect</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (1): Physical Disconnect.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC153DisablingRemovalinSecureWorkAreas"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-15-_3__-disabling-_-removal-in-secure-work-areas/4/</tf:Identifier><tf:Number>33</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-15 (3): Disabling / Removal in Secure Work Areas</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (3): Disabling / Removal in Secure Work Areas.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC154ExplicitlyIndicateCurrentParticipants"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-15-_4__-explicitly-indicate-current-participants/4/</tf:Identifier><tf:Number>34</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-15 (4): Explicitly Indicate Current Participants</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (4): Explicitly Indicate Current Participants.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC16TransmissionofSecurityAttributes"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-16_-transmission-of-security-attributes/4/</tf:Identifier><tf:Number>35</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-16: Transmission of Security Attributes</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16: Transmission of Security Attributes.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC161IntegrityValidation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-16-_1__-integrity-validation/4/</tf:Identifier><tf:Number>36</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-16 (1): Integrity Validation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16 (1): Integrity Validation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC181IdentifyUnacceptableCodeTakeCorrectiveActions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_1__-identify-unacceptable-code-_-take-corrective-actions/4/</tf:Identifier><tf:Number>37</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-18 (1): Identify Unacceptable Code / Take Corrective Actions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (1): Identify Unacceptable Code / Take Corrective Actions.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC182AcquisitionDevelopmentUse"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_2__-acquisition-_-development-_-use/4/</tf:Identifier><tf:Number>38</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-18 (2): Acquisition / Development / Use</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (2): Acquisition / Development / Use.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC183PreventDownloadingExecution"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_3__-prevent-downloading-_-execution/4/</tf:Identifier><tf:Number>39</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-18 (3): Prevent Downloading / Execution</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (3): Prevent Downloading / Execution.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC184PreventAutomaticExecution"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_4__-prevent-automatic-execution/4/</tf:Identifier><tf:Number>40</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-18 (4): Prevent Automatic Execution</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (4): Prevent Automatic Execution.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC185AllowExecutionOnlyinConfinedEnvironments"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18-_5__-allow-execution-only-in-confined-environments/4/</tf:Identifier><tf:Number>41</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-18 (5): Allow Execution Only in Confined Environments</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (5): Allow Execution Only in Confined Environments.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC202DataOriginIntegrity"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-20-_2__-data-origin-_-integrity/4/</tf:Identifier><tf:Number>42</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-20 (2): Data Origin / Integrity</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-20 (2): Data Origin / Integrity.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC231InvalidateSessionIdentifiersatLogout"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-23-_1__-invalidate-session-identifiers-at-logout/4/</tf:Identifier><tf:Number>43</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-23 (1): Invalidate Session Identifiers at Logout</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (1): Invalidate Session Identifiers at Logout.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC233UniqueSessionIdentifierswithRandomization"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-23-_3__-unique-session-identifiers-with-randomization/4/</tf:Identifier><tf:Number>44</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-23 (3): Unique Session Identifiers with Randomization</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (3): Unique Session Identifiers with Randomization.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC235AllowedCertificateAuthorities"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-23-_5__-allowed-certificate-authorities/4/</tf:Identifier><tf:Number>45</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-23 (5): Allowed Certificate Authorities</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (5): Allowed Certificate Authorities.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC25ThinNodes"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-25_-thin-nodes/4/</tf:Identifier><tf:Number>46</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-25: Thin Nodes</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-25: Thin Nodes.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC26Honeypots"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-26_-honeypots/4/</tf:Identifier><tf:Number>47</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-26: Honeypots</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-26: Honeypots.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC27PlatformIndependentApplications"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-27_-platform-independent-applications/4/</tf:Identifier><tf:Number>48</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-27: Platform-Independent Applications</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-27: Platform-Independent Applications.