+ All Categories
Home > Documents > Five Best Practices to Combat the Insider Threat

Five Best Practices to Combat the Insider Threat

Date post: 17-Feb-2022
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
99
1 Title of the Presentation Goes Here © 2018 Carnegie Mellon University [Distribution Statement A] Approved for public release and unlimited distribution. [Distribution Statement A] Approved for public release and unlimited distribution. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Five Best Practices to Combat the Insider Threat The CERT ® Division’s National Insider Threat Center (NITC)
Transcript
Page 1: Five Best Practices to Combat the Insider Threat

1Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

[Distribution Statement A] Approved for public release and unlimited distribution.

Software Engineering InstituteCarnegie Mellon UniversityPittsburgh, PA 15213

Five Best Practices to Combat the Insider Threat

The CERT® Division’s National Insider Threat Center (NITC)

Page 2: Five Best Practices to Combat the Insider Threat

2Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Copyright 2018 Carnegie Mellon University. All Rights Reserved.This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other documentation.NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected] Mellon® and CERT® are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.DM18-0619

Document Markings

Page 3: Five Best Practices to Combat the Insider Threat

3[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

CERT National Insider Threat Center Community Forum© 2018 Carnegie Mellon University

Agenda8:00: Overview of the National Insider Threat Center

8:15: Our Research

8:30: What is the Insider Threat?

8:45: 3 Insider Threat Models

9:00: 5 Best Practices

Page 4: Five Best Practices to Combat the Insider Threat

4Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Five Best Practices to Combat the Insider Threat

Ms. Carrie GardnerCyber Security Engineer, CERT National Insider Threat Center

Page 5: Five Best Practices to Combat the Insider Threat

5Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Established as a DoD FFRDC at Carnegie Mellon University in 1984

Only DoD R&D center focused on software and cybersecurity

Offices in Pittsburgh, Arlington, and Los Angeles

About 600 staff (~400 tech staff)

Page 6: Five Best Practices to Combat the Insider Threat

6Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

The CERT Division’s National Insider Threat Center

• Center of insider threat expertise

• Began working in this area in 2001 with the U.S. Secret Service

• Mission: enable effective insider threat mitigation, incident management practices, and develop capabilities for deterring, detecting, and responding to evolving cyber and physical threats

• Action and Value: conduct research, modeling, analysis, and outreach to develop & transition socio-technical solutions to combat insider threats

Page 7: Five Best Practices to Combat the Insider Threat

7Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

• Database of over 1600 insider threat incidents

• Includes interviews of actual offenders

• Coded to allow analysis of technical actions & behaviors observables

• Development of technical controls to baseline and detect anomalous actions

• Research into areas of• Text analysis• Workplace violence• Typing heuristics• Biometrics

Insider Threat Incident Corpus

Page 8: Five Best Practices to Combat the Insider Threat

8Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Our Insider Threat Portfolio

Awareness Evaluation Assistance Support Transition

• cert.org/insider-threat

• Insider Threat Awareness Training

• Insider Threat Blog• Industry-Specific

Studies• Threat Applicability

Studies• Common Sense

Guide to Mitigating Insider Threats

• Insider Threat Vulnerability Assessment

• Insider Threat Program Evaluation

• Insider Threat Self-Assessment

• Program Building Planning Stakeholder

Identification Achieving

Executive Support

Risk Management Integration

Governance and Policy Development

Communication Plan Development

• Control Development and Measurement

• Indicator Development and Measurement

• Hub Architecture and Design

• Sentiment and Linguistic Analysis

• Insider Incident Management

• Insider Threat Tool Evaluation

• Metrics Development

• Executive Workshop• Team Workshop• Program Building

Facilitated Workshop

• Insider Threat Program Manager Certificate

• Insider Threat Vulnerability Assessor Certificate

• Insider Threat Program Evaluator Certificate

Insider Threat StewardshipInsider Incident Collection and

Analysis

Ontology Development

and Maintenance

Modeling and Simulation

Mitigation Pattern

Language

Customized Research Exploration

Page 9: Five Best Practices to Combat the Insider Threat

9Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Other NITC Services

• Building an Insider Threat Program• Insider Threat Program Manager Certificate (ITPM-C)• Insider Threat Analyst Training

• Insider Threat Vulnerability Assessment• Insider Threat Vulnerability Assessor Certificate (ITVA-C)• Insider Threat Vulnerability Assessment License

• Evaluating an Insider Threat Program• Insider Threat Program Evaluator Certificate (ITPE-C)

• Insider Threat Analyst Training Course

• Insider Threat Control/Indicator Development / Deployment / Measurement

• Insider Threat Data Analytics Hub Development / Deployment

• Customized Insider Threat Research• Insider Threat Tool Evaluation Criteria Development

Page 10: Five Best Practices to Combat the Insider Threat

10Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

What is the Insider Threat?

