22
8/23/2017 1 CJIS Security Russ Hoskins & Nick Harris FBI CJIS Security Policy Latest version is 5.6 (Published in June 2017) LEDS or FBI website 2 “To Provide Premier Public Safety Services”

CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

Embed Size (px)

Citation preview

Page 1: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

1

CJIS Security

Russ Hoskins & Nick Harris

FBI CJIS Security Policy

• Latest version is 5.6 (Published in June 2017)

• LEDS or FBI website

2“To Provide Premier Public Safety Services”

Page 2: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

2

FBI CJIS Security Policy

• “The CJIS Security Policy provides criminaljustice and non‐criminal agencies with aminimum set of security requirements foraccess to FBI CJIS Division systems andinformation and to protect and safeguardcriminal justice information (CJI)”.

3“To Provide Premier Public Safety Services”

CJIS Security Awareness Overview

• “The intent of the CJIS Security Policy is to ensure theprotection of CJI until the information is: released tothe public via authorized dissemination (e.g. withinthe court system; presented in crime reports;released in the interest of public safety); purged ordestroyed in accordance with applicable recordretention rules.”

4“To Provide Premier Public Safety Services”

FBI CJIS Security PolicySection 4.1

Page 3: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

3

CJIS Security Awareness Overview

• “To verify identification, a state of residency andnational fingerprint‐based record checks shall beconducted within 30 days of assignment for allpersonnel who have direct access to criminal justiceinformation (CJI) and those who have directresponsibility to configure and maintain computersystems and networks with direct access to CJI.”

5“To Provide Premier Public Safety Services”

FBI CJIS Security PolicySection 5.12.1.1

CJIS Security Awareness Overview

• “Basic security awareness training shall berequired within six months of initialassignment, and biennially thereafter, for allpersonnel who have access to CJI to include allpersonnel who have unescorted access to aphysically secure location.”

6“To Provide Premier Public Safety Services”

FBI CJIS Security PolicySection 5.2

Page 4: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

4

CJIS Security Awareness Overview

• CJIS Security Fingerprint‐Based Background Check

– Fingerprints establish positive identity

– Background check looks for criminal convictionsthat the FBI or the State CJIS Security Officer deemas disqualifiers for unescorted access to CJI.

7“To Provide Premier Public Safety Services”

CJIS Security Awareness Overview

• CJIS Security Fingerprint‐Based Background Check

– CJIS Security Clearance Background Request form

– Completed fingerprint card

8“To Provide Premier Public Safety Services”

Page 5: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

5

CJIS Security Awareness Overview

• Submit the fingerprint card and request form at the same time (together). 

9“To Provide Premier Public Safety Services”

CJIS Security Awareness Overview

• CJIS Security Disqualifiers

– Felony conviction

– Any conviction for fraud, ID theft, or computercrimes (State CJIS Security Officer)

– Active warrant

10“To Provide Premier Public Safety Services”

Page 6: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

6

CJIS Security Awareness Overview

• CJIS Security Fingerprint Background Check

– Simply determines if the applicant is approved forunescorted access to CJI

– It is not intended to the basis for hire or serve asan employment background check

11“To Provide Premier Public Safety Services”

CJIS Security Awareness Overview

• Training Levels

12“To Provide Premier Public Safety Services”

LEVEL

1

Authorized unescorted access to a physically 

secure location where CJI is present. Not 

authorized access to CJI.

CustodialStaff

Facilities Maintenance

Vendors(Non‐IT)

Page 7: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

7

CJIS Security Awareness Overview

• Training Levels

13“To Provide Premier Public Safety Services”

LEVEL

2

Authorized unescorted physical access to criminal justice information. (e.g. viewing a LEDS printout)

Judge Regulatory Board Chair

CJIS Security Awareness Overview

• Training Levels

14“To Provide Premier Public Safety Services”

LEVEL

3

Authorized unescorted logical access to criminal justice information. (e.g. 

LEDS or any system containing CJI)

Background investigator or investigative assistant

Page 8: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

8

CJIS Security Awareness Overview

• Training Levels

15“To Provide Premier Public Safety Services”

LEVEL

4

Authorized unescorted logical access to servers, routers, switches, etc. that 

process CJI

IT Staff or anyone with access to the “server room”

CJIS Security Awareness Overview

16“To Provide Premier Public Safety Services”

Page 9: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

9

CJIS Security Awareness Overview

17“To Provide Premier Public Safety Services”

CJIS Online• OSP’s online tool for administering andtracking CJIS Security Awareness Training

18“To Provide Premier Public Safety Services”

Page 10: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

10

CJIS Online

• The LEDS Rep or the agency LASO (localagency security officer) are typically the TACs(administrators) in CJIS Online.

• Only one TAC allowed per agency.

• No criminal justice information in CJIS Online.

