Skip to main content
Microsoft
Azure Government
Azure Government
  • Home
  • DevBlogs
    • App Center
    • Azure DevOps
    • Notification Hubs
    • Visual Studio
    • Visual Studio Code
    • Visual Studio for Mac
    • Azure Artifacts
    • Azure Boards
    • Azure Pipelines
    • Azure Repos
    • Azure Test Plans
    • DevOps
    • C++
    • Java
    • Java Blog in Chinese
    • JavaScript
    • PowerShell
    • Python
    • Q#
    • Scripting
    • TypeScript
    • Visual Basic
    • Visual C#
    • Visual F#
    • .NET
    • ASP.NET
    • NuGet
    • Xamarin
    • Apps for Windows
    • Azure Government
    • Azure SDKs
    • Bing Dev Center
    • Command Line
    • Developer Support
    • DirectX Developer Blog
    • IoT Developer
    • Math In Office
    • Microsoft Edge Dev
    • Microsoft Azure
    • Office 365 Development
    • Old New Thing
    • PAX Graph
    • PAX Media
    • PAX Windows
    • Perf and Diagnostics
    • PIX on Windows
    • Startup Developers
    • Surface Duo
    • Sustainable Software
    • Windows Search Platform
    • Azure Cosmos DB
    • Azure Data Studio
    • Azure SQL
    • Azure Synapse Analytics
    • OData
    • Revolutions R
    • SQL Server Data Tools

    Azure Government

    Insights, how-tos and updates for building solutions on Microsoft's cloud for US government

    CJIS Archives | Page 2 of 3 | Azure Government

    Microsoft hosts Justice & Public Safety leaders at the 2nd annual CJIS Summit
    Microsoft hosts Justice & Public Safety leaders at the 2nd annual CJIS Summit
    AvatarRochelle M. EichnerMay 1, 2017May 1, 201705/1/17
    Transparency is the foundation of Microsoft’s commitment to CJIS Compliance Founded on our commitment of transparency, Microsoft hosted the 2nd annual CJIS Summit, offering leaders in law enforcement the opportunity to collaborate directly with our compliance engineers, executives, and our Justice and Public Safety team. Attendees included...

    Comments are closed.0AzureAzure Government
    The CJIS Security Policy – Analyzing the 13 Policy Areas: Part III
    The CJIS Security Policy – Analyzing the 13 Policy Areas: Part III
    AvatarRochelle M. EichnerApril 11, 2017Apr 11, 201704/11/17
    Better than a sleeping pill or a riveting read? Welcome back to the third and final post in this series on the CJIS Security Policy. Our last post ended with Policy Area 7 of section 5 concerning Network Diagrams. Policy Area 8 covers Media Protection and how to protect it both in transit and at rest. It also covers the proper way to dispose...

    Comments are closed.0Azure GovernmentCJIS
    The CJIS Security Policy – Analyzing the 13 Policy Areas: Part II
    The CJIS Security Policy – Analyzing the 13 Policy Areas: Part II
    AvatarRochelle M. EichnerApril 4, 2017Apr 4, 201704/4/17
     Better than a sleeping pill or a riveting read? In our last blog post, Alan Ferretti, CJIS Security Analyst and Subject Matter Expert of the CJIS ACE Division at Diverse Computing, and I covered the first four sections of the CJIS Security Policy. We will continue with Section 5 and its thirteen Policy areas and how they impact you and your...

    Comments are closed.0Azure GovernmentCJIS
    The CJIS Security Policy – Analyzing the 13 Policy Areas: Part I
    The CJIS Security Policy – Analyzing the 13 Policy Areas: Part I
    AvatarRochelle M. EichnerMarch 28, 2017Mar 28, 201703/28/17
    Better than a sleeping pill or a riveting read? Recently Alan Ferretti and I were talking about compliance for agencies and lamented on the fact that most people malign  the CJIS Security Policy as a good cure for insomnia. It seems you can’t attend a conference where a speaker doesn’t make a joke about it. When in fact, the Policy is ...

    Comments are closed.0Azure GovernmentCJIS
    Microsoft Signs CJIS Information Agreements with Indiana and Iowa
    Microsoft Signs CJIS Information Agreements with Indiana and Iowa
    AvatarRochelle M. EichnerMarch 22, 2017Mar 22, 201703/22/17
    Microsoft has signed agreements with 28 states – now over 50% of the states are covered representing 70% of U.S. sworn officers. Microsoft contractually committed to the applicable controls of the CJIS Security Policy by signing a CJIS Information Agreements with Indiana and Iowa. This commitment allows CJIS Systems Agencies to background ...

