Trust Interoperability Profiles (176-200 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for agencies to control access to sensitive information based on job assignment or function (i.e., the role) of the user seeking access.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to employ a formal sanctions process for personnel failing to comply with established information security policies and procedures.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for passwords to not be transmitted in the clear outside of a secure location.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, that basic security awareness training is required within six months of initial assignment and biennially thereafter, for all personnel who have access to CJI.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an information system to prevent further access to the system by initiating a session lock after a maximum of 30 minutes of inactivity.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an information system to maintain a session lock until the user reestablishes access using appropriate identification and authentication procedures.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to employ spam protection mechanisms at critical information system entry points (e.g. firewalls, electronic mail servers, remote-access servers).
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to approve individual access privileges.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to synchronize internal information system clocks on an annual basis.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for information security events and weaknesses associated with information systems to be communicated in a manner allowing timely corrective action to be taken.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.5, for information security events and weaknesses associated with information systems to be communicated in a manner allowing timely corrective action to be taken.
5.5
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to ensure general incident response roles responsibilities are included as part of required security awareness training.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for baseline security awareness training for all authorized personnel with access to CJI to address the implications of noncompliance.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for records of individual basic security awareness training and specific information system security training to be documented
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for records of individual basic security awareness training and specific information system security training to be kept current
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for records of individual basic security awareness training and specific information system security training to be maintained by the CSO/SIB/Compact Officer
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to protect CJI transmitted outside the boundary of the physically secure location via cryptographic mechanisms (encryption).
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an agency to ensure that all user IDs belong to currently authorized users.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an organization when deploying Voice Over IP (VOIP) within a network that contains unencrypted sensitive information.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an organization to ensure that organization-managed wireless access points have strong administrative passwords.
5.4
Profile of requirements from the FBI Criminal Justice Information Services (CJIS) Policy, version 5.4, for an organization to ensure that passwords for all organization-managed wireless access points are changed in accordance with section 5.6.3.2 of the CJIS Security Policy.
5.4
Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4.
5.4
Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.9.
5.9
Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 1.3.
5.4
Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 3.2.
5.4
This page is also available as JSON and XML.