CJIS Security Policy v6.0

Control Audit Matrix

An auditor-ready technical reference covering every security control in CJIS Security Policy v6.0, with FBI mandates, required audit evidence, and implementation details.

For the educational narrative guide, see The Public Defender's Guide to CJIS Compliance.

296 Controls
0 Implemented
0 In Progress
Updated February 2026

Compliance Progress

Implemented
0
0% of total
In Progress
0
0% of total
Evaluating
296
100% of total
N/A
0
0% of total
Total
296
controls tracked

By Implementation PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.

P1 91 controls0/91 done (0%)
P2 139 controls0/139 done (0%)
P3 50 controls0/50 done (0%)
P4 16 controls0/16 done (0%)

By Pillar

5.1

Information Exchange Agreements

Pillar 1 · 8 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Formal Agreements
Before exchanging CJI, agencies shall put formal agreements in place that specify security controls.
P1Required NowEvaluating
Compliance Specification
Agreements must specify the security controls and conditions described in the CJIS Security Policy.
P1Required NowEvaluating
Documented Commitment
Agreements shall be supported by documentation committing both parties to the terms of the exchange.
P1Required NowEvaluating
Service Monitoring
Services, reports, and records provided by the service provider shall be regularly monitored and reviewed by the agency.
P1Required NowEvaluating
Visibility (Vulnerabilities & Incidents)
The agency shall maintain sufficient overall control and visibility into security aspects, specifically identifying vulnerabilities and incident reporting.
P1Required NowEvaluating
Incident Response Conformity
The incident reporting/response process used by the provider shall conform to the specifications provided in this Policy.
P1Required NowEvaluating
Change Management
Any changes to services (provisioning, new services) shall be managed by the agency (CJA).
P1Required NowEvaluating
Risk Evaluation
Evaluation of risks to the agency shall be undertaken based on the criticality of the data and impact of the change.
P1Required NowEvaluating
AC

Access Control

Pillar 1 · 40 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate an Access Control policy that addresses purpose, scope, roles, responsibilities, management, coordination, and compliance.
P2Due Oct 2027Evaluating
Account Management
The system must automate/govern the creation, modification, disabling, and removal of accounts. Must support account types (individual, group, system, etc.).
P1Required NowEvaluating
Automated System Account Management
The system must automatically audit account creation, modification, enabling, disabling, and removal actions.
P1Required NowEvaluating
Temporary/Emergency Accounts
The system must automatically remove or disable temporary and emergency accounts after a defined time period (e.g., 72 hours).
P1Required NowEvaluating
Disable Inactive Accounts
The system must disable accounts after a defined period of inactivity (e.g., 90 days).
P1Required NowEvaluating
Automated Audit Actions
The system must automatically audit account actions (create, disable, modify).
P1Required NowEvaluating
Inactivity Logout
The system must automatically log out users after a period of expected inactivity (distinct from session timeout, often refers to specific application inactivity).
P1Required NowEvaluating
High-Risk Disablement
The system must have the capability to disable accounts of high-risk individuals (e.g., terminated hostile employees) immediately.
P1Required NowEvaluating
Access Enforcement
The system must enforce approved authorizations for logical access to information and system resources (ACLs).
P1Required NowEvaluating
Individual Access
The system must limit access to CJI to authorized individuals.
P1Required NowEvaluating
Information Flow Enforcement
The system must enforce approved authorizations for controlling the flow of information within the system and between interconnected systems.
P1Required NowEvaluating
Separation of Duties
The system must separate duties of individuals to prevent malevolent activity without collusion. (e.g., Admin vs. Auditor).
P1Required NowEvaluating
Least Privilege
The system must employ the principle of least privilege, allowing only authorized accesses for users (and processes) which are necessary to accomplish assigned tasks.
P1Required NowEvaluating
Authorize Access to Security Functions
The system must explicitly authorize access to security functions (auditing, account management) to a limited group of personnel.
P1Required NowEvaluating
Non-Privileged Access for Non-Security Functions
The system must require that users of information system accounts, or roles, with access to security functions, use non-privileged accounts or roles, when accessing non-security functions.
P1Required NowEvaluating
Privileged Accounts
The system must restrict the use of privileged accounts to specific authorized personnel and tasks.
P1Required NowEvaluating
Review of User Privileges
The system must review user privileges annually to ensure they are still necessary and aligned with the principle of least privilege.
P1Required NowEvaluating
Log Use of Privileged Functions
The system must audit the execution of privileged functions.
P1Required NowEvaluating
Prohibit Non-Privileged Execution
The system must prevent non-privileged users from executing privileged functions.
P1Required NowEvaluating
Unsuccessful Logon Attempts
The system must lock the account after 5 consecutive invalid logon attempts within 15 minutes and automatically lock the account/delay the next login.
P3Required NowEvaluating
System Use Notification
The system must display a privacy warning message before granting access (on the login screen).
P2Required NowEvaluating
Device Lock
The system (or OS) must lock the device/session after a period of inactivity.
P4Due Oct 2027Evaluating
Pattern-Hiding Displays
The system must conceal information on the display when the device is locked (e.g., no CJI in the screensaver).
P4Required NowEvaluating
Session Termination
The system must automatically terminate a user session after a defined condition (e.g., inactivity).
P3Due Oct 2027Evaluating
Permitted Actions without ID
The system must identify specific user actions that can be performed without identification/authentication (e.g., reading the warning banner) and document them.
P4Due Oct 2027Evaluating
Remote Access
The system must authorize, monitor, and control all remote access connections.
P1Required NowEvaluating
Automated Monitoring / Control
The system must monitor and control remote access methods.
P1Required NowEvaluating
Encryption (Confidentiality/Integrity)
The system must use encryption (FIPS 140) to protect the confidentiality and integrity of remote access sessions.
P1Required NowEvaluating
Managed Access Control Points
The system must route all remote access through managed control points (e.g., Jump Host, VPN Gateway, Load Balancer).
P1Required NowEvaluating
Privileged Commands via Remote Access
The system must authorize the execution of privileged commands via remote access only for compelling operational needs and document the rationale.
P1Required NowEvaluating
Wireless Access
The system must protect wireless access to the information system (if applicable).
P2Required NowEvaluating
Wireless Authentication & Encryption
The system must enforce strong authentication and encryption for wireless access.
P2Required NowEvaluating
Disable Wireless Networking
The system must disable wireless networking capabilities when not intended for use (e.g., on servers).
P2Required NowEvaluating
Access Control for Mobile Devices
The system must establish usage restrictions and implementation guidance for mobile devices.
P2Required NowEvaluating
Full Device / Container Encryption
The system must employ full-device encryption or container-based encryption for mobile devices.
P2Required NowEvaluating
Use of External Systems
The system must restrict the use of external information systems (e.g., public cloud, personal devices) to process/store CJI.
P1Required NowEvaluating
Limits on Authorized Use
The system must limit authorized use of external systems to approved individuals and devices.
P1Required NowEvaluating
Portable Storage Devices
The system must restrict/control the use of portable storage (USB) for CJI.
P1Required NowEvaluating
Information Sharing
The system must facilitate information sharing while protecting CJI (e.g., redacted sharing).
P3Required NowEvaluating
Publicly Accessible Content
The system must ensure CJI is not included in publicly accessible content.
P4Due Oct 2027Evaluating
IA