    Comments are closed.0Azure GovernmentCJIS
    A former CJIS ISO perspective: Microsoft’s commitment to law enforcement from top to bottom
    A former CJIS ISO perspective: Microsoft’s commitment to law enforcement from top to bottom
    AvatarRochelle M. EichnerFebruary 27, 2017Feb 27, 201702/27/17
    “I have worked with hundreds of vendors in my twelve years as CJIS ISO in Texas, and never have I found any vendor more committed to law enforcement.”  Alan Ferretti, Former CJIS ISO in Texas  Alan Ferretti, former Texas CJIS Information Security Officer (ISO), and I have been working together for nearly five years. He recently retired...

    Comments are closed.0AzureAzure Government
    The Importance of Regulation – Microsoft Signs CJIS Information Agreement with Missouri
    The Importance of Regulation – Microsoft Signs CJIS Information Agreement with Missouri
    AvatarRochelle M. EichnerFebruary 9, 2017Feb 9, 201702/9/17
    Microsoft has signed agreements with 26 states – contractually committing to CJIS requirements for more than 2/3rds of the US Population Do you ever wonder why we have government regulation?  Do you have to deal with regulations to get your job done? My family runs a hog farm and there are a number of regulations that have confused me. In ...

    Comments are closed.0AzureAzure Government
    Microsoft signs CJIS Security Addendum with Utah-covering two-thirds of the US population
    Microsoft signs CJIS Security Addendum with Utah-covering two-thirds of the US population
    AvatarRochelle M. EichnerDecember 6, 2016Dec 6, 201612/6/16
    Meeting the applicable regulatory controls of the CJIS Security Policy is a long-term commitment for Microsoft. We don’t consider it a checkbox, it is a commitment. As part of this commitment Microsoft recently signed the CJIS Security Addendum with Utah--bringing the total states which Microsoft has signed the CJIS Security Addendum to 25...

    Comments are closed.0AzureAzure Government
    Microsoft Signs CJIS Security Addendum with Georgia
    Microsoft Signs CJIS Security Addendum with Georgia
    AvatarRochelle M. EichnerNovember 9, 2016Nov 9, 201611/9/16
    Microsoft has now contractually committed to CJIS requirements in 24 states, covering nearly 2/3rds of the US population Microsoft has a long-term commitment to providing law enforcement agencies with cloud services they can trust to help keep them CJIS compliant.  As part of this commitment Microsoft recently signed the CJIS Security ...

    Comments are closed.0AzureAzure Government
    Compliance is a commitment, not a checkbox
    Compliance is a commitment, not a checkbox
    AvatarRochelle M. EichnerOctober 3, 2016Oct 3, 201610/3/16
    With the recent heartbreaking public safety events in New York, New Jersey, North Carolina, Minnesota and other locations around the United States, it was inspiring to have the opportunity for Microsoft to participate in the South Carolina Law Enforcement Division (SLED) User Conference. It included over 700 law enforcement professionals ...

    Comments are closed.0AzureAzure Government
    • Previous page
    • Page 1
    • Page 2
    • Page 3
    • Next page
    Relevant Links

