EasyWarrant

CJIS Control Mapping

Full mapping of CJIS Security Policy v6.0 controls to EasyWarrant implementation details.

ControlTitleRequirementEasyWarrant Implementation
SC-8Transmission Confidentiality & IntegrityProtect CJI during transmissionTLS 1.3 for all API and signaling; DTLS-SRTP for video media
SC-8(1)Cryptographic ProtectionImplement cryptographic mechanisms for transmissionAES-128 minimum; FIPS 140-3 validated module; TLS 1.3
SC-13Cryptographic ProtectionFIPS 140-3 validated modules; FIPS 140-2 sunset Sep 2026Azure Government FIPS 140-3 throughout; no FIPS 140-2
SC-17Public Key Infrastructure CertificatesPKI for e-signature and judicial approvalDocuSign eNotary; agency-level CA; TSA timestamp
SC-23Session AuthenticityProtect against MitM attacks and session hijackingDTLS certificate pinning; session key rotation; server-side enforcement
SC-28Protection of Information at RestProtect CJI at restAES-256 via Azure Blob Storage Gov + Key Vault CMK; US jurisdiction only
SC-10Network DisconnectTerminate session after 1 hour of inactivityServer-side 60-minute inactivity timeout; all session keys destroyed on termination
SC-12Cryptographic Key EstablishmentAgency-controlled key lifecycleAzure Key Vault HSM CMK; agency controls generation, rotation, destruction
IA-2(1)Multi-Factor AuthenticationAAL2 MFA for all CJI accessAuth0 Government or Okta FedRAMP High; AAL2 enforced; SMS OTP not accepted
AU-2Audit EventsIdentify and log auditable eventsOpenTelemetry + PostgreSQL; all warrant lifecycle, auth, and access events logged
AU-3Content of Audit RecordsSufficient information in each audit recordTimestamp, actor, action, resource, outcome, source IP, prev-hash in every entry
AU-9Protection of Audit InformationProtect audit logs from unauthorized access/modificationHash chain tamper-evidence; agency CMK; Brigade staff cannot modify agency logs
AU-11Audit Record RetentionRetain audit records per policyConfigurable per-agency retention policy; on-demand export with chain cert
AC-17Remote AccessAuthorize and monitor remote accessAll access over TLS 1.3; MFA required; full access logging
App. G.2VoIP/Video SecurityAddress VoIP/video threat modelDTLS-SRTP enforced; no plaintext media; session keys per-session
App. G.6Encryption DecisionApply FIPS requirements per encryption decision flowchartAll EasyWarrant channels encrypted; physical location rule: always encrypt