CJIS Security Policy v6.0
Control Audit Matrix
An auditor-ready technical reference covering every security control in CJIS Security Policy v6.0, with FBI mandates, required audit evidence, and implementation details.
For the educational narrative guide, see The Public Defender's Guide to CJIS Compliance.
320 Controls
0 Implemented
0 In Progress
Updated February 2026
Compliance Progress
Implemented
0
0% of total
In Progress
0
0% of total
Evaluating
320
100% of total
N/A
0
0% of total
Total
320
controls tracked
By Implementation PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.
P1 99 controls0/99 done (0%)
P2 154 controls0/154 done (0%)
P3 50 controls0/50 done (0%)
P4 17 controls0/17 done (0%)
By Pillar
5.1
Information Exchange Agreements
Pillar 1 · 5 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Formal Information Exchange Agreements Agencies must put formal agreements in place that specify security controls, roles, responsibilities, and data ownership before exchanging CJI. | P1 | Required Now | Evaluating | |
Security Control Specification Information exchange agreements must specify the security controls and conditions described in the CJIS Security Policy. | P1 | Required Now | Evaluating | |
Monitoring and Review of Services The services, reports, and records provided by the service provider shall be regularly monitored and reviewed by the agency. | P1 | Required Now | Evaluating | |
Visibility and Incident Reporting The agency must maintain visibility into security aspects, including vulnerability identification and incident reporting conforming to CJIS standards. | P1 | Required Now | Evaluating | |
Managing Changes to Service Providers Changes to services must be managed by the agency and include a risk evaluation based on data criticality and impact. | P1 | Required Now | Evaluating |
AC
Access Control
Pillar 1 · 40 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Policy and Procedures Develop, document, and disseminate access control policies and procedures to personnel with security responsibilities; review and update annually or after incidents. | P2 | Due Oct 2027 | Evaluating | |
Account Management Define account types, assign managers, and specify authorized users and attributes including ORI, Sworn Officer status, and Certification Indicators. | P1 | Required Now | Evaluating | |
Automated System Account Management Support account lifecycle management using automated mechanisms and notifications. | P1 | Required Now | Evaluating | |
Automated Temporary and Emergency Account Management Automatically remove temporary and emergency accounts within 72 hours. | P1 | Required Now | Evaluating | |
Disable Accounts Disable accounts within one week of expiration, policy violation, or 90 days of inactivity. | P1 | Required Now | Evaluating | |
Automated Audit Actions Automatically audit account creation, modification, enabling, disabling, and removal actions. | P1 | Required Now | Evaluating | |
Inactivity Logout Require users to log out when a work period has been completed. | P1 | Required Now | Evaluating | |
Disable Accounts for High-Risk Individuals Disable accounts of high-risk individuals within 30 minutes of discovery. | P1 | Required Now | Evaluating | |
Access Enforcement Enforce approved authorizations for logical access to system resources based on applicable policies. | P1 | Required Now | Evaluating | |
Individual Access Provide processes to enable individuals to have access to elements of their personally identifiable information. | P1 | Required Now | Evaluating | |
Information Flow Enforcement Prevent unencrypted CJI transmission over public networks and block spoofed internal traffic. | P1 | Required Now | Evaluating | |
Separation of Duties Identify and document separation of duties to mitigate risk to CJI; define access authorizations accordingly. | P1 | Required Now | Evaluating | |
Least Privilege Allow only authorized accesses necessary for task completion for users and processes. | P1 | Required Now | Evaluating | |
Authorize Access to Security Functions Authorize access to security functions (auditing, account management) only for privileged users. | P1 | Required Now | Evaluating | |
Non-Privileged Access for Non-Security Functions Require privileged users to use non-privileged accounts/roles for non-security functions. | P1 | Required Now | Evaluating | |
Privileged Accounts Restrict privileged accounts on the system to privileged users. | P1 | Required Now | Evaluating | |
Review of User Privileges Review privileges annually to validate need; reassign or remove as necessary. | P1 | Required Now | Evaluating | |
Log Use of Privileged Functions Log the execution of privileged functions. | P1 | Required Now | Evaluating | |
Prohibit Non-Privileged Execution of Privileged Functions Prevent non-privileged users from executing privileged functions. | P1 | Required Now | Evaluating | |
Unsuccessful Logon Attempts Enforce a limit of 5 consecutive invalid attempts within 15 minutes; automatically lock the account. | P3 | Required Now | Evaluating | |
System Use Notification Display a notification banner before granting access stating usage is restricted and monitored. | P2 | Required Now | Evaluating | |
Device Lock Initiate a device lock after 30 minutes of inactivity. | P4 | Required Now | Evaluating | |
Pattern-Hiding Displays Conceal information previously visible on the display with a publicly viewable image when locked. | P4 | Required Now | Evaluating | |
Session Termination Automatically terminate a user session after a user has been logged out. | P3 | Due Oct 2027 | Evaluating | |
Permitted Actions Without Identification or Authentication Identify and document actions that can be performed without authentication (e.g., viewing warning banner). | P4 | Due Oct 2027 | Evaluating | |
Remote Access Establish usage restrictions and connection requirements for each type of remote access allowed. | P1 | Required Now | Evaluating | |
Remote Access | Monitoring and Control Employ automated mechanisms to monitor and control remote access methods. | P1 | Required Now | Evaluating | |
Remote Access | Protection of Confidentiality and Integrity Implement cryptographic mechanisms to protect remote access sessions. | P1 | Required Now | Evaluating | |
Remote Access | Managed Access Control Points Route remote accesses through authorized and managed network access control points. | P1 | Required Now | Evaluating | |
Remote Access | Privileged Commands and Access Authorize privileged commands via remote access only for compelling operational needs. | P1 | Required Now | Evaluating | |
Wireless Access Establish configuration requirements and authorize wireless access prior to allowing connections. | P2 | Required Now | Evaluating | |
Wireless Access | Authentication and Encryption Protect wireless access using authentication of authorized users and encryption. | P2 | Required Now | Evaluating | |
Wireless Access | Disable Wireless Networking Disable wireless networking capabilities embedded within system components when not intended for use. | P2 | Required Now | Evaluating | |
Access Control for Mobile Devices Establish configuration requirements and authorize the connection of organization-controlled mobile devices. | P2 | Required Now | Evaluating | |
Access Control for Mobile Devices | Full Device or Container Encryption Employ full-device or container-based encryption for mobile devices authorized to process CJI. | P2 | Required Now | Evaluating | |
Use of External Systems Establish policies governing external systems; prohibit use of personally-owned devices (BYOD) for CJI. | P1 | Required Now | Evaluating | |
Use of External Systems | Limits on Authorized Use Permit use of external systems only after verification of controls or retention of agreements. | P1 | Required Now | Evaluating | |
Use of External Systems | Portable Storage Devices Restricted Use Restrict the use of organization-controlled portable storage devices on external systems. | P1 | Required Now | Evaluating | |
Information Sharing Enable authorized users to determine sharing partner restrictions and employ attribute-based access control. | P3 | Required Now | Evaluating | |
Publicly Accessible Content Designate and train individuals for public content; review proposed content for CJI and perform quarterly reviews. | P4 | Due Oct 2027 | Evaluating |
IA
Identification & Authentication
Pillar 1 · 29 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Use of Originating Agency Identifiers (ORI) An FBI authorized ORI shall be used in each transaction to identify the sending agency and ensure proper access levels. | P1 | Required Now | Evaluating | |
Policy and Procedures Develop, document, and disseminate IA policy and procedures; review annually or after incidents. | P2 | Due Oct 2027 | Evaluating | |
Identification and Authentication (Organizational Users) Uniquely identify and authenticate organizational users and associate that identification with processes acting on their behalf. | P1 | Required Now | Evaluating | |
MFA for Privileged Accounts Implement multi-factor authentication (something you know, have, or are) for access to privileged accounts. | P1 | Required Now | Evaluating | |
MFA for Non-Privileged Accounts Implement multi-factor authentication for access to non-privileged accounts. | P1 | Required Now | Evaluating | |
Replay-Resistant Authentication Implement replay-resistant authentication mechanisms for access to privileged and non-privileged accounts. | P1 | Required Now | Evaluating | |
Acceptance of PIV Credentials Accept and electronically verify Personal Identity Verification (PIV)-compliant credentials. | P1 | Required Now | Evaluating | |
Device Identification and Authentication Uniquely identify and authenticate agency-managed devices before establishing network connections. | P2 | Due Oct 2027 | Evaluating | |
Identifier Management Manage system identifiers by assigning unique IDs to users/devices and preventing reuse for one year. | P2 | Required Now | Evaluating | |
Identify User Status Manage identifiers by uniquely identifying each individual as agency or non-agency. | P2 | Due Oct 2027 | Evaluating | |
Authenticator Management Manage authenticators including verification of identity, refresh of memorized secrets annually, and protecting content from disclosure. | P1 | Required Now | Evaluating | |
Memorized Secret Authenticators Enforce 8-character min length, salt/hash storage, and comparison against compromised lists quarterly. | P1 | Required Now | Evaluating | |
Look-Up Secret Authenticators CSPs creating look-up secrets must use approved random bit generators; secrets must have at least 20 bits of entropy and be used only once. | P1 | Required Now | Evaluating | |
Out-of-Band Authenticators Out-of-band authenticators must use a separate encrypted channel and prove possession of a specific physical device; VoIP/Email is prohibited. | P1 | Required Now | Evaluating | |
OTP Authenticators OTP keys must have 112-bit min strength; nonces must change every 2 mins; verifiers must use approved cryptography. | P1 | Required Now | Evaluating | |
Cryptographic Authenticators Software-based keys must use secure storage (TEE/TPM) and not facilitate cloning; hardware keys must have 112-bit min strength. | P1 | Required Now | Evaluating | |
PKI-Based Authentication Enforce access to private keys, map identity to accounts, and validate certificates via trust anchors and local revocation caches. | P1 | Required Now | Evaluating | |
Protection of Authenticators Protect authenticators commensurate with the highest security category of information accessible through their use. | P1 | Required Now | Evaluating | |
Authentication Feedback Obscure feedback of authentication information (e.g., mask with asterisks) to protect against exploitation. | P3 | Required Now | Evaluating | |
Cryptographic Module Authentication Implement mechanisms for authentication to a cryptographic module that meet legal and regulatory guidelines. | P2 | Due Oct 2027 | Evaluating | |
Identification and Authentication (Non-Organizational Users) Uniquely identify and authenticate non-organizational users or processes acting on their behalf. | P2 | Due Oct 2027 | Evaluating | |
Acceptance of PIV Credentials from Other Agencies Accept and electronically verify PIV-compliant credentials from other federal, state, local, tribal, or territorial agencies. | P2 | Due Oct 2027 | Evaluating | |
Acceptance of External Authenticators Accept only external authenticators that are NIST-compliant and maintain a list of accepted authenticators. | P2 | Due Oct 2027 | Evaluating | |
Use of Defined Profiles Conform to SAML or OpenID Connect profiles for identity management. | P2 | Due Oct 2027 | Evaluating | |
Re-Authentication Require re-authentication when roles/credentials change, privileged functions occur, or every 12 hours. | P2 | Due Oct 2027 | Evaluating | |
Identity Proofing Identity proof users requiring logical access; resolve identities uniquely and verify evidence. | P2 | Due Oct 2027 | Evaluating | |
Identity Evidence Require evidence of individual identification be presented to the registration authority. | P2 | Due Oct 2027 | Evaluating | |
Identity Evidence Validation and Verification Validate/verify evidence through agency methods; resolve to a unique individual; protect PII. | P2 | Due Oct 2027 | Evaluating | |
Address Confirmation Send a registration code via out-of-band channel to verify address of record; codes have fixed validity periods. | P2 | Due Oct 2027 | Evaluating |
PS
Personnel Security
Pillar 1 · 9 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Personnel Security Policy and Procedures Develop and disseminate a personnel security policy and procedures; review annually or after incidents and policy changes. | P2 | Due Oct 2027 | Evaluating | |
Position Risk Designation Assign a risk designation to all organizational positions and establish screening criteria for individuals filling those positions. | P2 | Due Oct 2027 | Evaluating | |
Personnel Screening Conduct state and national fingerprint-based record checks prior to authorizing access; felony convictions normally result in denial unless a variance is granted by the CSO/IA Official. | P2 | Required Now | Evaluating | |
Personnel Termination Disable system access within 24 hours of termination; revoke credentials, retrieve property, and conduct exit interviews on CJI/PII non-disclosure. | P2 | Due Oct 2027 | Evaluating | |
Personnel Transfer Review ongoing need for access upon transfer; modify authorizations and close/establish accounts within 24 hours. | P3 | Due Oct 2027 | Evaluating | |
Access Agreements Develop and update access agreements annually; verify individuals sign appropriate agreements (NDA, RoB) prior to access. | P4 | Due Oct 2027 | Evaluating | |
External Personnel Security Establish security requirements for external providers; require 24-hour notification for provider personnel transfers/terminations. | P2 | Required Now | Evaluating | |
