1. Access Control
Organizations must have controls in place to ensure that only authorized individuals are able to access CJI. This includes controls for managing user accounts and passwords, as well as for logging access attempts.
2. Information Exchange Agreements
Organizations must have written agreements in place with any other organizations that will be exchanging CJI with them. These agreements must specify the types of information that will be shared, as well as the security measures that will be in place to protect the information.
3. Personnel Security
Organizations must take steps to ensure the security of their personnel who handle CJI. This includes background checks, security training, and ongoing monitoring of employee activities.
4. Physical Security
Organizations must have physical security measures in place to protect their CJI from unauthorized access or theft. This includes secure storage areas, locked doors, and surveillance systems.
5. Auditing and Accountability
Organizations must track all activities involving CJI and retain logs of these activities for a period of time specified by the CJIS Security Policy. This allows organizations to audit their systems for compliance with the policy and investigate any incidents that may occur.
6. Media Protection
Organizations must take steps to protect any media (e.g., disks, tapes, hard drives) on which CJI is stored from unauthorized access or destruction. This includes using locked storage areas and implementing data backup and disaster recovery plans.
7. Incident Response
Organizations must have procedures in place for responding to any incidents that may occur involving their CJI systems. This includes notifying the appropriate authorities and taking steps to mitigate any damage that may have been done.
8. Identification and Authentication
Organizations must use strong authentication methods (e.g., passwords, and biometric scans) to ensure that only authorized individuals are able to access their CJI systems.
9. Configuration Management
Organizations must use configuration management tools to track and manage all changes made to their CJI systems. This allows organizations to quickly identify any unauthorized changes that may have been made and take corrective action.
10. Systems and Communications Protection and Information Integrity
Organizations must use security features (e.g., firewalls, and antivirus software) to protect their CJI systems from unauthorized access or destruction. They must also use data encryption technologies to protect the information itself from being accessed or modified by unauthorized individuals.
11. Formal Audits
Organizations must periodically conduct formal audits of their CJI systems to ensure compliance with the CJIS Security Policy. These audits must be conducted by an independent third party and should include a review of all security controls that are in place.
12. Security Awareness Training
Organizations must provide security awareness training to all personnel who have access to CJI. This training should cover the requirements of the CJIS Security Policy and the procedures that must be followed when handling CJI.
13. Mobile Devices
Organizations must take steps to secure any mobile devices (e.g., laptops, smartphones) that are used to access or store CJI. This includes using data encryption technologies and requiring strong authentication methods for access.
14. Telecommuting
Organizations must take steps to secure any CJI that is accessed or stored by telecommuters. This includes using data encryption technologies and requiring strong authentication methods for access.
15. Cloud Computing
Organizations must take steps to secure any CJI that is stored in the cloud. This includes use of data encryption technologies and requiring strong authentication methods for access.