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC281CryptographicProtection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-28-_1__-cryptographic-protection/4/</tf:Identifier><tf:Number>49</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-28 (1): Cryptographic Protection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (1): Cryptographic Protection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC282OffLineStorage"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-28-_2__-off-line-storage/4/</tf:Identifier><tf:Number>50</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-28 (2): Off-Line Storage</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (2): Off-Line Storage.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC29Heterogeneity"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-29_-heterogeneity/4/</tf:Identifier><tf:Number>51</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-29: Heterogeneity</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29: Heterogeneity.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC291VirtualizationTechniques"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-29-_1__-virtualization-techniques/4/</tf:Identifier><tf:Number>52</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-29 (1): Virtualization Techniques</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29 (1): Virtualization Techniques.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC30ConcealmentandMisdirection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30_-concealment-and-misdirection/4/</tf:Identifier><tf:Number>53</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-30: Concealment and Misdirection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30: Concealment and Misdirection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC302Randomness"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30-_2__-randomness/4/</tf:Identifier><tf:Number>54</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-30 (2): Randomness</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (2): Randomness.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC303ChangeProcessingStorageLocations"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30-_3__-change-processing-_-storage-locations/4/</tf:Identifier><tf:Number>55</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-30 (3): Change Processing / Storage Locations</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (3): Change Processing / Storage Locations.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC304MisleadingInformation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30-_4__-misleading-information/4/</tf:Identifier><tf:Number>56</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-30 (4): Misleading Information</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (4): Misleading Information.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC305ConcealmentofSystemComponents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-30-_5__-concealment-of-system-components/4/</tf:Identifier><tf:Number>57</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-30 (5): Concealment of System Components</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (5): Concealment of System Components.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC31CovertChannelAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-31_-covert-channel-analysis/4/</tf:Identifier><tf:Number>58</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-31: Covert Channel Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31: Covert Channel Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC311TestCovertChannelsforExploitability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-31-_1__-test-covert-channels-for-exploitability/4/</tf:Identifier><tf:Number>59</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-31 (1): Test Covert Channels for Exploitability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (1): Test Covert Channels for Exploitability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC312MaximumBandwidth"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-31-_2__-maximum-bandwidth/4/</tf:Identifier><tf:Number>60</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-31 (2): Maximum Bandwidth</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (2): Maximum Bandwidth.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC313MeasureBandwidthinOperationalEnvironments"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-31-_3__-measure-bandwidth-in-operational-environments/4/</tf:Identifier><tf:Number>61</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-31 (3): Measure Bandwidth in Operational Environments</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (3): Measure Bandwidth in Operational Environments.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC32InformationSystemPartitioning"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-32_-information-system-partitioning/4/</tf:Identifier><tf:Number>62</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-32: Information System Partitioning</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-32: Information System Partitioning.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC34NonModifiableExecutablePrograms"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34_-non-modifiable-executable-programs/4/</tf:Identifier><tf:Number>63</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-34: Non-Modifiable Executable Programs</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34: Non-Modifiable Executable Programs.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC341NoWritableStorage"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34-_1__-no-writable-storage/4/</tf:Identifier><tf:Number>64</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-34 (1): No Writable Storage</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (1): No Writable Storage.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC342IntegrityProtectionReadOnlyMedia"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34-_2__-integrity-protection-_-read-only-media/4/</tf:Identifier><tf:Number>65</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-34 (2): Integrity Protection / Read-Only Media</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (2): Integrity Protection / Read-Only Media.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC343HardwareBasedProtection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34-_3__-hardware-based-protection/4/</tf:Identifier><tf:Number>66</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-34 (3): Hardware-Based Protection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (3): Hardware-Based Protection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC35Honeyclients"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-35_-honeyclients/4/</tf:Identifier><tf:Number>67</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-35: Honeyclients</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-35: Honeyclients.