Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to establish identifier and authenticator management processes.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to issue user identifiers to the intended parties.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to disable user identifiers after a specified period of inactivity.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to define initial authenticator content.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to manage user identifiers by uniquely identifying each user.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to verify the identity of each user.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to promptly report incident information to appropriate authorities.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, vesrion 5.5, for an agency to promptly report incident information to appropriate authorities.
|
5.5 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to implement an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for organizations to establish an operational incident handling capability for their information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for agencies to have responsibilities and procedures in place to handle information security events and weaknesses effectively once they have been reported.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for agencies to track, document, and report incidents to appropriate agency officials and/or authorities.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, that procedures for handling and storage of information are established to protect that information from unauthorized disclosure, alteration or misuse.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for organizations to put formal agreements in place that specify security controls before exchanging Criminal Justice Information (CJI)
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to position information system devices and documents containing CJI in such a way as to prevent unauthorized individuals from access and view.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to issue alerts/advisories to appropriate personnel.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to receive information system security alerts/advisories on a regular basis.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to implement network-based and/or host-based intrusion detection tools.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to implement least privilege based on specific duties, operations, or information systems as necessary to mitigate risk to CJI.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an organization to test wireless access point (AP) range boundaries to determine the precise extent of the wireless coverage and design the AP wireless coverage to limit the coverage area to only what is needed for operational purposes.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to allocate publicly accessible information system components (e.g. public Web servers) to separate sub networks with separate, network interfaces.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for a system to display an approved system use notification message, before granting access, informing potential users of various usages and monitoring rules.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an information system to display display an approved system use notification message that remains on the screen until the user acknowledges the notification and takes explicit actions to log on to the information system.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for access controls to be in place and operational for all IT systems to ensure that only authorized personnel can add, change, or remove component devices, dial-up connections, and remove or alter programs.
|
5.4 |
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to control all remote accesses through managed access control points.
|
5.4 |