CJIS Security Policy v6.0

Control Audit Matrix

An auditor-ready technical reference covering every security control in CJIS Security Policy v6.0, with FBI mandates, required audit evidence, and implementation details.

For the educational narrative guide, see The Public Defender's Guide to CJIS Compliance.

320 Controls
0 Implemented
0 In Progress
Updated February 2026

Compliance Progress

Implemented
0
0% of total
In Progress
0
0% of total
Evaluating
320
100% of total
N/A
0
0% of total
Total
320
controls tracked

By Implementation PriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.

P1 99 controls0/99 done (0%)
P2 154 controls0/154 done (0%)
P3 50 controls0/50 done (0%)
P4 17 controls0/17 done (0%)

By Pillar

5.1

Information Exchange Agreements

Pillar 1 · 5 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Formal Information Exchange Agreements
Agencies must put formal agreements in place that specify security controls, roles, responsibilities, and data ownership before exchanging CJI.
P1Required NowEvaluating
Security Control Specification
Information exchange agreements must specify the security controls and conditions described in the CJIS Security Policy.
P1Required NowEvaluating
Monitoring and Review of Services
The services, reports, and records provided by the service provider shall be regularly monitored and reviewed by the agency.
P1Required NowEvaluating
Visibility and Incident Reporting
The agency must maintain visibility into security aspects, including vulnerability identification and incident reporting conforming to CJIS standards.
P1Required NowEvaluating
Managing Changes to Service Providers
Changes to services must be managed by the agency and include a risk evaluation based on data criticality and impact.
P1Required NowEvaluating
AC

Access Control

Pillar 1 · 40 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
Develop, document, and disseminate access control policies and procedures to personnel with security responsibilities; review and update annually or after incidents.
P2Due Oct 2027Evaluating
Account Management
Define account types, assign managers, and specify authorized users and attributes including ORI, Sworn Officer status, and Certification Indicators.
P1Required NowEvaluating
Automated System Account Management
Support account lifecycle management using automated mechanisms and notifications.
P1Required NowEvaluating
Automated Temporary and Emergency Account Management
Automatically remove temporary and emergency accounts within 72 hours.
P1Required NowEvaluating
Disable Accounts
Disable accounts within one week of expiration, policy violation, or 90 days of inactivity.
P1Required NowEvaluating
Automated Audit Actions
Automatically audit account creation, modification, enabling, disabling, and removal actions.
P1Required NowEvaluating
Inactivity Logout
Require users to log out when a work period has been completed.
P1Required NowEvaluating
Disable Accounts for High-Risk Individuals
Disable accounts of high-risk individuals within 30 minutes of discovery.
P1Required NowEvaluating
Access Enforcement
Enforce approved authorizations for logical access to system resources based on applicable policies.
P1Required NowEvaluating
Individual Access
Provide processes to enable individuals to have access to elements of their personally identifiable information.
P1Required NowEvaluating
Information Flow Enforcement
Prevent unencrypted CJI transmission over public networks and block spoofed internal traffic.
P1Required NowEvaluating
Separation of Duties
Identify and document separation of duties to mitigate risk to CJI; define access authorizations accordingly.
P1Required NowEvaluating
Least Privilege
Allow only authorized accesses necessary for task completion for users and processes.
P1Required NowEvaluating
Authorize Access to Security Functions
Authorize access to security functions (auditing, account management) only for privileged users.
P1Required NowEvaluating
Non-Privileged Access for Non-Security Functions
Require privileged users to use non-privileged accounts/roles for non-security functions.
P1Required NowEvaluating
Privileged Accounts
Restrict privileged accounts on the system to privileged users.
P1Required NowEvaluating
Review of User Privileges
Review privileges annually to validate need; reassign or remove as necessary.
P1Required NowEvaluating
Log Use of Privileged Functions
Log the execution of privileged functions.
P1Required NowEvaluating
Prohibit Non-Privileged Execution of Privileged Functions
Prevent non-privileged users from executing privileged functions.
P1Required NowEvaluating
Unsuccessful Logon Attempts
Enforce a limit of 5 consecutive invalid attempts within 15 minutes; automatically lock the account.
P3Required NowEvaluating
System Use Notification
Display a notification banner before granting access stating usage is restricted and monitored.
P2Required NowEvaluating
Device Lock
Initiate a device lock after 30 minutes of inactivity.
P4Required NowEvaluating
Pattern-Hiding Displays
Conceal information previously visible on the display with a publicly viewable image when locked.
P4Required NowEvaluating
Session Termination
Automatically terminate a user session after a user has been logged out.
P3Due Oct 2027Evaluating
Permitted Actions Without Identification or Authentication
Identify and document actions that can be performed without authentication (e.g., viewing warning banner).
P4Due Oct 2027Evaluating
Remote Access
Establish usage restrictions and connection requirements for each type of remote access allowed.
P1Required NowEvaluating
Remote Access | Monitoring and Control
Employ automated mechanisms to monitor and control remote access methods.
P1Required NowEvaluating
Remote Access | Protection of Confidentiality and Integrity
Implement cryptographic mechanisms to protect remote access sessions.
P1Required NowEvaluating
Remote Access | Managed Access Control Points
Route remote accesses through authorized and managed network access control points.
P1Required NowEvaluating
Remote Access | Privileged Commands and Access
Authorize privileged commands via remote access only for compelling operational needs.
P1Required NowEvaluating
Wireless Access
Establish configuration requirements and authorize wireless access prior to allowing connections.
P2Required NowEvaluating
Wireless Access | Authentication and Encryption
Protect wireless access using authentication of authorized users and encryption.
P2Required NowEvaluating
Wireless Access | Disable Wireless Networking
Disable wireless networking capabilities embedded within system components when not intended for use.
P2Required NowEvaluating
Access Control for Mobile Devices
Establish configuration requirements and authorize the connection of organization-controlled mobile devices.
P2Required NowEvaluating
Access Control for Mobile Devices | Full Device or Container Encryption
Employ full-device or container-based encryption for mobile devices authorized to process CJI.
P2Required NowEvaluating
Use of External Systems
Establish policies governing external systems; prohibit use of personally-owned devices (BYOD) for CJI.
P1Required NowEvaluating
Use of External Systems | Limits on Authorized Use
Permit use of external systems only after verification of controls or retention of agreements.
P1Required NowEvaluating
Use of External Systems | Portable Storage Devices Restricted Use
Restrict the use of organization-controlled portable storage devices on external systems.
P1Required NowEvaluating
Information Sharing
Enable authorized users to determine sharing partner restrictions and employ attribute-based access control.
P3Required NowEvaluating
Publicly Accessible Content
Designate and train individuals for public content; review proposed content for CJI and perform quarterly reviews.
P4Due Oct 2027Evaluating
IA

