<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ac-19-_4__-restrictions-for-classified-information/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 Security Control AC-19 (4): Restrictions for Classified Information</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-19 (4): Restrictions for Classified Information.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Access Control</tf:Keyword><tf:Keyword>Classified Information</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Restrictions</tf:Keyword><tf:Keyword>Security</tf:Keyword></tf:Keywords><tf:References><tf:TrustmarkDefinitionRequirement tf:id="TD_ref1"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-for-mobile-devices-_-restrictions-for-u.s.-classified-information-_-random-inspection/1.0/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>Access Control For Mobile Devices | Restrictions For U.S. Classified Information | Random Inspection</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization enforces the following restriction on individuals permitted by the authorizing official to use U.S. Unclassified mobile devices in facilities containing information systems processing, storing, or transmitting U.S. classified information: U.S. Unclassified mobile devices and the information stored on those devices are subject to random reviews and inspections by organization-defined security officials, and if U.S. classified information is found, the incident handling policy is followed.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref2"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-for-mobile-devices-_-restrictions-for-u.s.-classified-information-_-connection-to-u.s.-classified-systems-prohibited/1.0/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>Access Control For Mobile Devices | Restrictions For U.S. Classified Information | Connection to U.S. Classified Systems Prohibited</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization enforces the following restriction on individuals permitted by the authorizing official to use U.S. Unclassified mobile devices in facilities containing information systems processing, storing, or transmitting U.S. classified information: connection of U.S. Unclassified mobile devices to U.S. classified information systems is prohibited.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref3"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-for-mobile-devices-_-restrictions-for-u.s.-classified-information-_-prohibited-without-permission/1.0/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>Access Control For Mobile Devices | Restrictions For U.S. Classified Information | Prohibited without permission</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization prohibits the use of U.S. Unclassified mobile devices in facilities containing information systems processing, storing, or transmitting U.S. classified information unless specifically permitted by the authorizing official.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref4"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-for-mobile-devices-_-restrictions-for-u.s.-classified-information-_-u.s.-classified-devices-restricted-to-u.s.-classified-systems/1.0/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>Access Control For Mobile Devices | Restrictions For U.S. Classified Information | U.S. Classified Devices Restricted to U.S. Classified Systems</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization restricts the connection of U.S. classified mobile devices to U.S. classified information systems in accordance with organization-defined security policies.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref5"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-for-mobile-devices-_-restrictions-for-u.s.-classified-information-_-modem_wireless-use-prohibited/1.0/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>Access Control For Mobile Devices | Restrictions For U.S. Classified Information | Modem/Wireless Use Prohibited</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization enforces the following restriction on individuals permitted by the authorizing official to use U.S. Unclassified mobile devices in facilities containing information systems processing, storing, or transmitting U.S. classified information: use of internal or external modems or wireless interfaces within the U.S. Unclassified mobile devices is prohibited.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref6"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-for-mobile-devices-_-restrictions-for-u.s.-classified-information-_-connection-to-u.s.-unclassified-systems-with-approval/1.0/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>Access Control For Mobile Devices | Restrictions For U.S. Classified Information | Connection to U.S. Unclassified Systems With Approval</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization enforces the following restriction on individuals permitted by the authorizing official to use U.S. Unclassified mobile devices in facilities containing information systems processing, storing, or transmitting U.S. classified information: connection of U.S. Unclassified mobile devices to U.S. Unclassified information systems requires approval from the authorizing official.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement></tf:References><tf:TrustExpression><![CDATA[TD_ref1 and TD_ref2 and TD_ref3 and TD_ref4 and TD_ref5 and TD_ref6]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>