cjis security policy - oregon · 2019-10-25 · cjis security policy written by the user community...

114
1 Information Technology Security and the CJIS Security Policy Nicholas Harris CJIS Information Security Officer Oregon State Police [email protected] (503)302-7269 UNCLASSIFIED//FOUO 1

Upload: others

Post on 03-Jul-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

1

Information Technology Security and the CJIS Security Policy

Nicholas HarrisCJIS Information Security OfficerOregon State [email protected](503)302-7269

UNCLASSIFIED//FOUO1

Page 2: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

OBJECTIVE

Why does OSP audit?

What is the CJIS Security Policy?

Where does the CJIS Security Policy come from?

What is criminal justice information(CJI)?

What to expect from an OSP IT audit?

UNCLASSIFIED//FOUO2

Page 3: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

OBJECTIVE

What are the top noncompliance issues?

Discussion of policy for top noncompliance issues

UNCLASSIFIED//FOUO3

Page 4: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SHARED MANAGEMENT

Where does CJI come from?

– Local, state, tribal, and federal agencies

Because the information is shared…

– The FBI CJIS Division employs shared management philosophy

UNCLASSIFIED//FOUO4

Page 5: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SHARED MANAGEMENT

What does ‘shared management’ mean?

– The FBI CJIS Division and its user community share responsibility for operation and management of

shared information systems

UNCLASSIFIED//FOUO5

Page 6: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SHARED MANAGEMENT

How does ‘shared management’ work?

– CJIS Systems Agency (CSA)

– CJIS Systems Officer (CSO)

– CJIS Information Security Officer (CISO)

– CJIS Advisory Process

The CJIS Advisory Process is used to…

– Establish a minimum standard of requirements to ensure continuity of information protection

(write minimum policy standards)UNCLASSIFIED//FOUO

6

Page 7: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ADVISORY POLICY BOARD

What does the Advisory Policy Board (APB) govern?

– CJI obtained by criminal justice agencies for criminal justice purposes

UNCLASSIFIED//FOUO7

Page 8: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

COMPACT COUNCIL

What does the National Crime Prevention and Privacy Compact Council (Council) govern?

– CJI obtained by all agencies for noncriminal justice purposes

UNCLASSIFIED//FOUO8

Page 9: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS SECURITY POLICY

Written by the user community (through the CJIS Advisory Process)

Published yearly

Current Version 5.6

Provides minimum standard for IT security of CJI across the nation

Over 600 ‘shall’ statementsUNCLASSIFIED//FOUO

9

Page 10: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS SECURITY POLICY

Where do the requirements come from?

– Although the CJIS Security Policy is written by the user community in conjunction with the FBI through the Advisory Process, the requirements and language are often borrowed from the National Institute of Standards and Technology (NIST) [a part of the United States Department of Commerce]

UNCLASSIFIED//FOUO10

Page 11: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CRIMINAL JUSTICE INFORMATION

Definition:

– ‘Criminal Justice Information’ is the term used to refer to all of the FBI CJIS Division provided data necessary for law enforcement and civil agencies to perform their missions including, but not limited to biometric, identity history, biographic, property, and case/incident history data (i.e. any information obtained from the FBI)

UNCLASSIFIED//FOUO11

Page 12: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CRIMINAL JUSTICE INFORMATION

What does this mean?

– CJI taken from FBI systems and copied, transposed, or scanned into local agency information systems (e.g. a records management system [RMS]) is still considered CJI and still falls under the scope of the CJIS Security Policy

UNCLASSIFIED//FOUO12

Page 13: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS AUDIT UNIT

Why does OSP audit?

– Formal audits are conducted to ensure compliance with applicable statutes, regulations and policies

– Information housed in CJIS systems is obtained from the user community; the audit ensures that all agencies with access protect the data of the community at large

UNCLASSIFIED//FOUO13

Page 14: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS AUDIT UNIT

Who does the OSP audit?

– Each CJA and or NCJA every three (3) years

– Vendors who have contractual CJIS with Oregon Agencies

Who participates?

– CJIS ISO visits the CJA/NCJA and small statistical sample of local agencies (number varies based on resources)

– Looks for trends in the stateUNCLASSIFIED//FOUO

14

Page 15: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS AUDIT UNIT

What is the general audit process for the Agency

–4 to 6 weeks prior

• Initial contact to local agency

• Pre-audit material forwarded electronically

UNCLASSIFIED//FOUO16

Page 16: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS AUDIT UNIT

What does the pre-audit material include?

