The Criminal Justice Information Services (CJIS) is a division of the Federal Bureau of Investigation (FBI) that provides a centralized system for collecting, storing, and sharing criminal justice information across federal, state, and local law enforcement agencies. Established in 1992, CJIS manages a wide range of databases and systems that support criminal investigations, national security, and public safety.
Establish and maintain formal agreements for sharing Criminal Justice Information (CJI) with external entities.
Document all information exchange agreements with specifics on data handling and security responsibilities.
Implement specific data handling controls as outlined in the information exchange agreements.
Ensure all personnel with access to CJI receive regular security awareness training.
Provide comprehensive security awareness training to all new personnel before granting access to CJI.
Conduct annual refresher security awareness training for all personnel with access to CJI.
Provide role-based security training tailored to the specific responsibilities of different job functions.
Establish and maintain an incident response plan to effectively handle security incidents involving CJI.
Develop a comprehensive written incident response plan that outlines procedures for identifying containing eradicating recovering from and following up on security incidents.
Establish clear procedures for personnel to report suspected or actual security incidents.
Conduct periodic testing of the incident response plan to ensure its effectiveness.
Implement auditing mechanisms to track access to and use of CJI and establish accountability for security actions.
Enable comprehensive audit logging for all systems that process store or transmit CJI.
Establish a process for the regular review and analysis of audit logs.
Ensure that all actions taken on systems containing CJI can be attributed to a specific individual.
Implement controls to limit access to CJI to only authorized personnel on a need-to-know basis.
Implement role-based access control (RBAC) to assign access permissions based on job roles and responsibilities.
Enforce the principle of least privilege by granting users only the minimum level of access required for their job functions.
Implement physical access controls to restrict unauthorized entry to areas where CJI is processed stored or transmitted.
Establish and implement robust identification and authentication mechanisms for accessing CJI.
Assign a unique identifier to each individual with authorized access to CJI.
Enforce strong authentication methods for accessing systems containing CJI.
Implement session management controls to protect against unauthorized access to active user sessions.
Establish and maintain a secure configuration management process for all systems handling CJI.
Establish and document baseline security configurations for all types of systems that process store or transmit CJI.
Implement a formal change control process for all changes to systems containing CJI.
Implement a process for identifying assessing and remediating security vulnerabilities in systems handling CJI.
Implement policies and procedures to protect physical and electronic media containing CJI throughout its lifecycle.
Securely store all physical and electronic media containing CJI in controlled areas with access restricted to authorized personnel.
Establish secure procedures for transporting physical and electronic media containing CJI outside of controlled areas.
Implement procedures for securely sanitizing or destroying media containing CJI when it is no longer needed.
Implement physical security measures to protect the facilities and areas where CJI is processed stored or transmitted.
Control physical access to facilities housing systems that process store or transmit CJI.
Implement security measures to protect workstations and devices used to access CJI.
Maintain appropriate environmental controls (temperature humidity power) in facilities housing CJI systems.
Implement security measures to protect systems and communications networks and ensure the integrity of CJI.
Implement network security controls to protect the communication pathways for CJI.
Deploy and maintain anti-malware software on all systems that process store or transmit CJI.
Implement measures to ensure the accuracy completeness and validity of CJI.
Conduct formal audits to assess compliance with the CJIS Security Policy.
Conduct periodic internal audits to evaluate adherence to CJIS Security Policy requirements.
Undergo external audits as required by the CJIS Security Policy or relevant authorities.
Implement personnel security practices to ensure that individuals with access to CJI are trustworthy and reliable.
Conduct background checks on all personnel prior to granting access to CJI.
Establish and implement procedures for terminating access to CJI upon personnel termination or transfer.
Establish policies and controls for the use of mobile devices that access store or transmit CJI.
Develop and implement a comprehensive policy for the use of mobile devices accessing CJI.
Implement mobile device management (MDM) capabilities to enforce security policies on mobile devices accessing CJI.