<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-system-and-information-integrity---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: System and Information Integrity - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of System and Information Integrity.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Information Integrity</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>System</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI23TimetoRemediateFlawsBenchmarksforCorrectiveActions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-2-_3__-time-to-remediate-flaws-_-benchmarks-for-corrective-actions/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-2 (3): Time to Remediate Flaws / Benchmarks for Corrective Actions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (3): Time to Remediate Flaws / Benchmarks for Corrective Actions.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI25AutomaticSoftwareFirmwareUpdates"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-2-_5__-automatic-software-_-firmware-updates/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-2 (5): Automatic Software / Firmware Updates</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (5): Automatic Software / Firmware Updates.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI26RemovalofPreviousVersionsofSoftwareFirmware"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-2-_6__-removal-of-previous-versions-of-software-_-firmware/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-2 (6): Removal of Previous Versions of Software / Firmware</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (6): Removal of Previous Versions of Software / Firmware.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI34UpdatesOnlybyPrivilegedUsers"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-3-_4__-updates-only-by-privileged-users/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-3 (4): Updates Only by Privileged Users</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (4): Updates Only by Privileged Users.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI36TestingVerification"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-3-_6__-testing-_-verification/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-3 (6): Testing / Verification</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (6): Testing / Verification.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI37NonsignatureBasedDetection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-3-_7__-nonsignature-based-detection/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-3 (7): Nonsignature-Based Detection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (7): Nonsignature-Based Detection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI38DetectUnauthorizedCommands"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-3-_8__-detect-unauthorized-commands/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-3 (8): Detect Unauthorized Commands</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (8): Detect Unauthorized Commands.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI39AuthenticateRemoteCommands"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-3-_9__-authenticate-remote-commands/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-3 (9): Authenticate Remote Commands</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (9): Authenticate Remote Commands.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI310MaliciousCodeAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-3-_10__-malicious-code-analysis/4/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-3 (10): Malicious Code Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (10): Malicious Code Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI41SystemWideIntrusionDetectionSystem"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_1__-system-wide-intrusion-detection-system/4/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (1): System-Wide Intrusion Detection System</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (1): System-Wide Intrusion Detection System.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI43AutomatedToolIntegration"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_3__-automated-tool-integration/4/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (3): Automated Tool Integration</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (3): Automated Tool Integration.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI47AutomatedResponsetoSuspiciousEvents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_7__-automated-response-to-suspicious-events/4/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (7): Automated Response to Suspicious Events</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (7): Automated Response to Suspicious Events.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI49TestingofMonitoringTools"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_9__-testing-of-monitoring-tools/4/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (9): Testing of Monitoring Tools</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (9): Testing of Monitoring Tools.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI410VisibilityofEncryptedCommunications"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_10__-visibility-of-encrypted-communications/4/</tf:Identifier><tf:Number>14</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (10): Visibility of Encrypted Communications</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (10): Visibility of Encrypted Communications.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI411AnalyzeCommunicationsTrafficAnomalies"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_11__-analyze-communications-traffic-anomalies/4/</tf:Identifier><tf:Number>15</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (11): Analyze Communications Traffic Anomalies</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (11): Analyze Communications Traffic Anomalies.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI412AutomatedAlerts"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_12__-automated-alerts/4/</tf:Identifier><tf:Number>16</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (12): Automated Alerts</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (12): Automated Alerts.