‒ Provides general idea of topic areas that will be discussed

‒ List of documentation the agency is required to provide

‒ Provides an idea of who to have present during the audit

UNCLASSIFIED//FOUO17

Page 17: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS AUDIT UNIT

What happens the day of the audit?

‒ Administrative Interview

‒ Physical Security Inspection

• Tour of the facility/datacenter

‒ Policy Assessment Packet

• Summarizes issues/concerns found

UNCLASSIFIED//FOUO18

Page 18: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS AUDIT UNIT

What happens after the audit?

–60 days after (workload permitting)

• Agency gets official draft report

–120 days after (workload permitting)

• Response from Agency due

UNCLASSIFIED//FOUO19

Page 19: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CJIS AUDIT UNIT

What happens after the audit?

‒ APB Compliance Evaluation Subcommittee (CES)

• Criminal Justice

‒ Compact Council Sanctions Committee

• Noncriminal Justice

• III misuse by Criminal Justice

UNCLASSIFIED//FOUO20

Page 20: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

NATIONAL AUDIT RESULTS

UNCLASSIFIED//FOUO21

Criminal Justice Agencies

Event Logging

Encryption

System Use Notification

Advanced Authentication

Security Awareness Training

Management Control Agreements

Security Addendums

Media Disposal

Page 21: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

NATIONAL AUDIT RESULTS

UNCLASSIFIED//FOUO22

Noncriminal Justice Agencies

Contracted Noncriminal Justice Functions

Encryption

Event Logging

Personally Owned Computers

Mobile Devices

System Use Notification

Identification / User ID

Authentication (Passwords)

Page 22: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

NATIONAL AUDIT RESULTS

UNCLASSIFIED//FOUO23

CJA Top Findings NCJA Top Findings

Personally Owned Computers Contracted Noncriminal Justice Functions

Security Addendums Personally Owned Computers

Encryption Security Incident Response

Advanced Authentication Security Awareness Training

Event Logging Encryption

Security Incident Response Physical Security

Management Control Agreements Media Disposal

Media Protection Mobile Devices

Security Awareness Training Authentication (Passwords)

Page 23: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

NATIONAL AUDIT RESULTS

UNCLASSIFIED//FOUO24

Top Findings at both CJA and NCJA

Contractors (MCA/Security Addendum/Outsourcing)

Personally Owned Computers

Security Incident Response

Encryption

Security Awareness Training

Page 24: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

FORMAL AGREEMENTS

Before exchanging information…

– Ensure a formal agreement is in place that specifies the terms of the relationship

• Usage and dissemination restrictions

• Access restrictions and training requirements

• Physical and technical security controls for storage of information

• Division of the roles and responsibilities

• Security incident reporting procedures

UNCLASSIFIED//FOUO25

Page 25: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

FORMAL AGREEMENTS

UNCLASSIFIED//FOUO26

AuthorizedRecipient

Performing Services Type of Service Agreement Needed

CJA NCJA Criminal JusticeManagement Control

Agreement

CJA Private Contractor Criminal Justice Security Addendum

CJA CJA Criminal JusticeInformation Exchange

Agreement

Page 26: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

FORMAL AGREEMENTS

Management Control Agreement

– Signed between the CJA agency head and the agency head of the noncriminal justice agency

Applies only if ALL of the following are met:

Using any outside noncriminal justice governmental agency

To perform a criminal justice function

With unescorted access to unencrypted CJI UNCLASSIFIED//FOUO

27

Page 27: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

FORMAL AGREEMENTS

CJIS Security Addendum

– Signed by each unescorted private contractor

– Cannot be altered/substituted

Applies only if ALL of the following are met:

Using any outside personnel (not governmental)

To perform a criminal justice function

With unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO28

Page 28: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Sheriff’s Office (a CJA) is receiving IT services from the County Department of Information Technology (a NCJA). IT services include desktop support and network administration. The information systems, containing CJI, are housed at the county IT data center with all other county government departments. All County IT personnel have unescorted access to the data center. The racks housing the Sheriff’s Office equipment are not locked and the CJI is not

encrypted at rest.

UNCLASSIFIED//FOUO29

Page 29: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need a management control agreement?

Using any outside noncriminal justice governmental agency

To perform a criminal justice function

With unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO30

Page 30: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO31

Page 31: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Police Department (a CJA) is receiving custodial services from the City Facilities Department (a NCJA). Personnel are paid from Facilities budget and answer to the Director of City Facilities. All custodial personnel are allowed unescorted access to the Police Department, including

secure terminal areas.UNCLASSIFIED//FOUO

32

Page 32: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need a management control agreement?