Identification & Authentication

Pillar 1 · 20 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Use of Originating Agency Identifiers in Transactions and Information Exchanges
The system must use originating agency identifiers in transactions and information exchanges.
P1Required NowEvaluating
Policy and Procedures
The agency must develop, document, and disseminate an IA policy that addresses purpose, scope, roles, and compliance.
P2Due Oct 2027Evaluating
Identification and Authentication (Org Users)
The system must uniquely identify and authenticate organizational users (or processes acting on behalf of users).
P1Required NowEvaluating
MFA for Privileged Accounts
The system must implement Multi-Factor Authentication (MFA) for all privileged accounts (Admins) for all access (local and remote).
P1Required NowEvaluating
MFA for Non-Privileged Accounts
The system must implement MFA for non-privileged accounts if they access CJI.
P1Required NowEvaluating
Access to Accounts - Replay Resistant
The system must use replay-resistant authentication mechanisms (e.g., OTP, Kerberos, nonces).
P1Required NowEvaluating
Acceptance of PIV Credentials
The system must accept PIV (Personal Identity Verification) credentials (smart cards) where feasible/mandated.
P1Required NowEvaluating
Device Identification and Authentication
The system must uniquely identify and authenticate devices before establishing a connection (for specific high-security flows).
P2Due Oct 2027Evaluating
Identifier Management
The organization must manage information system identifiers (User IDs) by ensuring uniqueness, preventing reuse for a defined period, and disabling after inactivity.
P2Required NowEvaluating
Authenticator Management
The organization must manage authenticators (passwords, tokens, biometrics) including distribution, revocation, and protection.
P1Required NowEvaluating
Authenticator Types (Passwords)
The system must enforce minimum password complexity/strength (per NIST SP 800-63B).
P1Required NowEvaluating
Memorized Secret Authenticators
Passwords must be "salted and hashed" using a suitably strong algorithm.
P1Required NowEvaluating
Cryptographic Authenticators
For high assurance, use cryptographic authenticators (keys/tokens).
P1Required NowEvaluating
PKI-Based Authentication
For privileged access or non-org users, support PKI (Public Key Infrastructure) where required.
P1Required NowEvaluating
Protection of Authenticators
Authenticators must be protected from unauthorized disclosure and modification.
P1Required NowEvaluating
Authentication Feedback
The system must obscure feedback of authentication information (e.g., masking characters).
P3Required NowEvaluating
Cryptographic Module Authentication
The system must use mechanisms for authentication to cryptographic modules that meet FIPS 140 requirements.
P2Due Oct 2027Evaluating
Identification and Authentication (Non-Org Users)
The system must uniquely identify and authenticate non-organizational users (e.g., the public, external counsel).
P2Due Oct 2027Evaluating
Re-Authentication
The system must require re-authentication when roles change, authenticators change, or after a specific period.
P2Due Oct 2027Evaluating
Identity Proofing
The organization must employ identity proofing (verifying the human exists) before issuing credentials.
P2Due Oct 2027Evaluating
PS

