CJIS Security Policy Controls List
The CJIS Security Policy protects sensitive law enforcement data, and any organization that interacts with CJI, including law enforcement agencies, criminal justice agencies, government contractors and subcontractors, public safety organizations, and any non-criminal justice agencies or service providers with access to CJI must comply with its security requirements. This spreadsheet lists all CJIS Security Policy requirements and maps them to NIST 800-53 controls to help you organize and track your compliance efforts.
SOC 1®, SOC 2® and SOC 3® are registered trademarks of the American Institute of Certified Public Accountants in the United States. The AICPA® Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy is copyrighted by the Association of International Certified Professional Accountants. All rights reserved.
