When law enforcement and government agencies share data and intelligence, the ability to track criminals, solve crimes, find missing people, and provide a better standard of public service becomes much more effective. This sounds like an obvious win, so how come law enforcement agencies have been slow to embrace cloud computing and the collaboration benefits it provides? To understand their hesitation, it helps to look at the history of Criminal Justice Information Services (CJIS).
What is CJIS?
Established in 1992 and known as CJIS, the Criminal Justice Information Services division of the FBI is a high-tech intelligence hub housed in the hills of West Virginia. Linking nearly 18,000 law enforcement agencies across the country to a massive database of crime reports, fingerprints, and other agency data, the CJIS gives law enforcement, national security, and intelligence community partners the information they need to protect the United States, while preserving civil liberties.
History of the CJIS and Compliance
CJIS policies cover best practices in wireless networking, remote access, data encryption, and multiple authentication. For CJIS security policy to be effective, however, cooperation across various levels of government is required. Complicating matters further, there is no nationwide, uniform certification system for CJIS compliance. Instead, each state government manages CJIS compliance semi-independently through a state-appointed CJIS Systems Officer (CSO) who administers policy for computers, networks, and other parts of the CJIS infrastructure. The CSO is also tasked with ensuring that organizations are obeying regulations, documenting compliance, and reporting back to the FBI. This hodge-podge of similar-but-different rules being used across the country, and other government red tape surrounding CJIS compliance, has deterred many law enforcement organizations from sharing data in order to keep their nose clean.
Challenges Concerning CJIS Compliance for Government Agencies
If law enforcement and government agencies are encouraged to share data, even across jurisdictions, why does CJIS compliance make it so difficult to accomplish? Obviously, CJIS data is highly sensitive, so organizations running within a CJIS-compliant cloud need cloud computing security policies in place governing those that have access to data—from the cloud provider to internal clerical and IT support staff. That’s not all; data-at-rest and data-in-motion also need to be compliant. Meaning all organizations must use at least 128-bit encryption to protect digital intelligence while in storage or transit so hackers and spies cannot employ deciphering techniques.
How Can Your Government Agency Maintain CJIS Compliance?
One of the best ways to ensure your government agency is consistently maintaining CJIS compliance is to work with a trusted, CJIS compliant cloud provider. Having experts on your side who know the ins and outs of compliance regulations means your internal team can focus on more important tasks instead of worrying about compliance! When considering cloud solutions, CJIS-bound agencies must look for cloud storage providers with heightened security following all CJIS compliance requirements, along with flexible, budget-friendly options.
Tips for Choosing a CJIS Compliant Cloud Provider for Your Government Agency
Choosing a reputable cloud services provider is crucial for government and law enforcement agencies migrating to the cloud. To minimize risk and maintain the security of critical information, be sure that your potential provider has been audited by the state’s CJIS Systems Agency (CSA) which will ensure that at a minimum they perform each of the following as outlined by the CJIS:
- Limits access to intelligence based on employee job assignment, network address, location, and time of day.
- Employs restriction measures to prevent unauthorized users from accessing information they don’t need to perform job duties.
- Limits login attempts to five tries, after which users will be locked out until they contact an administrator.
- Employs a session lock timer which engages after 30 minutes to prevent unauthorized users from accessing data should a user forget to logout.
- Performs ongoing monitoring and automatic recording of various activities (such as password changes) and maintains these logs for at least one year.
- Uses multi-factor authentication for highly-sensitive data (for example, a software application may generate a unique, one-time password at timed intervals which adds a second level of complexity to logging in, but provides another barrier of entry against ransomware and data thieves).
- Maintains division between physical and virtual servers that store intelligence, and those that can be accessed by the public through webpages and internet portals.
- Performs criminal background checks on all employees with access to unencrypted intelligence, and performs ongoing and frequent employee training on CJIS best practices with ample documentation and knowledge sharing.
If you’re considering migrating your data to the cloud, consider DSM. We ensure strict security protocols, 99.99%+ uptime, and a complete compliance package, meeting requirements for CJIS, HIPAA, PCI, SOC, etc... Even better? DSM's Cloud is now available for purchase through the GSA contract. Learn more about the DSM difference and the GSA advantage here, or contact one of our IT experts today for a free consultation.