    Microsoft Azure Blog

    Microsoft Azure Blog - Government

    Azure Government Documentation

    Azure Government Developer Videos

    Azure Government DC User Community

    Azure Government Website

    Free Trial

    Top Bloggers
    Azure Gov Team

    Azure Gov Team

    TJ Banasik

    TJ Banasik
    CISSP-ISSEP, ISSAP, ISSMP, Sr. Program Manager

    Karina Homme

    Karina Homme
    Senior Director

    Avatar

    Zach Kramer

    Selcin Turkarslan

    Selcin Turkarslan

    Topics
    AADAcceleraAccelera SolutionsAccelerated NetworkingAccenture FederalAccessibilityAccountability ManagementaccreditationAdaptive Access ControlADEADOAdvanced Analyticsadvanced threat protectionaerospaceAFCEAAIAI ToolsAI-enabled Optical Character Recognition (OCR)Air ForceAISAnalyticsAnnouncementAnnouncementsAPIApp protectionApp ServiceApp ServicesApplied Information SciencesAppsarcGISARMARM TemplatesArtificial IntelligenceASP.NETASRATARCATOauditAuthenticationAuthority to OperateAuthorizationAutomationAvePointAwardAzCopyAzue GovernmentAzureAzure Active DirectoryAzure Active Directory (AD) Privileged Identity Management (PIM)Azure Active Directory Domain ServicesAzure Active Directory TenancyAzure AdvisorAzure BackupAzure BatchAzure Batch AI ServiceAzure BlobAzure Blob StorageAzure BlueprintAzure Blueprint for FedRAMP HighAzure Blueprint for IRS 1075Azure BlueprintsAzure Bot ServiceAzure Cognitive ServicesAzure Container RegistryAzure Cosmos DBAzure Cost ManagementAzure Data FactoryAzure Data Lake Storage (ADLS) Gen2Azure Database for MariaDBAzure Database for MySQLAzure DB for MySQLAzure DDoS Protection StandardAzure Dedicated HostAzure DevOpsAzure DevOps ServerAzure DevTest LabsAzure Environment SelectorAzure Event GridAzure FastTrackAzure File SyncAzure FilesAzure Form RecognizerAzure FridayAzure FunctionsAzure Global ISV of the Year awardAzure GovAzure Gov MeetupAzure Gov VideoAzure GovernmentAzure Government Cloud Solution ProvidersAzure Government CSPAzure Government Innovation TourAzure Government MarketplaceAzure Government MeetupAzure Government SecretAzure Government Starter PacksAzure HDInsight Enterprise Security Package (ESP)Azure Import/ExportAzure Information ProtectionAzure Information Protection (AIP)Azure IoT HubAzure Key VaultAzure KubernetesAzure Lab ServicesAzure Learning ResourcesAzure LighthouseAzure Logic AppsAzure Machine LearningAzure MapsAzure MarketplaceAzure MigrateAzure Monetary CommitmentAzure MonitorAzure PaaSAzure PodcastAzure PolicyAzure Policy Guest ConfigurationAzure Premium FilesAzure Private LinkAzure ReservationsAzure Resource ManagerAzure SDK supportAzure SecurityAzure Security CenterAzure SentinelAzure Site RecoveryAzure SQL DatabaseAzure StackAzure Stack HubAzure Starter PacksAzure StorageAzure Storage ExplorerAzure Storage Service EncryptionAzure Stream AnalyticsAzure virtual networksAzure Virtual WANAzureGovAzureGovDCMeetupAzureGovMeetupAzureMedia ServicesBackupbackup & recoveryBarracudabashBatchBCDRBig DataBillingBilling APIBitnamiBlobBlock Malicious DomainsBlockchainBlueprintBooz AllenBot FrameworkBot ServiceBotsBring Your Own Device" (BYOD) policyBrooks Consultingbrowser-based command lineBudgetBuild 2017Business ContinuityCacheCalculatorCaliforniaCapabilitiesCapacityCentral ITcertificatesCertificationsChannel 9CIOCISCIS Hardened ImagesCIS Hardnened ImagesCiscoCitizensCitrixCitrix Cloud XenAppCitrix Secure Digital WorkspaceCJISCJIS Summitclassified workloadsCLETSCLICloudCloud AcceleratorsCloud Adoption in Federal Civilian Agencies MaturityScape Benchmark SurveyCloud BrokerCloud CommunityCloud computingCloud computing careerCloud DriveCloud Governance & ManagementCloud GovernmentCloud ImplementationCloud Migrationcloud securityCloud ServicesCloud ShellCloud Smart Strategy ProposalCloud SolutionCloud SolutionsCloud Solutions PartnerCloud StrategyCloudBeesClouderaCloudWaveCMMCCode for AmericaCognitive SearchCognitive ServicesComplianceCompliance CertificationComputeComputingConferenceConfidential ComputingConnectivityContainer StrategiesContainersConversational AICool StorageCopyCosmos DBCost AnalysisCost ManagementCoud based analyticsCPUcross-platform capabilitiesCrowdAICSACSFCSPCTOCubersecurityCultureCulture of ChangeCustom Speech ServicesCustomer Lockboxcustomer managed keysCyberCyber AgilityCyber Threat ConcernsCybersecurityCybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification (CMMC)CybraicsDataData AnalyticsData at RestData BoxData ClassificationData EncryptionData Exploration & VisualizationData Ingestion Toolsdata protectionData ScienceData Science Virtual MachineData Securitydata servicesData Strategydata warehousedata warehouse-as-a-servicedata-driven agilitydatabaseDatacenter MigrationDC AzureGov MeetupDcodeDDoS ProtectionDeep LearningDefenseDefense ContractingDefense Intelligence AgencyDemoDemosDepartment of DefenseDepartment of Defense Cloud StrategyDepartment of Defense Impact Level 5 (IL5)Department of EnergyDepartment of JusticeDepartment of TransportationDev OpsDev-TestDeveloperDeveloper ServicesDevelopersDevOpsDevSecOpsDFARSDigital GovernmentDigital TransformationDirector of National Intelligence (DNI)DirectoryDISADISA L5DISA Level 4Disaster RecoveryDiscovery DayDisk EncryptionDockerdocker containersDocument ExtractionDocumentationDoDDoD Impact Level 6 (IL6)DoD RegionsDoE 10 CFR Part 810DOJDrawbridgeDSv2DSVMDynatraceeBookEdge ComputingEmerging TechEmerging TechnologyEnvironmentEsriEventEvent HubEvent Hub NamespaceEventsExecutive OrderExportExport Administration Regulations (EAR)Express RouteExpressRouteExpressRoute LocationExtensionF-SeriesF5FAQFastTrackFathymFederalFederal