Personnel Security

Pillar 1 · 9 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate a Personnel Security policy.
P2Due Oct 2027Evaluating
Position Risk Designation
Assign a risk designation (Low, Moderate, High) to all positions based on the potential for harm from misuse.
P2Due Oct 2027Evaluating
Personnel Screening
All personnel with physical or logical access to CJI must undergo a state and national fingerprint-based background check within 30 days of assignment.
P2Required NowEvaluating
Personnel Termination
Disable access immediately (or within a specified timeframe) upon termination of employment.
P2Due Oct 2027Evaluating
Personnel Transfer
Review and adjust access rights when personnel transfer to a different position within the organization.
P3Due Oct 2027Evaluating
Access Agreements
Personnel must sign access agreements (e.g., NDA, Rules of Behavior) before being granted access.
P4Due Oct 2027Evaluating
External Personnel Security
Contractors must be subject to the same (or more stringent) screening and security requirements as agency employees.
P2Required NowEvaluating
Personnel Sanctions
The organization must establish a formal sanctions process for personnel who fail to comply with security policies.
P4Due Oct 2027Evaluating
Position Descriptions
Security and privacy responsibilities must be documented in position descriptions.
P4Due Oct 2027Evaluating
AT

Awareness & Training

Pillar 1 · 7 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate an Awareness and Training policy that addresses purpose, scope, roles, responsibilities, and compliance.
P2Due Oct 2027Evaluating
Literacy Training & Awareness
All personnel with access to CJI must receive basic security awareness training within 6 months of assignment and at least once every two years thereafter.
P2Required NowEvaluating
Insider Threat
Training must explicitly include modules on recognizing and reporting potential indicators of insider threat.
P2Required NowEvaluating
Social Engineering & Mining
Training must include recognizing and reporting social engineering attempts (e.g., phishing) and data mining.
P2Required NowEvaluating
Role-Based Training
Personnel with specific security roles (admins, developers) require specialized training tailored to their duties.
P2Due Oct 2027Evaluating
Processing PII
Personnel handling PII must be trained on strict rules for collection, use, and retention, including penalties for misuse.
P2Due Oct 2027Evaluating
Training Records
The agency (and vendor) must document and monitor individual training activities, retaining records for audit (typically 3+ years).
P4Required NowEvaluating
SC

System & Communications Protection

Pillar 2 · 23 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency shall develop, document, and disseminate an SC policy.
P2Due Oct 2027Evaluating
Separation of System and User Functionality
The system must separate user functionality from information system management functionality.
P2Required NowEvaluating
Information in Shared System Resources
The system must prevent unauthorized and unintended information transfer via shared resources.
P2Required NowEvaluating
Denial-of-Service Protection
The system must protect against or limit the effects of Denial-of-Service (DoS) attacks.
P2Due Oct 2027Evaluating
Boundary Protection
The system must monitor and control communications at the external boundary and at key internal boundaries.
P1Required NowEvaluating
Access Points
The organization must limit the number of external network connections.
P1Required NowEvaluating
External Telecom Services
The system must protect the confidentiality and integrity of communications with external telecom services.
P1Required NowEvaluating
Deny by Default - Allow by Exception
The system must enforce "Deny All" for network traffic and only allow authorized traffic.
P1Required NowEvaluating
Split Tunneling
The system must prevent split-tunneling for remote devices.
P1Required NowEvaluating
Route Traffic to Proxy Servers
The system must route all external traffic through authenticated proxy servers.
P1Required NowEvaluating
Personally Identifiable Information
The system must protect PII at the boundary.
P1Required NowEvaluating
Transmission Confidentiality and Integrity
The system must protect the confidentiality and integrity of transmitted information.
P2Required NowEvaluating
Cryptographic Protection
The system must use cryptographic mechanisms to prevent unauthorized disclosure of info during transmission.
P2Required NowEvaluating
Network Disconnect
The system must terminate the network connection at the end of a session or after a period of inactivity.
P3Due Oct 2027Evaluating
Cryptographic Key Establishment and Management
The organization must establish and manage cryptographic keys using automated mechanisms.
P2Required NowEvaluating
Cryptographic Protection
The system must use FIPS-validated cryptography to protect information.
P2Due Oct 2027Evaluating
Collaborative Computing
The system must prohibit remote activation of collaborative computing devices (e.g., cameras, mics) except for authorized sessions.
P2Due Oct 2027Evaluating
Public Key Infrastructure Certificates
The organization must issue and manage PKI certificates.
P2Required NowEvaluating
Mobile Code
The organization must establish usage restrictions for mobile code (e.g., JavaScript, ActiveX).
P3Due Oct 2027Evaluating
Session Authenticity
The system must protect the authenticity of communications sessions (e.g., preventing session hijacking).
P2Due Oct 2027Evaluating
Protection of Information at Rest
The system must protect the confidentiality and integrity of information at rest.
P2Required NowEvaluating
Cryptographic Protection (At Rest)
The system must use cryptographic mechanisms to protect information at rest.
P2Required NowEvaluating
Process Isolation
The system must maintain a separate execution domain for each system process.
P2Required NowEvaluating
MP

