• RSS
  • Twitter
  • FaceBook
Home > White Papers > Entrust Datacard > Deploying Advanced Authentication for CJIS Compliance

Deploying Advanced Authentication for CJIS Compliance

Entrust Datacard

To help protect access to this sensitive information, a strict set of security controls is defined in the FBI’s CJIS Security Policy and must be adhered to by organizations that access CJIS information.

The FBI’s CJIS Security Policy (Section 5.6.2.2) requires organizations to implement advanced authentication controls to securely and properly access the CJIS database from non-secure locations, including police cruisers.

Learn the reasons behind this policy, understand the strategy for advanced authentication and review the options available to organizations to meet the stronger authentication requirements.

 

Email this page
Published:  Jul 21, 2014
Length:  22
Type:  White Paper
Tags : 
authentication, cjis, compliance, sensitive information, security, controls, fbi, policy



Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter