<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4---security-control-family_-system-and-services-acquisition---supplemental-controls/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 - Security Control Family: System and Services Acquisition - Supplemental Controls</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to all supplemental security controls in NIST Special Publication 800-53, r4, under the control family of System and Services Acquisition.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Services Acquisition</tf:Keyword><tf:Keyword>System</tf:Keyword><tf:Keyword>Supplemental</tf:Keyword></tf:Keywords><tf:References><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA43DevelopmentMethodsTechniquesPractices"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-4-_3__-development-methods-_-techniques-_-practices/4/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-4 (3): Development Methods / Techniques / Practices</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (3): Development Methods / Techniques / Practices.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA45SystemComponentServiceConfigurations"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-4-_5__-system-_-component-_-service-configurations/4/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-4 (5): System / Component / Service Configurations</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (5): System / Component / Service Configurations.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA46UseofInformationAssuranceProducts"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-4-_6__-use-of-information-assurance-products/4/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-4 (6): Use of Information Assurance Products</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (6): Use of Information Assurance Products.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA47NIAPApprovedProtectionProfiles"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-4-_7__-niap-approved-protection-profiles/4/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-4 (7): NIAP-Approved Protection Profiles</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (7): NIAP-Approved Protection Profiles.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA48ContinuousMonitoringPlan"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-4-_8__-continuous-monitoring-plan/4/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-4 (8): Continuous Monitoring Plan</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (8): Continuous Monitoring Plan.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA91RiskAssessmentsOrganizationalApprovals"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-9-_1__-risk-assessments-_-organizational-approvals/4/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-9 (1): Risk Assessments / Organizational Approvals</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (1): Risk Assessments / Organizational Approvals.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA93EstablishMaintainTrustRelationshipwithProviders"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-9-_3__-establish-_-maintain-trust-relationship-with-providers/4/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-9 (3): Establish / Maintain Trust Relationship with Providers</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (3): Establish / Maintain Trust Relationship with Providers.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA94ConsistentInterestsofConsumersandProviders"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-9-_4__-consistent-interests-of-consumers-and-providers/4/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-9 (4): Consistent Interests of Consumers and Providers</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (4): Consistent Interests of Consumers and Providers.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA95ProcessingStorageandServiceLocation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-9-_5__-processing_-storage_-and-service-location/4/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-9 (5): Processing, Storage, and Service Location</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (5): Processing, Storage, and Service Location.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA101SoftwareFirmwareIntegrityVerification"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-10-_1__-software-_-firmware-integrity-verification/4/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-10 (1): Software / Firmware Integrity Verification</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-10 (1): Software / Firmware Integrity Verification.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA102AlternativeConfigurationManagementProcesses"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-10-_2__-alternative-configuration-management-processes/4/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-10 (2): Alternative Configuration Management Processes</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-10 (2): Alternative Configuration Management Processes.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA103HardwareIntegrityVerification"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-10-_3__-hardware-integrity-verification/4/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-10 (3): Hardware Integrity Verification</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-10 (3): Hardware Integrity Verification.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA104TrustedGeneration"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-10-_4__-trusted-generation/4/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-10 (4): Trusted Generation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-10 (4): Trusted Generation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA105MappingIntegrityforVersionControl"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-10-_5__-mapping-integrity-for-version-control/4/</tf:Identifier><tf:Number>14</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-10 (5): Mapping Integrity for Version Control</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-10 (5): Mapping Integrity for Version Control.