Page 11: Five Best Practices to Combat the Insider Threat

11Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

The NITC Definition of Insider Threat

The potential for an individual who has or had authorized access to an organization’s assets to use their access, either maliciously or unintentionally, to act in a way that could negatively affect the organization.

Page 12: Five Best Practices to Combat the Insider Threat

12Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Scope of the Insider Threat

Individuals

Current or Former

Full-Time Employees

Part-Time Employees

Temporary Employees

Contractors

Trusted Business Partners

Organization’s Assets

People

Information

Technology

Facilities

Intentionally or Unintentionally

Fraud

Theft of Intellectual Property

Sabotage

Espionage

Workplace Violence

Social Engineering

Accidental Disclosure

Accidental Loss or Disposal of Equipment or Documents

Negatively Affect the

Organization

Harm to Organization’s Employees

Degradation to CIA of Information or Information

Systems

Disruption of Organization’s Ability to Meet its Mission

Damage to Organization’s Reputation

Harm to Organization’s Customers

use that access to act in a way that could

who have or had authorized access to

Page 13: Five Best Practices to Combat the Insider Threat

13Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Threats Can Be Cyber or Physical

There is not one “type” of insider threatThreat is to an organization’s critical assets

• People• Information• Technology• Facilities

Based on the motive(s) of the insiderImpact is to Confidentiality, Availability, Integrity

Cyber attack = Cyber ImpactPhysical attack = Physical Impact

Cyber attack = Physical ImpactPhysical attack = Cyber Impact

Page 14: Five Best Practices to Combat the Insider Threat

14Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Threat Issues -1

Insiders pose a substantial threat by virtue of their knowledge of, and access to, their employers’ systems and/or databases.Insiders can bypass existing physical and electronic security measures through legitimate measures.

Page 15: Five Best Practices to Combat the Insider Threat

15Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Threat Issues -2

Think about the following questions.• Has your organization been victim of an insider attack?• Can you confidently say you have not been the victim of an

insider attack?

Page 16: Five Best Practices to Combat the Insider Threat

16Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Threat Issues -3

Many organizations feel they have to choose between protection from outsiders versus insiders.Keep in mind that once an outsider gets in, there is a good chance they will perform the same types of malicious acts as malicious insiders.

• Plant malicious code or logic bomb• Create backdoor account• Exfiltrate intellectual property or other proprietary information

Insider negligence or malfeasance could aid outsiders getting in.• Therefore, insider threat controls can also provide protection

from outsiders.

Page 17: Five Best Practices to Combat the Insider Threat

17Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

The Expanding Complexity of “Insiders”

Area Description

Willing or unintentional collusion with outsiders

Insiders recruited by, working for, or used by outsiders, including organized crime and foreign organizations or governments

Business partners Difficulty in controlling/monitoring access to your information and systems by “trusted” business partners

Mergers & acquisitions Heightened risk of insider threat in organizations being merged into acquiring organization

Cultural differences Difficulty in recognizing behavioral indicators exhibited by insiders working for US organizations who are not US citizens

Page 18: Five Best Practices to Combat the Insider Threat

18Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

How Serious are Insider Threats?

Page 19: Five Best Practices to Combat the Insider Threat

19Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

CSO Magazine, USSS,CERT Division, & Forcepoint

510 respondents

41% of organizations have500 or more employees

59% of organizations haveless than 500 employees

Percentage of Participants Who Experienced an Insider Incident

Source: 2017 U.S. State of Cybercrime Survey, in partnership with Forcepoint, CSO, U.S. Secret Service, and CERT Division of Software Engineering Institute at Carnegie Mellon University

41 39

5549 51

43

53 53

39 42 43

34

0

10

20

30

40

50

60

70

80

90

100

2004 2005 2006 2007 2008 2010 2011 2012 2013 2014 2015 2016

2017 U.S. State of Cybercrime Survey -1

Page 20: Five Best Practices to Combat the Insider Threat

20Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

2017 U.S. State of Cybercrime Survey -2

Source: 2017 U.S. State of Cybercrime Survey, in partnership with Forcepoint, CSO, U.S. Secret Service, and CERT Division of Software Engineering Institute at Carnegie Mellon University

Page 21: Five Best Practices to Combat the Insider Threat

21Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

2017 U.S. State of Cybercrime Survey -3

What percentage of the cyber security events (the past 12 months)are known or suspected to have been caused by

Insiders26 %

Unknown24 %

Source: 2017 U.S. State of Cybercrime Survey, in partnership with Forcepoint, CSO, U.S. Secret Service, and CERT Division of Software Engineering Institute at Carnegie Mellon University

Page 22: Five Best Practices to Combat the Insider Threat

22Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

2017 U.S. State of Cybercrime Survey -4

Insiders

51%

Unknown

24 %

Source: 2017 U.S. State of Cybercrime Survey, in partnership with Forcepoint, CSO, U.S. Secret Service, and CERT Division of Software Engineering Institute at Carnegie Mellon University