Risk and Authorization Management Program (FedRAMP)Federal Tax AdministrationFederal Tax Information (FTI)FederationFedRAMPFedRAMP HighFeedbackFile StorageFirewallFirewallsFlashGridFloridaFortinetFrameFrameworkFsfull backward compatibilityFunctionsFundamentalsGarter's 7 priorities for governmentGartnerGCGCCGDPRGeneral Availabilitygeo-redundancyGetting StartedGitHubGlobalizationGovCloudGovernanceGovernmentGovernment CloudGovernment Cloud StrategyGovernment Cost SavingsGovernment CSP ProgramGovernment ModernizationGovITGPUGraphical Processing UnitsHackathonsHackFestHD InsightHDFS endpointsHDInnsightHDInsightHHSHigh AvailabilityHigh Throughputhigh-complianceHoloLensHot StorageHow Government Organizations Are Looking at IoTHPCHybridhybrid applicationsHybrid Cloudhybrid cloud workloadsHybrid IdentityHybrid IntegrationHyperscale CloudHypervisorIaaSIDCIDEIdentificationIdentityIdentity & Access ManagementIdentity governanceIgniteIL5Impact Level 5ImportIn-memory workloadsInc.Incident Response MaturityIndianaInnovationIntegrationIntelligence Community Directive (ICD 503)intelligent chat botsIntelligent CloudIntelligent EdgeInternational AffairsInternational Traffic in Arms Regulation (ITAR)Internet of ThingsIoTIoT HubIowaIP BlacklistingIPv6IPv6 for Azure Virtual NetworkISOITIT GovernanceIT ModernizationIT prosITARJenkinsJSKey Vaultknowledge miningKnowledge Mining Solution AcceleratorKubernetesL3 TechnologiesL4L5Law EnforcementLearningLeidosLevel 4 certificationLinuxLive WebinarLMILog AnalyticsLogic Appslow latency SLA-backed performanceLUISM-seriesMachine LearningManaged Disksmanaged identitiesManagementManagement PortalmarketplaceMediaMedia ServicesMeetupMicroservicesMicrosoftMicrosoft AI Airlift for Intelligent Apps & AgentsMicrosoft BuildMicrosoft Defender Advanced Threat ProtectionMicrosoft Endpoint ManagerMicrosoft FlowMicrosoft IgniteMicrosoft Ignite - The TourMicrosoft IntuneMicrosoft Intune Device Management (MDM)Microsoft Intune Mobile Application Management (MAM)Microsoft Power AppsMicrosoft Software & Systems AcademyMigrateMigrationMissionMission AppsMission criticalMission Critical Applicationsmission smartMLMobileMobile appsMobius LogicModern WorkplaceModernizationModernizeMonitorMonitoringMonthly RecapMotorolaMotorola SolutionsMSSAMSTechSummitmulti-factor verificationMVPNasuninatural language processingNC-InstancesNERC CIP StandardsNERC Critical Infrastructure Protection (CIP) standardsNet-InspectNetBackupNetBackup CloudCatalystnetwork gatewaysNetwork PerformanceNetwork SecurityNetworkingNevadaNew JerseyNISTNIST CSFNIST SP 800-171 R2NIST SP 800-53 R4nLighten™NRC 10 CFR Part 110NV-SeriesNVIDIANVIDIA Tesla M60 GPUsO365object recognitionOffice of Foreign Assets Control (OFAC) Sanctions LawsOMSOnboardingOpen ShiftOpen SourceOpenShiftOperational Management SuiteOperationsOpinionsOpsgilityoptical character recognitionOptimizationOptimizing Costoptimizing workloadsOSSPaaSPalo AltoPalo Alto NetworksPartnersPass-through authenticationPassword hash synchronizationPivotalPlanet TechnologiesPlaning IdentityPNWPoint-to-site VPNPortalPower BIPower BI EmbeddedPower BI PremiumPower BI StreamingPowerBI ProPowerShellpredictive analyticsPreviewPricingPrivacyProgramProgrammingPublic Azurepublic safety softwarePublish to WebQnA MakerQuzaraRBACRDPRecapRecords ManagementRecover FunctionRecoveryRed HatRed Hat Enterprise LinuxRedis CacheRegionRegion to RegionRegionsRegulationRelease Managementremote executionReplayResiliencyResource ManagerResource RateCardResource UsageResponsible AIrisk managementRoad blocksRole Based Access ControlSaaSSAICSBAScalable Architecturescaling throughputSCCAscheduling triggerScreeningSecret RegionsSecure Azure Computing Architecture (SACA)secure CI/CD build environmentSecure Cloud Computing Architecture (SCCA) policySecure EnvironmentSecuritySecurity AnalyticsSecurity CenterSecurity ManagementSecurity PolicyServerlessserverless computeServerless ComputingServiceService AvailabilityService FabricService HealthService StatusServiceNow Digital WorkflowsServicesSite RecoverySLGSmart CitiesSnowflakesoftware factorySolutionSolution TemplateSpillageSplunkSQLSQL AzureSQL DatabaseSQL ServerStakeholdersState & Local GovernmentState and Local GovernmentState signingSTIGStoragestorage powerStorage Service EncryptionStorSimpleStream AnalyticsStrengthening cybersecurity for the Department of DefensesubnetsSubscriptionssupply chainSupportSUSESUSE Linux EnterpriseTableauTactical EdgeTeam Foundation Version Control (TFVC)Tech SummitTechTrendTelos CorporationTemplatesTerraformText Translation connectorTFSThreat DetectionThreat ProtectionTICTop Seven Priorities for U.S. Federal CIOsTop technologies used by GovernmentTraffic AnalyticsTrainingTranslationTransparent Data Encryption (TDE)TransportationTrusted Internet ConnectionTutorialU.S. export control regulationsU.S. Governmentunified security managementUnited States Army Corps of EngineersUS Gov VirginiaUSACEUSBUse CaseUser CaseUser CommunityUser ConferenceVault and PoliciesVDIVeritasVeterans AffairsVideoVideo LibaryVideo LibraryVirtual CloudVirtual Desktop InfrastructureVirtual Desktop Infrastructure; VDIVirtual MachineVirtual MachinesVirtual NetworkVirtual Network Service EndpointsVisual StudioVisual Studio Team ServicesVMVM IVM ImagesVMSVMSSVNETVNET IntegrationVS Code ExtensionsVSTSVulnerability AssessmentWashington DCWeatherCloudWebWeb & MobileWeb AppWeb SessionWebcastWebinarWebsitesWhite Glove ProgramWhitepaperWin 10Windows 10Windows Virtual DesktopWomen in CloudWomen in TechWomen in Tech Lunch PanelWorkloadsWVDXactaXenAppXenDesktopZero TrustZscaler

