Policy Recommendations from Information Bulletin 18-10 CJIS: A thorough look to Modern Security
The FBI’s Criminal Justice Information Services (CJIS) Division issued Information Bulletin 18-10 to address evolving cybersecurity threats and the changing landscape of information access. On top of that, this bulletin is not merely an update but a foundational shift in how criminal justice agencies and their authorized entities must approach the security of Criminal Justice Information (CJI). Its policy recommendations establish a modern, risk-based security framework that moves beyond a static checklist to a dynamic model of continuous assessment and adaptation. Understanding and implementing these recommendations is critical for any organization that accesses, stores, or transmits CJI, as non-compliance can result in the suspension of critical data access privileges, severely impacting public safety operations.
The Core Philosophy: From Compliance to Continuous Security
Traditional CJIS Security Policy compliance was often viewed as a point-in-time audit—a set of controls to be checked off. Information Bulletin 18-10 fundamentally reorients this perspective. The recommendations highlight that agencies must establish an ongoing cycle of risk assessment, control implementation, monitoring, and improvement. That's why its central thesis is that security is a continuous process, not a destination. Here's the thing — this aligns with the National Institute of Standards and Technology (NIST) Cybersecurity Framework and other modern standards, acknowledging that threats are not static and defenses must evolve accordingly. The bulletin mandates that agencies develop a formal, documented Security Program that embodies this lifecycle, assigning clear roles and responsibilities, particularly the critical appointment of a designated CJIS Security Officer (CSO) with the authority to enforce policy.
Key Policy Recommendations and Their Implementation
The bulletin’s recommendations are interwoven into the existing CJIS Security Policy but carry new weight and specificity. Their implementation requires a strategic, multi-layered approach.
1. Enhanced Risk Management and Assessment
The bulletin requires agencies to conduct formal, documented risk assessments at least annually and whenever significant changes occur to the system or environment. This is not a superficial scan but a thorough analysis identifying threats, vulnerabilities, and potential impacts on CJI confidentiality, integrity, and availability. The outcome must directly inform the selection and prioritization of security controls. Agencies must move from a "one-size-fits-all" control set to a tailored security posture based on their specific risk profile. To give you an idea, a small local police department’s risk assessment and subsequent controls will differ from a statewide criminal justice data repository, though both must meet the minimum security requirements.
2. Strengthened Access Control and Identity Management
Information Bulletin 18-10 significantly tightens requirements around who can access CJI and how. It reinforces the principle of least privilege, ensuring users are granted only the minimum access necessary to perform their official duties. This is supported by:
- Multi-Factor Authentication (MFA): The bulletin strongly recommends, and in many access scenarios effectively requires, MFA for all users accessing CJIS systems from external or unmanaged networks. This is a direct response to credential theft being a primary attack vector.
- Privileged Account Management: Strict controls for administrative and other high-privilege accounts are mandated, including separate credentials for administrative tasks, rigorous logging, and just-in-time privilege elevation where feasible.
- Session Management: Implementing automatic session timeouts and mechanisms to terminate inactive sessions to prevent unauthorized access to unattended terminals.
3. Rigorous System and Communications Protection
Protecting the data in transit and at rest is essential. The bulletin clarifies and strengthens encryption standards.
- Encryption of CJI in Transit: All CJI transmitted over public networks (like the internet) must be encrypted using FIPS 140-2 validated cryptographic modules and protocols (e.g., TLS 1.2 or higher). This is non-negotiable.
- Encryption of CJI at Rest: While the policy has long required protection, the bulletin emphasizes that encryption of stored CJI is a required control, especially for mobile devices and portable media. The strength of the encryption must be commensurate with the sensitivity of the data.
- Network Segmentation: Agencies are directed to logically segment networks containing CJI from other organizational networks. This "defense-in-depth" strategy limits the blast radius of a potential breach, preventing an attacker who compromises a non-CJIS system from easily pivoting to the criminal justice data environment.
4. Advanced Monitoring, Logging, and Incident Response
A reactive stance is insufficient. The bulletin mandates a proactive, intelligence-driven security operations capability Not complicated — just consistent..
- Centralized Logging: All security-relevant logs (access logs, system logs, firewall logs, etc.) must be collected, protected from alteration, and retained for a minimum period (typically one year, with two years of availability for audit). These logs must be reviewed regularly.
- Security Monitoring: Agencies must implement tools and processes for continuous monitoring of their CJIS environment for anomalous activity, intrusion attempts, and policy violations. This includes the use of Intrusion Detection/Prevention Systems (IDS/IPS) and Security Information and Event Management (SIEM) technologies where appropriate to the agency’s size and risk.
- Formalized Incident Response Plan: The bulletin requires a documented, tested plan for responding to security incidents involving CJI. This plan must define roles, communication protocols (including reporting to the CJIS Systems Officer and FBI CJIS), containment strategies, eradication procedures, and recovery steps. Regular tabletop exercises are recommended to ensure readiness.