Personnel Sanctions Employ a formal sanctions process; notify administrators and security personnel within 24 hours of initiating an employee sanction. | P4 | Due Oct 2027 | Evaluating | |
Position Descriptions Incorporate security and privacy roles and responsibilities into organizational position descriptions. | P4 | Due Oct 2027 | Evaluating |
AT
Awareness & Training
Pillar 1 · 8 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Policy and Procedures Develop, document, and disseminate an organization-level awareness and training policy and procedures; review and update annually or after incidents/policy changes. | P2 | Due Oct 2027 | Evaluating | |
Literacy Training and Awareness Provide security/privacy training to all users prior to CJI access and annually thereafter; update content following incidents or CJIS policy changes. | P2 | Required Now | Evaluating | |
Insider Threat Provide literacy training on recognizing and reporting potential indicators of insider threat, such as inordinate job dissatisfaction or unexplained financial resources. | P2 | Required Now | Evaluating | |
Social Engineering and Mining Provide literacy training on recognizing and reporting social engineering (phishing, impersonation, baiting) and social mining attempts. | P2 | Required Now | Evaluating | |
Role-Based Training: General & Privileged Users Provide specialized training for General and Privileged users covering topics like Least Privilege, Patch Management, and Audit Monitoring. | P2 | Required Now | Evaluating | |
Role-Based Training: Security Responsibilities (LASO) Provide specialized training for the LASO and personnel with security responsibilities, including summaries of recent state/FBI audit findings. | P2 | Required Now | Evaluating | |
Processing Personally Identifiable Information Provide initial and annual training on the employment and operation of PII processing and transparency controls. | P2 | Due Oct 2027 | Evaluating | |
Training Records Document and monitor training activities; retain individual training records for a minimum of three years. | P4 | Required Now | Evaluating |
SC
System & Communications Protection
Pillar 2 · 26 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
System and Communications Protection Policy and Procedures Develop, document, and disseminate a system and communications protection policy; review annually or after security incidents. | P2 | Due Oct 2027 | Evaluating | |
Separation of System and User Functionality Separate user functionality from system management functionality physically or logically. | P2 | Required Now | Evaluating | |
Information in Shared System Resources Prevent unauthorized and unintended information transfer via shared system resources (object reuse/residual info protection). | P2 | Required Now | Evaluating | |
Denial-of-Service Protection Protect against distributed DoS and DNS attacks using boundary protection and intrusion detection/prevention. | P2 | Due Oct 2027 | Evaluating | |
Boundary Protection Monitor and control communications at external managed interfaces and implement separated subnetworks for public components. | P1 | Required Now | Evaluating | |
Boundary Protection | Access Points Limit the number of external network connections to the system to facilitate monitoring. | P1 | Required Now | Evaluating | |
Boundary Protection | External Telecommunications Services Implement managed interfaces with traffic flow policies for each external service; review exceptions annually. | P1 | Required Now | Evaluating | |
Boundary Protection | Deny by Default Deny network communications traffic by default and allow by exception for systems processing CJI. | P1 | Required Now | Evaluating | |
Boundary Protection | Split Tunneling for Remote Devices Prevent split tunneling for remote devices connecting to organizational systems. | P1 | Required Now | Evaluating | |
Boundary Protection | Route Traffic to Authenticated Proxy Servers Route all internal traffic to untrusted networks through authenticated proxy servers at managed interfaces. | P1 | Required Now | Evaluating | |
Boundary Protection | Personally Identifiable Information Monitor for permitted processing of PII at external interfaces and key internal boundaries; document exceptions. | P1 | Required Now | Evaluating | |
Transmission Confidentiality and Integrity Protect the confidentiality and integrity of transmitted information, including metadata derived from CJI. | P2 | Required Now | Evaluating | |
Transmission Confidentiality and Integrity | Cryptographic Protection Implement cryptographic mechanisms to prevent unauthorized disclosure and detect changes to CJI during transmission. | P2 | Required Now | Evaluating | |
Network Disconnect Terminate network connections at the end of a session or after 1 hour of inactivity. | P3 | Due Oct 2027 | Evaluating | |
Cryptographic Key Establishment and Management Establish and manage cryptographic keys (generation, storage, access, destruction) controlled by the agency. | P2 | Required Now | Evaluating | |
Cryptographic Protection Use FIPS 140-3 certified modules or validated algorithms (AES-128 min) for CJI in-transit; FIPS 140-2 unacceptable after 09/21/2026. | P2 | Required Now | Evaluating | |
Collaborative Computing Devices and Applications Prohibit remote activation of collaborative devices (cameras/mics) and provide explicit indication of use to local users. | P2 | Due Oct 2027 | Evaluating | |
Public Key Infrastructure Certificates Issue PKI certificates under an agency CA or approved provider; only include approved trust anchors in stores. | P2 | Required Now | Evaluating | |
Mobile Code Define acceptable mobile code technologies (JavaScript, HTML5); authorize, monitor, and control their use. | P3 | Due Oct 2027 | Evaluating | |
Secure Name/Address Resolution Service (Authoritative Source) Provide data origin authentication and integrity verification (DNSSEC) for authoritative name resolution queries. | P2 | Due Oct 2027 | Evaluating | |
Secure Name/Address Resolution Service (Recursive or Caching Resolver) Perform data origin authentication and integrity verification on name resolution responses from authoritative sources. | P2 | Due Oct 2027 | Evaluating | |
Architecture and Provisioning for Name/Address Resolution Service Ensure resolution services are fault-tolerant and implement internal and external role separation. | P2 | Due Oct 2027 | Evaluating | |
Session Authenticity Protect the authenticity of communications sessions against hijacking and insertion of false info. | P2 | Due Oct 2027 | Evaluating | |
Protection of Information at Rest Protect CJI at rest outside secure locations using FIPS 140-3 certified modules (128-bit symmetric min) or FIPS 197 (256-bit min). | P2 | Required Now | Evaluating | |
Protection of Information at Rest | Cryptographic Protection Implement cryptographic mechanisms to prevent unauthorized disclosure/modification of CJI at rest. | P2 | Required Now | Evaluating | |
Process Isolation Maintain a separate execution domain for each system process to prevent unauthorized code modification. | P2 | Required Now | Evaluating |
MP
Media Protection
Pillar 2 · 6 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Media Protection Policy and Procedures Develop, document, and disseminate a media protection policy and procedures; review and update annually or after incidents. | P2 | Required Now | Evaluating | |
Media Access Restrict access to digital (e.g., flash drives, external HDDs) and non-digital (paper, microfilm) media to authorized individuals. | P2 | Required Now | Evaluating | |
