Criminal Justice Information Services (CJIS) Security Policy
Introduction
The purpose of the Criminal Justice Information Services (CJIS) security policy is to ensure the protection of criminal justice information (CJI) until the information is appropriately released or destroyed. This page will list how ScreenConnect™ conforms to the CJIS security policy.
What is Criminal Justice Information (CJI)?
CJI refers to the FBI CJIS-provided data necessary for law enforcement agencies to perform their mission and enforce the laws, information that can include biometric, identity history, person, organization, property, and case/incident history data. CJI also refers to data necessary for civil agencies to perform their mission, including data used to make hiring decisions. The intent of the CJIS Security Policy is to ensure the protection of the aforementioned CJI until the information is 1) released to the public via authorized dissemination (e.g., within a court system, presented in crime reports data, or released in the interest of public safety) and 2) purged or destroyed in accordance with applicable record retention rules.
Note: Following the notes in this document will not guarantee CJI compliance, nor can we give advice or guidelines for achieving CJI compliance. Contact your CJI compliance professional to review your company's compliance status.
Detailed CJIS Requirements and ScreenConnect Compliance
Policy | Requirement | ScreenConnect Solution |
---|---|---|
5.4.1 Auditable Events and Content (Information Systems) | Auditable Events and Content (Information Systems) The agency’s information system shall generate audit records for defined events. These defined events include identifying significant events which need to be audited as relevant to the security of the information system.
The following events shall be logged:
|
|
5.4.1.1.1 Content | The following content shall be included with every audited event:
|
|
5.4.3 Audit Monitoring, Analysis, and Reporting |
The responsible management official shall designate an individual or position to review/analyze information system audit records for indications of inappropriate or unusual activity, investigate suspicious activity or suspected violations, to report findings to appropriate officials, and to take necessary actions. Audit review/analysis shall be conducted at a minimum once a week. |
|
5.4.4 Time Stamps | The agency’s information system shall provide time stamps for use in audit record generation. The time stamps shall include the date and time values generated by the internal system clocks in the audit records. The agency shall synchronize internal information system clocks on an annual basis. |
|
5.4.5 Protection of Audit Information | The agency’s information system shall protect audit information and audit tools from modification, deletion and unauthorized access. |
|
5.5.2 Access Enforcement | Access to the system and contained information. The information system controls shall restrict access to privileged functions (deployed in hardware, software, and firmware) and security-relevant information to explicitly authorized personnel. Access control policies (e.g., identity-based policies, role-based policies, rule based policies) and associated access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) shall be employed by agencies to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the information system.
Agencies shall control access to CJI based on one or more of the following:
|
|
5.5.3 Unsuccessful Login Attempts | Where technically feasible, the system shall enforce a limit of no more than five consecutive invalid access attempts by a user (attempting to access CJI or systems with access to CJI). The system shall automatically lock the account/ node for a 10-minute time period unless released by an administrator. |
|
5.5.4 System Use Information | The information system shall display an approved system use notification message, before granting access, informing potential users of various usages and monitoring rules. |
|
5.5.5 Session Lock | The information system shall prevent further access to the system by initiating a session lock after a maximum of 30 minutes of inactivity, and the session lock remains in effect until the user reestablishes access using appropriate identification and authentication procedures. |
|
5.5.5.6 Remote Access | The agency shall authorize, monitor, and control all methods of remote access to the information system. Remote access is any temporary access to an agency’s information system by a user (or an information system) communicating temporarily through an external, nonagency-controlled network (e.g., the Internet). |
|
5.6.1 Identification Policy and Procedures | Each person who is authorized to store, process, and/or transmit CJI shall be uniquely identified. A unique identification shall also be required for all persons who administer and maintain the system(s) that access CJI or networks leveraged for CJI transit. The unique identification can take the form of a full name, badge number, serial number, or other unique alphanumeric identifier. Agencies shall require users to identify themselves uniquely before the user is allowed to perform any actions on the system. Agencies shall ensure that all user IDs belong to currently authorized users. Identification data shall be kept current by adding new users and disabling and/or deleting former users. |
|
5.6.2 Authentication Policy and Procedures | Each individual’s identity shall be authenticated at either the local agency, CSA, SIB or Channeler level. The authentication strategy shall be part of the agency’s audit for policy compliance. The FBI CJIS Division shall identify and authenticate all individuals who establish direct web-based interactive sessions with FBI CJIS Services. The FBI CJIS Division shall authenticate the ORI of all message-based sessions between the FBI CJIS Division and its customer agencies but will not further authenticate the user nor capture the unique identifier for the originating operator because this function is performed at the local agency, CSA, SIB or Channeler level.
Agencies shall follow the secure password attributes, below, to authenticate an individual’s unique ID. Passwords shall:
The CJIS Security Policy mandates that Advanced Authentication be used to verify user access in certain conditions. Methods cited in the policy include biometric systems, user-based public key infrastructure (PKI), smart cards, software tokens, hardware tokens, paper (inert) tokens, or “Risk-based Authentication” that includes a software token element comprised of a number of factors, such as network information, user information, positive device identification (i.e. device forensics, user pattern analysis and user binding), user profiling, and high-risk challenge/response questions. |
|
5.7.1 Access Restrictions for Changes | Planned or unplanned changes to the hardware, software, and/or firmware components of the information system can have significant effects on the overall security of the system. The goal is to allow only qualified and authorized individuals access to information system components for purposes of initiating changes, including upgrades, and modifications. |
|