{
  "$TMF_VERSION": "1.4",
  "PublicationDateTime": "2021-04-26T00:00:00.000Z",
  "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-10: Software Usage Restrictions. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.",
  "Keywords": [
    "800-53",
    "Configuration Management",
    "High",
    "Low",
    "Moderate",
    "NIST",
    "P2",
    "Security",
    "Software Usage Restrictions"
  ],
  "Issuer": {
    "Identifier": "https://trustmarkinitiative.org/",
    "PrimaryContact": {
      "Email": "help@trustmarkinitiative.org",
      "Telephone": "555-555-5555",
      "Kind": "PRIMARY",
      "WebsiteURL": "https://trustmarkinitiative.org/",
      "Responder": ""
    },
    "Name": "TMI"
  },
  "Sources": [{
    "Identifier": "SP800-53R4",
    "Reference": "NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at <a href=\"http://dx.doi.org/10.6028/NIST.SP.800-53r4\">http://dx.doi.org/10.6028/NIST.SP.800-53r4<\/a>.",
    "$id": "source-2112165102"
  }],
  "Name": "NIST SP 800-53 r4 Security Control CM-10: Software Usage Restrictions",
  "TrustExpression": "TD_ref1 and TD_ref2 and TD_ref3",
  "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-cm-10_-software-usage-restrictions/4/",
  "Version": "4",
  "References": {"TrustmarkDefinitionRequirements": [
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/tracking-of-quantity-licensed-software-and-documentation/1.0/",
      "Description": "Defines conformance and assessment criteria for compliance with minimum security requirements for tracking of quantity licensed software and documentation as related to overall configuration management requirements.",
      "Number": 1,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/tracking-of-quantity-licensed-software-and-documentation/1.0/",
        "Description": "Defines conformance and assessment criteria for compliance with minimum security requirements for tracking of quantity licensed software and documentation as related to overall configuration management requirements.",
        "Number": 1,
        "Version": "1.0",
        "Name": "Tracking of Quantity Licensed Software and Documentation"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Tracking of Quantity Licensed Software and Documentation",
      "$id": "TD_ref1"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/software-usage-in-compliance-with-contracts-and-copyrights/1.0/",
      "Description": "Defines conformance and assessment criteria for compliance with minimum security requirements for software usage in compliance with contracts and copyrights as related to overall configuration management requirements.",
      "Number": 2,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/software-usage-in-compliance-with-contracts-and-copyrights/1.0/",
        "Description": "Defines conformance and assessment criteria for compliance with minimum security requirements for software usage in compliance with contracts and copyrights as related to overall configuration management requirements.",
        "Number": 2,
        "Version": "1.0",
        "Name": "Software Usage In Compliance with Contracts and Copyrights"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Software Usage In Compliance with Contracts and Copyrights",
      "$id": "TD_ref2"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/control-and-documentation-of-peer-to-peer-file-sharing/1.0/",
      "Description": "Defines conformance and assessment criteria for compliance with minimum security requirements for control and documentation of peer-to-peer file sharing as related to overall configuration management requirements.",
      "Number": 3,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/control-and-documentation-of-peer-to-peer-file-sharing/1.0/",
        "Description": "Defines conformance and assessment criteria for compliance with minimum security requirements for control and documentation of peer-to-peer file sharing as related to overall configuration management requirements.",
        "Number": 3,
        "Version": "1.0",
        "Name": "Control and Documentation of Peer-To-Peer File Sharing"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Control and Documentation of Peer-To-Peer File Sharing",
      "$id": "TD_ref3"
    }
  ]},
  "Primary": "false",
  "LegalNotice": "This document and the information contained herein is provided on an \"AS IS\" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
  "$Type": "TrustInteroperabilityProfile"
}