| In This Article: We provide clear guidance for TACs, LASOs, and IT leaders on converting outdated worksheets into a defensible CJIS compliance checklist that’s aligned with the modern 6.0 standard. |
A successful CJIS audit rarely falls apart because of a firewall setting or a missing patch. It breaks down when an agency walks into the inspection using outdated compliance criteria.
The FBI CJIS Security Policy update to version 6.0 reshaped how requirements are organized, interpreted, and evaluated. Agencies that still rely on legacy 5.9 worksheets risk finding out too late that their checklist no longer reflects the standard being enforced.
The 6.0 Evolution: Why Your 5.9 Checklist Is Obsolete

The CJIS 5.9-to-6.0 transition was not a routine revision. It reorganized the policy into 20 control families aligned with NIST 800-53 for law enforcement, shifting the emphasis from isolated policy sections to an integrated risk management structure.
Version 5.9 grouped requirements into 13 broad areas. In Version 6.0, these elements are reassigned across control families in a new arrangement, including Planning, Risk Assessment, Access Control, System and Communications Protection, and Identification and Authentication.
The structure is consistent with today’s federal security expectations and aligns with broader CJIS modernization efforts. That change affects how a CJIS audit is conducted.
CJIS auditors are no longer evaluating whether an agency can cite the correct section number. They are assessing whether controls are implemented, documented, and tied to a repeatable risk management process.
Agencies entering the 2026 cycle with a 5.9-based worksheet are more likely to accumulate findings, even if their technical controls appear sound.
Mapping the Transition: From Legacy Sections to NIST Families
Legacy requirements didn’t disappear; they were redistributed across control families modeled after NIST 800-53. The FBI’s guidance makes clear that the crosswalk is a reference, not a shortcut.
For TACs, LASOs, and IT directors, this means the first step in updating the CJIS compliance checklist for 2026 is to conduct structured mapping. Each legacy control should be tied to its new family location, then validated against the revised language and enhancements in 6.0.
Identity and Access Management: The New AC and IA

Under 5.9, advanced authentication often appeared as a single line item. Did remote users have two-factor authentication enabled? Many checklists stopped there.
In the 6.0 framework, advanced authentication now lives within the Identification and Authentication and Access Control families. Controls such as IA-2 and IA-5 introduce defined multi-factor authentication standards and stronger expectations for authenticator management.
A modern checklist should confirm:
- Multi-factor authentication for non-privileged accounts
- Risk-based MFA for privileged accounts
- Replay-resistant mechanisms where required
- Documented management of authenticators across their lifecycle
Auditors reviewing a CJIS audit today want to see evidence that authentication controls match the policy language, not just a statement that two-factor is active.
System and Communications Protection: The New SC
Encryption requirements followed a similar redistribution. Legacy encryption language now resides within the System and Communications Protection family.
Each update to the checklist should be used to verify these items:
- Use of FIPS 140-3 validated cryptographic modules for CJI in transit
- AES under FIPS 197 with at least 128-bit strength for data transmitted outside secure locations
- AES at 256-bit strength for CJI at rest
- Documented integrity protections preventing unauthorized modification

During inspections, our team has observed that auditors frequently request proof of module validation and configuration documentation. The FBI CJIS Security Policy update now requires more than just stating that encryption is enabled.
Essential Checklist Additions for the 2026 Audit Cycle
Technical mappings are only part of the work, as administrative documentation requirements have expanded significantly in version 6.0. Agencies preparing for the next CJIS audit cycle should expect greater emphasis on structured artifacts and formal governance documentation.
Documenting System Security Plans, SSP
PL-2 introduces a requirement for a formal system security plan. Many agencies operating under 5.9 maintained policies and procedures without consolidating them into a structured SSP.
Under 6.0, the SSP acts as the operational center of your compliance program. It should describe system boundaries, identify applicable controls, reference supporting artifacts, and document annual reviews.
When auditors request documentation, agencies with an up-to-date SSP can immediately connect each control to evidence. Agencies without one often spend hours assembling fragmented material.
Formal Risk Assessments, RA
The risk assessment family reflects a broader shift toward proactive oversight. Agencies must now document periodic assessments of systems that access, process, or store CJI.
A revised checklist should confirm:
- A documented risk assessment covering relevant infrastructure
- Evidence of review following significant system changes
- Tracking of remediation actions and risk acceptance decisions
The expectation outline aligns directly with NIST 800-53 for law enforcement and reinforces the current direction of CJIS modernization.
Supply Chain and Vendor Risk Management

Version 6.0 introduces a dedicated supply chain risk management family. Agencies using SaaS platforms, hosted environments, or managed services must document the vendor’s compliance posture and the shared responsibility boundaries.
Any checklist updates should address:
- Vendor documentation supporting CJIS alignment
- Defined inherited versus agency-managed controls
- Contractual audit rights and oversight processes
- Ongoing review of provider security posture
Third-party attestations can support documentation, yet they do not automatically satisfy CJIS requirements. Agencies remain responsible for demonstrating how vendor controls align with the policy.
Redefining “Evidence”: What Auditors Look for Now
Historically, many CJIS audits centered on conversations with personnel and targeted spot inspections to evaluate whether requirements were being met. Version 6.0 emphasizes documented proof of implementation and effectiveness.
Log retention expectations now include integrity protections. AU-9 requires safeguards against unauthorized modification of audit logs and restricted access to audit functionality. Your checklist should validate protected storage and documented access controls.
Configuration management standards also expanded. CM-2 requires documented baseline configurations and current network topology diagrams reflecting CJIS interconnectivity. Informal build notes are unlikely to satisfy a 6.0 review.
Leveraging OpenFox Consulting for Your Checklist Overhaul
Translating a 5.9-era program into a 6.0-aligned structure can strain internal resources. OpenFox CJIS consulting services focus specifically on bridging that gap.
Our team assists agencies with structured crosswalk analyses, mapping legacy controls directly to the 20 policy areas introduced in the most recent FBI CJIS Security Policy update. We identify documentation gaps and clarify shared responsibility boundaries within hosted environments.

Policy authoring support addresses the creation of SSPs and formal risk assessments aligned with the new framework. Audit preparation guidance concentrates on producing defensible documentation that reflects the 6.0 standard.
Stop Guessing, Start Mapping
A strong CJIS audit outcome begins with a checklist built for the policy in effect today. The 2026 audit cycle is where outdated checklists are starting to be exposed, while the modernization runway toward September 30, 2027, is shrinking fast.
At CPI Openfox, we help agencies turn CJIS 6.0 from a moving target into a mapped, defensible compliance program. If your team is still working from a 5.9-era checklist, now’s the time to replace guesswork with a control-by-control crosswalk, current evidence, and documentation built for the way audits work now.
Partner with our OpenFox CJIS consulting team to modernize your CJIS compliance checklist in 2026, strengthen your SSP and risk assessment package, and walk into your next audit ready to prove compliance, not explain away gaps.
