Today s Presenters: Doug Blenman Jr. Steven Doggart. How to Comply with FBI CJIS Security Policy



Similar documents
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

NC CJIN Governing Board. 13 October, George A. White

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

CA Technologies Solutions for Criminal Justice Information Security Compliance

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Kroger Supplier Information Management System (SIM) Training Documentation

How Do I Sign Up? For more information call (866) or contact us at webmaster@newpeoplesbank.com

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

4/22/2013. Applications Update

How To Protect The Time System From Being Hacked

Meeting CJIS Advanced Authentication

ADM:49 DPS POLICY MANUAL Page 1 of 5

CJIS Online Overview. CJIS Security Awareness Training & Testing Software

Business ebanking - User Sign On & Set Up

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2

REPORTING CENTRAL EXTERNAL USER GUIDE FEDERAL RESERVE SYSTEM

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Business Banking Customer Login Experience for Enhanced Login Security

Technical Panel of Nebraska - 30-Day Comments Period

Multi-Factor Authentication Job Aide

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Personal Training. Chapter 27. FrontDesk v PT Specific Program Options. Contract Templates. Set Member s Secure Check In Password

IRS TAX RETURN TRANSCRIPT. Step-by-Step Instructions for Getting your IRS Transcript Online

Welcome to Business Internet Banking

Online Services User Guide

Quick Start User Guide

Brainloop Secure Dataroom Version QR Code Scanner Apps for ios Version 1.1 and for Android

Wasabi Hands On Lab Journal Exercise HO1

STUDENT PORTAL - TURNITIN

Provider OnLine. Log-In Guide

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures

IT Information Packet

Wires. z Go to z From the Secure login to drop-down, select Business Online Banking z Enter Username and Password

Reference Document. SedonaOnline Support

Avaya Credential Management System User Guide

TRAINING GUIDE. TRAVEL AND EXPENSE CARD US Bank Access OnLine

VPN Network Access. Principles and Restrictions

How to login with the RSA Token?

THANK YOU FOR YOUR BUSINESS.

Member FAQ. General Information: Security:

e-governance Password Management Guidelines Draft 0.1

OpenID & Strong Authentication

User Manual. Firm Bank Manager (includes instructions for employees and firms) U.S Network of Virtual Enterprises Bank. for

Sam Houston State University Procurement Card Program

USER GUIDE: INTERNET BANKING. Version 2.0

Learning Management System. Department Administrator User Guide. March 24, 2015

D&B SafeTransPort Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B

NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s)

Sage 100 ERP (MAS90 / MAS200) How to Set up Security in Sage 100 ERP

Digital Signatures on iqmis User Access Request Form

Blackboard Collaborate Session

U.S. Online Banking & Bill Pay Frequently Asked Questions

Choosing estatements is a smart, safe and environmentally-friendly way to receive and manage your monthly account information.

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Alan Ferretti CJIS Information Security Officer

Oracle WebCenter Content

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Massachusetts Identity Theft/ Data Security Regulations

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

Payment Plan Questions & Answers

CoSign for 21CFR Part 11 Compliance

RSA SecurID Software Token Security Best Practices Guide

Business Issues in the implementation of Digital signatures

SYSTEM REQUIREMENTS...

TIB 2.0 Administration Functions Overview

What s it all about? SAFE-BioPharma Association

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

How to Resolve Login Errors with Business Objects XI

North Carolina Community Colleges Business Intelligence Reporting System

CJIS Online Security Awareness Training. Vendor Guide

Remote Access Securing Your Employees Out of the Office

21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES CFR Part 11 Compliance PLA 2.1

Online Banking Agreement

Advanced Authentication

OWA/2-Factor Authentication VPN FAQ. Outlook Web Access (OWA) QUESTIONS

Create your portal account, and connect to your medical records.