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA106TrustedDistribution"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-10-_6__-trusted-distribution/4/</tf:Identifier><tf:Number>15</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-10 (6): Trusted Distribution</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-10 (6): Trusted Distribution.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA111StaticCodeAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-11-_1__-static-code-analysis/4/</tf:Identifier><tf:Number>16</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-11 (1): Static Code Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-11 (1): Static Code Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA112ThreatandVulnerabilityAnalyses"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-11-_2__-threat-and-vulnerability-analyses/4/</tf:Identifier><tf:Number>17</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-11 (2): Threat and Vulnerability Analyses</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-11 (2): Threat and Vulnerability Analyses.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA113IndependentVerificationofAssessmentPlansEvidence"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-11-_3__-independent-verification-of-assessment-plans-_-evidence/4/</tf:Identifier><tf:Number>18</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-11 (3): Independent Verification of Assessment Plans / Evidence</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-11 (3): Independent Verification of Assessment Plans / Evidence.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA114ManualCodeReviews"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-11-_4__-manual-code-reviews/4/</tf:Identifier><tf:Number>19</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-11 (4): Manual Code Reviews</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-11 (4): Manual Code Reviews.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA115PenetrationTesting"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-11-_5__-penetration-testing/4/</tf:Identifier><tf:Number>20</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-11 (5): Penetration Testing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-11 (5): Penetration Testing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA116AttackSurfaceReviews"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-11-_6__-attack-surface-reviews/4/</tf:Identifier><tf:Number>21</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-11 (6): Attack Surface Reviews</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-11 (6): Attack Surface Reviews.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA117VerifyScopeofTestingEvaluation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-11-_7__-verify-scope-of-testing-_-evaluation/4/</tf:Identifier><tf:Number>22</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-11 (7): Verify Scope of Testing / Evaluation</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-11 (7): Verify Scope of Testing / Evaluation.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA118DynamicCodeAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-11-_8__-dynamic-code-analysis/4/</tf:Identifier><tf:Number>23</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-11 (8): Dynamic Code Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-11 (8): Dynamic Code Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA121AcquisitionStrategiesToolsMethods"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_1__-acquisition-strategies-_-tools-_-methods/4/</tf:Identifier><tf:Number>24</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (1): Acquisition Strategies / Tools / Methods</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (1): Acquisition Strategies / Tools / Methods.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA122SupplierReviews"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_2__-supplier-reviews/4/</tf:Identifier><tf:Number>25</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (2): Supplier Reviews</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (2): Supplier Reviews.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA125LimitationofHarm"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_5__-limitation-of-harm/4/</tf:Identifier><tf:Number>26</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (5): Limitation of Harm</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (5): Limitation of Harm.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA127AssessmentsPriortoSelectionAcceptanceUpdate"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_7__-assessments-prior-to-selection-_-acceptance-_-update/4/</tf:Identifier><tf:Number>27</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (7): Assessments Prior to Selection / Acceptance / Update</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (7): Assessments Prior to Selection / Acceptance / Update.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA128UseofAllSourceIntelligence"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_8__-use-of-all-source-intelligence/4/</tf:Identifier><tf:Number>28</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (8): Use of All-Source Intelligence</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (8): Use of All-Source Intelligence.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA129OperationsSecurity"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_9__-operations-security/4/</tf:Identifier><tf:Number>29</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (9): Operations Security</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (9): Operations Security.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA1210ValidateasGenuineandNotAltered"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_10__-validate-as-genuine-and-not-altered/4/</tf:Identifier><tf:Number>30</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (10): Validate as Genuine and Not Altered</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (10): Validate as Genuine and Not Altered.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA1211PenetrationTestingAnalysisofElementsProcessesandActors"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_11__-penetration-testing-_-analysis-of-elements_-processes_-and-actors/4/</tf:Identifier><tf:Number>31</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (11): Penetration Testing / Analysis of Elements, Processes, and Actors</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (11): Penetration Testing / Analysis of Elements, Processes, and Actors.