Identification & Authentication

Pillar 1 · 29 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Use of Originating Agency Identifiers (ORI)
An FBI authorized ORI shall be used in each transaction to identify the sending agency and ensure proper access levels.
P1Required NowEvaluating
Policy and Procedures
Develop, document, and disseminate IA policy and procedures; review annually or after incidents.
P2Due Oct 2027Evaluating
Identification and Authentication (Organizational Users)
Uniquely identify and authenticate organizational users and associate that identification with processes acting on their behalf.
P1Required NowEvaluating
MFA for Privileged Accounts
Implement multi-factor authentication (something you know, have, or are) for access to privileged accounts.
P1Required NowEvaluating
MFA for Non-Privileged Accounts
Implement multi-factor authentication for access to non-privileged accounts.
P1Required NowEvaluating
Replay-Resistant Authentication
Implement replay-resistant authentication mechanisms for access to privileged and non-privileged accounts.
P1Required NowEvaluating
Acceptance of PIV Credentials
Accept and electronically verify Personal Identity Verification (PIV)-compliant credentials.
P1Required NowEvaluating
Device Identification and Authentication
Uniquely identify and authenticate agency-managed devices before establishing network connections.
P2Due Oct 2027Evaluating
Identifier Management
Manage system identifiers by assigning unique IDs to users/devices and preventing reuse for one year.
P2Required NowEvaluating
Identify User Status
Manage identifiers by uniquely identifying each individual as agency or non-agency.
P2Due Oct 2027Evaluating
Authenticator Management
Manage authenticators including verification of identity, refresh of memorized secrets annually, and protecting content from disclosure.
P1Required NowEvaluating
Memorized Secret Authenticators
Enforce 8-character min length, salt/hash storage, and comparison against compromised lists quarterly.
P1Required NowEvaluating
Look-Up Secret Authenticators
CSPs creating look-up secrets must use approved random bit generators; secrets must have at least 20 bits of entropy and be used only once.
P1Required NowEvaluating
Out-of-Band Authenticators
Out-of-band authenticators must use a separate encrypted channel and prove possession of a specific physical device; VoIP/Email is prohibited.
P1Required NowEvaluating
OTP Authenticators
OTP keys must have 112-bit min strength; nonces must change every 2 mins; verifiers must use approved cryptography.
P1Required NowEvaluating
Cryptographic Authenticators
Software-based keys must use secure storage (TEE/TPM) and not facilitate cloning; hardware keys must have 112-bit min strength.
P1Required NowEvaluating
PKI-Based Authentication
Enforce access to private keys, map identity to accounts, and validate certificates via trust anchors and local revocation caches.
P1Required NowEvaluating
Protection of Authenticators
Protect authenticators commensurate with the highest security category of information accessible through their use.
P1Required NowEvaluating
Authentication Feedback
Obscure feedback of authentication information (e.g., mask with asterisks) to protect against exploitation.
P3Required NowEvaluating
Cryptographic Module Authentication
Implement mechanisms for authentication to a cryptographic module that meet legal and regulatory guidelines.
P2Due Oct 2027Evaluating
Identification and Authentication (Non-Organizational Users)
Uniquely identify and authenticate non-organizational users or processes acting on their behalf.
P2Due Oct 2027Evaluating
Acceptance of PIV Credentials from Other Agencies
Accept and electronically verify PIV-compliant credentials from other federal, state, local, tribal, or territorial agencies.
P2Due Oct 2027Evaluating
Acceptance of External Authenticators
Accept only external authenticators that are NIST-compliant and maintain a list of accepted authenticators.
P2Due Oct 2027Evaluating
Use of Defined Profiles
Conform to SAML or OpenID Connect profiles for identity management.
P2Due Oct 2027Evaluating
Re-Authentication
Require re-authentication when roles/credentials change, privileged functions occur, or every 12 hours.
P2Due Oct 2027Evaluating
Identity Proofing
Identity proof users requiring logical access; resolve identities uniquely and verify evidence.
P2Due Oct 2027Evaluating
Identity Evidence
Require evidence of individual identification be presented to the registration authority.
P2Due Oct 2027Evaluating
Identity Evidence Validation and Verification
Validate/verify evidence through agency methods; resolve to a unique individual; protect PII.
P2Due Oct 2027Evaluating
Address Confirmation
Send a registration code via out-of-band channel to verify address of record; codes have fixed validity periods.
P2Due Oct 2027Evaluating
PS

Personnel Security

Pillar 1 · 9 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Personnel Security Policy and Procedures
Develop and disseminate a personnel security policy and procedures; review annually or after incidents and policy changes.
P2Due Oct 2027Evaluating
Position Risk Designation
Assign a risk designation to all organizational positions and establish screening criteria for individuals filling those positions.
P2Due Oct 2027Evaluating
Personnel Screening
Conduct state and national fingerprint-based record checks prior to authorizing access; felony convictions normally result in denial unless a variance is granted by the CSO/IA Official.
P2Required NowEvaluating
Personnel Termination
Disable system access within 24 hours of termination; revoke credentials, retrieve property, and conduct exit interviews on CJI/PII non-disclosure.
P2Due Oct 2027Evaluating
Personnel Transfer
Review ongoing need for access upon transfer; modify authorizations and close/establish accounts within 24 hours.
P3Due Oct 2027Evaluating
Access Agreements
Develop and update access agreements annually; verify individuals sign appropriate agreements (NDA, RoB) prior to access.
P4Due Oct 2027Evaluating
External Personnel Security
Establish security requirements for external providers; require 24-hour notification for provider personnel transfers/terminations.
P2Required NowEvaluating
Personnel Sanctions
Employ a formal sanctions process; notify administrators and security personnel within 24 hours of initiating an employee sanction.
P4Due Oct 2027Evaluating
Position Descriptions
Incorporate security and privacy roles and responsibilities into organizational position descriptions.
P4Due Oct 2027Evaluating
AT