Media Storage Securely store media within physically secure locations; encrypt CJI on digital media if physical/personnel restrictions are not feasible. | P2 | Required Now | Evaluating | |
Media Transport Protect media during transport outside secure areas using encryption; maintain accountability and document all transport activities. | P2 | Required Now | Evaluating | |
Media Sanitization Sanitize or destroy media prior to disposal or reuse using 3-pass overwrite, degaussing, or crosscut shredding for physical paper. | P2 | Required Now | Evaluating | |
Media Use Restrict removable media use; prohibit personally owned media and devices without an identifiable owner. | P2 | Required Now | Evaluating |
PE
Physical & Environmental Protection
Pillar 2 · 19 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Policy and Procedures Develop and disseminate physical and environmental protection policy and procedures; review annually or after incidents. | P2 | Due Oct 2027 | Evaluating | |
Physical Access Authorizations Maintain an authorized access list for the facility; issue credentials and review the list annually or upon personnel changes. | P2 | Required Now | Evaluating | |
Physical Access Control Enforce access authorizations, maintain audit logs, escort visitors, and inventory physical access devices annually. | P2 | Required Now | Evaluating | |
Access Control for Transmission Control physical access to information system distribution and transmission lines and devices. | P2 | Required Now | Evaluating | |
Access Control for Output Devices Control physical access to output from monitors, printers, and scanners to prevent unauthorized viewing. | P3 | Required Now | Evaluating | |
Monitoring Physical Access Monitor facility access to detect incidents; review logs quarterly and coordinate with incident response. | P2 | Required Now | Evaluating | |
Monitoring Physical Access | Intrusion Alarms and Surveillance Monitor physical access to the facility using intrusion alarms and surveillance equipment. | P2 | Required Now | Evaluating | |
Visitor Access Records Maintain visitor access records for one year and review quarterly; report anomalies to security personnel. | P4 | Due Oct 2027 | Evaluating | |
Visitor Access Records | Limit PII Elements Limit PII in visitor access records to the minimum necessary. | P4 | Due Oct 2027 | Evaluating | |
Power Equipment and Cabling Protect data center power equipment and cabling from damage and destruction. | P2 | Due Oct 2027 | Evaluating | |
Emergency Shutoff Provide accessible, protected emergency power shutoff capability in data centers. | P2 | Due Oct 2027 | Evaluating | |
Emergency Power Provide a UPS for orderly shutdown or transition to alternate power in data centers. | P2 | Due Oct 2027 | Evaluating | |
Emergency Lighting Maintain automatic emergency lighting covering evacuation routes in data centers. | P2 | Due Oct 2027 | Evaluating | |
Fire Protection Maintain fire detection and suppression systems with independent energy sources in data centers. | P2 | Due Oct 2027 | Evaluating | |
Fire Protection | Detection Systems Employ automatic fire detection systems that notify personnel and emergency responders. | P2 | Due Oct 2027 | Evaluating | |
Environmental Controls Maintain adequate HVAC levels and monitor continuously in data centers. | P2 | Due Oct 2027 | Evaluating | |
Water Damage Protection Protect data center systems from water damage via accessible master shutoff or isolation valves. | P2 | Due Oct 2027 | Evaluating | |
Delivery and Removal Authorize and control system components entering/exiting the facility; maintain records. | P3 | Required Now | Evaluating | |
Alternate Work Site Employ controls at alternate work sites (telework), including area locking and device positioning to prevent unauthorized view. | P3 | Required Now | Evaluating |
MA
Maintenance
Pillar 2 · 9 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Maintenance Policy and Procedures Develop, document, and disseminate a maintenance policy and procedures; review annually or after security incidents. | P2 | Due Oct 2027 | Evaluating | |
Controlled Maintenance Schedule, document, and review maintenance; sanitize media before removal; verify controls post-maintenance; include mandatory data fields in records. | P3 | Due Oct 2027 | Evaluating | |
Maintenance Tools Approve, control, and monitor maintenance tools; review previously approved tools prior to each use. | P4 | Due Oct 2027 | Evaluating | |
Inspect Tools Inspect maintenance tools for improper or unauthorized modifications. | P4 | Due Oct 2027 | Evaluating | |
Inspect Media Check media containing diagnostic and test programs for malicious code before use in the system. | P4 | Due Oct 2027 | Evaluating | |
Prevent Unauthorized Removal Prevent the removal of maintenance equipment containing organizational info via sanitization, destruction, or explicit exemption. | P4 | Due Oct 2027 | Evaluating | |
Nonlocal Maintenance Approve and monitor nonlocal maintenance; employ strong authentication (MFA); terminate sessions upon completion. | P3 | Due Oct 2027 | Evaluating | |
Maintenance Personnel Maintain an authorized list of maintenance personnel; verify access authorizations; supervise non-authorized personnel. | P3 | Due Oct 2027 | Evaluating | |
Timely Maintenance Obtain maintenance support and spare parts for critical components within agency-defined RTO/RPO limits. | P3 | Due Oct 2027 | Evaluating |
5.20
Mobile Devices
Pillar 2 · 16 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
802.11 Wireless Protocols Prohibit WEP/WPA; implement FIPS-compliant protocols. Managed APs must: (1) test for rogue APs, (2) maintain inventory, (3) secure placement, (4) test range, (8) disable SSID broadcast, (13) use FIPS protocols for management, (14) review logs monthly, and (15) insulate from wired network. | P1 | Required Now | Evaluating | |
Cellular Service Abroad Perform inspection of cellular devices before and after travel outside the U.S. to ensure all controls are in place and functioning. | P1 | Required Now | Evaluating | |
Voice Transmissions Over Cellular Devices Cellular devices used to transmit CJI via voice are exempt from encryption and authentication requirements. | P1 | Required Now | Evaluating | |
Bluetooth Devices Dictate Bluetooth usage based on agency operational processes to mitigate threats like DoS, eavesdropping, and MITM. | P1 | Required Now | Evaluating | |
Mobile Hotspots When hotspots are allowed: (1) enable encryption, (2) use non-identifiable SSIDs, (3) create PSKs, (4) enable port filtering, and (5) only allow agency-controlled connections. | P1 | Required Now | Evaluating | |
Mobile Device Management (MDM) Implement MDM for limited-feature OS to perform: (a) remote locking, (b) remote wiping, (c) configuration locking, (d) detection of rooted/jailbroken devices, (e) folder/disk encryption, and (k) automatic wiping after failed access attempts. | P1 | Required Now | Evaluating | |
Wireless Device Risk Mitigations Ensure devices: (1) apply critical patches immediately, (2) use local auth, (3) use AA for CJI access, (4) encrypt resident CJI, and (5) erase cached info/authenticators upon session termination. | P1 | Required Now | Evaluating | |
Patching/Updates Monitor mobile devices to ensure their patch and update state is current; apply critical upgrades as soon as they become available. | P1 | Required Now | Evaluating | |
