Table of Contents

Free Active Directory Auditing Tool

Try it now
Department of Justice logo - CJIS compliance

CJIS compliance: How to meet password and MFA requirements

Table of Contents

If you’re responsible for password security at a law enforcement agency or organization that handles criminal justice data, CJIS compliance isn’t optional. It’s the baseline for protecting some of the most sensitive information in the country.

The FBI’s Criminal Justice Information Services (CJIS) Security Policy sets strict standards for anyone accessing criminal justice information. Version 5.9.5 was released in July 2024 and version 6.0 was released in December 2024, both bringing significant updates to password and multi-factor authentication (MFA) requirements that organizations need to meet.

We’ll show you how to make it simple with Specops tools that work within your existing Active Directory environment, adding the controls necessary to meet CJIS requirements without disrupting your operations.

Who needs to comply with CJIS?

CJIS compliance applies to any organization that accesses, stores, or transmits Criminal Justice Information (CJI). This includes:

  • Law enforcement agencies at federal, state, and local levels
  • Courts and judicial systems
  • Correctional facilities
  • Private contractors and vendors who work with law enforcement
  • Cloud service providers hosting CJI
  • Background check companies

If your organization touches CJI in any way, you fall under CJIS requirements. This extends beyond direct law enforcement to any third-party vendor or contractor in the chain.

Why CJIS compliance matters

Non-compliance with CJIS isn’t just a paperwork problem. Organizations that fail to meet requirements face serious consequences, including loss of access to FBI CJIS resources and potential monetary fines. All breaches and major incidents must be reported to the Justice Department, and the reputational damage alone can be devastating for agencies that fail to protect this data.

Every law enforcement agency using CJIS gets audited at least once every three years. Falling short means risking your access to critical databases your organization depends on. The version 6.0 enforcement deadline has passed, which means non-compliant organizations are already at risk of sanctions.

Key updates in CJIS 5.9.5 and 6.0

CJIS 5.9.5 — MFA moves from guidance to requirement

With the release of CJIS 5.9.5, multifactor authentication (MFA) was no longer optional: every account that accesses criminal-justice information must use MFA so that possession of a password alone cannot enable access.

MFA must combine at least two different types of factors, for example:

  • Something you know — e.g., a password or PIN (a necessary but insufficient safeguard by itself).
  • Something you have — e.g., a smart card, hardware token, or registered mobile device (an additional possession-based barrier).
  • Something you are — e.g., fingerprint or facial scan (biometric verification tied to the individual).

Using multiple factor types dramatically lowers the chance an attacker can gain entry even if one credential is compromised.

CJIS 6.0 — Widening and hardening the security perimeter

CJIS 6.0 extends the protections introduced in 5.9.5 with several operational and lifecycle-focused controls:

  • Continuous monitoring: Agencies must actively detect and investigate suspicious behavior in near real time so incidents can be contained before they become major breaches.
  • Third-party & supply-chain risk management: Vendors, contractors, and partners are held to the same security expectations as agency personnel, including documented risk assessments and explicit access restrictions.
  • Lifecycle security planning: Security must be embedded from design through deployment, upkeep, and eventual decommissioning of systems.

These updates reflect the realities of modern law-enforcement IT (data is accessed from many devices, networks, and jurisdictions) and require consistent security controls across that entire environment.

CJIS password requirements

The CJIS Security Policy v6.0 updated the “Memorized Secrets” aka PINs and Passwords Standards to align with NIST Digital Identity Guidelines. These requirements replace traditional complexity rules with length and quality checks:

  • Minimum length: Memorized secrets (passwords and/or pins) must be at least 8 characters with no additional complexity requirements, or 6 characters if chosen by the verifier. However, at Specops we would recommend going well above this minimum limit and enforcing passphrases of 15 characters and above.
  • Banned password list: Systems must maintain and check against a list of context-specific words, dictionary words, repetitive or sequential characters, or passwords obtained from previous breach corpuses.
  • Password change protocol: Users must immediately change passwords found on the banned list.
  • Authentication attempts: Max of 5 failed login attempts to prevent brute force attacks.
  • Password expiration: Passwords must expire immediately if found to be compromised, and may be allowed to expire after 365 days.
  • Secure transmission: Passwords must travel over encrypted and authenticated channels.
  • Secure storage: Passwords must be salted and hashed using a one-way key derivation function.

Read more on CJIS password policy requirements.

Where can Specops help?

Specops Password Policy makes it simple to enforce a strong password policy that meets the above standards. You can:

  • Set passphrase requirements to help end users create and remember longer passwords. Dynamic feedback guides users to create strong, compliant passwords during the creation process.
  • Embed CJIS-approved complexity, rotation, and history rules directly in Active Directory with readymade CJIS compliance templates that apply the correct password requirements without manual policy building.
  • Your Active Directory will also be continuously scanned against our growing database of over 4 billion compromised passwords, notifying end users with breached passwords to immediately change.
Continuous Scan Password Policy icon
Continuously block 4 billion+ compromised passwords in your Active Directory

MFA requirements under CJIS

The CJIS Security Policy now requires MFA for all users accessing CJI, particularly for remote access scenarios. CJIS requires at least two of these three authentication factors:

  • Something you know: Passwords, security codes, or personal identification numbers
  • Something you have: Physical authenticators like USB keys, access cards, or mobile devices
  • Something you are: Biometric identifiers such as facial recognition, iris scans, or fingerprints

It’s worth noting the policy treats remote access as higher risk and mandates stricter controls for any remote connection to CJI.

Where can Specops help?

  • Specops Secure Access elevates your MFA by letting you stick to authentication factors that are less resistant for social engineering and phishing.
Secure your Active Directory access with MFA for Windows logon, VPN & RDP.
  • Specops uReset gives users a self-service portal (protected by MFA) to unlock their Active Directory accounts securely. Every reset is logged, timestamped, and reportable, ticking the audit-trail box without a mountain of help-desk tickets.
  • If you’re already using an MFA provider and want to add Specops Password Policy or uReset, the Specops authentication client wraps easily with your chosen MFA solution, creating a seamless experience that meets CJIS multi-factor requirements without complicating the login process.

Need support with CJIS compliance?

We’d be happy to walk you through where and how Specops can support you on your path to CJIS compliance – reach out to us here and an expert will be in touch.

(Last updated on October 13, 2025)

picture of author marcus white

Written by

Marcus White

Marcus is a Specops cybersecurity specialist based in the UK, with 8+ years experience in the tech and cyber sectors. He writes about authentication, password security, password management, and compliance.

Back to Blog

Related Articles

  • What is the NCSC guidance on password managers?

    To keep our accounts secure across the multiple services that we use, we need to choose strong passwords that are unique for each account or service. Yet, 52% of people reuse the same password for multiple accounts.   Remembering multiple strong passwords for perhaps dozens of accounts is challenging, but can be solved with a password manager. The National Cyber Security Centre (NCSC), the UK’s cyber…

    Read More
  • [New research] Heatmap of 10 million breached passwords: 98.5% are weak

    The Specops research team has analyzed 10 million random passwords from the 1 billion+ breached password list used by Specops Password Auditor. These are all real compromised passwords that have been captured by Specops, which you can scan your own Active Directory against right now. Our team have mapped out the most common length and…

    Read More
  • NIS2, passwords, and MFA: Everything you need to know 

    MFA and password security are key considerations in several regulatory frameworks, and NIS2 is no different. The NIS2 Directive is an important piece of legislation for anyone working in cybersecurity across the European Union. The latest updates to the NIS2 (Network and Information Systems) regulations were published in the Official Journal of the European Union…

    Read More

Free Active Directory Auditing Tool!