Awareness & Training

Pillar 1 · 8 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
Develop, document, and disseminate an organization-level awareness and training policy and procedures; review and update annually or after incidents/policy changes.
P2Due Oct 2027Evaluating
Literacy Training and Awareness
Provide security/privacy training to all users prior to CJI access and annually thereafter; update content following incidents or CJIS policy changes.
P2Required NowEvaluating
Insider Threat
Provide literacy training on recognizing and reporting potential indicators of insider threat, such as inordinate job dissatisfaction or unexplained financial resources.
P2Required NowEvaluating
Social Engineering and Mining
Provide literacy training on recognizing and reporting social engineering (phishing, impersonation, baiting) and social mining attempts.
P2Required NowEvaluating
Role-Based Training: General & Privileged Users
Provide specialized training for General and Privileged users covering topics like Least Privilege, Patch Management, and Audit Monitoring.
P2Required NowEvaluating
Role-Based Training: Security Responsibilities (LASO)
Provide specialized training for the LASO and personnel with security responsibilities, including summaries of recent state/FBI audit findings.
P2Required NowEvaluating
Processing Personally Identifiable Information
Provide initial and annual training on the employment and operation of PII processing and transparency controls.
P2Due Oct 2027Evaluating
Training Records
Document and monitor training activities; retain individual training records for a minimum of three years.
P4Required NowEvaluating
SC

System & Communications Protection

Pillar 2 · 26 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
System and Communications Protection Policy and Procedures
Develop, document, and disseminate a system and communications protection policy; review annually or after security incidents.
P2Due Oct 2027Evaluating
Separation of System and User Functionality
Separate user functionality from system management functionality physically or logically.
P2Required NowEvaluating
Information in Shared System Resources
Prevent unauthorized and unintended information transfer via shared system resources (object reuse/residual info protection).
P2Required NowEvaluating
Denial-of-Service Protection
Protect against distributed DoS and DNS attacks using boundary protection and intrusion detection/prevention.
P2Due Oct 2027Evaluating
Boundary Protection
Monitor and control communications at external managed interfaces and implement separated subnetworks for public components.
P1Required NowEvaluating
Boundary Protection | Access Points
Limit the number of external network connections to the system to facilitate monitoring.
P1Required NowEvaluating
Boundary Protection | External Telecommunications Services
Implement managed interfaces with traffic flow policies for each external service; review exceptions annually.
P1Required NowEvaluating
Boundary Protection | Deny by Default
Deny network communications traffic by default and allow by exception for systems processing CJI.
P1Required NowEvaluating
Boundary Protection | Split Tunneling for Remote Devices
Prevent split tunneling for remote devices connecting to organizational systems.
P1Required NowEvaluating
Boundary Protection | Route Traffic to Authenticated Proxy Servers
Route all internal traffic to untrusted networks through authenticated proxy servers at managed interfaces.
P1Required NowEvaluating
Boundary Protection | Personally Identifiable Information
Monitor for permitted processing of PII at external interfaces and key internal boundaries; document exceptions.
P1Required NowEvaluating
Transmission Confidentiality and Integrity
Protect the confidentiality and integrity of transmitted information, including metadata derived from CJI.
P2Required NowEvaluating
Transmission Confidentiality and Integrity | Cryptographic Protection
Implement cryptographic mechanisms to prevent unauthorized disclosure and detect changes to CJI during transmission.
P2Required NowEvaluating
Network Disconnect
Terminate network connections at the end of a session or after 1 hour of inactivity.
P3Due Oct 2027Evaluating
Cryptographic Key Establishment and Management
Establish and manage cryptographic keys (generation, storage, access, destruction) controlled by the agency.
P2Required NowEvaluating
Cryptographic Protection
Use FIPS 140-3 certified modules or validated algorithms (AES-128 min) for CJI in-transit; FIPS 140-2 unacceptable after 09/21/2026.
P2Required NowEvaluating
Collaborative Computing Devices and Applications
Prohibit remote activation of collaborative devices (cameras/mics) and provide explicit indication of use to local users.
P2Due Oct 2027Evaluating
Public Key Infrastructure Certificates
Issue PKI certificates under an agency CA or approved provider; only include approved trust anchors in stores.
P2Required NowEvaluating
Mobile Code
Define acceptable mobile code technologies (JavaScript, HTML5); authorize, monitor, and control their use.
P3Due Oct 2027Evaluating
Secure Name/Address Resolution Service (Authoritative Source)
Provide data origin authentication and integrity verification (DNSSEC) for authoritative name resolution queries.
P2Due Oct 2027Evaluating
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
Perform data origin authentication and integrity verification on name resolution responses from authoritative sources.
P2Due Oct 2027Evaluating
Architecture and Provisioning for Name/Address Resolution Service
Ensure resolution services are fault-tolerant and implement internal and external role separation.
P2Due Oct 2027Evaluating
Session Authenticity
Protect the authenticity of communications sessions against hijacking and insertion of false info.
P2Due Oct 2027Evaluating
Protection of Information at Rest
Protect CJI at rest outside secure locations using FIPS 140-3 certified modules (128-bit symmetric min) or FIPS 197 (256-bit min).
P2Required NowEvaluating
Protection of Information at Rest | Cryptographic Protection
Implement cryptographic mechanisms to prevent unauthorized disclosure/modification of CJI at rest.
P2Required NowEvaluating
Process Isolation
Maintain a separate execution domain for each system process to prevent unauthorized code modification.
P2Required NowEvaluating
MP

Media Protection

Pillar 2 · 6 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Media Protection Policy and Procedures
Develop, document, and disseminate a media protection policy and procedures; review and update annually or after incidents.
P2Required NowEvaluating
Media Access
Restrict access to digital (e.g., flash drives, external HDDs) and non-digital (paper, microfilm) media to authorized individuals.
P2Required NowEvaluating
Media Storage
Securely store media within physically secure locations; encrypt CJI on digital media if physical/personnel restrictions are not feasible.
P2Required NowEvaluating
Media Transport
Protect media during transport outside secure areas using encryption; maintain accountability and document all transport activities.
P2Required NowEvaluating
Media Sanitization
Sanitize or destroy media prior to disposal or reuse using 3-pass overwrite, degaussing, or crosscut shredding for physical paper.
P2Required NowEvaluating
Media Use
Restrict removable media use; prohibit personally owned media and devices without an identifiable owner.
P2Required NowEvaluating
PE