Malicious Code Protection Agencies must have a process to approve specific software/applications. Use MDM to report software inventory to a central console to detect unauthorized apps. | P1 | Required Now | Evaluating | |
Personal Firewall Employ firewalls on full-featured OS devices to: (1) manage internet access, (2) block unsolicited connections, (3) filter by IP/Protocol, (4) filter by port, and (5) maintain an IP traffic log. | P1 | Required Now | Evaluating | |
Incident Reporting Develop enhanced procedures for mobile incidents: loss of control, total loss, compromise, or loss outside the U.S. | P1 | Required Now | Evaluating | |
Access Control On limited-feature operating systems, access control must be accomplished by the application that accesses CJI. | P1 | Required Now | Evaluating | |
Local Device Authentication Use local device authentication to unlock the device; authenticators must meet IA requirements. | P1 | Required Now | Evaluating | |
Advanced Authentication Use advanced authentication (MFA) for access to CJI from an authorized mobile device unless access is indirect. | P1 | Required Now | Evaluating | |
Compensating Controls CSO-approved compensating controls require: (1) MDM implementation, (2) device registration as identity proof, (3) use of device certificates, and (4) standard authenticator protection. | P1 | Required Now | Evaluating | |
Device Certificates Protect certificates from extraction; configure for remote wipe or self-deletion after failed attempts; use secure local auth to unlock. | P1 | Required Now | Evaluating |
AU
Audit & Accountability
Pillar 3 · 17 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Audit and Accountability Policy and Procedures Develop, document, and disseminate an audit and accountability policy and procedures; review and update annually or after security incidents. | P2 | Required Now | Evaluating | |
Event Logging Identify and log specific events including logons, attempts to use/create/write/delete/change permissions, privileged actions, and audit log access attempts. | P2 | Due Oct 2027 | Evaluating | |
Content of Audit Records Ensure audit records establish: what happened, when (hh:mm:ss.00), where, the source, the outcome, and the identities involved. | P2 | Required Now | Evaluating | |
Additional Audit Information Generate audit records with session duration, source/destination addresses, filenames, and number of bytes sent/received. | P2 | Required Now | Evaluating | |
Limit Personally Identifiable Information Elements Limit PII contained in audit records to the minimum necessary to achieve the purpose based on privacy risk assessment. | P2 | Due Oct 2027 | Evaluating | |
Audit Log Storage Capacity Allocate sufficient audit log storage capacity to meet retention requirements. | P2 | Due Oct 2027 | Evaluating | |
Response to Audit Logging Process Failures Alert personnel within one hour of logging failure; restart processes and verify system is logging properly. | P2 | Required Now | Evaluating | |
Audit Record Review, Analysis, and Reporting Review and analyze system audit records weekly for unusual activity; report findings to security/privacy officials. | P2 | Required Now | Evaluating | |
Automated Process Integration Integrate audit record review, analysis, and reporting processes using automated mechanisms. | P2 | Due Oct 2027 | Evaluating | |
Correlate Audit Record Repositories Analyze and correlate audit records across different repositories (OS, App, DB) to gain situational awareness. | P2 | Due Oct 2027 | Evaluating | |
Audit Record Reduction and Report Generation Provide audit record reduction and report generation that supports on-demand review without altering original content. | P3 | Due Oct 2027 | Evaluating | |
Automatic Processing Provide the capability to sort and search audit records for events of interest based on AU-3 content. | P3 | Due Oct 2027 | Evaluating | |
Time Stamps Use internal clocks to generate timestamps to the hundredths of a second (hh:mm:ss.00) using UTC or a fixed offset. | P2 | Required Now | Evaluating | |
Protection of Audit Information Protect audit information and tools from unauthorized access, modification, or deletion; alert upon detection of unauthorized access. | P2 | Required Now | Evaluating | |
Access by Subset of Privileged Users Authorize access to management of audit functionality only to specific personnel with audit/security responsibilities. | P2 | Due Oct 2027 | Evaluating | |
Audit Record Retention Retain audit records for a minimum of one year or as needed for administrative/legal purposes. | P4 | Required Now | Evaluating | |
Audit Record Generation Provide audit record generation capability on all systems generating logs; allow authorized personnel to select event types. | P2 | Due Oct 2027 | Evaluating |
SI
System & Information Integrity
Pillar 3 · 21 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
System and Information Integrity Policy and Procedures Develop, document, and disseminate a system and information integrity policy; review and update annually or after security incidents. | P2 | Due Oct 2027 | Evaluating | |
Flaw Remediation Identify, report, and correct system flaws; install critical updates within 15 days and high updates within 30 days. | P1 | Required Now | Evaluating | |
Automated Flaw Remediation Status Determine flaw remediation status using scanning tools at least quarterly or following security incidents involving CJI. | P1 | Required Now | Evaluating | |
Malicious Code Protection Implement signature-based protection at entry/exit points; perform daily scans; block or quarantine malicious code and alert administrators. | P1 | Required Now | Evaluating | |
System Monitoring Monitor for attacks, unauthorized connections, and system misuse; provide logs to security personnel weekly. | P1 | Required Now | Evaluating | |
Automated Tools and Mechanisms for Real-Time Analysis Employ automated tools (e.g., SIEM) to support near real-time analysis of events. | P1 | Required Now | Evaluating | |
Inbound and Outbound Communications Traffic Monitor communications traffic continuously for unusual activities, malicious signaling, or unauthorized exfiltration. | P1 | Required Now | Evaluating | |
System-Generated Alerts Alert personnel when system-generated indications of compromise or unusual activities occur. | P1 | Required Now | Evaluating | |
Security Alerts, Advisories, and Directives Receive and disseminate security alerts from sources like CISA and MS-ISAC; implement directives within established time frames. | P2 | Required Now | Evaluating | |
Software, Firmware, and Information Integrity Employ integrity verification tools (hashes, signatures) to detect unauthorized changes to software/CJI; notify personnel and implement IR. | P1 | Required Now | Evaluating | |
Integrity Checks Perform software, firmware, and information integrity checks at least weekly or in an automated fashion. | P1 | Required Now | Evaluating | |
Integration of Detection and Response Incorporate detection of unauthorized privilege elevation or configuration changes into the incident response capability. | P1 | Required Now | Evaluating | |
Spam Protection Employ spam protection at system entry/exit points to detect and act on unsolicited messages; update based on CM policy. | P3 | Required Now | Evaluating | |
Automatic Updates Automatically update spam protection mechanisms at least daily. | P3 | Due Oct 2027 | Evaluating | |