19“To Provide Premier Public Safety Services”

CJIS Online• The Basics

20“To Provide Premier Public Safety Services”

Use “Local Agency Admin” to work with agency and vendor user accounts.

Any IT or agency user, including the LEDS Rep, use this to take the training.

Page 11: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

11

CJIS Online• The Basics

21“To Provide Premier Public Safety Services”

For vendors to take the training or work with their employee accounts.

Do not use. Does not apply to Oregon users.

CJIS Online

• Users are divided into two broad categories:“IT & Agency Users” and “Vendors”

– CJIS Online Agency Admins can view their own IT& Agency users and all vendors.

– CJIS Online Agency Admins cannot view IT &Agency users from other agencies.

22“To Provide Premier Public Safety Services”

Page 12: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

12

CJIS Online

• Do not enter vendors as IT & Agency users. 

– Other agencies will not be able to see them.

– They will try to add them but will be told the useralready exists even though they cannot see theuser.

23“To Provide Premier Public Safety Services”

CJIS Online

• A vendor user may be designated as anadmin for their company. Then they can beresponsible for their user accounts.

24“To Provide Premier Public Safety Services”

Page 13: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

13

CJIS Online

• If agency groups, such as IT or custodial andmaintenance, provide service to multipleagencies, they should be entered as vendors.

• This allows other agencies to view theirtraining and add fingerprint information.

25“To Provide Premier Public Safety Services”

Example

26“To Provide Premier Public Safety Services”

Oregon Medical Board IT

OR Board of Pharmacy

OR Board of Optometry

OR Board of Dentistry

Create a vendor called “Oregon Medical Board IT”.The other boards can then view the vendor and their employees and also add their agency’s fingerprint information.

Page 14: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

14

CJIS Online

27“To Provide Premier Public Safety Services”

https://www.cjisonline.com/index.cgi

Let’s see what a vendor record should look like.

CJIS Online

28“To Provide Premier Public Safety Services”

REMEMBER!

CJIS Security Awareness Level 3 training is incorporated into all LEDS training levels. 

The only reason a LEDS user would need a CJIS Online account would be if they had IT (Level 4) 

access to CJI.

Page 15: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

15

CJIS Security Questions?

• “Does someone who transfers to another section of our agency, but with a different ORI, have to have the background check run again?”

• “Under what circumstances can our agency utilize “paper” CJIS Security Awareness Training?”

• Interpretation of the CJIS Security Policy

29“To Provide Premier Public Safety Services”

Better call Nick!!!

Nick Harris

• OSP CJIS Information Security Officer

[email protected]

• 503‐934‐2335

30“To Provide Premier Public Safety Services”

Page 16: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

16

CJIS IT Security Oregon State Police

Regulatory CJIS IT Requirements

Presented by: Nicholas Harris – OSP CJIS Information Security Officer

Presentation date: August 2, 2017

Oregon State Police – CSALeadership

• CJIS Security Officer (CSO) – Major Tom Worthy

– The CSO is responsible for the administration of the CJIS network for the CJIS Agency (CSA).

• CJIS Information Security Officer (CJIS ISO) ‐ Nicholas Harris

– The CJIS ISO is responsible to the CSO and is the security POC to the FBI CJIS Information Security Officer.

– CJIS Auditor to the State of Oregon.  Document and provide assistance for implementing the security related controls for the Interface Agency and its users.

32“To Provide Premier Public Safety Services”

Page 17: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

17

CJIS Policy Manual

• Current Version

– Version 5.6 Effective June 5, 2017

–Annually Released.

– Incorporates APB approved changes.

– Incorporates administrative Changes.

33“To Provide Premier Public Safety Services”

CJIS Policy Manual

• Purpose– The CJIS Security Policy provides Criminal Justice Agencies (CJA) and 

Noncriminal Justice Agencies (NCJA) with a minimum set of security requirements for access to Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division systems and information and to protect and safeguard Criminal Justice Information (CJI). This minimum standard of security requirements ensures continuity of information protection. The essential premise of the CJIS Security Policy is to provide the appropriate controls to protect CJI, from creation through dissemination; whether at rest or in transit. 

– The CJIS Security Policy integrates presidential directives, federal laws, FBI directives, the criminal justice community’s Advisory Policy Board (APB) decisions along with nationally recognized guidance from the National Institute of Standards and Technology (NIST) and the National Crime Prevention and Privacy Compact Council (Compact Council).

34“To Provide Premier Public Safety Services”

Page 18: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

18

CJIS Policy Manual

• Scope– At the consent of the advisory process, and taking into consideration federal law and state statutes, the CJIS Security Policy applies to all entities with access to, or who operate in support of, FBI CJIS Division’s services and information. The CJIS Security Policy provides minimum security requirements associated with the creation, viewing, modification, transmission, dissemination, storage, or destruction of CJI. 

– Entities engaged in the interstate exchange of CJI data for noncriminal justice purposes are also governed by the standards and rules promulgated by the Compact Council.