In general, cybercrimes were more costly or damaging to your organization when caused by

Page 23: Five Best Practices to Combat the Insider Threat

23Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

2017 U.S. State of Cybercrime Survey -5

Source: 2017 U.S. State of Cybercrime Survey, in partnership with Forcepoint, CSO, U.S. Secret Service, and CERT Division of Software Engineering Institute at Carnegie Mellon University

76%

13%7%5%

How Insider Incidents Are Handled

Internally (without legal action orlaw enforcement)Internally (with legal action)

Externally (notifying lawenforcement)Externally (filing a civil action)

Page 24: Five Best Practices to Combat the Insider Threat

24Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

2017 U.S. State of Cybercrime Survey -6Percentage of insiders versus outsiders

0

20

40

60

80

100

2004 2005 2006 2007 2008 2010 2011 2012 2013 2014 2015 2016

29

20

32 31 3427

31 29 2823

2720

71

80

68 69 6673

69 71 7277

7380

insiders outsidersSource: 2017 U.S. State of Cybercrime Survey, in partnership with Forcepoint, CSO, U.S. Secret Service, and CERT Division of Software Engineering Institute at Carnegie Mellon University

Page 25: Five Best Practices to Combat the Insider Threat

25Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

NITC Research

Page 26: Five Best Practices to Combat the Insider Threat

26Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

NITC Insider Threat Incident Corpus

359

180

156

55

142 1

150135

83

0

50

100

150

200

250

300

350

400

Fraud Theft of IP Sabotage Fraud andTheft of IP

Sabotage andTheft of IP

Sabotage andFraud

Sabotage,Fraud, andTheft of IP

Espionage UIT Misc.

Insider Threat Cases by Category

Page 27: Five Best Practices to Combat the Insider Threat

27Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Note: Does not include incidents that involve multiple case types or espionage.

0

30

60

90

120

150

Banking andFinance

Healthcareand Public

Health

InformationTechnology

Government -State / Local

CommercialFacilities

Government -Federal

All othersectors

Num

ber o

f Inc

iden

ts (T

otal

= 6

20)

U.S. Cases by Top 6 Sectors and Type of Crime

Fraud

Sabotage

Theft IP

Critical Infrastructure Sectors

Page 28: Five Best Practices to Combat the Insider Threat

28Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

** This does not include espionage cases involving classified information

Information Technology27%

Banking and Finance12%

Commercial Facilities

10%

Government - Federal8%

Government -State/Local

8%

Healthcare and Public Health

7%

Communications7%

Education4%

Energy4%

Transportation Systems4%

All other sectors9%

U.S. Sabotage Cases by Critical Industry Sector

Critical Infrastructure Sectors – Sabotage

Page 29: Five Best Practices to Combat the Insider Threat

29Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

** This does not include espionage cases involving classified information

Information Technology17%

Healthcare and Public Health16%

Banking and Finance16%

Critical Manufacturing

10%

Chemical9%

Commercial Facilities8%

Defense Industrial Base5%

Government-State/Local3%

Government-Federal3%

All other sectors13%

U.S. Theft of IP Cases by Critical Industry Sector

Critical Infrastructure Sectors – Theft of IP

Page 30: Five Best Practices to Combat the Insider Threat

30Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

** This does not include espionage cases involving classified information

Critical Infrastructure Sectors – Fraud

Banking and Finance44%

Government-State/Local14%

Healthcare and Public Health

11%

N/A6%

Government-Federal6%

Education5%

Commercial Facilities3%

Information Technology3% Communications

2%

Agriculture and Food2%

All other sectors4%

U.S. Fraud Cases by Critical Industry Sector

Page 31: Five Best Practices to Combat the Insider Threat

31Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Threat Model Components

Page 32: Five Best Practices to Combat the Insider Threat

32Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

To smartly select proper security controls!Consider your possible threat scenarios (fraud, theft of IP, sabotage, etc.)Decompose the threat scenarios into their component parts

• Models can help hereMap threat scenario components to observablesMap observables to controls

• Select controls of varying functions (preventative, detective, corrective, deterrent, etc.) for a defense-in-depth strategy

Why is understanding insider threat model components important?