Using any outside noncriminal justice governmental agency

X To perform a criminal justice function

With unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO33

Page 33: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

NO

UNCLASSIFIED//FOUO34

Page 34: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The 911 Dispatch Center (a NCJA) provides MDTs for the Police Department (a CJA). The MDT application servers and networking are controlled and maintained by the 911 Center. The MDT laptops are issued and owned by the Police Department and are connected to the 911 via VPN connection.

UNCLASSIFIED//FOUO35

Page 35: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need a management control agreement?

Using any outside noncriminal justice governmental agency

To perform a criminal justice function

With unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO36

Page 36: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO37

Page 37: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Sheriff’s Office (a CJA) is using a local cloud storage company to store RMS backups containing CJI. The backups are encrypted at rest by the Sheriff’s Office IT prior to leaving the facility and the Sheriff’s Office manages the key infrastructure. The cloud vendor cannot unencrypt the data.

UNCLASSIFIED//FOUO38

Page 38: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need a signed CJIS Security Addendum?

Using any outside personnel (not governmental)

To perform a criminal justice function

X With unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO39

Page 39: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

NO

UNCLASSIFIED//FOUO40

Page 40: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Police Department (a CJA) rents copiers from a private company. The copiers are being used by agency personnel to copy and/or scan CJI data. Every 2 years the copiers are replaced. The private company sends the CJA a certificate of destruction of all the hard drives.

UNCLASSIFIED//FOUO41

Page 41: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need a signed CJIS Security Addendum?

Using any outside personnel (not governmental)

To perform a criminal justice function

With unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO42

Page 42: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO43

Page 43: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

City IT (a NCJA governmental) provides IT services and media destruction to a local Police Department (a CJA). City IT personnel have access to all of the Police Departments information systems containing CJI. The City IT has a subcontract with a local company for physical and electronic media destruction of all the city’s media including the Police Department. Shredding is not witnessed by City IT.

UNCLASSIFIED//FOUO44

Page 44: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need a management control agreement?

Using any outside noncriminal justice governmental agency

To perform a criminal justice function

With unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO45

Page 45: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO46

Page 46: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need a signed CJIS Security Addendum?

Using any outside personnel (not governmental)

To perform a criminal justice function

With unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO47

Page 47: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO48

Page 48: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

PERSONNEL SECURITY

Who needs a fingerprint-based record check for access to CJI?

– All personnel with unescorted access to unencrypted CJI (whether access is physical or logical)

UNCLASSIFIED//FOUO49

Page 49: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Sheriff’s Office (a CJA) is receiving IT services from the County Department of Information Technology (a NCJA). IT services include desktop support and network administration. The information systems, containing CJI, are housed at the county IT data center with all other county government departments. All County IT personnel have unescorted access to the data center. The racks housing the Sheriff’s Office equipment are not locked and the CJI is not

encrypted at rest.

UNCLASSIFIED//FOUO50

Page 50: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need to submit fingerprints?

unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO51

Page 51: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO52

Page 52: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Police Department (a CJA) is archiving all backup tapes with the City Archive Department (a NCJA). The tapes, containing CJI, are not encrypted at rest. A CJA employee takes the backup tapes to the Archive warehouse every Tuesday and locks the tapes within a CJA designated cage within the warehouse. State Archive personnel have key access to the cage for emergency purposes only but are supposed to request permission from the CJA prior to entry.

UNCLASSIFIED//FOUO53

Page 53: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need to submit fingerprints?

unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO54

Page 54: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO55

Page 55: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Sheriff’s Office (CJA) is using a well-known vendor for their mobile data terminal (MDT) direct access information system. The information system is administered by the vendor through remote maintenance (which is not initiated or monitored by the CJA). The private contractor has advised that they service many CJAs throughout the country and have been vetted in several other states.

UNCLASSIFIED//FOUO56

Page 56: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need to submit fingerprints?

unescorted access to unencrypted CJI

UNCLASSIFIED//FOUO57

Page 57: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO58

Page 58: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SECURITY AWARENESS TRAINING

Who needs to complete security awareness training?

– All personnel with unescorted access to unencrypted CJI (whether access is physical or logical)

UNCLASSIFIED//FOUO59

Page 59: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SECURITY AWARENESS TRAINING

When is security awareness training required?

