Enterprise Security

Security controls built for criminal justice data and agency review

Deploy in an isolated environment, enforce record-level access, and hand your security team the evidence and framework mappings needed for CJIS, FedRAMP, NIST, and audit review.

Operational readout

CJIS Security Policy mapped for criminal justice review

580+ Controls

FedRAMP high-baseline control coverage

421 Controls (High Baseline)

retention window for security-relevant audit events

365+ day retention

encryption at rest and in transit for protected records

AES-256 / TLS 1.3

Understanding the Stakes

Security failures in this market expose officers, informants, and live cases

Criminal justice information carries operational risk, legal risk, and personal risk. The control model has to protect more than generic enterprise records.

The stakes became painfully clear in June 2020 when a single compromised vendor account exposed 269 gigabytes of sensitive law enforcement data from more than 200 agencies. The breach revealed everything from undercover officer information to nuclear facility security staff details. The lesson was unambiguous: in criminal justice technology, security architecture isn't a feature, it's the foundation.
Your data never mingles with other agencies' information. Row-level security and cryptographic tenant isolation ensure that even in a shared infrastructure environment, your criminal justice information remains mathematically separated from everyone else's.
You maintain the authority to pursue certification independently. We've implemented the technical controls required by CJIS, FedRAMP, SOC 2, and other frameworks. The security architecture is ready. But because each deployment operates under your control in your provisioned environment, the actual certification decision and process remains yours.

We built Public Safety with that reality as our starting point, not an afterthought to address later.

Operational data protection

Security controls have to protect evidence, case history, and operator activity under real investigative pressure

The security model only counts if it stays attached to the live case and evidence record, not in a separate trust-center abstraction.

Architecture

Your Deployment, Your Certification Authority

Here's what makes Public Safety different from typical SaaS platforms: every customer deployment is provisioned as an isolated environment in compliant datacenter infrastructure.

Protected record surface

The same tenant isolation and access rules have to survive on the live operational record

Security review is stronger when the controls can be demonstrated against the real case, entity, and timeline surfaces operators use daily.

Isolated deployment

Complete Data Isolation

Your data never mingles with other agencies' information. Row-level security and cryptographic tenant isolation ensure that even in a shared infrastructure environment, your criminal justice information remains mathematically separated from everyone else's.

Customer Controlled

Identity and access

Policy Area 5 - Access Control

Role-based access with granular permissions down to individual data elements. Classification-based restrictions ensure investigators can only access information appropriate to their clearance and case assignments. Every permission decision is logged and auditable.

Policy Area 6 - Identification and Authentication

Audit and monitoring

Policy Area 4 - Audit and Accountability

Comprehensive logging captures every access, query, modification, and administrative action. Logs are append-only with cryptographic integrity verification, stored for 365+ days, and exportable for compliance audits.

365+ day retention

Certification support

Your Certification Authority

You maintain the authority to pursue certification independently. We've implemented the technical controls required by CJIS, FedRAMP, SOC 2, and other frameworks. The security architecture is ready. But because each deployment operates under your control in your provisioned environment, the actual certification decision and process remains yours.

Your Certification Authority
Security Controls

Security controls on the live platform

Beyond framework mapping, these are the controls that protect casework, evidence, and operator activity every day.

Federal-Grade Encryption

Data at rest is protected with AES-256 encryption using FIPS 140-2 validated cryptographic modules. Data in transit uses TLS 1.3 with perfect forward secrecy.

AES-256 encryption at rest
FIPS 140-2 validated modules
TLS 1.3 with PFS in transit

Zero-Trust Architecture

Every request is authenticated and authorized regardless of network location. There's no implicit trust based on being "inside the network." Aligns with Executive Order 14028's Zero Trust mandates.

Every request is authenticated and authorized regardless of network location.
Identity checks happen before case, evidence, or administrative records open.
The control model stays aligned with zero-trust requirements instead of relying on perimeter trust.

Cryptographic Tenant Isolation

Your deployment is cryptographically isolated from other agencies' deployments. Row-level security policies enforce tenant boundaries at the database level, not in application code that could have bugs, but in the database engine itself.

