3 Ways To Meet CJIS Compliance
Kate Bennett • Feb 07, 2024

3 Ways to Meet the Upcoming CJIS Mandate Requirements 

ID card as a “KEY” to access Criminal Justice Information

If your organization already uses smart cards for ID badges, they can be applied toward meeting the CJIS requirement. Card utility is enhanced through enrollment in a software solution that associates each card with a unique PIN, password, or biometric. These smart cards can now be utilized in the Multi-Factor authentication processes– ensuring only approved members' access to sensitive information.

Pros

  • Smart cards can be programmed for MFA capabilities within a matter of days. 
  • A single card can grant access to physical and digital resources while also serving as a visual ID badge. 

Cons

  • Only cards equipped with PKI or FIDO technology offer phishing-resistant maximum security.

User Experience

  1. Present the smart card/ ID badge to a contactless reader. (Readers will either be pre-embedded in the device or an external reader will be required for secure access.)
  2. To authenticate your identity, a personal PIN is entered into the device.

Using Mobile Devices for Multi-Factor Authentication 

Opting to use our most easily accessed devices for MFA is a convenient and secure route for law enforcement. Embedding mobile devices with cryptographically protected software tokens (aka authenticator apps) allows users to complete a secure login to other systems and devices.

Pros

  • Mobile MFA is extremely flexible and versatile, securing: cloud applications, VDI, VPN, mainframes, server and desktop client applications. 
  • Mobile ID is less costly up front as users may not require additional devices for authentication. 

Cons

  • Issues can arise when using personal mobile devices for authentication. 
  • Ideally, agencies would provide personnel with a corporate mobile device (a work phone or laptop). . 

User Experience

  1. Enter log-in information to the target device 
  2. Open the mobile devices authentication app to approve or deny login requests. Alternatively, mobile authentication applications can also be used to generate a one-time password (OTP) code. 

Implementing USB Security Keys

FIDO and PKI-enabled USB security keys streamline access to digital and physical resources in a fast, user-friendly, and secure manner. This option is an excellent way to obtain high levels of security without compromising convenience and ease of use. 

Pros

  • FIDO and PKI provide maximum phishing resistance.
  • USB security keys have a variety of digital and physical applications, offering fast and flexible identity assurance.
  • USB security keys do not require any additional hardware (smart cards or readers).

Cons

  • Security keys are less often applied to physical access.
  • Application is dependent on how many (and which) USB ports are available on user devices. 

User Experience

  1. Insert the USB key into an embedded or external drive or High-Frequency Near-Field communication (NFC) device. 
  2. Enter PIN or biometric factor to complete authentication.

The correct MFA solution will fit the needs, resource allocations, and mandate requirements of each law office. HID and Tx Systems have successfully implemented and supported several Law enforcement agencies in the process of adhering to CJIS requirements. We are the experts in this industry, and you are in trusted hands with us. 


To learn more about the Criminal Justice Information Services mandate, consult this incredibly informative whitepaper or our site page

By Kate Bennett 05 Nov, 2024
Applications For Embedded Readers
By Kate Bennett 24 Sep, 2024
Background
By Kate Bennett 29 Aug, 2024
The Problem with Passwords
More Posts
Share by: