Assessment3/7/2026
Total Controls126
Tasks: [Open/Total]2 / 2

CJIS(SP

Score of Applied Controls:
5
5 out of 126
Count of Applied Controls:
84
84 out of 126
Risk Assessment
[based on applied Controls]
33
33 out of 100
126 Cntrls
802.11 Wireless Protocols 802.11 Wireless Protocols
0 / 1 Answered
Access Control Access Control
0 / 1 Answered
Access Control Criteria Access Control Criteria
0 / 1 Answered
Access Control for Display Medium Access Control for Display Medium
0 / 1 Answered
Access Control for Transmission Medium Access Control for Transmission Medium
0 / 1 Answered
Access Control Mechanisms Access Control Mechanisms
0 / 1 Answered
Access Enforcement Access Enforcement
0 / 1 Answered
Account Management Account Management
0 / 1 Answered
Advanced Authentication Advanced Authentication
0 / 2 Answered
Advanced Password Standards Advanced Password Standards
0 / 1 Answered
Agency User Agreements Agency User Agreements
0 / 1 Answered
Assertions Assertions
0 / 1 Answered
Audit Monitoring, Analysis, and Reporting Audit Monitoring, Analysis, and Reporting
0 / 1 Answered
Audit Record Retention Audit Record Retention
0 / 1 Answered
Auditable Events and Content (Information Systems) Auditable Events and Content (Information Systems)
0 / 1 Answered
Auditing and Accountability Auditing and Accountability
0 / 1 Answered
Audits by the CSA Audits by the CSA
0 / 1 Answered
Authentication Policy and Procedures Authentication Policy and Procedures
0 / 1 Answered
Authenticator Management Authenticator Management
0 / 1 Answered
Basic Password Standards Basic Password Standards
0 / 1 Answered
Basic Security Awareness Training Basic Security Awareness Training
0 / 1 Answered
Bluetooth Bluetooth
0 / 1 Answered
Boundary Protection Boundary Protection
0 / 1 Answered
Cellular Service Abroad Cellular Service Abroad
0 / 1 Answered
Cloud Computing Cloud Computing
0 / 1 Answered
Collection of Evidence Collection of Evidence
0 / 1 Answered
Compensating Controls Compensating Controls
0 / 1 Answered
Content Content
0 / 1 Answered
Controlled Area Controlled Area
0 / 1 Answered
Criminal Justice Agency User Agreements Criminal Justice Agency User Agreements
0 / 1 Answered
CSA ISO Responsibilities CSA ISO Responsibilities
0 / 1 Answered
Delivery and Removal Delivery and Removal
0 / 1 Answered
Device Certificates Device Certificates
0 / 1 Answered
Digital Media during Transport Digital Media during Transport
0 / 1 Answered
Digital Media Sanitization and Disposal Digital Media Sanitization and Disposal
0 / 1 Answered
Disposal of Physical Media Disposal of Physical Media
0 / 1 Answered
Encryption for CJI at Rest Encryption for CJI at Rest
0 / 1 Answered
Encryption for CJI in Transit Encryption for CJI in Transit
0 / 1 Answered
Events Events
0 / 1 Answered
Facsimile Transmission of CJI Facsimile Transmission of CJI
0 / 1 Answered
FBI CJIS Division Responsibilities FBI CJIS Division Responsibilities
0 / 1 Answered
Identification and Authentication Identification and Authentication
0 / 1 Answered
Identification Policy and Procedures Identification Policy and Procedures
0 / 1 Answered
Identifier and Authenticator Management Identifier and Authenticator Management
0 / 1 Answered
Identifier Management Identifier Management
0 / 1 Answered
Incident Handling Incident Handling
0 / 1 Answered
Incident Monitoring Incident Monitoring
0 / 1 Answered
Incident Response Incident Response
0 / 2 Answered
Incident Response Training Incident Response Training
0 / 1 Answered
Information Exchange Information Exchange
0 / 2 Answered
Information Flow Enforcement Information Flow Enforcement
0 / 1 Answered
Information Handling Information Handling
0 / 1 Answered
Information Input Restrictions Information Input Restrictions
0 / 1 Answered
Interagency and Management Control Agreements Interagency and Management Control Agreements
0 / 1 Answered
Intrusion Detection Tools and Techniques Intrusion Detection Tools and Techniques
0 / 1 Answered
LASO Training LASO Training
0 / 1 Answered
Least Functionality Least Functionality
0 / 1 Answered
Least Privilege Least Privilege
0 / 1 Answered
Level Four Security Awareness Training Level Four Security Awareness Training
0 / 1 Answered
Level One Security Awareness Training Level One Security Awareness Training
0 / 1 Answered
Level Three Security Awareness Training Level Three Security Awareness Training
0 / 1 Answered
Level Two Security Awareness Training Level Two Security Awareness Training