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC36DistributedProcessingandStorage"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-36_-distributed-processing-and-storage/4/</tf:Identifier><tf:Number>68</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-36: Distributed Processing and Storage</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36: Distributed Processing and Storage.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC361PollingTechniques"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-36-_1__-polling-techniques/4/</tf:Identifier><tf:Number>69</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-36 (1): Polling Techniques</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36 (1): Polling Techniques.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC37OutOfBandChannels"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-37_-out-of-band-channels/4/</tf:Identifier><tf:Number>70</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-37: Out-Of-Band Channels</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37: Out-Of-Band Channels.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC371EnsureDeliveryTransmission"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-37-_1__-ensure-delivery-_-transmission/4/</tf:Identifier><tf:Number>71</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-37 (1): Ensure Delivery / Transmission</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37 (1): Ensure Delivery / Transmission.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC38OperationsSecurity"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-38_-operations-security/4/</tf:Identifier><tf:Number>72</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-38: Operations Security</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-38: Operations Security.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC391HardwareSeparation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-39-_1__-hardware-separation/4/</tf:Identifier><tf:Number>73</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-39 (1): Hardware Separation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (1): Hardware Separation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC392ThreadIsolation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-39-_2__-thread-isolation/4/</tf:Identifier><tf:Number>74</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-39 (2): Thread Isolation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (2): Thread Isolation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC40WirelessLinkProtection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40_-wireless-link-protection/4/</tf:Identifier><tf:Number>75</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-40: Wireless Link Protection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40: Wireless Link Protection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC401ElectromagneticInterference"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_1__-electromagnetic-interference/4/</tf:Identifier><tf:Number>76</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-40 (1): Electromagnetic Interference</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (1): Electromagnetic Interference.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC402ReduceDetectionPotential"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_2__-reduce-detection-potential/4/</tf:Identifier><tf:Number>77</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-40 (2): Reduce Detection Potential</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (2): Reduce Detection Potential.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC403ImitativeorManipulativeCommunicationsDeception"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_3__-imitative-or-manipulative-communications-deception/4/</tf:Identifier><tf:Number>78</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-40 (3): Imitative or Manipulative Communications Deception</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (3): Imitative or Manipulative Communications Deception.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC404SignalParameterIdentification"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_4__-signal-parameter-identification/4/</tf:Identifier><tf:Number>79</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-40 (4): Signal Parameter Identification</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (4): Signal Parameter Identification.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC41PortandIODeviceAccess"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-41_-port-and-i_o-device-access/4/</tf:Identifier><tf:Number>80</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-41: Port and I/O Device Access</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-41: Port and I/O Device Access.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC42SensorCapabilityandData"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-42_-sensor-capability-and-data/4/</tf:Identifier><tf:Number>81</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-42: Sensor Capability and Data</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42: Sensor Capability and Data.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC421ReportingtoAuthorizedIndividualsorRoles"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-42-_1__-reporting-to-authorized-individuals-or-roles/4/</tf:Identifier><tf:Number>82</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-42 (1): Reporting to Authorized Individuals or Roles</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (1): Reporting to Authorized Individuals or Roles.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC422AuthorizedUse"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-42-_2__-authorized-use/4/</tf:Identifier><tf:Number>83</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-42 (2): Authorized Use</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (2): Authorized Use.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC423ProhibitUseofDevices"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-42-_3__-prohibit-use-of-devices/4/</tf:Identifier><tf:Number>84</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-42 (3): Prohibit Use of Devices</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (3): Prohibit Use of Devices.