CJIS endpoint controls

The CJIS Security Policy requires technical controls that limit access to Criminal Justice Information and reduce risk on agency endpoints. Codeproof provides centralized MDM and security configuration for iOS, Android, Windows, and macOS to help you deploy consistent controls at scale.

Download CJIS checklist (PDF)

What CJIS expects on endpoints

Access control: Unique user authentication, session lock, and least privilege on devices and apps that handle CJI.

Encryption: Protect data at rest and data in transit with approved algorithms and trusted certificates.

Configuration management: Standardized baselines, change control, and detection of unauthorized settings or software.

Audit and accountability: Activity logging and retention for access, configuration, and administrative actions.

Incident response: Remote lock and wipe for lost or stolen devices, and procedures for containment and evidence.

Your agency remains responsible for overall CJIS compliance. Codeproof provides endpoint controls and evidence to support your program.

How Codeproof helps

  • Encryption and auth: Enforce FileVault and BitLocker policies, device encryption on mobile, passcodes, auto-lock, and idle timeout.
  • Integrity posture: Detect jailbroken or rooted devices and block access for noncompliant endpoints.
  • App governance: Allow or deny lists, kiosk mode for single app or multi app use, and silent app updates where supported.
  • Secure connectivity: Deploy Wi-Fi, per app VPN, and certificate trust stores at scale.
  • Patch posture: Track OS and app versions and restrict access for unpatched devices where policy requires.
  • Remote actions: Lock, selective wipe, full wipe, and optional location where allowed by agency policy.
  • Evidence for audits: Device inventory, configuration history, activity logs, and exportable reports.

Related: Windows MDM · macOS MDM · Android MDM · iOS MDM

CJIS FAQs

What is CJIS?
CJIS (Criminal Justice Information Services) refers to the FBI’s CJIS Security Policy—a set of requirements for protecting Criminal Justice Information (CJI) across agencies and their vendors.
Does Codeproof help us align with the CJIS Security Policy?
Yes. Codeproof enforces device safeguards—encryption, access control, audit logging, and remote actions—that support your CJIS Security Policy program. Policy alignment still requires agency procedures and training.
How do we protect CJI on mobile devices?
Require passcodes and encryption, restrict data sharing to approved apps, disable risky features (where supported), and use remote lock/wipe with activity logs for incident evidence.
Can we enforce MFA and strong authentication?
Yes. Pair device controls with identity providers for MFA. Use certificates/Managed Kerberos where applicable and restrict access from non-compliant devices.
How do we handle lost or stolen officer devices?
Trigger Lost Mode or remote lock, revoke certificates/keys, and wipe corporate data. Use inventory and logs to document timelines and actions.
Can cameras, Bluetooth, or sharing be restricted in secure areas?
Yes—use policy to block camera, screen capture, AirDrop/Nearby Share, and unmanaged sharing in designated profiles or locations (where the OS supports it).

Maximize employee productivity through Codeproof