Physical & Environmental Protection

Pillar 2 · 19 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
Develop and disseminate physical and environmental protection policy and procedures; review annually or after incidents.
P2Due Oct 2027Evaluating
Physical Access Authorizations
Maintain an authorized access list for the facility; issue credentials and review the list annually or upon personnel changes.
P2Required NowEvaluating
Physical Access Control
Enforce access authorizations, maintain audit logs, escort visitors, and inventory physical access devices annually.
P2Required NowEvaluating
Access Control for Transmission
Control physical access to information system distribution and transmission lines and devices.
P2Required NowEvaluating
Access Control for Output Devices
Control physical access to output from monitors, printers, and scanners to prevent unauthorized viewing.
P3Required NowEvaluating
Monitoring Physical Access
Monitor facility access to detect incidents; review logs quarterly and coordinate with incident response.
P2Required NowEvaluating
Monitoring Physical Access | Intrusion Alarms and Surveillance
Monitor physical access to the facility using intrusion alarms and surveillance equipment.
P2Required NowEvaluating
Visitor Access Records
Maintain visitor access records for one year and review quarterly; report anomalies to security personnel.
P4Due Oct 2027Evaluating
Visitor Access Records | Limit PII Elements
Limit PII in visitor access records to the minimum necessary.
P4Due Oct 2027Evaluating
Power Equipment and Cabling
Protect data center power equipment and cabling from damage and destruction.
P2Due Oct 2027Evaluating
Emergency Shutoff
Provide accessible, protected emergency power shutoff capability in data centers.
P2Due Oct 2027Evaluating
Emergency Power
Provide a UPS for orderly shutdown or transition to alternate power in data centers.
P2Due Oct 2027Evaluating
Emergency Lighting
Maintain automatic emergency lighting covering evacuation routes in data centers.
P2Due Oct 2027Evaluating
Fire Protection
Maintain fire detection and suppression systems with independent energy sources in data centers.
P2Due Oct 2027Evaluating
Fire Protection | Detection Systems
Employ automatic fire detection systems that notify personnel and emergency responders.
P2Due Oct 2027Evaluating
Environmental Controls
Maintain adequate HVAC levels and monitor continuously in data centers.
P2Due Oct 2027Evaluating
Water Damage Protection
Protect data center systems from water damage via accessible master shutoff or isolation valves.
P2Due Oct 2027Evaluating
Delivery and Removal
Authorize and control system components entering/exiting the facility; maintain records.
P3Required NowEvaluating
Alternate Work Site
Employ controls at alternate work sites (telework), including area locking and device positioning to prevent unauthorized view.
P3Required NowEvaluating
MA

Maintenance

Pillar 2 · 9 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Maintenance Policy and Procedures
Develop, document, and disseminate a maintenance policy and procedures; review annually or after security incidents.
P2Due Oct 2027Evaluating
Controlled Maintenance
Schedule, document, and review maintenance; sanitize media before removal; verify controls post-maintenance; include mandatory data fields in records.
P3Due Oct 2027Evaluating
Maintenance Tools
Approve, control, and monitor maintenance tools; review previously approved tools prior to each use.
P4Due Oct 2027Evaluating
Inspect Tools
Inspect maintenance tools for improper or unauthorized modifications.
P4Due Oct 2027Evaluating
Inspect Media
Check media containing diagnostic and test programs for malicious code before use in the system.
P4Due Oct 2027Evaluating
Prevent Unauthorized Removal
Prevent the removal of maintenance equipment containing organizational info via sanitization, destruction, or explicit exemption.
P4Due Oct 2027Evaluating
Nonlocal Maintenance
Approve and monitor nonlocal maintenance; employ strong authentication (MFA); terminate sessions upon completion.
P3Due Oct 2027Evaluating
Maintenance Personnel
Maintain an authorized list of maintenance personnel; verify access authorizations; supervise non-authorized personnel.
P3Due Oct 2027Evaluating
Timely Maintenance
Obtain maintenance support and spare parts for critical components within agency-defined RTO/RPO limits.
P3Due Oct 2027Evaluating
5.20

Mobile Devices

Pillar 2 · 16 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
802.11 Wireless Protocols
Prohibit WEP/WPA; implement FIPS-compliant protocols. Managed APs must: (1) test for rogue APs, (2) maintain inventory, (3) secure placement, (4) test range, (8) disable SSID broadcast, (13) use FIPS protocols for management, (14) review logs monthly, and (15) insulate from wired network.
P1Required NowEvaluating
Cellular Service Abroad
Perform inspection of cellular devices before and after travel outside the U.S. to ensure all controls are in place and functioning.
P1Required NowEvaluating
Voice Transmissions Over Cellular Devices
Cellular devices used to transmit CJI via voice are exempt from encryption and authentication requirements.
P1Required NowEvaluating
Bluetooth Devices
Dictate Bluetooth usage based on agency operational processes to mitigate threats like DoS, eavesdropping, and MITM.
P1Required NowEvaluating
Mobile Hotspots
When hotspots are allowed: (1) enable encryption, (2) use non-identifiable SSIDs, (3) create PSKs, (4) enable port filtering, and (5) only allow agency-controlled connections.
P1Required NowEvaluating
Mobile Device Management (MDM)
Implement MDM for limited-feature OS to perform: (a) remote locking, (b) remote wiping, (c) configuration locking, (d) detection of rooted/jailbroken devices, (e) folder/disk encryption, and (k) automatic wiping after failed access attempts.
P1Required NowEvaluating
Wireless Device Risk Mitigations
Ensure devices: (1) apply critical patches immediately, (2) use local auth, (3) use AA for CJI access, (4) encrypt resident CJI, and (5) erase cached info/authenticators upon session termination.
P1Required NowEvaluating
Patching/Updates
Monitor mobile devices to ensure their patch and update state is current; apply critical upgrades as soon as they become available.
P1Required NowEvaluating
Malicious Code Protection
Agencies must have a process to approve specific software/applications. Use MDM to report software inventory to a central console to detect unauthorized apps.
P1Required NowEvaluating
Personal Firewall
Employ firewalls on full-featured OS devices to: (1) manage internet access, (2) block unsolicited connections, (3) filter by IP/Protocol, (4) filter by port, and (5) maintain an IP traffic log.
P1Required NowEvaluating
Incident Reporting
Develop enhanced procedures for mobile incidents: loss of control, total loss, compromise, or loss outside the U.S.
P1Required NowEvaluating
Access Control
On limited-feature operating systems, access control must be accomplished by the application that accesses CJI.
P1Required NowEvaluating
Local Device Authentication
Use local device authentication to unlock the device; authenticators must meet IA requirements.
P1Required NowEvaluating
Advanced Authentication
Use advanced authentication (MFA) for access to CJI from an authorized mobile device unless access is indirect.
P1Required NowEvaluating
Compensating Controls
CSO-approved compensating controls require: (1) MDM implementation, (2) device registration as identity proof, (3) use of device certificates, and (4) standard authenticator protection.
P1Required NowEvaluating
Device Certificates
Protect certificates from extraction; configure for remote wipe or self-deletion after failed attempts; use secure local auth to unlock.
P1Required NowEvaluating
AU

