<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pm-1_-information-security-program-plan/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 Security Control PM-1: Information Security Program Plan</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-1: Information Security Program Plan.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Information Security Program Plan</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Program Management</tf:Keyword><tf:Keyword>Security</tf:Keyword></tf:Keywords><tf:References><tf:TrustmarkDefinitionRequirement tf:id="TD_ref1"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---approval-of-risk---the-nation/1.0/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>Information Security Program Plan - Approval of Risk - The Nation</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to the Nation.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref2"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---identification-and-assignment-of-compliance/1.0/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>Information Security Program Plan - Development - Identification and Assignment of Compliance</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that includes the identification and assignment of compliance.
.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref3"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---planned-management-controls/1.0/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>Information Security Program Plan - Development - Planned Management Controls</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that provides a description of the security program management controls planned for meeting the requirements of the information security program.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref4"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---approval-of-risk---organizational-operations/1.0/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>Information Security Program Plan - Approval of Risk - Organizational Operations</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref5"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---protection-from-modification/1.0/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>Information Security Program Plan - Protection From Modification</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization protects the information security program plan from unauthorized modification.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref6"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---requirements/1.0/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>Information Security Program Plan - Development - Requirements</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that provides an overview of the requirements for the security program.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref7"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---identification-and-assignment-of-roles/1.0/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>Information Security Program Plan - Development - Identification and Assignment of Roles</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that includes the identification and assignment of roles.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref8"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---updates-from-implementation/1.0/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>Information Security Program Plan - Updates From Implementation</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization updates the organization-wide information security plan to address organizational changes and problems identified during plan implementation.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref9"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---protection-from-disclosure/1.0/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>Information Security Program Plan - Protection From Disclosure</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization protects the information security program plan from unauthorized disclosure.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref10"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---reviews/1.0/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>Information Security Program Plan - Reviews</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization reviews the organization-wide information security program plan at an organization-defined frequency.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref11"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---management-controls-in-place/1.0/</tf:Identifier><tf:Number>11</tf:Number><tf:Name>Information Security Program Plan - Development - Management Controls In Place</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that provides a description of the security program management controls in place for meeting the requirements of the information security program.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref12"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---reflects-coordination/1.0/</tf:Identifier><tf:Number>12</tf:Number><tf:Name>Information Security Program Plan - Reflects Coordination</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that reflects coordination among organizational entities responsible for the different aspects of information security (i.e., technical, physical, personnel, cyber-physical).</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref13"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---dissemination---requirements/1.0/</tf:Identifier><tf:Number>13</tf:Number><tf:Name>Information Security Program Plan - Dissemination - Requirements</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization disseminates an organization-wide information security program plan.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref14"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---approval-of-risk---other-organizations/1.0/</tf:Identifier><tf:Number>14</tf:Number><tf:Name>Information Security Program Plan - Approval of Risk - Other Organizations</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to other organizations.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref15"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---approval-of-risk---organizational-assets/1.0/</tf:Identifier><tf:Number>15</tf:Number><tf:Name>Information Security Program Plan - Approval of Risk - Organizational Assets</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to organizational assets.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref16"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---identification-and-assignment-of-management-commitment/1.0/</tf:Identifier><tf:Number>16</tf:Number><tf:Name>Information Security Program Plan - Development - Identification and Assignment of Management Commitment</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that includes the identification and assignment of management commitment.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref17"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---identification-and-assignment-of-responsibilities/1.0/</tf:Identifier><tf:Number>17</tf:Number><tf:Name>Information Security Program Plan - Development - Identification and Assignment of Responsibilities</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that includes the identification and assignment of responsibilities.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref18"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---planned-common-controls/1.0/</tf:Identifier><tf:Number>18</tf:Number><tf:Name>Information Security Program Plan - Development - Planned Common Controls</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that provides a description of the common controls planned for meeting the requirements of the information security program.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref19"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---updates-from-assessments/1.0/</tf:Identifier><tf:Number>19</tf:Number><tf:Name>Information Security Program Plan - Updates From Assessments</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization updates the organization-wide information security plan to address organizational changes and problems identified during security control assessments.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref20"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---approval-of-risk---individuals/1.0/</tf:Identifier><tf:Number>20</tf:Number><tf:Name>Information Security Program Plan - Approval of Risk - Individuals</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to individuals.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref21"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---common-controls-in-place/1.0/</tf:Identifier><tf:Number>21</tf:Number><tf:Name>Information Security Program Plan - Development - Common Controls In Place</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that provides a description of the common controls in place for meeting the requirements of the information security program.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref22"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/information-security-program-plan---development---identification-and-assignment-of-coordination/1.0/</tf:Identifier><tf:Number>22</tf:Number><tf:Name>Information Security Program Plan - Development - Identification and Assignment of Coordination</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization develops an organization-wide information security program plan that includes the identification and assignment of coordination among organizational entities.
.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement></tf:References><tf:TrustExpression><![CDATA[TD_ref1 and TD_ref2 and TD_ref3 and TD_ref4 and TD_ref5 and TD_ref6 and TD_ref7 and TD_ref8 and TD_ref9 and TD_ref10 and TD_ref11 and TD_ref12 and TD_ref13 and TD_ref14 and TD_ref15 and TD_ref16 and TD_ref17 and TD_ref18 and TD_ref19 and TD_ref20 and TD_ref21 and TD_ref22]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>