[Log In] []

Exploring the science and magic of Identity and Access Management
Saturday, July 27, 2024
 

Report: Mitigating Insider Threats

Information Security
Author: Mark Dixon
Friday, December 14, 2012
1:42 pm

A colleague referred me today to a long, but very useful technical report, “Common Sense Guide to Mitigating Insider Threats, 4th Edition,” published in December 2012 by the CERT® Program at Carnegie Mellon University.  The report abstract states:

This fourth edition of the Common Sense Guide to Mitigating Insider Threats provides the most current recommendations of the CERT® Program (part of Carnegie Mellon University’s Software Engineering Institute), based on an expanded database of more than 700 insider threat cases and continued research and analysis. It introduces the topic of insider threats, explains its intended audience and how this guide differs from previous editions, defines insider threats, and outlines current patterns and trends. The guide then describes 19 practices that organizations should implement across the enterprise to prevent and detect insider threats, as well as case studies of organizations that failed to do so.

It was interesting to read how the patterns and trends that they team observed indicated four classes of malicious insider activity:

  1. IT sabotage—an insider’s use of IT to direct specific harm at an organization or an individual
  2. theft of IP—an insider’s use of IT to steal IP from the organization. This category includes industrial espionage involving outsiders.
  3. fraud—an insider’s use of IT for the unauthorized modification, addition, or deletion of an organization’s data (not programs or systems) for personal gain, or theft of information that leads to an identity crime (e.g., identity theft or credit card fraud)
  4. miscellaneous—cases in which the insider’s activity was not for IP theft, fraud, or IT sabotage

The following chart shows the top six infrastructure sectors for the three most important classes: Fraud, Sabotage, and Theft of IP:

The nineteen practices that are include in the report are:

  1. Consider threats from insiders and business partners in enterprise-wide risk assessments.
  2. Clearly document and consistently enforce policies and controls.
  3. Incorporate insider threat awareness into periodic security training for all employees.
  4. Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior.
  5. Anticipate and manage negative issues in the work environment.
  6. Know your assets.
  7. Implement strict password and account management policies and practices.
  8. Enforce separation of duties and least privilege.
  9. Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities.
  10. Institute stringent access controls and monitoring policies on privileged users
  11. Institutionalize system change controls
  12. Use a log correlation engine or security information and event management (SIEM) system to log, monitor, and audit employee actions
  13. Monitor and control remote access from all end points, including mobile devices.
  14. Develop a comprehensive employee termination procedure
  15. Implement secure backup and recovery processes
  16. Develop a formalized insider threat program
  17. Establish a baseline of normal network device behavior
  18. Be especially vigilant regarding social media
  19. Close the doors to unauthorized data exfiltration.

All in all, it is a very insightful and helpful report.

Comments Off on Report: Mitigating Insider Threats . Permalink . Trackback URL
WordPress Tags: ,
 

Comments are closed.

Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.