5. Personnel Security and Ongoing Awareness
The human element remains the most vulnerable component. The recommendations here are about building a culture of security.
- Background Investigations: The bulletin reiterates the requirement for appropriate background checks for all personnel with access to CJI, with the depth of the investigation matching the level of access.
- Mandatory Security Awareness Training: Training is not a one-time event. Agencies must provide initial and annual refresher training for all users. This training must cover policy, acceptable use, phishing awareness, social engineering, and incident reporting procedures. Training effectiveness should be measured.
- Termination Procedures: Immediate and documented processes to revoke all system access and retrieve credentials and devices upon employee termination or role change are strictly required.
Overcoming Implementation Challenges
Adopting these recommendations presents real challenges, particularly for smaller agencies with limited IT and security staff. The primary hurdles include:
- Resource Constraints: Cost, expertise, and time are significant barriers. On the flip side, the bulletin encourages leveraging shared services and cloud solutions that are CJIS-compliant. Many cloud service providers now offer environments specifically designed and validated for CJIS data, allowing smaller agencies to "buy" security rather than build it from scratch.
- Legacy Systems: Older applications may not support modern encryption or MFA. Which means agencies must develop a roadmap for upgrading, isolating, or replacing these systems. The risk-based approach allows for compensating controls for legacy systems, but these must be documented and justified. Practically speaking, * Cultural Shift: Moving from a compliance-checkbox mentality to a culture of continuous security requires strong leadership from the CJIS Security Officer and agency executives. Security must be framed as an enabler of the mission—protecting the integrity of investigations and the privacy of citizens—not merely a bureaucratic hurdle.
The Path Forward: Building a Resilient Security Posture
To operationalize Information Bulletin 18-10, agencies should follow a structured
ThePath Forward: Building a Resilient Security Posture
To operationalize Information Bulletin 18-10, agencies should follow a structured, phased approach:
-
Comprehensive Assessment & Gap Analysis: Begin by conducting a thorough audit of current CJIS security practices against the bulletin's requirements. Identify gaps in personnel vetting, access controls, incident response plans, training programs, and technical controls (like encryption and MFA). This assessment forms the baseline for prioritization.
-
Develop & Document a Detailed Implementation Roadmap: Based on the gap analysis, create a realistic, timeline-driven plan. This plan must explicitly outline:
- Phased Milestones: Clear deadlines for implementing critical controls (e.g., MFA rollout, legacy system isolation plans, enhanced training schedules).
- Resource Allocation: Detailed budget estimates, staff training needs, and identification of internal or external resources (including leveraging CJIS Service Providers or shared service centers).
- Risk-Based Prioritization: Clearly justify the sequence of actions, focusing first on high-risk vulnerabilities and critical systems.
- Documentation: Rigorously document all compensating controls for legacy systems, access reviews, and training effectiveness metrics.
-
take advantage of CJIS-Compliant Shared Services & Cloud Solutions: Actively pursue partnerships with CJIS-certified cloud providers and shared service organizations. These entities offer pre-validated, scalable security frameworks, reducing the burden on agency IT staff and accelerating compliance. Ensure any shared service agreement explicitly addresses CJIS data handling and audit requirements Not complicated — just consistent. Turns out it matters..
-
Embed Security into the Culture Through Leadership & Training: Executive leadership must champion the security posture, visibly integrating it into agency operations. This commitment must be reinforced through:
- Enhanced Training: Expand beyond annual refreshers to include scenario-based drills, tabletop exercises simulating CJIS-specific incidents (breaches, insider threats, denial-of-service), and clear, accessible reporting channels.
- Continuous Communication: Regularly communicate security expectations, successes, and evolving threats to all personnel at all levels.
- Recognition: Acknowledge and reward security-conscious behavior and contributions to the security program.
-
Establish dependable Monitoring, Review, and Continuous Improvement: Security is not static. Implement continuous monitoring for CJIS systems and data. Schedule regular, independent audits and reviews of the entire security program against the bulletin requirements. Use metrics (incident response times, training completion rates, access review frequency, phishing test results) to measure effectiveness and drive ongoing enhancements. The CJIS Security Officer must maintain a current, documented security plan subject to regular review and update Which is the point..
Conclusion:
Implementing CJIS Information Bulletin 18-10 is a complex but essential undertaking for any agency handling sensitive criminal justice information. Practically speaking, while challenges like resource constraints and legacy systems persist, the path forward lies in strategic planning, leveraging available resources (especially CJIS-compliant shared services and cloud solutions), and, most critically, fostering a pervasive security culture driven by unwavering leadership commitment. By adopting a structured, risk-based approach focused on continuous improvement and embedding security into the fabric of daily operations, agencies can transform compliance from a bureaucratic obligation into a fundamental enabler of their mission – protecting public safety while safeguarding the privacy and integrity of the data entrusted to them. Resilience is built through preparation, vigilance, and an unwavering focus on the human and technical elements that define CJIS security.