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI413AnalyzeTrafficEventPatterns"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_13__-analyze-traffic-_-event-patterns/4/</tf:Identifier><tf:Number>17</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (13): Analyze Traffic / Event Patterns</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (13): Analyze Traffic / Event Patterns.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI414WirelessIntrusionDetection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_14__-wireless-intrusion-detection/4/</tf:Identifier><tf:Number>18</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (14): Wireless Intrusion Detection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (14): Wireless Intrusion Detection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI415WirelesstoWirelineCommunications"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_15__-wireless-to-wireline-communications/4/</tf:Identifier><tf:Number>19</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (15): Wireless to Wireline Communications</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (15): Wireless to Wireline Communications.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI416CorrelateMonitoringInformation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_16__-correlate-monitoring-information/4/</tf:Identifier><tf:Number>20</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (16): Correlate Monitoring Information</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (16): Correlate Monitoring Information.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI417IntegratedSituationalAwareness"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_17__-integrated-situational-awareness/4/</tf:Identifier><tf:Number>21</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (17): Integrated Situational Awareness</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (17): Integrated Situational Awareness.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI418AnalyzeTrafficCovertExfiltration"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_18__-analyze-traffic-_-covert-exfiltration/4/</tf:Identifier><tf:Number>22</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (18): Analyze Traffic / Covert Exfiltration</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (18): Analyze Traffic / Covert Exfiltration.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI419IndividualsPosingGreaterRisk"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_19__-individuals-posing-greater-risk/4/</tf:Identifier><tf:Number>23</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (19): Individuals Posing Greater Risk</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (19): Individuals Posing Greater Risk.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI420PrivilegedUsers"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_20__-privileged-users/4/</tf:Identifier><tf:Number>24</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (20): Privileged Users</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (20): Privileged Users.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI421ProbationaryPeriods"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_21__-probationary-periods/4/</tf:Identifier><tf:Number>25</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (21): Probationary Periods</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (21): Probationary Periods.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI422UnauthorizedNetworkServices"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_22__-unauthorized-network-services/4/</tf:Identifier><tf:Number>26</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (22): Unauthorized Network Services</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (22): Unauthorized Network Services.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI423HostBasedDevices"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_23__-host-based-devices/4/</tf:Identifier><tf:Number>27</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (23): Host-Based Devices</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (23): Host-Based Devices.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI424IndicatorsofCompromise"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-4-_24__-indicators-of-compromise/4/</tf:Identifier><tf:Number>28</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-4 (24): Indicators of Compromise</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (24): Indicators of Compromise.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI62AutomationSupportforDistributedTesting"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-6-_2__-automation-support-for-distributed-testing/4/</tf:Identifier><tf:Number>29</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-6 (2): Automation Support for Distributed Testing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-6 (2): Automation Support for Distributed Testing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI63ReportVerificationResults"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-6-_3__-report-verification-results/4/</tf:Identifier><tf:Number>30</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-6 (3): Report Verification Results</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-6 (3): Report Verification Results.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI73CentrallyManagedIntegrityTools"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_3__-centrally-managed-integrity-tools/4/</tf:Identifier><tf:Number>31</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (3): Centrally-Managed Integrity Tools</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (3): Centrally-Managed Integrity Tools.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI76CryptographicProtection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_6__-cryptographic-protection/4/</tf:Identifier><tf:Number>32</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (6): Cryptographic Protection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (6): Cryptographic Protection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI78AuditingCapabilityforSignificantEvents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_8__-auditing-capability-for-significant-events/4/</tf:Identifier><tf:Number>33</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (8): Auditing Capability for Significant Events</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (8): Auditing Capability for Significant Events.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI79VerifyBootProcess"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_9__-verify-boot-process/4/</tf:Identifier><tf:Number>34</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (9): Verify Boot Process</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (9): Verify Boot Process.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI710ProtectionofBootFirmware"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_10__-protection-of-boot-firmware/4/</tf:Identifier><tf:Number>35</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (10): Protection of Boot Firmware</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (10): Protection of Boot Firmware.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI711ConfinedEnvironmentswithLimitedPrivileges"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_11__-confined-environments-with-limited-privileges/4/</tf:Identifier><tf:Number>36</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (11): Confined Environments with Limited Privileges</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (11): Confined Environments with Limited Privileges.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI712IntegrityVerification"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_12__-integrity-verification/4/</tf:Identifier><tf:Number>37</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (12): Integrity Verification</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (12): Integrity Verification.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI713CodeExecutioninProtectedEnvironments"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_13__-code-execution-in-protected-environments/4/</tf:Identifier><tf:Number>38</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (13): Code Execution in Protected Environments</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (13): Code Execution in Protected Environments.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI715CodeAuthentication"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_15__-code-authentication/4/</tf:Identifier><tf:Number>39</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (15): Code Authentication</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (15): Code Authentication.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI716TimeLimitonProcessExecutionWOSupervision"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-7-_16__-time-limit-on-process-execution-w_o-supervision/4/</tf:Identifier><tf:Number>40</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-7 (16): Time Limit on Process Execution W/O Supervision</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (16): Time Limit on Process Execution W/O Supervision.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI83ContinuousLearningCapability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-8-_3__-continuous-learning-capability/4/</tf:Identifier><tf:Number>41</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-8 (3): Continuous Learning Capability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-8 (3): Continuous Learning Capability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI101ManualOverrideCapability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-10-_1__-manual-override-capability/4/</tf:Identifier><tf:Number>42</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-10 (1): Manual Override Capability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-10 (1): Manual Override Capability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI102ReviewResolutionofErrors"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-10-_2__-review-_-resolution-of-errors/4/</tf:Identifier><tf:Number>43</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-10 (2): Review / Resolution of Errors</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-10 (2): Review / Resolution of Errors.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI103PredictableBehavior"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-10-_3__-predictable-behavior/4/</tf:Identifier><tf:Number>44</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-10 (3): Predictable Behavior</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-10 (3): Predictable Behavior.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI104ReviewTimingInteractions"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-10-_4__-review-_-timing-interactions/4/</tf:Identifier><tf:Number>45</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-10 (4): Review / Timing Interactions</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-10 (4): Review / Timing Interactions.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI105RestrictInputstoTrustedSourcesandApprovedFormats"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-10-_5__-restrict-inputs-to-trusted-sources-and-approved-formats/4/</tf:Identifier><tf:Number>46</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-10 (5): Restrict Inputs to Trusted Sources and Approved Formats</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-10 (5): Restrict Inputs to Trusted Sources and Approved Formats.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI13PredictableFailurePrevention"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-13_-predictable-failure-prevention/4/</tf:Identifier><tf:Number>47</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-13: Predictable Failure Prevention</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-13: Predictable Failure Prevention.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI131TransferringComponentResponsibilities"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-13-_1__-transferring-component-responsibilities/4/</tf:Identifier><tf:Number>48</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-13 (1): Transferring Component Responsibilities</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-13 (1): Transferring Component Responsibilities.