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA1212InterOrganizationalAgreements"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_12__-inter-organizational-agreements/4/</tf:Identifier><tf:Number>32</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (12): Inter-Organizational Agreements</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (12): Inter-Organizational Agreements.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA1213CriticalInformationSystemComponents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_13__-critical-information-system-components/4/</tf:Identifier><tf:Number>33</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (13): Critical Information System Components</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (13): Critical Information System Components.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA1214IdentityandTraceability"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_14__-identity-and-traceability/4/</tf:Identifier><tf:Number>34</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (14): Identity and Traceability</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (14): Identity and Traceability.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA1215ProcessestoAddressWeaknessesorDeficiencies"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-12-_15__-processes-to-address-weaknesses-or-deficiencies/4/</tf:Identifier><tf:Number>35</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-12 (15): Processes to Address Weaknesses or Deficiencies</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (15): Processes to Address Weaknesses or Deficiencies.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA13Trustworthiness"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-13_-trustworthiness/4/</tf:Identifier><tf:Number>36</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-13: Trustworthiness</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-13: Trustworthiness.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA14CriticalityAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-14_-criticality-analysis/4/</tf:Identifier><tf:Number>37</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-14: Criticality Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-14: Criticality Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA151QualityMetrics"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_1__-quality-metrics/4/</tf:Identifier><tf:Number>38</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (1): Quality Metrics</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (1): Quality Metrics.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA152SecurityTrackingTools"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_2__-security-tracking-tools/4/</tf:Identifier><tf:Number>39</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (2): Security Tracking Tools</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (2): Security Tracking Tools.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA153CriticalityAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_3__-criticality-analysis/4/</tf:Identifier><tf:Number>40</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (3): Criticality Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (3): Criticality Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA154ThreatModelingVulnerabilityAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_4__-threat-modeling-_-vulnerability-analysis/4/</tf:Identifier><tf:Number>41</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (4): Threat Modeling / Vulnerability Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (4): Threat Modeling / Vulnerability Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA155AttackSurfaceReduction"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_5__-attack-surface-reduction/4/</tf:Identifier><tf:Number>42</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (5): Attack Surface Reduction</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (5): Attack Surface Reduction.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA156ContinuousImprovement"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_6__-continuous-improvement/4/</tf:Identifier><tf:Number>43</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (6): Continuous Improvement</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (6): Continuous Improvement.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA157AutomatedVulnerabilityAnalysis"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_7__-automated-vulnerability-analysis/4/</tf:Identifier><tf:Number>44</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (7): Automated Vulnerability Analysis</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (7): Automated Vulnerability Analysis.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA158ReuseofThreatVulnerabilityInformation"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_8__-reuse-of-threat-_-vulnerability-information/4/</tf:Identifier><tf:Number>45</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (8): Reuse of Threat / Vulnerability Information</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (8): Reuse of Threat / Vulnerability Information.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA159UseofLiveData"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_9__-use-of-live-data/4/</tf:Identifier><tf:Number>46</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (9): Use of Live Data</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (9): Use of Live Data.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA1510IncidentResponsePlan"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_10__-incident-response-plan/4/</tf:Identifier><tf:Number>47</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (10): Incident Response Plan</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (10): Incident Response Plan.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA1511ArchiveInformationSystemComponent"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_11__-archive-information-system-_-component/4/</tf:Identifier><tf:Number>48</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-15 (11): Archive Information System / Component</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (11): Archive Information System / Component.