Information Input Validation Validate the syntax and semantics of inputs to web/app servers, database servers, and any system processing CJI. | P1 | Required Now | Evaluating | |
Error Handling Generate error messages necessary for corrective actions without revealing exploitable info; reveal only to security personnel. | P3 | Due Oct 2027 | Evaluating | |
Information Management and Retention Manage and retain information according to law, regulation, and operational requirements throughout the full lifecycle. | P3 | Required Now | Evaluating | |
Limit Personally Identifiable Information Elements Limit PII processed to the minimum necessary to achieve the collection purpose. | P3 | Required Now | Evaluating | |
Minimize Personally Identifiable Information in Testing, Training, and Research Use data obfuscation, randomization, or synthetic data to minimize PII for research, testing, or training. | P3 | Due Oct 2027 | Evaluating | |
Information Disposal Dispose of, destroy, or erase information following the retention period as defined in MP-6. | P3 | Required Now | Evaluating | |
Memory Protection Implement data execution prevention (DEP) and address space layout randomization (ASLR) to protect system memory. | P2 | Due Oct 2027 | Evaluating |
IR
Incident Response
Pillar 3 · 15 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Incident Response Policy and Procedures Develop, document, and disseminate an incident response policy and procedures; review and update annually or after incidents. | P2 | Required Now | Evaluating | |
Incident Response Training Provide incident response training to users consistent with roles prior to system access and annually thereafter. | P2 | Required Now | Evaluating | |
Incident Response Training | Breach Provide training on identifying and responding to a breach, including the process for reporting PII loss. | P3 | Due Oct 2027 | Evaluating | |
Incident Response Testing Test the effectiveness of the incident response capability annually using tabletop exercises or simulations. | P3 | Due Oct 2027 | Evaluating | |
Incident Response Testing | Coordination with Related Plans Coordinate incident response testing with elements responsible for related plans (BCP, DRP, Occupant Emergency). | P3 | Due Oct 2027 | Evaluating | |
Incident Handling Implement incident handling for preparation, detection, containment, eradication, and recovery; incorporate lessons learned. | P2 | Required Now | Evaluating | |
Automated Incident Handling Processes Support incident handling using automated mechanisms such as online management systems and live response data collection. | P2 | Required Now | Evaluating | |
Incident Monitoring Track and document incidents including status and pertinent forensics information. | P2 | Required Now | Evaluating | |
Incident Reporting Require personnel to report suspected incidents within one hour; notify confirmed incidents to the CSO or SIB Chief. | P2 | Due Oct 2027 | Evaluating | |
Automated Reporting Report incidents using automated mechanisms such as email, website posting, or automated tools. | P2 | Required Now | Evaluating | |
Supply Chain Coordination Provide incident information to product/service providers and supply chain organizations related to the incident. | P2 | Due Oct 2027 | Evaluating | |
Incident Response Assistance Provide a support resource (e.g., help desk, ticketing) that offers advice and assistance to users for handling incidents. | P3 | Required Now | Evaluating | |
Automation Support for Availability Increase availability of IR information and support using automated mechanisms like push/pull website queries. | P3 | Due Oct 2027 | Evaluating | |
Incident Response Plan Develop an IRP that provides a roadmap, describes organization, defines metrics, and is approved annually by executive leadership. | P2 | Required Now | Evaluating | |
Incident Response Plan | Breaches Include a process to determine notice requirements and assess harm/mitigation for PII breaches in the IRP. | P2 | Due Oct 2027 | Evaluating |
CP
Contingency Planning
Pillar 3 · 23 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Contingency Planning Policy and Procedures Develop, document, and disseminate contingency planning policy and procedures; review and update annually or after incidents and exercises. | P2 | Due Oct 2027 | Evaluating | |
Contingency Plan Develop a system contingency plan identifying essential functions, recovery objectives, priorities, roles, and full restoration without control deterioration. | P2 | Due Oct 2027 | Evaluating | |
Coordinate with Related Plans Coordinate contingency plan development with organizational elements responsible for related plans (BCP, DRP, IRP). | P2 | Due Oct 2027 | Evaluating | |
Resume Mission and Business Functions Plan for the resumption of essential mission and business functions within 24 hours of contingency plan activation. | P2 | Due Oct 2027 | Evaluating | |
Identify Critical Assets Identify critical system assets supporting essential mission and business functions. | P2 | Due Oct 2027 | Evaluating | |
Contingency Training Provide contingency training to users within 30 days of role assumption and annually thereafter; update content after incidents. | P3 | Due Oct 2027 | Evaluating | |
Contingency Plan Testing Test the contingency plan annually using tabletop exercises or simulations; initiate corrective actions if needed. | P3 | Due Oct 2027 | Evaluating | |
Coordinate with Related Plans (Testing) Coordinate contingency plan testing with organizational elements responsible for related plans. | P3 | Due Oct 2027 | Evaluating | |
Alternate Storage Site Establish a geographically distinct alternate storage site with equivalent security controls for backup information. | P2 | Due Oct 2027 | Evaluating | |
Separation from Primary Site Identify an alternate storage site sufficiently separated from the primary site to reduce susceptibility to same threats. | P2 | Due Oct 2027 | Evaluating | |
Accessibility Identify potential accessibility problems to the alternate storage site in area-wide disruptions and outline mitigation. | P2 | Due Oct 2027 | Evaluating | |
Alternate Processing Site Establish an alternate processing site with equivalent controls to resume functions within the time period defined in the plan. | P2 | Due Oct 2027 | Evaluating | |
Separation from Primary Site (Processing) Identify an alternate processing site sufficiently separated from the primary site to reduce shared threat susceptibility. | P2 | Due Oct 2027 | Evaluating | |
Accessibility (Processing) Identify potential accessibility problems to alternate processing sites in area-wide disruptions and outline mitigation. | P2 | Due Oct 2027 | Evaluating | |
Priority of Service Develop alternate processing site agreements that contain priority-of-service provisions in accordance with recovery time objectives. | P2 | Due Oct 2027 | Evaluating | |
Telecommunications Services Establish alternate telecommunications services to resume system operations when primary services are unavailable. | P2 | Due Oct 2027 | Evaluating | |
Priority of Service provisions Develop service agreements with priority-of-service provisions and request TSP for national security emergency preparedness. | P2 | Due Oct 2027 | Evaluating | |
Single Points of Failure Obtain alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary services. | P2 | Due Oct 2027 | Evaluating | |
System Backup Conduct backups of user-level info, system-level info, and documentation; protect backup confidentiality and integrity. | P2 | Due Oct 2027 | Evaluating | |