Tenant separation is enforced at the database layer, not just in interface code.
Customer deployments remain isolated even when infrastructure is shared.
Agencies preserve authority over residency, access, and certification decisions.

Tamper-Proof Audit Logging

Every security-relevant event is logged to append-only storage with cryptographic signatures that prove logs haven't been tampered with. Your evidence if you ever need to prove exactly what happened.

365+ day retention
Security-relevant events can be exported for compliance and incident review.
Audit evidence stays tied to the operator, record, and administrative action involved.

Behavioral Threat Detection

Behavioral analytics monitor for anomalies: unusual access patterns, queries outside normal parameters, bulk data access attempts. Automatic alerts and access suspension pending investigation.

Behavioral analytics monitor for unusual query, export, and access patterns.
Suspicious activity can trigger alerts before data misuse spreads across the tenant.
Security teams review outliers with the same operational context investigators use.

Supply Chain Protection

Continuous monitoring of all dependencies for known vulnerabilities, package integrity verification, Content Security Policy and Trusted Types to prevent code injection.

Dependencies are monitored continuously for known vulnerabilities.
Package integrity and browser protections reduce injection and tampering risk.
Security review extends beyond the application boundary into the supporting stack.
Resources

Documentation and review support

Packages and supporting materials for security reviews, compliance mapping, and audit preparation.

Transparency

Why This Matters

When a vendor claims their product is "CJIS certified" or "FedRAMP certified," ask exactly what that means. CJIS compliance is validated by state CJIS Systems Agencies for specific implementations. FedRAMP authorization is granted to specific systems for specific agencies. A vendor's certification doesn't automatically extend to your deployment.

We've built Public Safety so that your path to certification is as straightforward as possible, but we won't pretend that our work substitutes for yours. What we can promise is that when you pursue certification, you won't find technical gaps that require architectural rework. The foundation is ready.

Security review rail

Review packages should expose architecture, mappings, and operating evidence from the same control plane

Security and procurement teams should be able to inspect controls, audit evidence, and support materials without reconstructing the platform from marketing claims.

Security Documentation Package

Architecture diagrams, data flows, encryption specs

Request Documentation

Compliance Mapping Worksheets

Control-by-control framework mappings

Request Full Package

Audit Support

Environment access, evidence collection, technical Q&A

Learn More

Penetration Testing Results

Annual third-party testing results (under NDA)

Request Under NDA

Compliance Frameworks

Framework mappings your security lead can actually work with

Public Safety is structured around the technical controls major criminal justice and government frameworks expect, with documentation that supports real review work instead of checkbox marketing.

Framework mapping

Named standards your security and procurement teams will actually ask about

CJIS Security Policy | Architecture Ready | The FBI's Criminal Justice Information Services Security Policy represents the baseline for any system handling criminal justice information in the United States. The July 2024 update expanded the policy from 13 to 19 areas, aligning with NIST 800-53 and introducing 580+ controls.
FedRAMP | Controls Aligned | FedRAMP establishes security requirements for cloud services used by federal agencies. The High baseline requires 421 controls, the level appropriate for systems handling criminal justice information where breach impact would be severe or catastrophic.
ISO 27001:2022 | Controls Implemented | The international standard for Information Security Management Systems provides a framework for systematic security management recognized across jurisdictions worldwide. The 2022 revision restructured controls into 93 requirements across four categories.
NIST CSF 2.0 | Framework Aligned | The February 2024 release introduced GOVERN as a sixth core function, emphasizing cybersecurity risk management at the organizational level.
GDPR & LED | Compliant | For agencies with international cooperation requirements or data involving EU citizens, both GDPR and the Law Enforcement Directive (2016/680) may apply.
What we provide

What We Provide

Technical controls and architectural decisions
Operational procedures implementing security requirements
Documentation mapping capabilities to framework controls
Technical support for your certification activities
Infrastructure that has achieved its own authorizations
Agency responsibility

Your Responsibility

Pursuing formal certification through appropriate authority
Implementing organizational policies beyond technical controls
Personnel procedures and governance structures
Maintaining operational disciplines over time

Review the control package with your security and procurement team

Walk through tenant isolation, access control, audit retention, and framework mappings with the people who have to sign off on deployment.