January 21: How To Achieve CJIS Compliance With M365

It is my ambition to say in ten sentences what others say in a whole book.

Friedrich Nietzsche

In my work with state and local government trying to achieve CJIS compliance with M365, I’ve found the security requirements needlessly complex. Take the Criminal Justice Information Services (CJIS) Security Policy section covering authentication – “IA-5 AUTHENTICATOR MANAGEMENT”. This section spans forty-two pages (72-114) to advise the use of phishing-resistant authentication.

I’ve reviewed the entire 451-page CJIS security policy and extracted the P1 controls addressable by Microsoft 365 configurations.

Here is the table of contents. Provide your email and I’ll send you the eBook How to Achieve CJIS Compliance with M365.