WESD Online Class Registration New User Guide

Center for Educational Performance and Information (CEPI) Single Sign-On (SSO) User Guide

Tom Schauer TrustCC cell

Mobilization Tracking Information System (MTIS) Agency Contact User Manual

Entrust IdentityGuard

Print4 Solutions fully comply with all HIPAA regulations

PASSWORD MANAGEMENT POLICY OCIO TABLE OF CONTENTS

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

DocuSign Quick Start Guide. Using Templates. Overview. Table of Contents

RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum from Internet

WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY

Transcription:

Today s Presenters: Doug Blenman Jr. Steven Doggart How to Comply with FBI CJIS Security Policy

Before we get started Introductions: Doug Blenman Jr. Public Safety Product Manager Steven Doggart Sr. Software Developer Goals for this webinar: Overview of compliancy challenges Outline Versions and key CJIS Security Policies Preview some upcoming CJIS Security Policy changes Demonstrate how IDN Security helps you to comply Questions and Answers Final Housekeeping Items: Special word of thanks to Robert Turner of CommSys This PowerPoint & the recording of this session will be made available via our website afterwards.

FBI CJIS Security Policies Complying can be very challenging and complex: Requires a team effort & coordination with IT staffs Hardware & software providers VPN s to manage Network providers Administration Continual training Complex passwords Plus constantly changing: Technologies Networks Rules

CJIS Policy Versions Where to find the current version: Release 5.1-7/13/12 141 pages Google FBI CJIS Security Policy PDF Version - bottom of the page Upcoming Version: Advisory Policy Board (APB) Meeting took place June 5-6, 2013 in Portsmouth, VA Potential major changes may be pending as a result Release 5.2 is pending (this fall?) http://www.fbi.gov/about-us/cjis/cjis-security-policy-resource-center/view

Important v5.1 Policies 5.6.2.1 Standard Authentication (Password) Agencies shall follow the secure password attributes, below, to authenticate an individual s unique ID. Passwords shall: 1. Be a minimum length of eight (8) characters on all systems. 2. Not be a dictionary word or proper name. 3. Not be the same as the user ID. 4. Expire within a maximum of 90 calendar days. 5. Not be identical to the previous ten (10) passwords. 6. Not be transmitted in the clear outside the secure location. 7. Not be displayed when entered.

v5.1 continued 5.6.2.2 Advanced Authentication Advanced Authentication (AA) provides for additional security to the typical user identification and authentication of login ID and password, such as: biometric systems, user-based public key infrastructure (PKI), smart cards, software tokens, hardware tokens, paper (inert) tokens, or Risk-based Authentication that includes a software token element comprised of a number of factors, such as network information, user information, positive device identification (i.e. device forensics, user pattern analysis and user binding), user profiling, and high-risk challenge/response questions. 5.9.1.3 Physical Access Control The agency shall control all physical access points (except for those areas within the facility officially designated as publicly accessible) and shall verify individual access authorizations before granting access.

CJIS Policy Update Highlights of the June 5-6, 2013 Meetings: 1. Advanced Authentication (AA) was overhauled Agency issued equipment may end up being considered exempt Mobile Device Management (MDM) will be required 2. The decision about cruisers being considered secure environments was reversed so long as the laptops are FIXED within the vehicle (meaning it is not removable by an officer). 3. A new document was introduced (NIST 800-53 Rev. 4 which was publicly issued on May 7, 2013) & stands to have long-reaching effects on the approaches and requirements. Reminder - these changes aren t policy yet!!!

ID Networks Software This newer version of our security system that we re about to demonstrate has already been integrated into all of our product lines. We are in the process of scheduling or delivering this version to all customers at this time. Anyone using the latest version of our CAD or Mobile software already has it. Please check with your account or project manager for more information if there are any questions. There are many new parts to the security subsystem, but we re only going to be touching on the ones that help you to comply with the CJIS Security Policies. For additional information about additional parts, please contact your project or account managers. We are committed to using right partners, like CommSys and NetMotion, so that we can bring together the right blend of expertise and technology. Now, let s turn it over to Steve for a live demonstration of some of these settings.

Password Settings

2 Factor Login Screen

Require Tokens

Creating New Tokens

Assigning Tokens

Login Attempts

Wrap Up Any questions about today s presentation?

Thank you for attending! Doug Blenman Jr. dblenman@idnetworks.com (440) 536-0189 Steven Doggart sdoggart@idnetworks.com (800) 982-0751 www.idnetworks.com