– Within 6 months of unescorted access

– At least once every 2 years

UNCLASSIFIED//FOUO60

Page 60: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SECURITY AWARENESS TRAINING

What needs to be in the training?

– Level 1 – those with physical access only (not

performing a criminal justice function – incidental access or “walking around access”) [i.e. janitorial, maintenance, coke vendors, etc.]

– Level 2 – those with physical access only performing a criminal justice function (access

on purpose) [i.e. paper shredding, records clerks, scanning services, couriers, etc.]

UNCLASSIFIED//FOUO61

Page 61: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SECURITY AWARENESS TRAINING

What needs to be in the training?

– Level 3 – those with physical and logical access (access to electronically see criminal justice info) [i.e. the

majority of your staff, terminal operators, record entry, officer w/ mdts, etc.]

– Level 4 – those with IT

UNCLASSIFIED//FOUO62

Page 62: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

WRITTEN POLICY STANDARDS

All important policy and procedures should be written for consistency and continuity of information…

– Standards of discipline for misuse

– Physical protection

– Secure media storage, transport, and sanitization/disposal

– Account management

– Proper use/access from remote locations, using

personal devices, mobile devices, etc.

– Incident reporting UNCLASSIFIED//FOUO

63

Page 63: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

MEDIA PROTECTION

Controlled access – at rest and in transit

ID Verification and escort of visitor

Secure sanitization/destruction

– Authorized personnel

– Witnessed

– At least 3 passes for wipes

UNCLASSIFIED//FOUO64

Page 64: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SYSTEM USE NOTIFICATION

The system use notification shall provide the following:– The user is accessing a restricted information system

– System usage may be monitored, recorded, and subject to audit

– Unauthorized use of the system is prohibited and may be subject to criminal and/or civil penalties

– Use of the system indicated consent to monitoring

and recording

UNCLASSIFIED//FOUO65

Page 65: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SYSTEM USE NOTIFICATION

The system use notification must remain on the screen until user acknowledges the notification and takes explicit action to log in

UNCLASSIFIED//FOUO66

Page 66: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

IDENTIFICATION

Each user shall be uniquely identified

– No shared user accounts, no generic log in (especially includes remote maintenance by administrative IT personnel or private contractors)

Least privilege

Need–to–know

UNCLASSIFIED//FOUO67

Page 67: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

IDENTIFICATION

Agency should have written policy and procedures for issuing user accounts as well as disabling and/or deleting of user accounts and performing validation of user accounts (annual audit of access)

UNCLASSIFIED//FOUO68

Page 68: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

AUTHENTICATION

Passwords

– Minimum of 8 characters

– Numbers, letters, and special characters

– Cannot be same as UserID

– Expire in maximum of 90 days

– Cannot reuse previous 10

– Not transmitted in clear outside secure

location

UNCLASSIFIED//FOUO69

Page 69: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ADVANCED AUTHENTICATION

What is two-factor authentication?

1. Something you know (username and password)

2. AND one of the following

• Something you are (biometrics)

• Something you have (token, one-time-password, etc.)

UNCLASSIFIED//FOUO70

Page 70: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ADVANCED AUTHENTICATION

When is advanced authentication (AA) required?

– Direct access information systems accessed outside the physically secure location

– This will affect the following:

– User population

– Remote maintenance to direct access system

UNCLASSIFIED//FOUO71

Page 71: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ADVANCED AUTHENTICATION

When is AA NOT required?

– Access from within the physically secure location

– Indirect access from outside the physically secure location

UNCLASSIFIED//FOUO72

Page 72: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ADVANCED AUTHENTICATION

Its important to note

– Mobile devices that cannot support a full-featured operating system, may use compensating controls (e.g. mobile device management [MDM]) in lieu of AA as a temporary solution

UNCLASSIFIED//FOUO73

Page 73: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ADVANCED AUTHENTICATION

AA in the criminal justice conveyance – A criminal justice conveyance is considered a physically

secure location and therefore, when officers are directly accessing CJI from within a criminal justice conveyance, AA is not required as long as the enclosed vehicle is meeting 5.9.1.3

UNCLASSIFIED//FOUO74

Page 74: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ADVANCED AUTHENTICATION

AA in the criminal justice conveyance

– Mobile devices that cannot be removed or operate outside the criminal justice conveyance do not require AA

– Conversely, mobile devices that can receive direct transactional responses from outside the criminal justice conveyance must implement AA

– The APB did NOT approve written policy as a control to prevent use of an MDT outside the criminal justice conveyance as sufficient to meet the exemption

UNCLASSIFIED//FOUO75

Page 75: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

A Police Department (a CJA) has mobile data terminals (MDTs) with direct access mounted within the police vehicle. The officers, by policy, remove the MDT from the vehicle each night and store within their home. The modem is in the trunk and the MDT cannot connect to the Police Department network to access CJI from outside the vehicle.