Testing for Reliability and Integrity Test backup information to verify media reliability and information integrity. | P2 | Due Oct 2027 | Evaluating | |
Cryptographic Protection Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of CJI in backups. | P2 | Due Oct 2027 | Evaluating | |
System Recovery and Reconstitution Provide for system recovery and reconstitution to a known state after disruption. | P2 | Due Oct 2027 | Evaluating | |
Transaction Recovery Implement transaction recovery for transaction-based systems. | P2 | Due Oct 2027 | Evaluating |
CM
Configuration Management
Pillar 4 · 24 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Policy and Procedures Develop and disseminate a CM policy and procedures; review and update annually and following system changes. | P2 | Due Oct 2027 | Evaluating | |
Baseline Configuration Maintain a current baseline configuration and topological drawing under configuration control; review annually and upon security-relevant changes. | P1 | Required Now | Evaluating | |
Automation Support for Accuracy Use automated mechanisms (e.g., config management tools) to maintain the baseline configuration. | P1 | Required Now | Evaluating | |
Retention of Previous Configurations Retain at least one previous version of baseline configurations to support rollback. | P1 | Required Now | Evaluating | |
Configure Systems for High-Risk Areas Issue devices with compliant configurations for travel to high-risk areas; examine and reimage upon return. | P1 | Required Now | Evaluating | |
Configuration Change Control Review, approve, and implement configuration changes with impact analyses; retain records for two years. | P2 | Due Oct 2027 | Evaluating | |
Testing, Validation, and Documentation of Changes Test and validate changes before finalizing implementation. | P2 | Due Oct 2027 | Evaluating | |
Security and Privacy Representatives Require security and privacy personnel to be members of the CCB/CAB. | P2 | Due Oct 2027 | Evaluating | |
Impact Analyses Analyze changes for security/privacy impacts prior to implementation. | P3 | Due Oct 2027 | Evaluating | |
Verification of Controls After system changes, verify impacted controls are operating as intended. | P3 | Due Oct 2027 | Evaluating | |
Access Restrictions for Change Enforce physical and logical access restrictions for system changes. | P1 | Required Now | Evaluating | |
Configuration Settings Establish and implement restrictive configuration settings using benchmarks like CIS or STIGs; approve deviations. | P1 | Required Now | Evaluating | |
Least Functionality Configure system for essential capabilities only; prohibit unneeded ports, protocols, and services. | P1 | Required Now | Evaluating | |
Least Functionality | Periodic Review Review system annually to identify and remove unnecessary/nonsecure functions and services. | P1 | Required Now | Evaluating | |
Least Functionality | Prevent Program Execution Prevent program execution according to rules of behavior or software terms. | P1 | Required Now | Evaluating | |
Least Functionality | Authorized Software-Allow-by-Exception Employ a deny-all, permit-by-exception policy for software execution; review the authorized list annually. | P1 | Required Now | Evaluating | |
System Component Inventory Maintain a detailed inventory including model, serial number, manufacturer, and software version; review annually. | P1 | Required Now | Evaluating | |
Updates During Installation and Removal Update inventory during component installations, removals, and system updates. | P1 | Required Now | Evaluating | |
Automated Unauthorized Component Detection Detect and isolate unauthorized components continuously or at least weekly. | P1 | Required Now | Evaluating | |
Configuration Management Plan Develop and implement a CM plan addressing roles, responsibilities, and the system development life cycle. | P2 | Due Oct 2027 | Evaluating | |
Software Usage Restrictions Use software in accordance with contracts and copyright; track quantity licenses; control peer-to-peer sharing. | P3 | Due Oct 2027 | Evaluating | |
User-Installed Software Establish and enforce software installation policies via automated methods; monitor weekly. | P2 | Due Oct 2027 | Evaluating | |
Information Location Document the location of CJI and the specific system components on which it resides. | P2 | Due Oct 2027 | Evaluating | |
Automated Tools to Support Information Location Use automated tools to identify CJI on software and hardware system components. | P2 | Due Oct 2027 | Evaluating |
RA
Risk Assessment
Pillar 4 · 9 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Risk Assessment Policy and Procedures Develop, document, and disseminate a risk assessment policy and procedures; review annually or after security incidents. | P2 | Due Oct 2027 | Evaluating | |
Security Categorization Categorize the system and CJI as "moderate" impact; document results and supporting rationale in the security plan; obtain AO approval. | P2 | Due Oct 2027 | Evaluating | |
Risk Assessment Conduct risk assessments quarterly to identify threats and vulnerabilities; determine harm likelihood to assets and PII effects on individuals. | P2 | Due Oct 2027 | Evaluating | |
Vulnerability Monitoring and Scanning Scan for vulnerabilities monthly and upon new reports; remediate Critical (15 days), High (30 days), Medium (60 days), and Low (90 days). | P1 | Required Now | Evaluating | |
Update Vulnerabilities to Be Scanned Update system vulnerabilities to be scanned within 24 hours prior to a new scan or upon new reports. | P1 | Required Now | Evaluating | |
Privileged Access Implement privileged access for vulnerability scanning activities requiring deep inspection of CJI-processing components. | P1 | Required Now | Evaluating | |
Public Disclosure Program Establish a publicly discoverable reporting channel for vulnerabilities that authorizes good-faith research. | P1 | Required Now | Evaluating | |
Risk Response Respond to assessment/audit findings in accordance with risk tolerance; generate POAM entries if mitigation is not immediate. | P2 | Due Oct 2027 | Evaluating | |
Criticality Analysis Perform criticality analysis to identify critical components and functions at all stages of the SDLC. | P2 | Due Oct 2027 | Evaluating |
SA
System & Services Acquisition
Pillar 4 · 18 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
System and Services Acquisition Policy and Procedures Develop and disseminate an acquisition policy and procedures; review and update following security incidents. | P2 | Due Oct 2027 | Evaluating | |
Allocation of Resources Determine high-level security/privacy requirements and allocate resources as part of capital planning. | P2 | Due Oct 2027 | Evaluating | |
System Development Life Cycle Manage the system using a documented SDLC that integrates security and privacy risk management. | P2 | Due Oct 2027 | Evaluating | |
Acquisition Process Include security/privacy requirements and acceptance criteria in acquisition contracts using defined language. | P2 | Due Oct 2027 | Evaluating | |
Functional Properties of Controls Require developers to provide a description of the functional properties of the security controls. | P2 | Due Oct 2027 | Evaluating | |
Design and Implementation Information Require developers to provide design and implementation info, including external interfaces and high-level designs. | P2 | Due Oct 2027 | Evaluating | |
Functions, Ports, Protocols, and Services Require developers to identify functions, ports, protocols, and services intended for organizational use. | P2 | Due Oct 2027 | Evaluating | |