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI133ManualTransferBetweenComponents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-13-_3__-manual-transfer-between-components/4/</tf:Identifier><tf:Number>49</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-13 (3): Manual Transfer Between Components</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-13 (3): Manual Transfer Between Components.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI134StandbyComponentInstallationNotification"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-13-_4__-standby-component-installation-_-notification/4/</tf:Identifier><tf:Number>50</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-13 (4): Standby Component Installation / Notification</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-13 (4): Standby Component Installation / Notification.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI135FailoverCapability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-13-_5__-failover-capability/4/</tf:Identifier><tf:Number>51</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-13 (5): Failover Capability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-13 (5): Failover Capability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI14NonPersistence"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-14_-non-persistence/4/</tf:Identifier><tf:Number>52</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-14: Non-Persistence</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-14: Non-Persistence.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI141RefreshfromTrustedSources"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-14-_1__-refresh-from-trusted-sources/4/</tf:Identifier><tf:Number>53</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-14 (1): Refresh from Trusted Sources</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-14 (1): Refresh from Trusted Sources.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI15InformationOutputFiltering"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-15_-information-output-filtering/4/</tf:Identifier><tf:Number>54</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-15: Information Output Filtering</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-15: Information Output Filtering.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSI17FailSafeProcedures"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-si-17_-fail-safe-procedures/4/</tf:Identifier><tf:Number>55</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SI-17: Fail-Safe Procedures</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-17: Fail-Safe Procedures.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlSI23TimetoRemediateFlawsBenchmarksforCorrectiveActions and TIP_NISTSP80053r4SecurityControlSI25AutomaticSoftwareFirmwareUpdates and TIP_NISTSP80053r4SecurityControlSI26RemovalofPreviousVersionsofSoftwareFirmware and TIP_NISTSP80053r4SecurityControlSI34UpdatesOnlybyPrivilegedUsers and TIP_NISTSP80053r4SecurityControlSI36TestingVerification and TIP_NISTSP80053r4SecurityControlSI37NonsignatureBasedDetection and TIP_NISTSP80053r4SecurityControlSI38DetectUnauthorizedCommands and TIP_NISTSP80053r4SecurityControlSI39AuthenticateRemoteCommands and TIP_NISTSP80053r4SecurityControlSI310MaliciousCodeAnalysis and TIP_NISTSP80053r4SecurityControlSI41SystemWideIntrusionDetectionSystem and TIP_NISTSP80053r4SecurityControlSI43AutomatedToolIntegration and TIP_NISTSP80053r4SecurityControlSI47AutomatedResponsetoSuspiciousEvents and TIP_NISTSP80053r4SecurityControlSI49TestingofMonitoringTools and TIP_NISTSP80053r4SecurityControlSI410VisibilityofEncryptedCommunications and TIP_NISTSP80053r4SecurityControlSI411AnalyzeCommunicationsTrafficAnomalies and TIP_NISTSP80053r4SecurityControlSI412AutomatedAlerts and TIP_NISTSP80053r4SecurityControlSI413AnalyzeTrafficEventPatterns and TIP_NISTSP80053r4SecurityControlSI414WirelessIntrusionDetection and TIP_NISTSP80053r4SecurityControlSI415WirelesstoWirelineCommunications and TIP_NISTSP80053r4SecurityControlSI416CorrelateMonitoringInformation and TIP_NISTSP80053r4SecurityControlSI417IntegratedSituationalAwareness and TIP_NISTSP80053r4SecurityControlSI418AnalyzeTrafficCovertExfiltration and TIP_NISTSP80053r4SecurityControlSI419IndividualsPosingGreaterRisk and TIP_NISTSP80053r4SecurityControlSI420PrivilegedUsers and TIP_NISTSP80053r4SecurityControlSI421ProbationaryPeriods and TIP_NISTSP80053r4SecurityControlSI422UnauthorizedNetworkServices and TIP_NISTSP80053r4SecurityControlSI423HostBasedDevices and TIP_NISTSP80053r4SecurityControlSI424IndicatorsofCompromise and TIP_NISTSP80053r4SecurityControlSI62AutomationSupportforDistributedTesting and TIP_NISTSP80053r4SecurityControlSI63ReportVerificationResults and TIP_NISTSP80053r4SecurityControlSI73CentrallyManagedIntegrityTools and TIP_NISTSP80053r4SecurityControlSI76CryptographicProtection and TIP_NISTSP80053r4SecurityControlSI78AuditingCapabilityforSignificantEvents and TIP_NISTSP80053r4SecurityControlSI79VerifyBootProcess and TIP_NISTSP80053r4SecurityControlSI710ProtectionofBootFirmware and TIP_NISTSP80053r4SecurityControlSI711ConfinedEnvironmentswithLimitedPrivileges and TIP_NISTSP80053r4SecurityControlSI712IntegrityVerification and TIP_NISTSP80053r4SecurityControlSI713CodeExecutioninProtectedEnvironments and TIP_NISTSP80053r4SecurityControlSI715CodeAuthentication and TIP_NISTSP80053r4SecurityControlSI716TimeLimitonProcessExecutionWOSupervision and TIP_NISTSP80053r4SecurityControlSI83ContinuousLearningCapability and TIP_NISTSP80053r4SecurityControlSI101ManualOverrideCapability and TIP_NISTSP80053r4SecurityControlSI102ReviewResolutionofErrors and TIP_NISTSP80053r4SecurityControlSI103PredictableBehavior and TIP_NISTSP80053r4SecurityControlSI104ReviewTimingInteractions and TIP_NISTSP80053r4SecurityControlSI105RestrictInputstoTrustedSourcesandApprovedFormats and TIP_NISTSP80053r4SecurityControlSI13PredictableFailurePrevention and TIP_NISTSP80053r4SecurityControlSI131TransferringComponentResponsibilities and TIP_NISTSP80053r4SecurityControlSI133ManualTransferBetweenComponents and TIP_NISTSP80053r4SecurityControlSI134StandbyComponentInstallationNotification and TIP_NISTSP80053r4SecurityControlSI135FailoverCapability and TIP_NISTSP80053r4SecurityControlSI14NonPersistence and TIP_NISTSP80053r4SecurityControlSI141RefreshfromTrustedSources and TIP_NISTSP80053r4SecurityControlSI15InformationOutputFiltering and TIP_NISTSP80053r4SecurityControlSI17FailSafeProcedures]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>