Media Protection

Pillar 2 · 6 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency shall develop, document, and disseminate a media protection policy that addresses purpose, scope, roles, responsibilities, and compliance.
P2Required NowEvaluating
Media Access
The agency shall restrict access to media containing CJI to authorized personnel.
P2Required NowEvaluating
Media Storage
The agency shall physically control and securely store media within controlled areas.
P2Required NowEvaluating
Media Transport
The agency shall protect and control information system media during transport outside of controlled areas.
P2Required NowEvaluating
Media Sanitization
The agency shall sanitize information system media prior to disposal, release out of organizational control, or release for reuse.
P2Required NowEvaluating
Media Use
The agency shall restrict the use of removable media on information systems.
P2Required NowEvaluating
PE

Physical & Environmental Protection

Pillar 2 · 19 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate a PE policy that addresses purpose, scope, roles, and compliance.
P2Due Oct 2027Evaluating
Physical Access Authorizations
The organization must develop and maintain a list of personnel with authorized access to the facility where the system resides.
P2Required NowEvaluating
Physical Access Control
The organization must enforce physical access control at entry/exit points and verify individual identity before granting access.
P2Required NowEvaluating
Access Control for Transmission
The organization must control physical access to information system output devices and transmission lines.
P2Required NowEvaluating
Access Control for Output Devices
The organization must control physical access to information system output devices (printers, monitors) to prevent unauthorized viewing.
P3Required NowEvaluating
Monitoring Physical Access
The organization must monitor physical access to the facility to detect and respond to physical security incidents.
P2Required NowEvaluating
Alarms and Surveillance
The organization must use physical intrusion alarms and surveillance equipment to monitor physical access.
P2Required NowEvaluating
Visitor Access Records
The organization must maintain visitor access records to the facility for at least one (1) year.
P4Due Oct 2027Evaluating
Limit PII Elements
The organization must limit PII collected in visitor logs to only what is necessary.
P4Due Oct 2027Evaluating
Power Equipment and Cabling
The organization must protect power equipment and cabling from damage and destruction.
P2Due Oct 2027Evaluating
Emergency Shutoff
The organization must provide the capability to shut off power to the system in an emergency.
P2Due Oct 2027Evaluating
Emergency Power
The organization must provide a short-term emergency power source (UPS) to allow for an orderly shutdown.
P2Due Oct 2027Evaluating
Emergency Lighting
The organization must provide emergency lighting that activates upon power failure.
P2Due Oct 2027Evaluating
Fire Protection
The organization must employ fire suppression and detection systems.
P2Due Oct 2027Evaluating
Detection Systems
Fire detection systems must provide automatic notification to personnel/authorities.
P2Due Oct 2027Evaluating
Environmental Controls
The organization must maintain temperature and humidity levels within acceptable ranges for the system.
P2Due Oct 2027Evaluating
Water Damage Protection
The organization must protect the system from water damage.
P2Due Oct 2027Evaluating
Delivery and Removal
The organization must authorize, monitor, and control information system components entering/exiting the facility.
P3Required NowEvaluating
Alternate Work Site
The organization must establish security controls at alternate work sites (e.g., remote offices, telework).
P3Required NowEvaluating
MA

Maintenance

Pillar 2 · 8 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate a Maintenance policy that addresses purpose, scope, roles, and compliance.
P2Due Oct 2027Evaluating
Controlled Maintenance
The organization must schedule, perform, document, and review records of maintenance and repairs on information system components.
P3Due Oct 2027Evaluating
Maintenance Tools
The organization must approve, control, and monitor maintenance tools (hardware/software) brought into the facility.
P4Due Oct 2027Evaluating
Inspect Tools
The organization must inspect maintenance tools for malicious code/unauthorized software before use.
P4Due Oct 2027Evaluating
Inspect Media
The organization must check media containing diagnostic/test programs for malicious code before the media is used.
P4Due Oct 2027Evaluating
Non-local Maintenance
The organization must approve and monitor non-local (remote) maintenance and diagnostic activities.
P3Due Oct 2027Evaluating
Maintenance Personnel
The organization must establish a process for authorization and supervision of maintenance personnel.
P3Due Oct 2027Evaluating
Timely Maintenance
The organization must obtain maintenance support and/or spare parts within a specific timeframe (SLA).
P3Due Oct 2027Evaluating
5.20

Mobile Devices

Pillar 2 · 9 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Wireless Protocols
Pre-802.11i protocols (WEP, WPA) are prohibited as they do not meet FIPS 140-2. Managed APs must use strong passwords, non-identifiable SSIDs, and FIPS-compliant management protocols.
P1Required NowEvaluating
Service Abroad
Cellular devices authorized for use outside the U.S. must be inspected before and after travel to ensure security controls are functioning.
P1Required NowEvaluating
Mobile Hotspots
Hotspots on devices approved for CJI must use encryption, non-identifiable SSIDs, and only allow agency-controlled device connections.
P1Required NowEvaluating
MDM Enforcement
Devices running limited-feature OS (iOS/Android) must be managed by an MDM that enforces remote locking, wiping, and disk-level encryption.
P1Required NowEvaluating
Risk Mitigations
Mobile devices must apply critical patches immediately, use local device authentication, and encrypt all resident CJI.
P1Required NowEvaluating
Personal Firewall
Full-featured mobile OS (Laptops/Windows Tablets) must employ a personal firewall that filters incoming traffic and maintains logs.
P1Required NowEvaluating
Incident Reporting
Agencies must have enhanced procedures for mobile device loss or compromise, including reporting within 1 hour.
P1Required NowEvaluating
Local Device Auth
Mobile devices must be locked and require authentication (meeting IA standards) to unlock for use.
P1Required NowEvaluating
Device Certificates
Certificates used for auth must be protected from extraction and configured for remote wipe on demand.
P1Required NowEvaluating
AU