Audit & Accountability

Pillar 3 · 17 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Audit and Accountability Policy and Procedures
Develop, document, and disseminate an audit and accountability policy and procedures; review and update annually or after security incidents.
P2Required NowEvaluating
Event Logging
Identify and log specific events including logons, attempts to use/create/write/delete/change permissions, privileged actions, and audit log access attempts.
P2Due Oct 2027Evaluating
Content of Audit Records
Ensure audit records establish: what happened, when (hh:mm:ss.00), where, the source, the outcome, and the identities involved.
P2Required NowEvaluating
Additional Audit Information
Generate audit records with session duration, source/destination addresses, filenames, and number of bytes sent/received.
P2Required NowEvaluating
Limit Personally Identifiable Information Elements
Limit PII contained in audit records to the minimum necessary to achieve the purpose based on privacy risk assessment.
P2Due Oct 2027Evaluating
Audit Log Storage Capacity
Allocate sufficient audit log storage capacity to meet retention requirements.
P2Due Oct 2027Evaluating
Response to Audit Logging Process Failures
Alert personnel within one hour of logging failure; restart processes and verify system is logging properly.
P2Required NowEvaluating
Audit Record Review, Analysis, and Reporting
Review and analyze system audit records weekly for unusual activity; report findings to security/privacy officials.
P2Required NowEvaluating
Automated Process Integration
Integrate audit record review, analysis, and reporting processes using automated mechanisms.
P2Due Oct 2027Evaluating
Correlate Audit Record Repositories
Analyze and correlate audit records across different repositories (OS, App, DB) to gain situational awareness.
P2Due Oct 2027Evaluating
Audit Record Reduction and Report Generation
Provide audit record reduction and report generation that supports on-demand review without altering original content.
P3Due Oct 2027Evaluating
Automatic Processing
Provide the capability to sort and search audit records for events of interest based on AU-3 content.
P3Due Oct 2027Evaluating
Time Stamps
Use internal clocks to generate timestamps to the hundredths of a second (hh:mm:ss.00) using UTC or a fixed offset.
P2Required NowEvaluating
Protection of Audit Information
Protect audit information and tools from unauthorized access, modification, or deletion; alert upon detection of unauthorized access.
P2Required NowEvaluating
Access by Subset of Privileged Users
Authorize access to management of audit functionality only to specific personnel with audit/security responsibilities.
P2Due Oct 2027Evaluating
Audit Record Retention
Retain audit records for a minimum of one year or as needed for administrative/legal purposes.
P4Required NowEvaluating
Audit Record Generation
Provide audit record generation capability on all systems generating logs; allow authorized personnel to select event types.
P2Due Oct 2027Evaluating
SI

System & Information Integrity

Pillar 3 · 21 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
System and Information Integrity Policy and Procedures
Develop, document, and disseminate a system and information integrity policy; review and update annually or after security incidents.
P2Due Oct 2027Evaluating
Flaw Remediation
Identify, report, and correct system flaws; install critical updates within 15 days and high updates within 30 days.
P1Required NowEvaluating
Automated Flaw Remediation Status
Determine flaw remediation status using scanning tools at least quarterly or following security incidents involving CJI.
P1Required NowEvaluating
Malicious Code Protection
Implement signature-based protection at entry/exit points; perform daily scans; block or quarantine malicious code and alert administrators.
P1Required NowEvaluating
System Monitoring
Monitor for attacks, unauthorized connections, and system misuse; provide logs to security personnel weekly.
P1Required NowEvaluating
Automated Tools and Mechanisms for Real-Time Analysis
Employ automated tools (e.g., SIEM) to support near real-time analysis of events.
P1Required NowEvaluating
Inbound and Outbound Communications Traffic
Monitor communications traffic continuously for unusual activities, malicious signaling, or unauthorized exfiltration.
P1Required NowEvaluating
System-Generated Alerts
Alert personnel when system-generated indications of compromise or unusual activities occur.
P1Required NowEvaluating
Security Alerts, Advisories, and Directives
Receive and disseminate security alerts from sources like CISA and MS-ISAC; implement directives within established time frames.
P2Required NowEvaluating
Software, Firmware, and Information Integrity
Employ integrity verification tools (hashes, signatures) to detect unauthorized changes to software/CJI; notify personnel and implement IR.
P1Required NowEvaluating
Integrity Checks
Perform software, firmware, and information integrity checks at least weekly or in an automated fashion.
P1Required NowEvaluating
Integration of Detection and Response
Incorporate detection of unauthorized privilege elevation or configuration changes into the incident response capability.
P1Required NowEvaluating
Spam Protection
Employ spam protection at system entry/exit points to detect and act on unsolicited messages; update based on CM policy.
P3Required NowEvaluating
Automatic Updates
Automatically update spam protection mechanisms at least daily.
P3Due Oct 2027Evaluating
Information Input Validation
Validate the syntax and semantics of inputs to web/app servers, database servers, and any system processing CJI.
P1Required NowEvaluating
Error Handling
Generate error messages necessary for corrective actions without revealing exploitable info; reveal only to security personnel.
P3Due Oct 2027Evaluating
Information Management and Retention
Manage and retain information according to law, regulation, and operational requirements throughout the full lifecycle.
P3Required NowEvaluating
Limit Personally Identifiable Information Elements
Limit PII processed to the minimum necessary to achieve the collection purpose.
P3Required NowEvaluating
Minimize Personally Identifiable Information in Testing, Training, and Research
Use data obfuscation, randomization, or synthetic data to minimize PII for research, testing, or training.
P3Due Oct 2027Evaluating
Information Disposal
Dispose of, destroy, or erase information following the retention period as defined in MP-6.
P3Required NowEvaluating
Memory Protection
Implement data execution prevention (DEP) and address space layout randomization (ASLR) to protect system memory.
P2Due Oct 2027Evaluating
IR