UNCLASSIFIED//FOUO76

Page 76: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need advanced authentication?

Direct access information system

Accessed from a physically secure location (criminal justice conveyance)

Will not work if removed from the secure location

UNCLASSIFIED//FOUO77

Page 77: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

NO

UNCLASSIFIED//FOUO78

Page 78: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Here is why…

Although the officers have direct access to CJI, they cannot initiate a direct access transaction from outside the criminal justice conveyance, which is considered a physically secure location.

UNCLASSIFIED//FOUO79

Page 79: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

A Police Department (a CJA) is using RMS software administered by private contractor. Private contractor personnel remote login at their leisure (session is not initiated by CJA) to the RMS server. The RMS is a direct access information system (i.e. can initiate transactions directly to the state /FBI). The CJA does not virtually escort contractors.

UNCLASSIFIED//FOUO80

Page 80: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need advanced authentication?

Direct access information system

Accessed from outside the physically secure location

Contractors can grant themselves direct access (as administrators)

UNCLASSIFIED//FOUO81

Page 81: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO82

Page 82: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Here is why…

Because the private contractor personnel have remote access (access outside the physically secure location) to a direct access information system, they must utilize AA prior to accessing the direct access RMS.

Note: IT administrators, whether internal or external to the CJA, with elevated privileges pose a higher risk to CJI and the state/national network because of the nature of their knowledge and privileges within

the network/system. UNCLASSIFIED//FOUO

83

Page 83: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Police Department (a CJA) utilizes tablets (with a Windows 7 OS – full operating system) that have access to the agency’s RMS. Although the RMS contains CJI, the system cannot perform transactional queries (run transactions).

UNCLASSIFIED//FOUO84

Page 84: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need advanced authentication?

Indirect access information system (cannot run transactions)

UNCLASSIFIED//FOUO85

Page 85: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

NO

UNCLASSIFIED//FOUO86

Page 86: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Here is why…

Although CJA personnel have access to CJI through the RMS from outside a physically secure location, the RMS is an indirect information system and therefore does not require the implementation of AA.

UNCLASSIFIED//FOUO87

Page 87: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ENCRYPTION

When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately encrypted

– Encryption for data in transit shall be a minimum of 128 bit and certified to meet FIPS 140-2 standards

UNCLASSIFIED//FOUO88

Page 88: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ENCRYPTION

When CJI is at rest (i.e. stored electronically) outside the boundary of the physically secure location, the data shall be encrypted

– Encryption for data at rest can be a minimum of 256 bit and FIPS 197

UNCLASSIFIED//FOUO89

Page 89: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

A Police Department (a CJA) has 4 precincts throughout the city which are connected by city owned fiber (city-wide WAN) to access their RMS system, which contains CJI. The city WAN is owned, operating, and maintained by the City IT Department, which has been authorized by the Police Department (thorough an MCA, fingerprints, and security awareness training).

UNCLASSIFIED//FOUO90

Page 90: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need encryption?

Contains CJI

Accessed/transmitted outside a physically secure location (from the RMS server location to 4 precincts throughout the city)

UNCLASSIFIED//FOUO91

Page 91: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO92

Page 92: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Here is why…

Although the city owns, maintains, and operates the fiber connections transmitting CJI across the city, the CJA is unable to ensure physical access to the fiber is by authorized personnel only (fingerprinted, trained, etc.) for the entire length of the connection. Because the agency is unable to ensure all five conditions to meet the exemption, at least 128 bit FIPS 140-2 certified encryption must be employed between physically secure precincts.

UNCLASSIFIED//FOUO93

Page 93: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

ENCRYPTION

Exception to encryption in transit only when…

– Agency owns, operates, manages, or protects medium

– Medium terminates within physically secure location on both ends, no interconnections

– Physical access to the medium is controlled by the agency using the requirements of 5.9 and 5.12 (fingerprint-based record check)

– Protection includes safeguards/countermeasures

– Prior approval of the CSO

UNCLASSIFIED//FOUO94

Page 94: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Sheriff’s Office (a CJA) MDT server, a direct access information system, is located within the Sheriff’s Office main building. The Sheriff’s Office is using ‘Local Teleco’ provided aircards to connect laptops to the MDT server in order to run transactions in the criminal justice conveyance. The laptops are mounted and locked/secured in the physically secure

criminal justice conveyance. UNCLASSIFIED//FOUO

95

Page 95: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need encryption?