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA171FormalPolicyModel"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-17-_1__-formal-policy-model/4/</tf:Identifier><tf:Number>49</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-17 (1): Formal Policy Model</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (1): Formal Policy Model.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA172SecurityRelevantComponents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-17-_2__-security-relevant-components/4/</tf:Identifier><tf:Number>50</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-17 (2): Security-Relevant Components</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (2): Security-Relevant Components.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA173FormalCorrespondence"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-17-_3__-formal-correspondence/4/</tf:Identifier><tf:Number>51</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-17 (3): Formal Correspondence</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (3): Formal Correspondence.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA174InformalCorrespondence"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-17-_4__-informal-correspondence/4/</tf:Identifier><tf:Number>52</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-17 (4): Informal Correspondence</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (4): Informal Correspondence.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA175ConceptuallySimpleDesign"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-17-_5__-conceptually-simple-design/4/</tf:Identifier><tf:Number>53</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-17 (5): Conceptually Simple Design</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (5): Conceptually Simple Design.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA176StructureforTesting"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-17-_6__-structure-for-testing/4/</tf:Identifier><tf:Number>54</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-17 (6): Structure for Testing</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (6): Structure for Testing.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA177StructureforLeastPrivilege"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-17-_7__-structure-for-least-privilege/4/</tf:Identifier><tf:Number>55</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-17 (7): Structure for Least Privilege</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (7): Structure for Least Privilege.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA18TamperResistanceandDetection"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-18_-tamper-resistance-and-detection/4/</tf:Identifier><tf:Number>56</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-18: Tamper Resistance and Detection</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18: Tamper Resistance and Detection.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA181MultiplePhasesofSDLC"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-18-_1__-multiple-phases-of-sdlc/4/</tf:Identifier><tf:Number>57</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-18 (1): Multiple Phases of SDLC</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18 (1): Multiple Phases of SDLC.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA182InspectionofInformationSystemsComponentsorDevices"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-18-_2__-inspection-of-information-systems_-components_-or-devices/4/</tf:Identifier><tf:Number>58</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-18 (2): Inspection of Information Systems, Components, or Devices</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18 (2): Inspection of Information Systems, Components, or Devices.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA19ComponentAuthenticity"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-19_-component-authenticity/4/</tf:Identifier><tf:Number>59</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-19: Component Authenticity</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19: Component Authenticity.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA191AntiCounterfeitTraining"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-19-_1__-anti-counterfeit-training/4/</tf:Identifier><tf:Number>60</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-19 (1): Anti-Counterfeit Training</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (1): Anti-Counterfeit Training.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA192ConfigurationControlforComponentServiceRepair"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-19-_2__-configuration-control-for-component-service-_-repair/4/</tf:Identifier><tf:Number>61</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-19 (2): Configuration Control for Component Service / Repair</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (2): Configuration Control for Component Service / Repair.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA193ComponentDisposal"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-19-_3__-component-disposal/4/</tf:Identifier><tf:Number>62</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-19 (3): Component Disposal</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (3): Component Disposal.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA194AntiCounterfeitScanning"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-19-_4__-anti-counterfeit-scanning/4/</tf:Identifier><tf:Number>63</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-19 (4): Anti-Counterfeit Scanning</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (4): Anti-Counterfeit Scanning.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA20CustomizedDevelopmentofCriticalComponents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-20_-customized-development-of-critical-components/4/</tf:Identifier><tf:Number>64</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-20: Customized Development of Critical Components</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-20: Customized Development of Critical Components.