Incident Response

Pillar 3 · 15 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Incident Response Policy and Procedures
Develop, document, and disseminate an incident response policy and procedures; review and update annually or after incidents.
P2Required NowEvaluating
Incident Response Training
Provide incident response training to users consistent with roles prior to system access and annually thereafter.
P2Required NowEvaluating
Incident Response Training | Breach
Provide training on identifying and responding to a breach, including the process for reporting PII loss.
P3Due Oct 2027Evaluating
Incident Response Testing
Test the effectiveness of the incident response capability annually using tabletop exercises or simulations.
P3Due Oct 2027Evaluating
Incident Response Testing | Coordination with Related Plans
Coordinate incident response testing with elements responsible for related plans (BCP, DRP, Occupant Emergency).
P3Due Oct 2027Evaluating
Incident Handling
Implement incident handling for preparation, detection, containment, eradication, and recovery; incorporate lessons learned.
P2Required NowEvaluating
Automated Incident Handling Processes
Support incident handling using automated mechanisms such as online management systems and live response data collection.
P2Required NowEvaluating
Incident Monitoring
Track and document incidents including status and pertinent forensics information.
P2Required NowEvaluating
Incident Reporting
Require personnel to report suspected incidents within one hour; notify confirmed incidents to the CSO or SIB Chief.
P2Due Oct 2027Evaluating
Automated Reporting
Report incidents using automated mechanisms such as email, website posting, or automated tools.
P2Required NowEvaluating
Supply Chain Coordination
Provide incident information to product/service providers and supply chain organizations related to the incident.
P2Due Oct 2027Evaluating
Incident Response Assistance
Provide a support resource (e.g., help desk, ticketing) that offers advice and assistance to users for handling incidents.
P3Required NowEvaluating
Automation Support for Availability
Increase availability of IR information and support using automated mechanisms like push/pull website queries.
P3Due Oct 2027Evaluating
Incident Response Plan
Develop an IRP that provides a roadmap, describes organization, defines metrics, and is approved annually by executive leadership.
P2Required NowEvaluating
Incident Response Plan | Breaches
Include a process to determine notice requirements and assess harm/mitigation for PII breaches in the IRP.
P2Due Oct 2027Evaluating
CP

Contingency Planning

Pillar 3 · 23 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Contingency Planning Policy and Procedures
Develop, document, and disseminate contingency planning policy and procedures; review and update annually or after incidents and exercises.
P2Due Oct 2027Evaluating
Contingency Plan
Develop a system contingency plan identifying essential functions, recovery objectives, priorities, roles, and full restoration without control deterioration.
P2Due Oct 2027Evaluating
Coordinate with Related Plans
Coordinate contingency plan development with organizational elements responsible for related plans (BCP, DRP, IRP).
P2Due Oct 2027Evaluating
Resume Mission and Business Functions
Plan for the resumption of essential mission and business functions within 24 hours of contingency plan activation.
P2Due Oct 2027Evaluating
Identify Critical Assets
Identify critical system assets supporting essential mission and business functions.
P2Due Oct 2027Evaluating
Contingency Training
Provide contingency training to users within 30 days of role assumption and annually thereafter; update content after incidents.
P3Due Oct 2027Evaluating
Contingency Plan Testing
Test the contingency plan annually using tabletop exercises or simulations; initiate corrective actions if needed.
P3Due Oct 2027Evaluating
Coordinate with Related Plans (Testing)
Coordinate contingency plan testing with organizational elements responsible for related plans.
P3Due Oct 2027Evaluating
Alternate Storage Site
Establish a geographically distinct alternate storage site with equivalent security controls for backup information.
P2Due Oct 2027Evaluating
Separation from Primary Site
Identify an alternate storage site sufficiently separated from the primary site to reduce susceptibility to same threats.
P2Due Oct 2027Evaluating
Accessibility
Identify potential accessibility problems to the alternate storage site in area-wide disruptions and outline mitigation.
P2Due Oct 2027Evaluating
Alternate Processing Site
Establish an alternate processing site with equivalent controls to resume functions within the time period defined in the plan.
P2Due Oct 2027Evaluating
Separation from Primary Site (Processing)
Identify an alternate processing site sufficiently separated from the primary site to reduce shared threat susceptibility.
P2Due Oct 2027Evaluating
Accessibility (Processing)
Identify potential accessibility problems to alternate processing sites in area-wide disruptions and outline mitigation.
P2Due Oct 2027Evaluating
Priority of Service
Develop alternate processing site agreements that contain priority-of-service provisions in accordance with recovery time objectives.
P2Due Oct 2027Evaluating
Telecommunications Services
Establish alternate telecommunications services to resume system operations when primary services are unavailable.
P2Due Oct 2027Evaluating
Priority of Service provisions
Develop service agreements with priority-of-service provisions and request TSP for national security emergency preparedness.
P2Due Oct 2027Evaluating
Single Points of Failure
Obtain alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary services.
P2Due Oct 2027Evaluating
System Backup
Conduct backups of user-level info, system-level info, and documentation; protect backup confidentiality and integrity.
P2Due Oct 2027Evaluating
Testing for Reliability and Integrity
Test backup information to verify media reliability and information integrity.
P2Due Oct 2027Evaluating
Cryptographic Protection
Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of CJI in backups.
P2Due Oct 2027Evaluating
System Recovery and Reconstitution
Provide for system recovery and reconstitution to a known state after disruption.
P2Due Oct 2027Evaluating
Transaction Recovery
Implement transaction recovery for transaction-based systems.
P2Due Oct 2027Evaluating
CM

