SlideShare a Scribd company logo
1 of 3
Download to read offline
Understanding CJIS Compliance Physical
Protection
In the previous blog, we discussed at length of the importance protecting physical as well as
digital media and this time we will understand the importance of physical protection and the
various steps the agencies should take in order to secure the criminal justice information as per
CJIS Compliance Physical Protection standards. Agencies should follow a physical protection
policy and associated procedures to ensure that all the CJI and media, information system
hardware and software are physically protected using access control measures.
Physically Secure Location
The process of media protection starts from selecting a physically secure location. A physically
secure location can be any including a facility, a room, a police vehicle, an area or a group of
rooms within a given facility. These locations must have both personnel and physical security
controls that are sufficient enough to protect CJI as well as the associated information systems. It
is also to be noted that the physically secure location is subject to FBI CJIS Security addendum;
criminal justice agency management control; SIB control; or a combination of these. The
following sections would describe the physical controls that need to be in place in order to
consider a facility to be a physically secure location.
Security Perimeter
It is of prime importance that the perimeter of a physically secure location be displayed
prominently separating it from the non-secure areas by physical controls. The security perimeters
need to be clearly defined, secured and controlled in a manner deemed acceptable by State
Identification Bureau (SIB) or CJIS Systems Agency (CSA).
Physical Access Authorizations
The agency should prepare and maintain a list of personnel currently having authorized access to
the physically secure location. The agency also would issue credentials to authorized people.
Physical Access Control
Other than the areas designated as publicly accessible by all, the agency should have complete
control over all the physical access points. It should also ascertain individual access authorization
before allowing access.
Access Control for Transmission Medium
Another important function of an agency is to control the physical access to information system
transmission and distribution lines within the secure location.
Access Control for Display Medium
To ensure better physical protection to CJI, the agencies must control physical access to IT
devices that are used to display criminal justice information. The placement of such information
systems is also of importance and they need to be placed in such a place where unauthorized
personnel can’t access or view CJI.
Monitoring Physical Access
Agencies need to monitor the physical access to the information system in order to detect as well
as respond to any physical security incidents.
Visitor Control
Barring the areas designated as publicly accessible by all, the agency should control physical
access to the critical information by authenticating the visitors before allowing escorted access to
the physically secure location. Agency shall also ensure physical protection by monitoring visitor
activities and escorting them at all times
Delivery and Removal
To ensure physical protection, the agency shall control and authorize information-system related
items that are entering into and moving out of the secure location
Controlled Area
In an event where the agency can’t meet all the requirements needed to set up a physically secure
location but has a operational need to store and access CJI, the agency shall then designate a
controlled area, a room, a storage container or an area to use it as a day-to-day CJI storage or
access point. At a minimum the agency shall meet the below requirements:
 Keep the room, area or storage contained locked when unattended.
 Limit the access to the controlled area only to personnel with authorized access rights.
 Follow all the encryption requirements (which will be discussed in the next blog) for
electronic storage of CJI.
 Place information system documents and devices containing CJI such a way that they are
inaccessible to unauthorized individuals.
This brings to the end of understanding the various measures to ensure CJIS Compliance
Physical Protection. In the next blog we will try to understand System and Communications
Protection and Information Integrity.
DoubleHorn is one of the leading Cloud Solutions Providers founded in January 2005 and based
in Austin, Texas. We offer secured Cloud solutions that meet all major compliance requirements
like HIPAA, CJIS, FedRAMP, FIPS, ITAR, FERPA etc. Our services, as a Cloud Services
Broker, include helping in selecting the right Cloud solution, implementing, maintaining and also
offering a single source for billing and support. Contact us for a complimentary initial
assessment at solutions@doublehorn.com or (855) 618-6423.

More Related Content

Recently uploaded

Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Understanding CJIS Compliance Physical Protection

  • 1. Understanding CJIS Compliance Physical Protection In the previous blog, we discussed at length of the importance protecting physical as well as digital media and this time we will understand the importance of physical protection and the various steps the agencies should take in order to secure the criminal justice information as per CJIS Compliance Physical Protection standards. Agencies should follow a physical protection policy and associated procedures to ensure that all the CJI and media, information system hardware and software are physically protected using access control measures. Physically Secure Location The process of media protection starts from selecting a physically secure location. A physically secure location can be any including a facility, a room, a police vehicle, an area or a group of rooms within a given facility. These locations must have both personnel and physical security controls that are sufficient enough to protect CJI as well as the associated information systems. It is also to be noted that the physically secure location is subject to FBI CJIS Security addendum; criminal justice agency management control; SIB control; or a combination of these. The following sections would describe the physical controls that need to be in place in order to consider a facility to be a physically secure location. Security Perimeter It is of prime importance that the perimeter of a physically secure location be displayed prominently separating it from the non-secure areas by physical controls. The security perimeters
  • 2. need to be clearly defined, secured and controlled in a manner deemed acceptable by State Identification Bureau (SIB) or CJIS Systems Agency (CSA). Physical Access Authorizations The agency should prepare and maintain a list of personnel currently having authorized access to the physically secure location. The agency also would issue credentials to authorized people. Physical Access Control Other than the areas designated as publicly accessible by all, the agency should have complete control over all the physical access points. It should also ascertain individual access authorization before allowing access. Access Control for Transmission Medium Another important function of an agency is to control the physical access to information system transmission and distribution lines within the secure location. Access Control for Display Medium To ensure better physical protection to CJI, the agencies must control physical access to IT devices that are used to display criminal justice information. The placement of such information systems is also of importance and they need to be placed in such a place where unauthorized personnel can’t access or view CJI. Monitoring Physical Access Agencies need to monitor the physical access to the information system in order to detect as well as respond to any physical security incidents. Visitor Control Barring the areas designated as publicly accessible by all, the agency should control physical access to the critical information by authenticating the visitors before allowing escorted access to the physically secure location. Agency shall also ensure physical protection by monitoring visitor activities and escorting them at all times Delivery and Removal To ensure physical protection, the agency shall control and authorize information-system related items that are entering into and moving out of the secure location Controlled Area
  • 3. In an event where the agency can’t meet all the requirements needed to set up a physically secure location but has a operational need to store and access CJI, the agency shall then designate a controlled area, a room, a storage container or an area to use it as a day-to-day CJI storage or access point. At a minimum the agency shall meet the below requirements:  Keep the room, area or storage contained locked when unattended.  Limit the access to the controlled area only to personnel with authorized access rights.  Follow all the encryption requirements (which will be discussed in the next blog) for electronic storage of CJI.  Place information system documents and devices containing CJI such a way that they are inaccessible to unauthorized individuals. This brings to the end of understanding the various measures to ensure CJIS Compliance Physical Protection. In the next blog we will try to understand System and Communications Protection and Information Integrity. DoubleHorn is one of the leading Cloud Solutions Providers founded in January 2005 and based in Austin, Texas. We offer secured Cloud solutions that meet all major compliance requirements like HIPAA, CJIS, FedRAMP, FIPS, ITAR, FERPA etc. Our services, as a Cloud Services Broker, include helping in selecting the right Cloud solution, implementing, maintaining and also offering a single source for billing and support. Contact us for a complimentary initial assessment at solutions@doublehorn.com or (855) 618-6423.