Audit & Accountability

Pillar 3 · 17 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate an Audit and Accountability policy that addresses purpose, scope, roles, and compliance.
P2Required NowEvaluating
Event Logging
The system must generate audit records for: 1. Successful/Unsuccessful logons. 2. Access to CJI (Query/View). 3. Permission changes. 4. Admin actions.
P2Due Oct 2027Evaluating
Content of Audit Records
Audit records must contain: 1. Date/Time. 2. Type of Event. 3. Data Subject (if applicable). 4. User Identity. 5. Outcome (Success/Failure).
P2Required NowEvaluating
Additional Audit Information
The system must generate audit records containing details to facilitate the reconstruction of events if needed.
P2Required NowEvaluating
Limit PII Elements
The system must limit the PII elements included in audit records to those necessary (avoid logging the full criminal history in the log itself).
P2Due Oct 2027Evaluating
Audit Log Storage Capacity
The agency must allocate audit record storage capacity sufficient to retain records for the required period.
P2Due Oct 2027Evaluating
Response to Audit Failures
The system must alert authorized personnel in the event of an audit logging process failure.
P2Required NowEvaluating
Audit Record Review
The agency must review/analyze audit records at least weekly for indications of inappropriate or unusual activity.
P2Required NowEvaluating
Automated Process Integration
The system must integrate audit review with automated mechanisms (e.g., SIEM) to alert on suspicious activity.
P2Due Oct 2027Evaluating
Correlate Audit Repositories
The system must correlate audit records across different repositories (e.g., App logs + DB logs + OS logs).
P2Due Oct 2027Evaluating
Audit Record Reduction/Reporting
The system must provide an audit reduction and report generation capability.
P3Due Oct 2027Evaluating
Automatic Processing
The system must provide the capability to automatically process audit records for events of interest.
P3Due Oct 2027Evaluating
Time Stamps
Information system clocks must be synchronized to an authoritative time source (e.g., USNO, NIST).
P2Required NowEvaluating
Protection of Audit Information
The system must protect audit information and tools from unauthorized access, modification, and deletion.
P2Required NowEvaluating
Access by Subset of Privileged Users
Access to management of audit functionality must be limited to a subset of privileged users (e.g., Auditors).
P2Due Oct 2027Evaluating
Audit Record Retention
Audit records must be retained for at least one (1) year. Once retention expires, they must be destroyed.
P4Required NowEvaluating
Audit Record Generation
The system must provide audit record generation capability for the list of events defined in AU-2.
P2Due Oct 2027Evaluating
SI

System & Information Integrity

Pillar 3 · 21 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency shall develop, document, and disseminate an SI policy.
P2Due Oct 2027Evaluating
Flaw Remediation
The organization must identify, report, and correct system flaws. It must install security-relevant software and firmware updates within a defined period.
P1Required NowEvaluating
Automated Flaw Remediation Status
The organization must employ automated mechanisms to determine the status of system components with regard to flaw remediation.
P1Required NowEvaluating
Malicious Code Protection
The organization must employ malicious code protection (Antivirus/EDR) at system entry/exit points and on workstations/servers.
P1Required NowEvaluating
System Monitoring
The organization must monitor the system to detect attacks and indicators of potential attacks.
P1Required NowEvaluating
Automated Analysis
The organization must employ automated tools for real-time analysis of events to detect attacks.
P1Required NowEvaluating
Inbound and Outbound Communications
The organization must monitor inbound and outbound communications traffic for unusual or unauthorized activities.
P1Required NowEvaluating
System-Generated Alerts
The system must generate alerts when specific security-relevant events occur.
P1Required NowEvaluating
Security Alerts, Advisories, and Directives
The organization must receive security alerts/advisories from external sources and take appropriate action.
P2Required NowEvaluating
Software, Firmware, and Information Integrity
The organization must employ integrity verification tools to detect unauthorized changes to software and information.
P1Required NowEvaluating
Integrity Checks
The system must perform integrity checks of software, firmware, and information at a defined frequency.
P1Required NowEvaluating
Integration of Detection and Response
The organization must integrate the detection of unauthorized changes with the incident response process.
P1Required NowEvaluating
Spam Protection
The system must employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages
P3Required NowEvaluating
Automatic Updates
The system must update spam protection mechanisms automatically at least daily.
P3Due Oct 2027Evaluating
Information Input Validation
The system must validate the integrity of information inputs (e.g., checking for malicious code or format errors).
P1Required NowEvaluating
Error Handling
The system must generate error messages that provide information necessary for corrective actions without revealing sensitive information.
P3Due Oct 2027Evaluating
Information Management/Retention
The organization must manage and retain information in accordance with laws and regulations.
P3Required NowEvaluating
Limit PII Elements
The organization must limit the PII elements contained in system outputs to those necessary.
P3Required NowEvaluating
Minimize PII in Testing, Training, and Research
The organization must obfuscate and anonymize PII in testing environments to prevent accidental exposure.
P3Due Oct 2027Evaluating
Information Disposal
The organization must dispose of information in accordance with laws and regulations.
P3Required NowEvaluating
Memory Protection
The system must employ memory protection to prevent unauthorized code execution.
P2Due Oct 2027Evaluating
IR

