FBI declares cloud vendors must meet CJIS security rules
Officials acknowledge difficulties facing large cloud vendors like Google, but contends that requirements are met by some firms
Computerworld - The FBI Tuesday reaffirmed its rule that all cloud products sold to to U.S. law enforcement agencies must comply with the FBI's Criminal Justice Information Systems (CJIS) security requirements.
While the nation's top law enforcement agency concedes that some vendors may have a tough time meeting those requirements, it insisted that there would be no compromising on security.
"The FBI remains committed to using technology in its information-sharing processes, but not at the sacrifice of the security of the information with which it has been entrusted," Stephen Fischer Jr., a spokesman for the FBI's CJIS division said today in an email to Computerworld.
Fischer's comments come less than two months after the Los Angeles Police Department canceled a planned migration to Google Apps because it said the cloud service was not compliant with CJIS security requirements.
At the time, two city officials noted that U.S. Department of Justice requirements for the CJIS are not currently compatible with cloud computing.
Google has also maintained that CJIS requirements are incompatible with cloud computing and therefore present a unique challenge to any cloud vendor.
The CJIS database, maintained by the FBI, is one of the world's largest repositories of criminal history records and fingerprints.
The records are available to law enforcement agencies and contractors around the country that comply with the security rules, which include requirements that all data, both in transit and at rest, be encrypted and that anyone who accesses the database pass FBI background checks.
Fischer today maintained that the CJIS security requirements are compatible with cloud computing.
"The CJIS Security Policy is a cloud-compatible policy," that was fully vetted and approved by local, state, tribal and federal law enforcement agencies in the U.S. and Canada, he said, while acknowledging that "the requirements may be tough for some vendors to meet."
One of the more challenging requirements requires cloud service providers to identify all system, database, security and network administrators who have access to criminal justice information, he said.
Similarly, cloud vendors will likely find it difficult to require fingerprint criminal background checks on all administrators with access to the criminal justice information. Fischer said.
Analysts have previously noted such rules would be particularly difficult for cloud vendors like Google that maintain staffed data centers outside the U.S.
Fischer noted as much today. "Admittedly, these requirements may be difficult for some cloud-computing vendors due to the sheer numbers and the geographic disbursement of their personnel," he said.
"However," he added, "these requirements aren't new to vendors serving the criminal justice community and many vendors have successfully met these requirements for years."
Jeff Gould, CEO of IT consulting firm Peerstone Research, said that the requirements are likely most challenging to large cloud providers with roots in the business of providing hosted services to consumers.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- ESG: The IBM FlashSystem 840: Technical Evolution to Deliver Business Value In this whitepaper, you will learn how this high-speed storage technology has tremendous potential to support I/O-intensive and/or latency-sensitive applications.
- Choosing an MDM Platform: Where to Start the Conversation If you're in the early stages of choosing an MDM solution, or you're considering switching vendors, here are seven critical questions to ask...
- Axeda Platform Technical Overview This paper summarizes the major features of an IoT platform and explains how they simplify and speed the process of developing and deploying...
- Stock Shock: The effect of project and portfolio management on share price In this independent report, you'll see the intrinsic connection between long-term capital investment and short term market performance -- and how this can...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cloud Computing White Papers | Webcasts