    Stay informed

    Login
    Code Block
    What's new
    • Surface Duo
    • Surface Laptop Go
    • Surface Pro X
    • Surface Go 2
    • Surface Book 3
    • Microsoft 365
    • Windows 10 apps
    • HoloLens 2
    Microsoft Store
    • Account profile
    • Download Center
    • Microsoft Store support
    • Returns
    • Order tracking
    • Virtual workshops and training
    • Microsoft Store Promise
    • Financing
    Education
    • Microsoft in education
    • Office for students
    • Office 365 for schools
    • Deals for students & parents
    • Microsoft Azure in education
    Enterprise
    • Azure
    • AppSource
    • Automotive
    • Government
    • Healthcare
    • Manufacturing
    • Financial services
    • Retail
    Developer
    • Microsoft Visual Studio
    • Windows Dev Center
    • Developer Center
    • Microsoft developer program
    • Channel 9
    • Microsoft 365 Dev Center
    • Microsoft 365 Developer Program
    • Microsoft Garage
    Company
    • Careers
    • About Microsoft
    • Company news
    • Privacy at Microsoft
    • Investors
    • Diversity and inclusion
    • Accessibility
    • Security
    English (United States)
    • Sitemap
    • Contact Microsoft
    • Privacy
    • Manage cookies
    • Terms of use
    • Trademarks
    • Safety & eco
    • About our ads
    • © Microsoft 2021