Use of Approved PIV Products Employ only IT products on the FIPS 201-approved list for PIV capabilities. | P2 | Due Oct 2027 | Evaluating | |
System Documentation Obtain or develop admin/user documentation describing secure configuration, vulnerabilities, and user responsibilities. | P3 | Due Oct 2027 | Evaluating | |
Security and Privacy Engineering Principles Apply engineering principles such as layered protections, physical/logical boundaries, and threat modeling in the SDLC. | P2 | Due Oct 2027 | Evaluating | |
Minimization Implement the principle of minimization using only the PII necessary to perform system engineering. | P2 | Due Oct 2027 | Evaluating | |
External System Services Require external providers (e.g., government NCJA or private contractors) to sign MCAs or Security Addendums; conduct triennial audits. | P2 | Due Oct 2027 | Evaluating | |
Identification of Functions, Ports, Protocols, and Services Require providers of external services with system connections to identify required ports, protocols, and services. | P2 | Due Oct 2027 | Evaluating | |
Developer Configuration Management Require developers to perform configuration management, implement access restrictions for changes, and track security flaws. | P2 | Due Oct 2027 | Evaluating | |
Developer Testing and Evaluation Require developers to perform comprehensive testing/regression testing and implement a verifiable flaw remediation process. | P2 | Due Oct 2027 | Evaluating | |
Development Process, Standards, and Tools Require developers to follow a documented process that addresses security/privacy and identifies standards and tools used. | P3 | Due Oct 2027 | Evaluating | |
Development Process | Criticality Analysis Require the developer to perform a criticality analysis at SDLC decision points using comprehensive testing. | P3 | Due Oct 2027 | Evaluating | |
Unsupported System Components Replace system components when support is no longer available; provide options for alternative support if replacement is not feasible. | P2 | Due Oct 2027 | Evaluating |
SR
Supply Chain Risk Management
Pillar 4 · 7 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Supply Chain Risk Management Policy and Procedures Develop and disseminate an SCRM policy and procedures; review annually or after security incidents involving CJI systems. | P2 | Due Oct 2027 | Evaluating | |
Supply Chain Risk Management Plan Develop a plan for managing supply chain risks across the SDLC; review annually and protect the plan from unauthorized disclosure. | P3 | Due Oct 2027 | Evaluating | |
Supply Chain Risk Management Plan | Establish SCRM Team Establish a cross-functional SCRM team (Security, IT, Legal, Acquisition) to lead and support supply chain risk activities. | P3 | Due Oct 2027 | Evaluating | |
Acquisition Strategies, Tools, and Methods Use preferred suppliers who provide attestation of compliance with federal or state standards to mitigate supply chain risk. | P2 | Due Oct 2027 | Evaluating | |
Notification Agreements Establish procedures and agreements with supply chain entities for the notification of compromises to CJI systems. | P3 | Due Oct 2027 | Evaluating | |
Inspection of Systems or Components Inspect CJI systems and components upon initial procurement and periodically to detect tampering. | P3 | Due Oct 2027 | Evaluating | |
Component Disposal Dispose of CJI using techniques and methods described in the Media Protection (MP) family. | P3 | Due Oct 2027 | Evaluating |
PL
Planning
Pillar 4 · 8 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Planning Policy and Procedures Develop, document, and disseminate a planning policy and procedures; review and update annually or after security incidents. | P2 | Due Oct 2027 | Evaluating | |
System Security and Privacy Plans Develop plans consistent with enterprise architecture that define components, operational context, roles, info types, and security categorization. | P2 | Due Oct 2027 | Evaluating | |
Rules of Behavior Establish expected behavior rules for system usage; receive documented acknowledgment from users annually or upon revision. | P3 | Due Oct 2027 | Evaluating | |
Rules of Behavior | Social Media and External Site Restrictions Include restrictions on social media use, posting organizational info on public sites, and using org identifiers for external accounts. | P3 | Due Oct 2027 | Evaluating | |
Security and Privacy Architectures Develop architectures describing protection approaches for CIA and PII; describe dependencies on external systems and review annually. | P2 | Due Oct 2027 | Evaluating | |
Central Management The CJISSECPOL is centrally managed by the FBI CJIS ISO. | P4 | Due Oct 2027 | Evaluating | |
Baseline Selection Select a control baseline for the system based on stakeholder needs and impact levels. | P3 | Due Oct 2027 | Evaluating | |
Baseline Tailoring Tailor the selected baseline by applying scoping considerations, selecting compensating controls, and assigning parameter values. | P3 | Due Oct 2027 | Evaluating |
CA
Assessment, Authorization & Monitoring
Pillar 4 · 11 controls| Control ID | Requirement | PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline. | Sanctionable | Status |
|---|---|---|---|---|
Assessment, Authorization, and Monitoring Policy and Procedures Develop, document, and disseminate policies and procedures for system assessment, authorization, and monitoring; review and update annually. | P2 | Due Oct 2027 | Evaluating | |
Control Assessments Assess system controls at least once every three years to determine if they are implemented correctly and operating as intended. | P3 | Due Oct 2027 | Evaluating | |
Independent Assessors Employ independent assessors or assessment teams, free from conflicts of interest, to conduct control assessments. | P3 | Due Oct 2027 | Evaluating | |
Information Exchange Agreements Manage information exchange via signed written agreements (MOU/ISA) that specify standards, audits, and sanctions. | P2 | Required Now | Evaluating | |
Secondary Dissemination Logging Log the dissemination of CHRI when released to an authorized agency that is not part of the primary information exchange agreement. | P2 | Required Now | Evaluating | |
Plan of Action and Milestones Develop a POAM to track remedial actions for identified weaknesses; update at least every six months. | P4 | Due Oct 2027 | Evaluating | |
Authorization Assign a senior official to authorize system operation and accept risk; update authorizations at least every three years. | P3 | Due Oct 2027 | Evaluating | |
Continuous Monitoring Implement a continuous monitoring strategy including metrics for Account Management, Remote Access, and System Monitoring; report status annually. | P1 | Required Now | Evaluating | |
Independent Assessment (Monitoring) Employ independent assessors or assessment teams to monitor system controls on an ongoing basis. | P1 | Required Now | Evaluating | |
Risk Monitoring Ensure risk monitoring includes effectiveness, compliance, and change monitoring integrated into the continuous monitoring strategy. | P1 | Required Now | Evaluating | |
Internal System Connections Authorize and document internal connections (components processing/storing CJI); review continued need annually. | P3 | Due Oct 2027 | Evaluating |
Questions about our compliance posture?
Walk through our CJIS implementation with a member of our team.
Schedule a WalkthroughOr read the CJIS Compliance Guide for the full narrative.