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA21DeveloperScreening"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-21_-developer-screening/4/</tf:Identifier><tf:Number>65</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-21: Developer Screening</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-21: Developer Screening.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA211ValidationofScreening"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-21-_1__-validation-of-screening/4/</tf:Identifier><tf:Number>66</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-21 (1): Validation of Screening</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-21 (1): Validation of Screening.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA22UnsupportedSystemComponents"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-22_-unsupported-system-components/4/</tf:Identifier><tf:Number>67</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-22: Unsupported System Components</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-22: Unsupported System Components.</tf:Description></tf:TrustInteroperabilityProfileReference><tf:TrustInteroperabilityProfileReference tf:id="TIP_NISTSP80053r4SecurityControlSA221AlternativeSourcesforContinuedSupport"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-22-_1__-alternative-sources-for-continued-support/4/</tf:Identifier><tf:Number>68</tf:Number><tf:Name>NIST SP 800-53 r4 Security Control SA-22 (1): Alternative Sources for Continued Support</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-22 (1): Alternative Sources for Continued Support.</tf:Description></tf:TrustInteroperabilityProfileReference></tf:References><tf:TrustExpression><![CDATA[TIP_NISTSP80053r4SecurityControlSA43DevelopmentMethodsTechniquesPractices and TIP_NISTSP80053r4SecurityControlSA45SystemComponentServiceConfigurations and TIP_NISTSP80053r4SecurityControlSA46UseofInformationAssuranceProducts and TIP_NISTSP80053r4SecurityControlSA47NIAPApprovedProtectionProfiles and TIP_NISTSP80053r4SecurityControlSA48ContinuousMonitoringPlan and TIP_NISTSP80053r4SecurityControlSA91RiskAssessmentsOrganizationalApprovals and TIP_NISTSP80053r4SecurityControlSA93EstablishMaintainTrustRelationshipwithProviders and TIP_NISTSP80053r4SecurityControlSA94ConsistentInterestsofConsumersandProviders and TIP_NISTSP80053r4SecurityControlSA95ProcessingStorageandServiceLocation and TIP_NISTSP80053r4SecurityControlSA101SoftwareFirmwareIntegrityVerification and TIP_NISTSP80053r4SecurityControlSA102AlternativeConfigurationManagementProcesses and TIP_NISTSP80053r4SecurityControlSA103HardwareIntegrityVerification and TIP_NISTSP80053r4SecurityControlSA104TrustedGeneration and TIP_NISTSP80053r4SecurityControlSA105MappingIntegrityforVersionControl and TIP_NISTSP80053r4SecurityControlSA106TrustedDistribution and TIP_NISTSP80053r4SecurityControlSA111StaticCodeAnalysis and TIP_NISTSP80053r4SecurityControlSA112ThreatandVulnerabilityAnalyses and TIP_NISTSP80053r4SecurityControlSA113IndependentVerificationofAssessmentPlansEvidence and TIP_NISTSP80053r4SecurityControlSA114ManualCodeReviews and TIP_NISTSP80053r4SecurityControlSA115PenetrationTesting and TIP_NISTSP80053r4SecurityControlSA116AttackSurfaceReviews and TIP_NISTSP80053r4SecurityControlSA117VerifyScopeofTestingEvaluation and TIP_NISTSP80053r4SecurityControlSA118DynamicCodeAnalysis and TIP_NISTSP80053r4SecurityControlSA121AcquisitionStrategiesToolsMethods and TIP_NISTSP80053r4SecurityControlSA122SupplierReviews and TIP_NISTSP80053r4SecurityControlSA125LimitationofHarm and TIP_NISTSP80053r4SecurityControlSA127AssessmentsPriortoSelectionAcceptanceUpdate and TIP_NISTSP80053r4SecurityControlSA128UseofAllSourceIntelligence and TIP_NISTSP80053r4SecurityControlSA129OperationsSecurity and TIP_NISTSP80053r4SecurityControlSA1210ValidateasGenuineandNotAltered and TIP_NISTSP80053r4SecurityControlSA1211PenetrationTestingAnalysisofElementsProcessesandActors and TIP_NISTSP80053r4SecurityControlSA1212InterOrganizationalAgreements and TIP_NISTSP80053r4SecurityControlSA1213CriticalInformationSystemComponents and TIP_NISTSP80053r4SecurityControlSA1214IdentityandTraceability and TIP_NISTSP80053r4SecurityControlSA1215ProcessestoAddressWeaknessesorDeficiencies and TIP_NISTSP80053r4SecurityControlSA13Trustworthiness and TIP_NISTSP80053r4SecurityControlSA14CriticalityAnalysis and TIP_NISTSP80053r4SecurityControlSA151QualityMetrics and TIP_NISTSP80053r4SecurityControlSA152SecurityTrackingTools and TIP_NISTSP80053r4SecurityControlSA153CriticalityAnalysis and TIP_NISTSP80053r4SecurityControlSA154ThreatModelingVulnerabilityAnalysis and TIP_NISTSP80053r4SecurityControlSA155AttackSurfaceReduction and TIP_NISTSP80053r4SecurityControlSA156ContinuousImprovement and TIP_NISTSP80053r4SecurityControlSA157AutomatedVulnerabilityAnalysis and TIP_NISTSP80053r4SecurityControlSA158ReuseofThreatVulnerabilityInformation and TIP_NISTSP80053r4SecurityControlSA159UseofLiveData and TIP_NISTSP80053r4SecurityControlSA1510IncidentResponsePlan and TIP_NISTSP80053r4SecurityControlSA1511ArchiveInformationSystemComponent and TIP_NISTSP80053r4SecurityControlSA171FormalPolicyModel and TIP_NISTSP80053r4SecurityControlSA172SecurityRelevantComponents and TIP_NISTSP80053r4SecurityControlSA173FormalCorrespondence and TIP_NISTSP80053r4SecurityControlSA174InformalCorrespondence and TIP_NISTSP80053r4SecurityControlSA175ConceptuallySimpleDesign and TIP_NISTSP80053r4SecurityControlSA176StructureforTesting and TIP_NISTSP80053r4SecurityControlSA177StructureforLeastPrivilege and TIP_NISTSP80053r4SecurityControlSA18TamperResistanceandDetection and TIP_NISTSP80053r4SecurityControlSA181MultiplePhasesofSDLC and TIP_NISTSP80053r4SecurityControlSA182InspectionofInformationSystemsComponentsorDevices and TIP_NISTSP80053r4SecurityControlSA19ComponentAuthenticity and TIP_NISTSP80053r4SecurityControlSA191AntiCounterfeitTraining and TIP_NISTSP80053r4SecurityControlSA192ConfigurationControlforComponentServiceRepair and TIP_NISTSP80053r4SecurityControlSA193ComponentDisposal and TIP_NISTSP80053r4SecurityControlSA194AntiCounterfeitScanning and TIP_NISTSP80053r4SecurityControlSA20CustomizedDevelopmentofCriticalComponents and TIP_NISTSP80053r4SecurityControlSA21DeveloperScreening and TIP_NISTSP80053r4SecurityControlSA211ValidationofScreening and TIP_NISTSP80053r4SecurityControlSA22UnsupportedSystemComponents and TIP_NISTSP80053r4SecurityControlSA221AlternativeSourcesforContinuedSupport]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>