Transmission Medium Is Exempt From CJIS Security Policy Encryption Requirements, v1.0

Defines conformance and assessment criteria for verifying that an organization's transmission medium is exempt from CJIS Security Policy encryption requirements.
If an assessment step references organization-defined elements (E.g. <organization-defined personnel or roles>, <organization-defined frequency>, etc.), corresponding citations/excerpts must be provided to confirm that the organization has established and documented these values and that they apply as referenced in the conformance criteria.

Similarly, if a "Selection" among multiple options (e.g. [Selection (one or more): as needed; ]) is specified, evidence must be provided to establish that the option(s) implemented by the organization have been defined and documented.

The assessment step shall not be marked as satisfied without this evidence.

Assessment Steps (5)

1
Organization Controls Transmission Medium (OrganizationControlsTransmissionMedium)
Does the organization own, operate, manage, or protect the transmission medium?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
2
Transmission Medium Terminates Within Secure Locations (TransmissionMediumTerminatesWithinSecureLocations)
Does the organization's transmission medium terminate within physically secure locations at both ends with no interconnections between?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
3
Physical Access To Transmission Medium Is Controled (PhysicalAccessToTransmissionMediumIsControled)
Is physical access to organization's transmission medium is controlled using the requirements in Sections 5.9.1 and 5.12 of the CJIS Security Policy?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
4
Transmission Medium Protection Includes Safeguards (TransmissionMediumProtectionIncludesSafeguards)
Does the protection of the organization's transmission medium include safeguards (e.g. acoustic, electric, electromagnetic, and physical) and if feasible countermeasures (e.g. alarms, notifications) to permit its use for the tranmission of unencrypted information through an area of lesser classification or control?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
5
CJIS Transmission Medium Exception Is Approved By CSO (CJISTransmissionMediumExceptionIsApprovedByCSO)
Has the CSO approved the organization's exemption to the CJIS Security Policy's transmission medium encryption requirements?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
If conformance criteria reference organization-defined elements (e.g. <organization-defined personnel or roles>, <organization-defined frequency>, etc.), these values must be defined and documented by the organization.

Similarly, if the criteria specify a "Selection" among multiple options (e.g. [Selection (one or more): as needed; ]), the option(s) implemented by the organization must also be defined and documented.

Conformance Criteria (5)

C1
i. The agency owns, operates, manages, or protects the medium.
Citation
CJIS-SP-V5-4
Section 5.10.1.2.
C2
ii. Medium terminates within physically secure locations at both ends with no interconnections between.
Citation
CJIS-SP-V5-4
Section 5.10.1.2.
C3
iii. Physical access to the medium is controlled by the agency using the requirements in Section 5.9.1 and 5.12.
Citation
CJIS-SP-V5-4
Section 5.10.1.2.
C4
iv. Protection includes safeguards (e.g. acoustic, electric, electromagnetic, and physical) and if feasible countermeasures (e.g. alarms, notifications) to permit its use for the tranmission of unencrypted information through an area of lesser classification or control.
Citation
CJIS-SP-V5-4
Section 5.10.1.2.
C5
v. With approval of the CSO.
Citation
CJIS-SP-V5-4
Section 5.10.1.2.