Incident Response

Pillar 3 · 15 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate an Incident Response policy that addresses purpose, scope, roles, and compliance.
P2Due Oct 2027Evaluating
Incident Response Training
The agency must provide incident response training to users with specific IR roles (e.g., handling evidence, reporting).
P3Required NowEvaluating
Training - Breach
Training must specifically cover "Breach" scenarios (loss of control/compromise of data), not just "Incidents" (service interruption).
P3Due Oct 2027Evaluating
Incident Response Testing
The agency must test the IR capability for the information system annually (e.g., simulations).
P3Due Oct 2027Evaluating
Coordination with Related Plans
IR testing must be coordinated with related plans (Contingency Planning, Crisis Management).
P3Due Oct 2027Evaluating
Incident Handling
The agency must implement an incident handling capability that includes preparation, detection, analysis, containment, eradication, and recovery.
P2Required NowEvaluating
Automated Incident Handling
The system must employ automated mechanisms to support the incident handling process.
P2Required NowEvaluating
Incident Monitoring
The agency must track and document information system security incidents (even those that don't result in a breach).
P2Required NowEvaluating
Incident Reporting
The agency must report security incidents to the appropriate authorities (CSA ISO / FBI) within a specified timeframe.
P2Due Oct 2027Evaluating
Automated Reporting
The system must employ automated mechanisms to assist in the reporting of security incidents.
P2Required NowEvaluating
Supply Chain Coordination
The agency must coordinate incident reporting with supply chain entities (e.g., Cloud Provider, Software Vendors).
P2Due Oct 2027Evaluating
Incident Response Assistance
The agency must provide an incident response support resource (help desk) that offers advice and assistance to users.
P3Required NowEvaluating
Automation Support for Availability
The organization must employ automated mechanisms to increase the availability of incident response information and support (e.g., chatbots, knowledge base).
P3Due Oct 2027Evaluating
Incident Response Plan
The agency must develop an IRP that provides a roadmap for implementing the incident response capability.
P2Required NowEvaluating
Breaches
The IRP must explicitly address "Breaches" (involving PII/CJI) distinct from general incidents, including specific legal reporting requirements.
P2Due Oct 2027Evaluating
CP

Contingency Planning

Pillar 3 · 23 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate a Contingency Planning policy that addresses purpose, scope, roles, and compliance.
P2Due Oct 2027Evaluating
Contingency Plan
The agency must develop a contingency plan that identifies essential missions, recovery strategies, and roles.
P2Due Oct 2027Evaluating
Coordinate with Related Plans
The contingency plan must be coordinated with related plans (e.g., Incident Response, Crisis Management).
P2Due Oct 2027Evaluating
Resume Mission Functions
The plan must provide for the resumption of essential mission functions within a specified time period (RTO).
P2Due Oct 2027Evaluating
Identify Critical Assets
The plan must identify critical assets (hardware, software, data) supporting essential functions.
P2Due Oct 2027Evaluating
Contingency Training
The organization must provide contingency training to personnel with DR roles.
P3Due Oct 2027Evaluating
Contingency Plan Testing
The organization must test the contingency plan to determine the effectiveness of the plan and the readiness to execute it.
P3Due Oct 2027Evaluating
Coordinate with Related Plans (Testing)
Testing must be coordinated with related plans (e.g., checking if IRP works during a disaster).
P3Due Oct 2027Evaluating
Alternate Storage Site
The organization must identify an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats.
P2Due Oct 2027Evaluating
Separation from Primary Site
The alternate storage site must be separated from the primary site to reduce susceptibility to the same threats (e.g., different flood zone).
P2Due Oct 2027Evaluating
Accessibility
The alternate storage site must be accessible for recovery operations within the RTO.
P2Due Oct 2027Evaluating
Alternate Processing Site
The organization must identify an alternate processing site that provides for recovery of operations.
P2Due Oct 2027Evaluating
Separation from Primary Site (Processing)
The alternate processing site must be separated from the primary site (same logic as CP-6).
P2Due Oct 2027Evaluating
Accessibility (Processing)
The alternate processing site must be accessible to necessary personnel.
P2Due Oct 2027Evaluating
Priority of Service
The organization must ensure that the alternate processing site provides priority of service provisions in accordance with availability requirements (SLAs).
P2Due Oct 2027Evaluating
Telecommunications Services
The organization must identify primary and alternate telecommunications services to support the system.
P2Due Oct 2027Evaluating
Priority of Service (Telecom)
Primary and alternate telecom services must have priority of service provisions (e.g., GETS/WPS for gov).
P2Due Oct 2027Evaluating
Single Points of Failure
The organization must identify and eliminate single points of failure for telecom.
P2Due Oct 2027Evaluating
System Backup
The organization must conduct backups of user-level and system-level information.
P2Due Oct 2027Evaluating
Testing for Reliability/Integrity
The organization must test backup information to verify media reliability and information integrity.
P2Due Oct 2027Evaluating
Cryptographic Protection
The organization must implement cryptographic mechanisms to prevent unauthorized disclosure/modification of backup information.
P2Due Oct 2027Evaluating
System Recovery and Reconstitution
The organization must provide for the recovery and reconstitution of the information system to a known state after a disruption.
P2Due Oct 2027Evaluating
Transaction Recovery
The system must implement transaction recovery for systems that are transaction-based (e.g., Databases).
P2Due Oct 2027Evaluating
CM

