<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustInteroperabilityProfile xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-18_-mobile-code/4/</tf:Identifier><tf:Name>NIST SP 800-53 r4 Security Control SC-18: Mobile Code</tf:Name><tf:Version>4</tf:Version><tf:Description>Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18: Mobile Code. Applicable to MODERATE impact and HIGH impact systems.</tf:Description><tf:PublicationDateTime>2021-04-26T00:00:00.000Z</tf:PublicationDateTime><tf:Primary>false</tf:Primary><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Issuer><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>TMI</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Responder></tf:Responder><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>555-555-5555</tf:Telephone><tf:WebsiteURL>https://trustmarkinitiative.org/</tf:WebsiteURL></tf:Contact></tf:Issuer><tf:Keywords><tf:Keyword>800-53</tf:Keyword><tf:Keyword>Communications Protection</tf:Keyword><tf:Keyword>High</tf:Keyword><tf:Keyword>Mobile Code</tf:Keyword><tf:Keyword>Moderate</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>P2</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>System</tf:Keyword></tf:Keywords><tf:References><tf:TrustmarkDefinitionRequirement tf:id="TD_ref1"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/mobile-code---implementation-guidance/1.0/</tf:Identifier><tf:Number>1</tf:Number><tf:Name>Mobile Code - Implementation Guidance</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization establishes implementation guidance for acceptable mobile code and mobile code technologies.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref2"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/mobile-code---use-is-controlled/1.0/</tf:Identifier><tf:Number>2</tf:Number><tf:Name>Mobile Code - Use Is Controlled</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization controls the use of mobile code within the information system.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref3"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/mobile-code---usage-restrictions/1.0/</tf:Identifier><tf:Number>3</tf:Number><tf:Name>Mobile Code - Usage Restrictions</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization establishes usage restrictions for acceptable mobile code and mobile code technologies.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref4"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/mobile-code---unacceptable-mobile-code-defined/1.0/</tf:Identifier><tf:Number>4</tf:Number><tf:Name>Mobile Code - Unacceptable Mobile Code Defined</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization defines unacceptable mobile code and mobile code technologies.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref5"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/mobile-code---use-is-authorized/1.0/</tf:Identifier><tf:Number>5</tf:Number><tf:Name>Mobile Code - Use Is Authorized</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization authorizes the use of mobile code within the information system.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref6"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/mobile-code---use-is-monitored/1.0/</tf:Identifier><tf:Number>6</tf:Number><tf:Name>Mobile Code - Use Is Monitored</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization monitors the use of mobile code within the information system.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement><tf:TrustmarkDefinitionRequirement tf:id="TD_ref7"><tf:TrustmarkDefinitionReference><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/mobile-code---acceptable-mobile-code-defined/1.0/</tf:Identifier><tf:Number>7</tf:Number><tf:Name>Mobile Code - Acceptable Mobile Code Defined</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for verifying that an organization defines acceptable mobile code and mobile code technologies.</tf:Description></tf:TrustmarkDefinitionReference></tf:TrustmarkDefinitionRequirement></tf:References><tf:TrustExpression><![CDATA[TD_ref1 and TD_ref2 and TD_ref3 and TD_ref4 and TD_ref5 and TD_ref6 and TD_ref7]]></tf:TrustExpression><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources></tf:TrustInteroperabilityProfile>