Enterprise Security

Within the Case Management System (CMS) ecosystem, the Enterprise Security component implements global security capabilities across the enterprise while each separate component implements baseline component-level security capabilities. The following provides guidance on the types of solutions available for implementing the Enterprise Security component to complement component-level security capabilities.

  1. Single Sign-On: Provide system single sign-on capability. Enables users to reset credentials.
  2. Encrypted Privacy Data: Store designated privacy data with encryption.
  3. Security Controls: Maintain security controls implemented within the system/application, such as through internal or third-party audits, vulnerability assessments, penetration testing, etc.
  4. Security Logging: Log all login attempts including date/time, IP address, status (success or failure).
  5. Soft Delete User but Retain History: Provide administrative functions allowing authorized users to soft delete a user but retain all history associated with the user's activity.
  6. Lock User Out of System/Unlock: Provide administrative functions allowing authorized users to lock a user out of the system or unlock a user to allow them to regain access.
  7. Timing of Security Changes: Allow security changes made by security administrators to take effect immediately or at a specified time.
  8. Distributed Security Administration: Allow security to be managed by multiple administrators so each administrator can manage their own court/office if needed.
  9. Password Changes: Require passwords to be changed at defined intervals and allow password reset times to be different based on user security roles.

  1. Identify and Remediate Vulnerabilities: Mechanisms and processes to minimize invasion of viruses and identify and remediate vulnerabilities in the component throughout the product release cycle and lifecycle.
  2. Protect Documents: Mechanisms to ensure documents are authentic and unaltered from what was originally submitted.
  3. Designate Administrators: Designate users as administrators and change those who have that designation by a super administrator.
  4. Administrative Functions: Provide administrative functions allowing authorized users to manage users' access rights, including grant/revoke security roles to/from a user, view granted roles, and search user by pre­defined search criteria.
  5. Assign Users to Roles and Groups: Provide administrative functions allowing authorized users to manage security roles/groups, modifying existing roles (groups and associated access rights), and to creating a new role/group (view users with the role, grant/revoke access rights to/from a role).
  6. Inherit Properties from Other Roles: Support role definitions that can inherit properties from other roles.
  7. User with Multiple Roles/Groups: Assign a user to multiple roles/groups.
  8. Configurable Time-Out: Configure the component time-out feature based on court policy.
  9. Access Data Using Application Services: Prevent domain or local administrative user from accessing data when not using application services.
  10. Terminate User's Session: Enable security administrators to terminate a user's session immediately.