Configuration Management

Pillar 4 · 20 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate a Configuration Management policy that addresses purpose, scope, roles, and compliance.
P2Due Oct 2027Evaluating
Baseline Configuration
The agency must develop, document, and maintain under configuration control, a current baseline configuration of the information system.
P1Required NowEvaluating
Automation Support
The organization must employ automated mechanisms to maintain the integrity of the baseline configuration.
P1Required NowEvaluating
Retention
The organization must retain previous versions of baseline configurations to support rollback.
P1Required NowEvaluating
High-Risk Areas
The organization must configure systems to provide only essential capabilities and prohibit use of functions not necessary for operation.
P1Required NowEvaluating
Configuration Change Control
The organization must enforce strict change control (approve, document, test, validate) for all changes to the system.
P2Due Oct 2027Evaluating
Test/Validate/Document
The organization must test, validate, and document changes before implementing them in production.
P2Due Oct 2027Evaluating
Security Representative
A security representative must be a member of the Change Control Board (CCB).
P2Due Oct 2027Evaluating
Impact Analyses
The organization must analyze changes to the system to determine potential security impacts before implementation.
P3Due Oct 2027Evaluating
Access Restrictions for Change
The organization must define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.
P1Required NowEvaluating
Configuration Settings
The organization must establish and document mandatory configuration settings (e.g., security hardening) using standard checklists (NIST/CIS).
P1Required NowEvaluating
Least Functionality
The organization must configure the system to provide only essential capabilities (ports, protocols, services).
P1Required NowEvaluating
Periodic Review
The organization must review the system's functionality annually to ensure it is providing only essential capabilities.
P1Required NowEvaluating
System Component Inventory
The organization must develop and document an inventory of information system components that accurately reflects the current system.
P1Required NowEvaluating
Updates
The inventory must be updated as part of the component installation/removal process.
P1Required NowEvaluating
Unauthorized Component Detection
The organization must employ automated mechanisms to detect the presence of unauthorized hardware/software/firmware.
P1Required NowEvaluating
Configuration Management Plan
The organization must develop, document, and implement a CM plan that addresses roles, responsibilities, and processes.
P2Due Oct 2027Evaluating
Software Usage Restrictions
The organization must use software/tools only in accordance with copyright laws and contract agreements.
P3Due Oct 2027Evaluating
User-Installed Software
The organization must enforce policies governing the installation of software by users.
P2Due Oct 2027Evaluating
Information Location
The organization must identify and document the location of information system components and the specific info processed.
P2Due Oct 2027Evaluating
RA

Risk Assessment

Pillar 4 · 9 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency shall develop, document, and disseminate a Risk Assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, and coordination.
P2Due Oct 2027Evaluating
Security Categorization
Categorize the information and system in accordance with applicable federal laws, executive orders, and directives.
P2Due Oct 2027Evaluating
Risk Assessment
Conduct an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, or destruction of the system and info.
P2Due Oct 2027Evaluating
Vulnerability Monitoring and Scanning
Monitor and scan for vulnerabilities in the system and hosted applications at a defined frequency (e.g., weekly).
P1Required NowEvaluating
Update Vulnerabilities to Be Scanned
Update the vulnerabilities to be scanned when new vulnerabilities are identified and reported.
P1Required NowEvaluating
Privileged Access
The system shall require privileged access for vulnerability scanning.
P1Required NowEvaluating
Public Disclosure Program
Establish a public disclosure program to receive vulnerability information from the security community.
P1Required NowEvaluating
Risk Response
Respond to risk in accordance with the organization's risk tolerance.
P2Due Oct 2027Evaluating
Criticality Analysis
Identify critical system components and functions that are essential to the mission.
P2Due Oct 2027Evaluating
SA

