CJIS Two Factor Authentication

CJIS ISO Program Office
http://www.fbi.gov/about-us/cjis

George White and Ron Buchanan from the CJIS ISO Program Office with the Federal Bureau of Investigation. There has been lots of discussion across the state regarding two-factor authentication and what constitutes compliance, the staff has invited Ron and George to provide us with a presentation regarding compliance through CJIS.

  • George went through the process that the ISO program office used to devise the process and what would be considered compliance through the FBI.
  • George stated that authentication is the process of verifying a claimed identity, determining if the subject is really who he/she claims to be. It is based on at least one of the following three factors: something a person has (smart card, token, key, swipe card, badge), something a person knows (password, passphrase, PIN), something a person is (fingerprint, voice, retina/iris characteristics). *Strong, or two-factor, authentication contains two out of these three methods.
  • George also stated that a single form of authentication (standard authentication* = password) is not a very secure means of authentication. Therefore, many organizations have introduced into policy a second means, or form of, authenticating a person’s identity.
  • Additionally George stated, for the purpose of the CJIS Security Policy (CSP), the process of requiring more than a single factor of authentication is most often referred to as Advanced Authentication, or AA.
  • George also expressed that the requirement to use AA is dependent upon the physical, personnel and technical security controls associated with the user’s location.
  • George explained that AA shall not be required for users requesting access to CJI from within a physically secure location and when the technical security controls have been met and AA is required when it can’t be determined from where a user is originating, e.g. utilizing wireless or web.
  • George also made the point those agencies that bought equipment to be in compliance for the previous set of protocols, are still good for a few more years, but need to look into the cost of being in compliance for the new set of authentication protocols.
  • CJIS does not endorse any product; however they will assist an agency who has a potential solution to ensure that the potential solution is in compliance.

Local Law Enforcement Agency Solutions

The City of High Point presented their solution to two-factor authentication to the CJIN Board. Please click here to view that presentaton.

The NC State Highway Patrol also presented their solution to two-factor authentication for the CJIN Mobile Data network. Please view that presentation here.

ITS also presented a possible solution from a State level, which was sent to the FBI for approval, that presentation and flowchart is located here. The letter that was submitted to the FBI can be seen here.

E-Newsletter Subscription