RECORD MANAGEMENT SYSTEM AND CRIMINAL JUSTICE INFORMATION (CJI) TRAINING
Jim Watson, Information Security Officer
Wyoming Division of Criminal Investigation
INTRODUCTION
INTRODUCTION
INTRODUCTION
INTRODUCTION
BACKGROUND CHECKS
**CJIS Security Policy, Section 5.12.1**
BACKGROUND CHECKS
BACKGROUND CHECKS
CJIS SECURITY ADDENDUM
**CJIS Security Policy, Section 5.1.1.5; [ A Security Addendum can be found in Appendix H]**
SECURITY AWARENESS TRAINING
**CJIS Security Policy, Section 5.2**
SECURITY AWARENESS TRAINING
SYSTEM REQUIREMENTS
UNIQUE USER ID
PASSWORDS
SYSTEM USE NOTIFICATION MESSAGE
SYSTEM USE NOTIFICATION MESSAGE
VALIDATION OF SYSTEM ACCOUNTS
VALIDATION OF SYSTEM ACCOUNTS
1. Valid need-to-know/need-to-share that is determined by assigned official duties.
2. Satisfaction of all personnel security criteria.
The agency responsible for account creation shall be notified when:
1. A user’s information system usage or need-to-know or need-to-share changes.
2. A user is terminated or transferred or associated accounts are removed, disabled, or otherwise secured.
VALIDATION OF SYSTEM ACCOUNTS
EVENT LOGGING
EVENT LOGGING
1. Successful and unsuccessful system log-on attempts.
2. Successful and unsuccessful attempts to use:
a. access permission on a user account, file, directory or other system resource;
b. create permission on a user account, file, directory or other system resource;
c. write permission on a user account, file, directory or other system resource;
d. delete permission on a user account, file, directory or other system resource;
e. change permission on a user account, file, directory or other system resource.
EVENT LOGGING
3. Successful and unsuccessful attempts to change account passwords.
4. Successful and unsuccessful actions by privileged accounts.
5. Successful and unsuccessful attempts for users to:
a. access the audit log file;
b. modify the audit log file;
c. destroy the audit log file.
The agency shall retain audit records for at least one (1) year.
EVENT LOGGING
ENCRYPTION
ENCRYPTION
ENCRYPTION
ENCRYPTION
ENCRYPTION
ENCRYPTION
ADVANCED AUTHENTICATION (AA)
ADVANCED AUTHENTICATION (AA)
ADVANCED AUTHENTICATION (AA)
ADVANCED AUTHENTICATION (AA)
ADVANCED AUTHENTICATION (AA)
MOBILE DEVICE MANAGEMENT (MDM)
QUESTIONS???
307-777-7524 or jeff.cullen@wyo.gov
Jim Watson, Information Security Officer
307-777-7545 or jimmy.watson@wyo.gov