Contains CJI

Accessed/transmitted outside a physically secure location (from the MDT server location to criminal justice conveyance)

UNCLASSIFIED//FOUO96

Page 96: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO97

Page 97: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Here is why…

When CJI is transmitted outside the physically secure location (between the Sheriff’s office and the criminal justice conveyance), at least 128 bit FIPS 140-2 encryption must be employed.

UNCLASSIFIED//FOUO98

Page 98: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Police Department (a CJA) using a private contractor to service their MDT application, a direct access information system. The MDT server is located within the Police Department. Private contractor personnel have remote access to the server, and CJI, using a virtual private network (VPN).

UNCLASSIFIED//FOUO99

Page 99: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need encryption in transit?

Contains CJI

Accessed from outside a physically secure location (remote access from anywhere)

UNCLASSIFIED//FOUO100

Page 100: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO101

Page 101: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Here is why…

When CJI is accessed outside the physically secure location (between the Police Department where the server is and the contractors laptop), at least 128 bit FIPS 140-2 encryption must be employed.

UNCLASSIFIED//FOUO102

Page 102: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

A Police Department (a CJA) is using a cloud vendor to store their backups of their RMS data, containing CJI. Backups of the data are encrypted by the Police Department using at least 256 bit FIPS 197 encryption prior to being sent via the internet to the cloud vendor’s facility in a neighboring state.

UNCLASSIFIED//FOUO103

Page 103: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need encryption in transit?

Contains CJI

Transmitted outside a physically secure location (from the agency to cloud)

UNCLASSIFIED//FOUO104

Page 104: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO105

Page 105: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Here is why…

Although the 256 bit FIPS 197 encryption can be used for the data at rest in the cloud vendor’s facility (a non-secure location), because the information is sent via the internet (outside the secure location of the Police Department) the standard must be at least 128 bit FIPS 140-2 certified encryption. The agency can either encrypt the data at rest to the higher FIPS 140-2 standard or send the information as is (197) using FIPS 140-2 encryption on the connection method (e.g. VPN).

UNCLASSIFIED//FOUO106

Page 106: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

The Police Department (a CJA) has a disaster recovery (DR) site that is managed by the city IT Department (a NCJA) [which has been authorized through an MCA, fingerprint checks, and training]. Backups of the information system, containing CJI, are replicated using a virtual storage area network (SAN) from the PD to the DR [SAN to SAN]. The CJA is not encrypting the data at rest prior to transit.

UNCLASSIFIED//FOUO107

Page 107: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Does the CJA need encryption in transit?

Contains CJI

Transmitted outside a physically secure location (from the agency to DR)

UNCLASSIFIED//FOUO108

Page 108: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

YES

UNCLASSIFIED//FOUO109

Page 109: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

SCENARIO

Here is why…

When CJI is transmitted outside the physically secure location (between the PD and DR location), at least 128 bit FIPS 140-2 encryption must be employed.

Note: Proprietary segmentation of the data prior to transit is not equivalent to encryption and does not exempt the agency from encryption requirements.

UNCLASSIFIED//FOUO110

Page 110: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

EVENT LOGGING

If a security related event took place (i.e. a breach of your information)…

– Who did it

– When it happened

– What happened

UNCLASSIFIED//FOUO111

Page 111: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

EVENT LOGGING

Log content

Weekly review of audit logs

Retain for minimum of 365 days

UNCLASSIFIED//FOUO112

Page 112: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

MOBILE DEVICES

Limited featured operating systems cannot support certain IT security controls

Mobile device management (MDM)

Unique concerns for usage restrictions and implementation guidelines

UNCLASSIFIED//FOUO113

Page 113: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CLOUD COMPUTING

Physical and logical access control

Metadata/data mining/analytics

Data recovery/sanitization

UNCLASSIFIED//FOUO114

Page 114: CJIS Security Policy - Oregon · 2019-10-25 · CJIS SECURITY POLICY Written by the user community (through the CJIS Advisory Process) Published yearly Current Version 5.6 Provides

CONTACT INFORMATION

Nicholas Harris

CJIS Information Security Officer

(503) 302-7269

<[email protected]>

UNCLASSIFIED//FOUO115