CJIS - Information Handling and Storage Procedures, v1.0

Profile of the FBI Criminal Justice Information Services (CJIS) requirements that procedures for handling and storage of information are established to protect that information from unauthorized disclosure, alteration or misuse.
Publication Date: 2017-05-10
Issuing Organization:
No Responder help@trustmarkinitiative.org 404-407-8956 75 5th Street NW, Suite 900, Atlanta, GA 30308
Keywords: Security, Information Assurance, CJIS Security Policy,
Legal Notice: This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.
Loading...

Trust Expression:

TD_MediaStoragePhysicalControl and TD_AlternateStorageSiteSafeguards and TD_AlternateProcessingSiteSecurity and TD_RemoteAccessProtectionOfInformation and TD_MonitoringForInformationDisclosure and TD_ProtectionOfInformationAtRestCryptographicProtection and ( TD_TransmissionConfidentialityAndIntegrityCryptographicProtection or TD_TransmissionConfidentialityAndIntegrityPhysicalProtection )

References (8)

TD_MediaStoragePhysicalControl
Defines conformance and assessment criteria for verifying that an rganization physically controls and securely stores organization-defined types of digital and/or non-digital media within organization-defined controlled areas.
TD_AlternateStorageSiteSafeguards
Defines conformance and assessment criteria for verifying that an organization ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.
TD_AlternateProcessingSiteSecurity
Defines conformance and assessment criteria for verifying that an organization ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site.
TD_RemoteAccessProtectionOfInformation
Defines conformance and assessment criteria for verifying that an organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.
TD_MonitoringForInformationDisclosure
Defines conformance and assessment criteria for verifying that an organization monitors organization-defined open source information and/or information sites at an organization-defined frequency for evidence of unauthorized disclosure of organizational information.
TD_ProtectionOfInformationAtRestCryptographicProtection
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined information] on [Assignment: organization-defined information system components].
TD_TransmissionConfidentialityAndIntegrityCryptographicProtection
This Trustmark Definition addresses the requirement for a system to employ encryption for transmitted information.
TD_TransmissionConfidentialityAndIntegrityPhysicalProtection
This Trustmark Definition addresses the requirement for a system to employ physical protection for transmitted information.
Also available as XML or JSON