Configuration Management

Pillar 4 · 24 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Policy and Procedures
Develop and disseminate a CM policy and procedures; review and update annually and following system changes.
P2Due Oct 2027Evaluating
Baseline Configuration
Maintain a current baseline configuration and topological drawing under configuration control; review annually and upon security-relevant changes.
P1Required NowEvaluating
Automation Support for Accuracy
Use automated mechanisms (e.g., config management tools) to maintain the baseline configuration.
P1Required NowEvaluating
Retention of Previous Configurations
Retain at least one previous version of baseline configurations to support rollback.
P1Required NowEvaluating
Configure Systems for High-Risk Areas
Issue devices with compliant configurations for travel to high-risk areas; examine and reimage upon return.
P1Required NowEvaluating
Configuration Change Control
Review, approve, and implement configuration changes with impact analyses; retain records for two years.
P2Due Oct 2027Evaluating
Testing, Validation, and Documentation of Changes
Test and validate changes before finalizing implementation.
P2Due Oct 2027Evaluating
Security and Privacy Representatives
Require security and privacy personnel to be members of the CCB/CAB.
P2Due Oct 2027Evaluating
Impact Analyses
Analyze changes for security/privacy impacts prior to implementation.
P3Due Oct 2027Evaluating
Verification of Controls
After system changes, verify impacted controls are operating as intended.
P3Due Oct 2027Evaluating
Access Restrictions for Change
Enforce physical and logical access restrictions for system changes.
P1Required NowEvaluating
Configuration Settings
Establish and implement restrictive configuration settings using benchmarks like CIS or STIGs; approve deviations.
P1Required NowEvaluating
Least Functionality
Configure system for essential capabilities only; prohibit unneeded ports, protocols, and services.
P1Required NowEvaluating
Least Functionality | Periodic Review
Review system annually to identify and remove unnecessary/nonsecure functions and services.
P1Required NowEvaluating
Least Functionality | Prevent Program Execution
Prevent program execution according to rules of behavior or software terms.
P1Required NowEvaluating
Least Functionality | Authorized Software-Allow-by-Exception
Employ a deny-all, permit-by-exception policy for software execution; review the authorized list annually.
P1Required NowEvaluating
System Component Inventory
Maintain a detailed inventory including model, serial number, manufacturer, and software version; review annually.
P1Required NowEvaluating
Updates During Installation and Removal
Update inventory during component installations, removals, and system updates.
P1Required NowEvaluating
Automated Unauthorized Component Detection
Detect and isolate unauthorized components continuously or at least weekly.
P1Required NowEvaluating
Configuration Management Plan
Develop and implement a CM plan addressing roles, responsibilities, and the system development life cycle.
P2Due Oct 2027Evaluating
Software Usage Restrictions
Use software in accordance with contracts and copyright; track quantity licenses; control peer-to-peer sharing.
P3Due Oct 2027Evaluating
User-Installed Software
Establish and enforce software installation policies via automated methods; monitor weekly.
P2Due Oct 2027Evaluating
Information Location
Document the location of CJI and the specific system components on which it resides.
P2Due Oct 2027Evaluating
Automated Tools to Support Information Location
Use automated tools to identify CJI on software and hardware system components.
P2Due Oct 2027Evaluating
RA

Risk Assessment

Pillar 4 · 9 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Risk Assessment Policy and Procedures
Develop, document, and disseminate a risk assessment policy and procedures; review annually or after security incidents.
P2Due Oct 2027Evaluating
Security Categorization
Categorize the system and CJI as "moderate" impact; document results and supporting rationale in the security plan; obtain AO approval.
P2Due Oct 2027Evaluating
Risk Assessment
Conduct risk assessments quarterly to identify threats and vulnerabilities; determine harm likelihood to assets and PII effects on individuals.
P2Due Oct 2027Evaluating
Vulnerability Monitoring and Scanning
Scan for vulnerabilities monthly and upon new reports; remediate Critical (15 days), High (30 days), Medium (60 days), and Low (90 days).
P1Required NowEvaluating
Update Vulnerabilities to Be Scanned
Update system vulnerabilities to be scanned within 24 hours prior to a new scan or upon new reports.
P1Required NowEvaluating
Privileged Access
Implement privileged access for vulnerability scanning activities requiring deep inspection of CJI-processing components.
P1Required NowEvaluating
Public Disclosure Program
Establish a publicly discoverable reporting channel for vulnerabilities that authorizes good-faith research.
P1Required NowEvaluating
Risk Response
Respond to assessment/audit findings in accordance with risk tolerance; generate POAM entries if mitigation is not immediate.
P2Due Oct 2027Evaluating
Criticality Analysis
Perform criticality analysis to identify critical components and functions at all stages of the SDLC.
P2Due Oct 2027Evaluating
SA

