Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Entrust Datacard > Deploying Advanced Authentication for CJIS Compliance
 

Deploying Advanced Authentication for CJIS Compliance

White Paper Published By: Entrust Datacard
Entrust Datacard
Published:  May 15, 2014
Type:  White Paper

To help protect access to this sensitive information, a strict set of security controls is defined in the FBI’s CJIS Security Policy and must be adhered to by organizations that access CJIS information.

The FBI’s CJIS Security Policy (Section 5.6.2.2) requires organizations to implement advanced authentication controls to securely and properly access the CJIS database from non-secure locations, including police cruisers.

Learn the reasons behind this policy, understand the strategy for advanced authentication and review the options available to organizations to meet the stronger authentication requirements. 




Tags : 
entrust, security, cjis, compliance, fbi, security policies, it management