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC43UsageRestrictions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-43_-usage-restrictions/4/</tf:Identifier><tf:Number>85</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-43: Usage Restrictions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-43: Usage Restrictions.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSC44DetonationChambers"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-44_-detonation-chambers/4/</tf:Identifier><tf:Number>86</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SC-44: Detonation Chambers</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-44: Detonation Chambers.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlSC21InterfacesforNonPrivilegedUsers and TIP_NISTSP80053r4SecurityControlSC31HardwareSeparation and TIP_NISTSP80053r4SecurityControlSC32AccessFlowControlFunctions and TIP_NISTSP80053r4SecurityControlSC33MinimizeNonsecurityFunctionality and TIP_NISTSP80053r4SecurityControlSC34ModuleCouplingandCohesiveness and TIP_NISTSP80053r4SecurityControlSC35LayeredStructures and TIP_NISTSP80053r4SecurityControlSC42PeriodsProcessing and TIP_NISTSP80053r4SecurityControlSC51RestrictInternalUsers and TIP_NISTSP80053r4SecurityControlSC52ExcessCapacityBandwidthRedundancy and TIP_NISTSP80053r4SecurityControlSC53DetectionMonitoring and TIP_NISTSP80053r4SecurityControlSC6ResourceAvailability and TIP_NISTSP80053r4SecurityControlSC79RestrictThreateningOutgoingCommunicationsTraffic and TIP_NISTSP80053r4SecurityControlSC710PreventUnauthorizedExfiltration and TIP_NISTSP80053r4SecurityControlSC711RestrictIncomingCommunicationsTraffic and TIP_NISTSP80053r4SecurityControlSC712HostBasedProtection and TIP_NISTSP80053r4SecurityControlSC713IsolationofSecurityToolsMechanismsSupportComponents and TIP_NISTSP80053r4SecurityControlSC714ProtectsAgainstUnauthorizedPhysicalConnections and TIP_NISTSP80053r4SecurityControlSC715RoutePrivilegedNetworkAccesses and TIP_NISTSP80053r4SecurityControlSC716PreventDiscoveryofComponentsDevices and TIP_NISTSP80053r4SecurityControlSC717AutomatedEnforcementofProtocolFormats and TIP_NISTSP80053r4SecurityControlSC719BlocksCommunicationfromNonOrganizationallyConfiguredHosts and TIP_NISTSP80053r4SecurityControlSC720DynamicIsolationSegregation and TIP_NISTSP80053r4SecurityControlSC722SeparateSubnetsforConnectingtoDifferentSecurityDomains and TIP_NISTSP80053r4SecurityControlSC723DisableSenderFeedbackonProtocolValidationFailure and TIP_NISTSP80053r4SecurityControlSC82PrePostTransmissionHandling and TIP_NISTSP80053r4SecurityControlSC83CryptographicProtectionforMessageExternals and TIP_NISTSP80053r4SecurityControlSC84ConcealRandomizeCommunications and TIP_NISTSP80053r4SecurityControlSC11TrustedPath and TIP_NISTSP80053r4SecurityControlSC111LogicalIsolation and TIP_NISTSP80053r4SecurityControlSC122SymmetricKeys and TIP_NISTSP80053r4SecurityControlSC123AsymmetricKeys and TIP_NISTSP80053r4SecurityControlSC151PhysicalDisconnect and TIP_NISTSP80053r4SecurityControlSC153DisablingRemovalinSecureWorkAreas and TIP_NISTSP80053r4SecurityControlSC154ExplicitlyIndicateCurrentParticipants and TIP_NISTSP80053r4SecurityControlSC16TransmissionofSecurityAttributes and TIP_NISTSP80053r4SecurityControlSC161IntegrityValidation and TIP_NISTSP80053r4SecurityControlSC181IdentifyUnacceptableCodeTakeCorrectiveActions and TIP_NISTSP80053r4SecurityControlSC182AcquisitionDevelopmentUse and TIP_NISTSP80053r4SecurityControlSC183PreventDownloadingExecution and TIP_NISTSP80053r4SecurityControlSC184PreventAutomaticExecution and TIP_NISTSP80053r4SecurityControlSC185AllowExecutionOnlyinConfinedEnvironments and TIP_NISTSP80053r4SecurityControlSC202DataOriginIntegrity and TIP_NISTSP80053r4SecurityControlSC231InvalidateSessionIdentifiersatLogout and TIP_NISTSP80053r4SecurityControlSC233UniqueSessionIdentifierswithRandomization and TIP_NISTSP80053r4SecurityControlSC235AllowedCertificateAuthorities and TIP_NISTSP80053r4SecurityControlSC25ThinNodes and TIP_NISTSP80053r4SecurityControlSC26Honeypots and TIP_NISTSP80053r4SecurityControlSC27PlatformIndependentApplications and TIP_NISTSP80053r4SecurityControlSC281CryptographicProtection and TIP_NISTSP80053r4SecurityControlSC282OffLineStorage and TIP_NISTSP80053r4SecurityControlSC29Heterogeneity and TIP_NISTSP80053r4SecurityControlSC291VirtualizationTechniques and TIP_NISTSP80053r4SecurityControlSC30ConcealmentandMisdirection and TIP_NISTSP80053r4SecurityControlSC302Randomness and TIP_NISTSP80053r4SecurityControlSC303ChangeProcessingStorageLocations and TIP_NISTSP80053r4SecurityControlSC304MisleadingInformation and TIP_NISTSP80053r4SecurityControlSC305ConcealmentofSystemComponents and TIP_NISTSP80053r4SecurityControlSC31CovertChannelAnalysis and TIP_NISTSP80053r4SecurityControlSC311TestCovertChannelsforExploitability and TIP_NISTSP80053r4SecurityControlSC312MaximumBandwidth and TIP_NISTSP80053r4SecurityControlSC313MeasureBandwidthinOperationalEnvironments and TIP_NISTSP80053r4SecurityControlSC32InformationSystemPartitioning and TIP_NISTSP80053r4SecurityControlSC34NonModifiableExecutablePrograms and TIP_NISTSP80053r4SecurityControlSC341NoWritableStorage and TIP_NISTSP80053r4SecurityControlSC342IntegrityProtectionReadOnlyMedia and TIP_NISTSP80053r4SecurityControlSC343HardwareBasedProtection and TIP_NISTSP80053r4SecurityControlSC35Honeyclients and TIP_NISTSP80053r4SecurityControlSC36DistributedProcessingandStorage and TIP_NISTSP80053r4SecurityControlSC361PollingTechniques and TIP_NISTSP80053r4SecurityControlSC37OutOfBandChannels and TIP_NISTSP80053r4SecurityControlSC371EnsureDeliveryTransmission and TIP_NISTSP80053r4SecurityControlSC38OperationsSecurity and TIP_NISTSP80053r4SecurityControlSC391HardwareSeparation and TIP_NISTSP80053r4SecurityControlSC392ThreadIsolation and TIP_NISTSP80053r4SecurityControlSC40WirelessLinkProtection and TIP_NISTSP80053r4SecurityControlSC401ElectromagneticInterference and TIP_NISTSP80053r4SecurityControlSC402ReduceDetectionPotential and TIP_NISTSP80053r4SecurityControlSC403ImitativeorManipulativeCommunicationsDeception and TIP_NISTSP80053r4SecurityControlSC404SignalParameterIdentification and TIP_NISTSP80053r4SecurityControlSC41PortandIODeviceAccess and TIP_NISTSP80053r4SecurityControlSC42SensorCapabilityandData and TIP_NISTSP80053r4SecurityControlSC421ReportingtoAuthorizedIndividualsorRoles and TIP_NISTSP80053r4SecurityControlSC422AuthorizedUse and TIP_NISTSP80053r4SecurityControlSC423ProhibitUseofDevices and TIP_NISTSP80053r4SecurityControlSC43UsageRestrictions and TIP_NISTSP80053r4SecurityControlSC44DetonationChambers]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>