System & Services Acquisition

Pillar 4 · 18 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
System and Services Acquisition Policy and Procedures
Develop and disseminate an acquisition policy and procedures; review and update following security incidents.
P2Due Oct 2027Evaluating
Allocation of Resources
Determine high-level security/privacy requirements and allocate resources as part of capital planning.
P2Due Oct 2027Evaluating
System Development Life Cycle
Manage the system using a documented SDLC that integrates security and privacy risk management.
P2Due Oct 2027Evaluating
Acquisition Process
Include security/privacy requirements and acceptance criteria in acquisition contracts using defined language.
P2Due Oct 2027Evaluating
Functional Properties of Controls
Require developers to provide a description of the functional properties of the security controls.
P2Due Oct 2027Evaluating
Design and Implementation Information
Require developers to provide design and implementation info, including external interfaces and high-level designs.
P2Due Oct 2027Evaluating
Functions, Ports, Protocols, and Services
Require developers to identify functions, ports, protocols, and services intended for organizational use.
P2Due Oct 2027Evaluating
Use of Approved PIV Products
Employ only IT products on the FIPS 201-approved list for PIV capabilities.
P2Due Oct 2027Evaluating
System Documentation
Obtain or develop admin/user documentation describing secure configuration, vulnerabilities, and user responsibilities.
P3Due Oct 2027Evaluating
Security and Privacy Engineering Principles
Apply engineering principles such as layered protections, physical/logical boundaries, and threat modeling in the SDLC.
P2Due Oct 2027Evaluating
Minimization
Implement the principle of minimization using only the PII necessary to perform system engineering.
P2Due Oct 2027Evaluating
External System Services
Require external providers (e.g., government NCJA or private contractors) to sign MCAs or Security Addendums; conduct triennial audits.
P2Due Oct 2027Evaluating
Identification of Functions, Ports, Protocols, and Services
Require providers of external services with system connections to identify required ports, protocols, and services.
P2Due Oct 2027Evaluating
Developer Configuration Management
Require developers to perform configuration management, implement access restrictions for changes, and track security flaws.
P2Due Oct 2027Evaluating
Developer Testing and Evaluation
Require developers to perform comprehensive testing/regression testing and implement a verifiable flaw remediation process.
P2Due Oct 2027Evaluating
Development Process, Standards, and Tools
Require developers to follow a documented process that addresses security/privacy and identifies standards and tools used.
P3Due Oct 2027Evaluating
Development Process | Criticality Analysis
Require the developer to perform a criticality analysis at SDLC decision points using comprehensive testing.
P3Due Oct 2027Evaluating
Unsupported System Components
Replace system components when support is no longer available; provide options for alternative support if replacement is not feasible.
P2Due Oct 2027Evaluating
SR

Supply Chain Risk Management

Pillar 4 · 7 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Supply Chain Risk Management Policy and Procedures
Develop and disseminate an SCRM policy and procedures; review annually or after security incidents involving CJI systems.
P2Due Oct 2027Evaluating
Supply Chain Risk Management Plan
Develop a plan for managing supply chain risks across the SDLC; review annually and protect the plan from unauthorized disclosure.
P3Due Oct 2027Evaluating
Supply Chain Risk Management Plan | Establish SCRM Team
Establish a cross-functional SCRM team (Security, IT, Legal, Acquisition) to lead and support supply chain risk activities.
P3Due Oct 2027Evaluating
Acquisition Strategies, Tools, and Methods
Use preferred suppliers who provide attestation of compliance with federal or state standards to mitigate supply chain risk.
P2Due Oct 2027Evaluating
Notification Agreements
Establish procedures and agreements with supply chain entities for the notification of compromises to CJI systems.
P3Due Oct 2027Evaluating
Inspection of Systems or Components
Inspect CJI systems and components upon initial procurement and periodically to detect tampering.
P3Due Oct 2027Evaluating
Component Disposal
Dispose of CJI using techniques and methods described in the Media Protection (MP) family.
P3Due Oct 2027Evaluating
PL

Planning

Pillar 4 · 8 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Planning Policy and Procedures
Develop, document, and disseminate a planning policy and procedures; review and update annually or after security incidents.
P2Due Oct 2027Evaluating
System Security and Privacy Plans
Develop plans consistent with enterprise architecture that define components, operational context, roles, info types, and security categorization.
P2Due Oct 2027Evaluating
Rules of Behavior
Establish expected behavior rules for system usage; receive documented acknowledgment from users annually or upon revision.
P3Due Oct 2027Evaluating
Rules of Behavior | Social Media and External Site Restrictions
Include restrictions on social media use, posting organizational info on public sites, and using org identifiers for external accounts.
P3Due Oct 2027Evaluating
Security and Privacy Architectures
Develop architectures describing protection approaches for CIA and PII; describe dependencies on external systems and review annually.
P2Due Oct 2027Evaluating
Central Management
The CJISSECPOL is centrally managed by the FBI CJIS ISO.
P4Due Oct 2027Evaluating
Baseline Selection
Select a control baseline for the system based on stakeholder needs and impact levels.
P3Due Oct 2027Evaluating
Baseline Tailoring
Tailor the selected baseline by applying scoping considerations, selecting compensating controls, and assigning parameter values.
P3Due Oct 2027Evaluating
CA

Assessment, Authorization & Monitoring

Pillar 4 · 11 controls
Control IDRequirementPriorityCJISSECPOL v6.0 § 1.4Sanctionable now: [Existing] controls & P1 modernized controls (since Oct 1, 2024)Zero-cycle: P2–P4 non-existing controls become sanctionable Oct 1, 2027Priority (P1–P4) indicates recommended implementation order, not deadline.SanctionableStatus
Assessment, Authorization, and Monitoring Policy and Procedures
Develop, document, and disseminate policies and procedures for system assessment, authorization, and monitoring; review and update annually.
P2Due Oct 2027Evaluating
Control Assessments
Assess system controls at least once every three years to determine if they are implemented correctly and operating as intended.
P3Due Oct 2027Evaluating
Independent Assessors
Employ independent assessors or assessment teams, free from conflicts of interest, to conduct control assessments.
P3Due Oct 2027Evaluating
Information Exchange Agreements
Manage information exchange via signed written agreements (MOU/ISA) that specify standards, audits, and sanctions.
P2Required NowEvaluating
Secondary Dissemination Logging
Log the dissemination of CHRI when released to an authorized agency that is not part of the primary information exchange agreement.
P2Required NowEvaluating
Plan of Action and Milestones
Develop a POAM to track remedial actions for identified weaknesses; update at least every six months.
P4Due Oct 2027Evaluating
Authorization
Assign a senior official to authorize system operation and accept risk; update authorizations at least every three years.
P3Due Oct 2027Evaluating
Continuous Monitoring
Implement a continuous monitoring strategy including metrics for Account Management, Remote Access, and System Monitoring; report status annually.
P1Required NowEvaluating
Independent Assessment (Monitoring)
Employ independent assessors or assessment teams to monitor system controls on an ongoing basis.
P1Required NowEvaluating
Risk Monitoring
Ensure risk monitoring includes effectiveness, compliance, and change monitoring integrated into the continuous monitoring strategy.
P1Required NowEvaluating
Internal System Connections
Authorize and document internal connections (components processing/storing CJI); review continued need annually.
P3Due Oct 2027Evaluating

Questions about our compliance posture?

Walk through our CJIS implementation with a member of our team.

Schedule a Walkthrough

Or read the CJIS Compliance Guide for the full narrative.