Get the inside scoop with LoginTC and learn about relevant security news and insights.
October 31, 2024 •
As the new CJIS MFA requirements take effect, how can you ensure that your law enforcement agency remains in compliance with the CJIS Security Policy? Government entities like police stations, sheriffs offices, or other entities that access the FBI’s Criminal Justice Information Services must ensure that sensitive criminal justice information is handled with proper cybersecurity procedures.
In this article, we break down the new multi-factor authentication (MFA) requirements, and explore how your agency can easily add a compliant MFA solution to your systems.
Let’s dive in.
The Criminal Justice Information Services (CJIS) Security Policy originated in 1992, when the CJIS Division was first established. The purpose of the policy is to set out the minimum security standards that any agency must have in order to access CJIS systems.
To develop these standards, the CJIS integrates directives from Presidential orders, US federal laws, the FBI, and Advisory Policy Board decisions with guidelines developed by the NIST and others.
The 2022 update to the CJIS introduced new requirements for multi-factor authentication (MFA), which beginning October 1, 2024 are subject to audit.
Before getting into how to meet the specific MFA requirements in CIJS, let’s understand what is MFA in the first place, and why it’s important.
MFA is the process of proving a user’s identity by providing two or more identity factors during the login process. Those factors can be:
By combining these identity factors, organizations can prevent unauthorized access from malicious actors attempting to breach systems. MFA has been proven to block 99.9% of account compromise attacks.
The CJIS Security Policy now includes MFA-related security controls in the following cases:
Let’s break down each of those requirements, as well as the supplemental MFA guidance that the new CJIS Security policy provides.
In the CJIS Security Rule, privileged accounts are defined as “system administrators for various types of commercial off-the-shelf operating systems”. Privileged users must authenticate with MFA at the system level, and can choose to also implement MFA at the application level.
Additional MFA usage and MFA strength should be applied to privileged accounts based on their level of access and risk.
Similar to the guidance for privileged accounts, non-privileged organizational accounts are required to authenticate at the system level using MFA. Additional MFA implementations at the application level, or based on risk, are also encouraged.
The CJIS Security Rule also includes some supplemental guidance around the specifics of MFA authenticators and their usage, including:
Those are just a few of the additional requirements your organization must meet in order to pass a CJIS Security Policy audit.
If you’re unsure how to meet CJIS MFA compliance, you can book a free consultation call with our MFA compliance experts to get a better understanding of the new requirements.
Now that you have a better understanding of the CJIS MFA Requirements, it’s time to implement a solution that fits your organization’s unique needs.
Take the following steps to implement MFA for CJIS:
The first step to implementing MFA is matching up the CJIS MFA requirements with your organization’s existing infrastructure.
To do this step, ask yourself questions like:
These questions will help you gain an understanding of your current security landscape. For example, if you have privileged accounts logging into systems such as Windows Logon and RDP, and they don’t currently authenticate logins with MFA, then you know you’ve found an MFA gap that needs to be addressed to meet CJIS requirements.
For help with this step, you can check out the MFA Gap Calculator. This free tool takes around 10 minutes and delivers an automated report directly to your inbox showing where MFA gaps in your environment are.
The next step is to choose authentication methods that are going to meet CJIS guidance, integrate well with your systems, and be easy for end-users and administrators.
Some authentication methods you could consider are:
Another consideration when it comes to choosing a token is determining whether you’ll need to use shared tokens. Shared authentication tokens allow multiple users to log into the same account securely.
While shared group accounts come with an additional level of risk, NIST offers guidelines on how to safely and securely use shared accounts. MFA authenticators that can be used with shared accounts include: hardware tokens, passcode grids, email passcodes (sent to group email accounts), some authenticator apps, and some FIDO2 tokens.
In addition to the methods themselves, you should look for a solution that allows for easy set-up and day-to-day token management. Also consider solutions that allow for streamlined policy management that help you control user behavior and stay compliant.
One important consideration when designing and implementing an MFA solution is what to do in offline scenarios.
In many cases your end users may be accessing systems in situations without reliable or regular access to the internet. To ensure authentication can be made seamlessly and without interruption, you need a solution that won’t require additional enrollment or complicated login procedures simply because the system is offline.
Find a solution that has a wide variety of offline authentication methods, and is designed with high-availability in mind.
Now that the CJIS MFA requirements have come into effect, your organization needs to prepare for changes and be ready to face an audit. However, those changes don’t have to be disruptive, add complications for your administrators, or slow down your end-users.
By choosing an MFA solution designed to meet a wide range of options, you can easily tailor your implementation based on your organization’s unique needs.
To test out an MFA solution that can help you meet CJIS compliance without impacting your end-users or help desk, start a free trial of LoginTC.