System & Services Acquisition

Pillar 4 · 17 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate an SA policy that addresses purpose, scope, roles, responsibilities, and compliance.
P2Due Oct 2027Evaluating
Allocation of Resources
The organization must determine and document the information security and privacy resources required to support the system.
P2Due Oct 2027Evaluating
System Development Life Cycle (SDLC)
The organization must manage the system using a documented SDLC that incorporates information security and privacy.
P2Due Oct 2027Evaluating
Acquisition Process
The organization must include security and privacy requirements in the acquisition contract for the system/service.
P2Due Oct 2027Evaluating
Functional Properties
The organization must require the developer to provide a description of the functional properties of the security controls.
P2Due Oct 2027Evaluating
Design/Implementation Info
The organization must require the developer to provide design and implementation information for security controls.
P2Due Oct 2027Evaluating
Functions, Ports, Protocols, and Services
The organization must require the developer to provide a list of all functions, ports, protocols, and services intended for use.
P2Due Oct 2027Evaluating
System Documentation
The organization must obtain and maintain administrator and user documentation for the system.
P3Due Oct 2027Evaluating
Security Engineering Principles
The organization must apply security and privacy engineering principles in the specification, design, development, and implementation of the system.
P2Due Oct 2027Evaluating
Minimization
The organization must apply minimization principles to the design of the system (e.g., collecting only the PII required).
P2Due Oct 2027Evaluating
External System Services
The organization must require that providers of external system services comply with organizational security requirements.
P2Due Oct 2027Evaluating
Identify Functions, Ports, Protocols, Services
The organization must identify the functions, ports, protocols, and services provided by external system services.
P2Due Oct 2027Evaluating
Developer Configuration Management
The organization must require the developer to perform configuration management during system development, implementation, and operation.
P2Due Oct 2027Evaluating
Developer Testing and Evaluation
The organization must require the developer to perform security testing and evaluation.
P2Due Oct 2027Evaluating
Development Process, Standards, and Tools
The organization must require the developer to use a documented process, standard, and tools for development.
P3Due Oct 2027Evaluating
Criticality Analysis
The organization must perform a criticality analysis to identify components that are critical to system security.
P3Due Oct 2027Evaluating
Unsupported System Components
The organization must replace system components when support for the components is no longer available.
P2Due Oct 2027Evaluating
SR

Supply Chain Risk Management

Pillar 4 · 7 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate an SR policy that addresses purpose, scope, roles, and compliance .
P2Due Oct 2027Evaluating
SCRM Plan
The organization must develop a plan for managing supply chain risks associated with the design, acquisition, and operations of systems used to process CJI.
P3Due Oct 2027Evaluating
Establish SCRM Team
Establish a coordinated, team-based approach (including IT, Legal, and Security) to identify and manage supply chain risks.
P3Due Oct 2027Evaluating
Acquisition Strategies
Employ procurement methods to protect against supply chain risks, such as using preferred suppliers who provide attestation of compliance.
P2Due Oct 2027Evaluating
Notification Agreements
Establish agreements with supply chain entities for the notification of compromises to systems used to process CJI.
P3Due Oct 2027Evaluating
Inspection of Systems or Components
Inspect systems/components upon procurement and periodically to detect tampering.
P3Due Oct 2027Evaluating
Component Disposal
Dispose of CJI-containing components using techniques described in the Media Protection (MP) section.
P3Due Oct 2027Evaluating
PL

Planning

Pillar 4 · 8 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate a Planning policy that addresses purpose, scope, roles, and compliance.
P2Due Oct 2027Evaluating
System Security and Privacy Plans (SSP)
The organization must develop, document, and maintain an SSP that describes security requirements and controls in place.
P2Due Oct 2027Evaluating
Rules of Behavior (RoB)
The organization must establish and make readily available a set of rules that describe individual responsibilities and expected behavior for users.
P3Due Oct 2027Evaluating
Social Media and External Sites
Rules of Behavior must include restrictions on using social media and external sites while accessing the information system.
P3Due Oct 2027Evaluating
Security and Privacy Architectures
The organization must develop a security/privacy architecture that describes the system boundary and high-level design.
P2Due Oct 2027Evaluating
Central Management
The organization must centrally manage the security and privacy requirements/controls for the system.
P4Due Oct 2027Evaluating
Baseline Selection
The organization must select a security control baseline based on the system's categorization.
P3Due Oct 2027Evaluating
Baseline Tailoring
The organization must document any decisions to "tailor" the baseline (e.g., opting out of a control due to a specific technical constraint).
P3Due Oct 2027Evaluating
CA

Assessment, Authorization & Monitoring

Pillar 4 · 10 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
The agency must develop, document, and disseminate an Assessment, Authorization, and Monitoring policy that addresses purpose, scope, roles, and compliance.
P2Due Oct 2027Evaluating
Control Assessments
The organization must assess the security controls periodically to determine if they are implemented correctly and operating as intended.
P3Due Oct 2027Evaluating
Independent Assessors
The organization must employ independent assessors or assessment teams (impartial to the system development/operation) to conduct control assessments.
P3Due Oct 2027Evaluating
Information Exchange
The organization must authorize all connections to external systems and document the interface characteristics (ports, protocols, security).
P2Required NowEvaluating
Plan of Action and Milestones (POAM)
The agency must document strictly how remedial actions (fixing bugs/vulns) are tracked and when they will be completed.
P4Due Oct 2027Evaluating
Authorization (ATO)
A senior official (Authorizing Official) must explicitly authorize the system to operate before operations begin. This authorization must be updated if significant changes occur.
P3Due Oct 2027Evaluating
Continuous Monitoring
The organization must develop a continuous monitoring strategy that includes ongoing metrics, control effectiveness, and automated monitoring of configuration.
P1Required NowEvaluating
Independent Assessment (Monitoring)
The organization must employ independent assessors or assessment teams to monitor the security controls on an ongoing basis.
P1Required NowEvaluating
Risk Monitoring
The organization must monitor risk to the system on an ongoing basis (e.g., new threat intelligence).
P1Required NowEvaluating
Internal System Connections
Authorize and document connections between the information system and other internal systems (e.g., Database to Analytics engine).
P3Due Oct 2027Evaluating

Questions about our compliance posture?

Walk through our CJIS implementation with a member of our team.

Schedule a Walkthrough

Or read the CJIS Compliance Guide for the full narrative.