FBI CJIS Security Policy
The FBI Criminal Justice Information Services (CJIS) Security Policy establishes minimum security requirements for access to FBI CJIS Division systems and information including the National Crime Information Center (NCIC), Interstate Identification Index (III), and National Instant Criminal Background Check System (NICS). Version 5.9.4 (2024) applies to all entities accessing criminal justice information (CJI) including law enforcement, contractors, and cloud service providers.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (6)
Access Control and Authentication
FedRAMP-specific access control and identification/authentication requirements
| Code | Title |
|---|---|
| CJIS-4 | Access Control |
| CJIS-5 | Identification and Authentication |
| CJIS-6 | Account Management |
| FEDRAMP-AC-1 | Access Control Policy and Procedures |
| FEDRAMP-AC-17 | Remote Access |
| FEDRAMP-AC-2 | Account Management |
| FEDRAMP-AC-3 | Access Enforcement |
| FEDRAMP-AC-4 | Information Flow Enforcement |
| FEDRAMP-AC-6 | Least Privilege |
| FEDRAMP-IA-1 | Identification and Authentication Policy |
| FEDRAMP-IA-2 | Identification and Authentication (Organizational Users) |
| FEDRAMP-IA-5 | Authenticator Management |
| FEDRAMP-IA-8 | Identification and Authentication (Non-Organizational Users) |
| ICS-AC-1 | Role-based access control |
| ICS-AC-2 | Authentication mechanisms |
| ICS-AC-3 | Account management |
| ICS-AC-4 | Physical access controls |
| NIS2-IA-11 | Access Control Policy |
| NIS2-IA-12 | Multi-Factor Authentication |
Governance and Agreements
| Code | Title |
|---|---|
| CJIS-1 | Information Exchange Agreements |
| CJIS-2 | Security Awareness Training |
| CJIS-3 | Personnel Security |
Monitoring and Response
Continuous monitoring and incident response
Physical and Environmental Security
| Code | Title |
|---|---|
| CJIS-14 | Physical Protection |
| CJIS-15 | Mobile Devices |
| CJIS-16 | Cloud Computing |
Risk and Supply Chain
| Code | Title |
|---|---|
| CJIS-17 | Risk Assessment |
| CJIS-18 | Security Assessment and Authorization |
| CJIS-19 | Supply Chain Risk Management |
| CJIS-20 | System Acquisition |
System Security
| Code | Title |
|---|---|
| CJIS-10 | System and Information Integrity |
| CJIS-7 | Configuration Management |
| CJIS-8 | Media Protection |
| CJIS-9 | System and Communications Protection |
Maps to 625 other frameworks
Frequently Asked Questions
What is FBI CJIS Security Policy?
FBI CJIS Security Policy is a compliance framework from United States (FBI) with 6 domains and 33 controls. The FBI Criminal Justice Information Services (CJIS) Security Policy establishes minimum security requirements for access to FBI CJIS Division systems and information including the National Crime Information Center (NCIC), Interstate Identification Index (III), and National Instant Criminal Background Check System (NICS). Version 5.9.4 (2024) applies to all entities accessing criminal justice information (CJI) including law enforcement, contractors, and cloud service providers. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does FBI CJIS Security Policy have?
FBI CJIS Security Policy has 33 controls organised across 6 domains. The largest domains are Access Control and Authentication (19 controls), Risk and Supply Chain (4 controls), System Security (4 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does FBI CJIS Security Policy map to?
FBI CJIS Security Policy maps to 625 other compliance frameworks. The top mapping partners are TISAX — Trusted Information Security Assessment Exchange (55% coverage), NIST SP 800-171A Rev 3 — Assessing CUI Security Requirements (52% coverage), AWWA Cybersecurity Guidance for the Water Sector (American Water Works Association) (52% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with FBI CJIS Security Policy compliance?
Start your FBI CJIS Security Policy compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about FBI CJIS Security Policy requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 33 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required