background

CJIS Security Policy Controls List

The CJIS Security Policy protects sensitive law enforcement data, and any organization that interacts with CJI, including law enforcement agencies, criminal justice agencies, government contractors and subcontractors, public safety organizations, and any non-criminal justice agencies or service providers with access to CJI must comply with its security requirements. This spreadsheet lists all CJIS Security Policy requirements and maps them to NIST 800-53 controls to help you organize and track your compliance efforts.

What you'll get:

  • Break down CJIS Security Policy compliance requirements into key policy areas and steps
  • See all the controls you'll need to implement as you prepare for, achieve, and maintain compliance
  • Tick items off the interactive checklist to gauge your company’s level of CJIS Security Policy compliance

SOC 1®, SOC 2® and SOC 3® are registered trademarks of the American Institute of Certified Public Accountants in the United States. The AICPA® Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy is copyrighted by the Association of International Certified Professional Accountants. All rights reserved.