<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pm-4_-plan-of-action-and-milestones-process/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 Security Control PM-4: Plan of Action and Milestones Process</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-4: Plan of Action and Milestones Process.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Action</tf:Keyword><tf:Keyword>Milestones Process</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>Plan</tf:Keyword><tf:Keyword>Program Management</tf:Keyword><tf:Keyword>Security</tf:Keyword></tf:Keywords><tf:References><tf:TrustmarkDefinitionRequirement tf:id="TD_ref1"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---residual-risk-documentation---individuals/1.0/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>Plan of Action and Milestones Process - Residual Risk Documentation - Individuals</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems document the remedial information security actions to adequately respond to risk to individuals.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref2"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---residual-risk-documentation---other-organizations/1.0/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>Plan of Action and Milestones Process - Residual Risk Documentation - Other Organizations</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems document the remedial information security actions to adequately respond to risk to other organizations.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref3"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---residual-risk-documentation---organizational-assets/1.0/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>Plan of Action and Milestones Process - Residual Risk Documentation - Organizational Assets</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems document the remedial information security actions to adequately respond to risk to organizational assets.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref4"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---review---organization-wide-priorities/1.0/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>Plan of Action and Milestones Process - Review - Organization-Wide Priorities</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization reviews plans of action and milestones for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref5"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---security-program-poam-maintenance/1.0/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>Plan of Action and Milestones Process - Security Program POAM Maintenance</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are maintained.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref6"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---review---organizational-risk-management-strategy/1.0/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>Plan of Action and Milestones Process - Review - Organizational Risk Management Strategy</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization reviews plans of action and milestones for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref7"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---residual-risk-documentation---organizational-operations/1.0/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>Plan of Action and Milestones Process - Residual Risk Documentation - Organizational Operations</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems document the remedial information security actions to adequately respond to risk to organizational operations.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref8"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---security-program-poam-development/1.0/</tf:Identifier><tf:Number>8</tf:Number><tf:Name>Plan of Action and Milestones Process - Security Program POAM Development</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are developed.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref9"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process/1.0/</tf:Identifier><tf:Number>9</tf:Number><tf:Name>Plan of Action and Milestones Process</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are reported in accordance with U.S. Office of Management and Budget (OMB) Federal Information Security Modernization Act (FISMA) reporting requirements.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref10"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/plan-of-action-and-milestones-process---residual-risk-documentation---the-nation/1.0/</tf:Identifier><tf:Number>10</tf:Number><tf:Name>Plan of Action and Milestones Process - Residual Risk Documentation - The Nation</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems document the remedial information security actions to adequately respond to risk to the Nation.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement></tf:References><tf:TrustExpression><![CDATA[TD_ref1 and TD_ref2 and TD_ref3 and TD_ref4 and TD_ref5 and TD_ref6 and TD_ref7 and TD_ref8 and TD_ref9 and TD_ref10]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>