Coast Mountains Piedmont Revolution Coast Piedmont Coast
Next Board Meeting Annual Report
Board Members Contact
Board Minutes Governance Board News

CJIS Two Factor Authentication

CJIS ISO Program Office
http://www.fbi.gov/about-us/cjis

George White and Ron Buchanan from the CJIS ISO Program Office with the Federal Bureau of Investigation. There has been lots of discussion across the state regarding two-factor authentication and what constitutes compliance, the staff has invited Ron and George to provide us with a presentation regarding compliance through CJIS. George went through the process that the ISO program office used to devise the process and what would be considered compliance through the FBI. George stated that authentication is the process of verifying a claimed identity, determining if the subject is really who he/she claims to be. It is based on at least one of the following three factors: something a person has (smart card, token, key, swipe card, badge), something a person knows (password, passphrase, PIN), something a person is (fingerprint, voice, retina/iris characteristics). *Strong, or two-factor, authentication contains two out of these three methods. George also stated that a single form of authentication (standard authentication* = password) is not a very secure means of authentication. Therefore, many organizations have introduced into policy a second means, or form of, authenticating a person's identity. Additionally George stated, for the purpose of the CJIS Security Policy (CSP), the process of requiring more than a single factor of authentication is most often referred to as Advanced Authentication, or AA. George also expressed that the requirement to use AA is dependent upon the physical, personnel and technical security controls associated with the user's location. George explained that AA shall not be required for users requesting access to CJI from within a physically secure location and when the technical security controls have been met and AA is required when it can't be determined from where a user is originating, e.g. utilizing wireless or web. George also made the point those agencies that bought equipment to be in compliance for the previous set of protocols, are still good for a few more years, but need to look into the cost of being in compliance for the new set of authentication protocols. CJIS does not endorse any product; however they will assist an agency who has a potential solution to ensure that the potential solution is in compliance.

CJIS ISO Program Office Presentation

CJIS Security Policy

Local Law Enforcement Agency Solutions

The City of High Point presented their solution to two-factor authentication to the CJIN Board. Please click here to view that presentaton.

The NC State Highway Patrol also presented their solution to two-factor authentication for the CJIN Mobile Data network. Please view that presentation here.

ITS also presented a possible solution from a State level, which was sent to the FBI for approval, that presentation and flowchart is located here. The letter that was submitted to the FBI can be seen here.