0 / 1 Answered
Local Device Authentication Local Device Authentication
0 / 1 Answered
Logging NCIC and III Transactions Logging NCIC and III Transactions
0 / 1 Answered
Malicious Code Protection Malicious Code Protection
0 / 2 Answered
Management of Security Incidents Management of Security Incidents
0 / 1 Answered
Managing Changes to Service Providers Managing Changes to Service Providers
0 / 1 Answered
Media Protection Media Protection
0 / 1 Answered
Media Storage and Access Media Storage and Access
0 / 1 Answered
Media Transport Media Transport
0 / 1 Answered
Mobile Device Management (MDM) Mobile Device Management (MDM)
0 / 1 Answered
Mobile Devices Mobile Devices
0 / 1 Answered
Mobile Hotspots Mobile Hotspots
0 / 1 Answered
Monitoring Physical Access Monitoring Physical Access
0 / 1 Answered
Monitoring, Review, and Delivery of Services Monitoring, Review, and Delivery of Services
0 / 1 Answered
Network Diagram Network Diagram
0 / 1 Answered
One-time Passwords (OTP) One-time Passwords (OTP)
0 / 1 Answered
Outsourcing Standards for Channelers Outsourcing Standards for Channelers
0 / 1 Answered
Outsourcing Standards for Non-Channelers Outsourcing Standards for Non-Channelers
0 / 1 Answered
Partitioning Partitioning
0 / 1 Answered
Password Password
0 / 1 Answered
Patch Management Patch Management
0 / 1 Answered
Patching/Updates Patching/Updates
0 / 1 Answered
Personal Firewall Personal Firewall
0 / 1 Answered
Personal Identification Number (PIN) Personal Identification Number (PIN)
0 / 1 Answered
Personally Owned Information Systems Personally Owned Information Systems
0 / 1 Answered
Personnel Sanctions Personnel Sanctions
0 / 1 Answered
Personnel Screening Requirements for Individuals R Personnel Screening Requirements for Individuals Requiring Unescorted Access to Unencrypted CJI
0 / 1 Answered
Personnel Termination Personnel Termination
0 / 1 Answered
Personnel Transfer Personnel Transfer
0 / 1 Answered
Physical Access Authorizations Physical Access Authorizations
0 / 1 Answered
Physical Access Control Physical Access Control
0 / 1 Answered
Physical Media in Transit Physical Media in Transit
0 / 1 Answered
Physical Protection Physical Protection
0 / 1 Answered
Private Contractor User Agreements and CJIS Securi Private Contractor User Agreements and CJIS Security Addendum
0 / 1 Answered
Protection of Audit Information Protection of Audit Information
0 / 1 Answered
Public Key Infrastructure (PKI) Technology Public Key Infrastructure (PKI) Technology
0 / 1 Answered
Publicly Accessible Computers Publicly Accessible Computers
0 / 1 Answered
Remote Access Remote Access
0 / 1 Answered
Reporting Security Events Reporting Security Events
0 / 1 Answered
Response to Audit Processing Failures Response to Audit Processing Failures
0 / 1 Answered
Secondary Dissemination Secondary Dissemination
0 / 1 Answered
Secondary Dissemination of Non-CHRI CJI Secondary Dissemination of Non-CHRI CJI
0 / 1 Answered
Security Alerts and Advisories Security Alerts and Advisories
0 / 1 Answered
Security of Configuration Documentation Security of Configuration Documentation
0 / 1 Answered
Security Perimeter Security Perimeter
0 / 1 Answered
Security Training Records Security Training Records
0 / 1 Answered
Session Lock Session Lock
0 / 1 Answered
Spam and Spyware Protection Spam and Spyware Protection
0 / 1 Answered
Special Security Inquiries and Audits Special Security Inquiries and Audits
0 / 1 Answered
State and Federal Agency User Agreements State and Federal Agency User Agreements
0 / 1 Answered
System Access Control System Access Control
0 / 1 Answered
System Use Notification System Use Notification
0 / 1 Answered
Time Stamps Time Stamps
0 / 1 Answered
Triennial Compliance Audits by the FBI CJIS Divisi Triennial Compliance Audits by the FBI CJIS Division
0 / 1 Answered
Triennial Security Audits by the FBI CJIS Division Triennial Security Audits by the FBI CJIS Division
0 / 1 Answered
Unsuccessful Login Attempts Unsuccessful Login Attempts
0 / 1 Answered
Use of Originating Agency Identifiers in Transacti Use of Originating Agency Identifiers in Transactions and Information Exchanges
0 / 1 Answered
Virtualization Virtualization
0 / 1 Answered
Visitor Control Visitor Control
0 / 1 Answered
Voice over Internet Protocol Voice over Internet Protocol
0 / 1 Answered
Wireless Device Risk Mitigations Wireless Device Risk Mitigations
0 / 1 Answered