35“To Provide Premier Public Safety Services”

CJIS PM 5.6 Changes

• Mainly defining encryption. 

– Encryption is a form of cryptology that applies a cryptographic operation to provide confidentiality of (sensitive) information. Decryption is the reversing of the cryptographic operation to convert the information back into a plaintext (readable) format. There are two main types of encryption: symmetric encryption and asymmetric encryption (also known as public key encryption). Hybrid encryption solutions do exist and use both asymmetric encryption for client/server certificate exchange – session integrity and symmetric encryption for bulk data encryption – data confidentiality.

36“To Provide Premier Public Safety Services”

Page 19: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

19

CJIS PM 5.6 Changes

• Encryption in Transit

– When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via encryption. When encryption is employed, the cryptographic module used shall be FIPS 140‐2 certified and use a symmetric cipher key strength of at least 128 bit strength to protect CJI. 

37“To Provide Premier Public Safety Services”

CJIS PM 5.6 Changes

• When is encryption not required?

– When the transmission medium meets the following –

• The agency owns, operates, manages, or protects the medium.

• Medium terminates within physically secure locations at both ends with no interconnections between.

• Physical access to the medium is controlled by the agency using the requirements in Sections 5.9.1 and 5.12.

38“To Provide Premier Public Safety Services”

Page 20: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

20

CJIS PM 5.6 Changes

• Encryption for CJI at Rest• When CJI is at rest (i.e. stored digitally) outside the boundary of the 

physically secure location, the data shall be protected via encryption. When encryption is employed, agencies shall either encrypt CJI in accordance with the standard in Section 5.10.1.2.1 above, or use a symmetric cipher that is FIPS 197 certified (AES) and at least 256 bit strength. 

• a) When agencies implement encryption on CJI at rest, the passphrase used to unlock the cipher shall meet the following requirements: 

i. Be at least 10 characters ii. Not be a dictionary word. iii. Include at least one (1) upper case letter, one (1) lower case letter, one (1) number, and one (1) special character. iv. Be changed when previously authorized personnel no longer require access. 

39“To Provide Premier Public Safety Services”

CJIS PM 5.6 Changes

– b) Multiple files maintained in the same unencrypted folder shall have separate and distinct passphrases. A single passphrase may be used to encrypt an entire folder or disk containing multiple files. All audit requirements found in Section 5.4.1 Auditable Events and Content (Information Systems) shall be applied. 

• NOTE: Commonly available encryption tools often use a key to unlock the cipher to allow data access; this key is called a passphrase. While similar to a password, a passphrase is not used for user authentication. Additionally, the passphrase contains stringent character requirements making it more secure and thus providing a higher level of confidence that the passphrase will not be compromised.

40“To Provide Premier Public Safety Services”

Page 21: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

21

CJIS PM 5.6 Changes

• Public Key Infrastructure (PKI) Technology– For agencies using public key infrastructure (PKI) technology, the 

agency shall develop and implement a certificate policy and certification practice statement for the issuance of public key certificates used in the information system. Registration to receive a public key certificate shall:

– a)  Include authorization by a supervisor or a responsible official.

– b)  Be accomplished by a secure process that verifies the identity of the certificate holder.

– c)  Ensure the certificate is issued to the intended party.

41“To Provide Premier Public Safety Services”

CJIS PM 5.6 Changes

• Appendix G.6 Encryption

• The CJIS Security Policy is a “living” document under constant review and receiving regular updates through the Advisory Policy Board (APB) process. Agencies need to always keep up to date on the latest requirements. These requirements can be found in CJIS Security Policy Section 5.10.1.2. Please contact the CJIS ISO Program anytime to address any questions or concerns about CJIS Security Policy requirements, the current APB status of CJIS Security Policy requirements, or if seeking general information or guidance. 

42“To Provide Premier Public Safety Services”

Page 22: CJIS Security - Oregon Training/2017 Statewide Training...physical access to criminal ... “paper” CJIS Security Awareness Training? ... requirements for access to Federal Bureau

8/23/2017

22

CJIS PM 5.6 Changes

• Appendix A – add new definitions– Asymmetric Encryption — A type of encryption that uses key pairs for 

encryption. One key is used to encrypt a message and another key to decrypt the message. Asymmetric encryption is also commonly known as public key encryption.

– Hybrid Encryption — A type of encryption where both asymmetric encryption and symmetric encryption keys are used creating what is referred to as cipher suites. In a hybrid solution the asymmetric encryption keys are used for client/server certificate exchange to provide session integrity while the symmetric encryption keys are used for bulk data encryption to provide data confidentiality.

– Symmetric Encryption — A type of encryption where the same key is used to encrypt and decrypt a message. Symmetric encryption is also known as secret key encryption.

43“To Provide Premier Public Safety Services”

Questions?

• Please Contact me –

[email protected]

– (503)934‐2335

44“To Provide Premier Public Safety Services”