Page 33: Five Best Practices to Combat the Insider Threat

33Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Critical Path to Insider Risk

Personal Predispositions

Medical conditionsPsychiatric conditionsPrevious rule violations

Stressors

PersonalProfessionalFinancial

Concerning Behaviors

InterpersonalTechnicalSecurityFinancialPersonnelSocial networkTravel

Problematic Organizational Responses

InattentionNo risk assessmentInadequate investigationSummary dismissal

Hostile Act

FraudTheft of IPSabotageEspionageMisuseData Leakage

CERT / Shaw (2006)

Page 34: Five Best Practices to Combat the Insider Threat

34Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Types of Insider Activities -1

IT Sabotage • An insider’s use of IT to direct specific harm at an organization

or an individual- Deletion of information- Bringing down systems- Web site defacement to embarrass organization

Theft of Intellectual Property • An insider’s use of IT to steal intellectual property from the

organization- This category includes industrial espionage involving insiders.

o Proprietary engineering designs, scientific formulas, etc.o Proprietary source codeo Confidential customer informationo Industrial Espionage

Page 35: Five Best Practices to Combat the Insider Threat

35Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Types of Insider Activities -2

Fraud• An insider’s use of IT for the unauthorized modification, addition,

or deletion of an organization's data (not programs or systems) for personal gain, or theft of information that leads to fraud (identity theft, credit card fraud)

• Theft and sale of confidential information (SSN, credit card numbers, etc.)

• Modification of critical data for pay (driver’s license records, criminal records, welfare status, etc.)

Unintentional Insider Threat• An insider whose actions or lack of action without malicious

intent causes harm or the possibility of harm

Page 36: Five Best Practices to Combat the Insider Threat

36Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Types of Insider Activities -3

National Security Insider Espionage • The act of communicating, delivering or transmitting information

pertaining to the national defense of the United States to any foreign government or faction, with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation

Miscellaneous• Unauthorized disclosure of information insider believed should be in

the public domain• Query of database to find address of person – information provided to

acquaintance who physically harmed individual• Query of high-profile individuals to access personal information• Unauthorized access to co-worker’s emails

Page 37: Five Best Practices to Combat the Insider Threat

37Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

3 Most Common Models

IT Sabotage IP Theft

Fraud

Page 38: Five Best Practices to Combat the Insider Threat

38Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

IT Sabotage

Page 39: Five Best Practices to Combat the Insider Threat

39Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

SCADA sabotage releases 800,000 liters raw sewage

TRUE STORY: IT Sabotage

Page 40: Five Best Practices to Combat the Insider Threat

40Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

911 services disrupted for 4 major citiesDisgruntled former employee arrested and convicted for this deliberate act of sabotage.

TRUE STORY: IT Sabotage

Page 41: Five Best Practices to Combat the Insider Threat

41Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider IT Sabotage Example

Insider had difficulties priorto hiring• High school dropout• Fired from prior job• History of drug use

Expressed feelings of dissatisfaction and frustration with work conditions• Complained that they

“did all the work”• Frequently late for

work• Drug use on the job• Demoted

Subject frames their supervisor for sabotage• Discovered plans for

termination• Installed logic bomb to

delete all files on all servers

• Set to execute from supervisor’s .profile

• Included “ha ha” message

• Also planted in script to run when system log file reached certain size

Tried to hide actions technically, but admitted to co-worker• Took great pains to conceal

act by deleting system logs• Forgot to modify one

system log, which was used to identify them as perpetrator

• Told co-worker the day before attack that they “would see some serious stuff happen”

A disgruntled system administrator is able to deploy a logic bomb and modify the system logs to frame their supervisor even though they had been demoted and their privileges should have been restricted.

Page 42: Five Best Practices to Combat the Insider Threat

42Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

The IT Sabotage M.O.

Attack Metrics

Target(s) Systems, servers, and networks

Method(s) Malicious code or modification / deletion of code

Location Typically remotely

Time Outside of normal working hours

Impact Average between $800,000 and $1 Million

Average Length Over 1/3 of incidents took place over 24hrs or less

Page 43: Five Best Practices to Combat the Insider Threat

43Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Observations from Insider Threat IT Sabotage Cases -1Most insiders had personal predispositions that contributed to their risk of committing malicious acts.Most insiders’ disgruntlement is due to unmet expectations.In most cases, stressors, including sanctions and precipitating events, contributed to the likelihood of insider IT sabotage. Behavioral precursors were often observable in insider IT sabotage cases but not appropriately mitigated by the organization.

Page 44: Five Best Practices to Combat the Insider Threat

44Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Observations from Insider Threat IT Sabotage Cases -2Insiders created or used access paths unknown to management to set up their attack and conceal their identity or actions. The majority of saboteurs attacked after pending or completed termination.In many cases, organizations failed to detect technical precursors. Lack of physical and electronic access controls facilitated IT sabotage.

Page 45: Five Best Practices to Combat the Insider Threat

45Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Model Components to Observables

Model Component Associated Observables

Personal Predispositions Co-worker conflicts

History of policy / rule violations

Aggressive, angry or violent behavior

Unmet Expectations Being passed over for a promotion

Being demoted or transferred

Issues with supervisor

Disagreement over salary and compensation

Behavioral Precursors Co-worker or supervisor conflicts

Sudden decline in work performance or attendance

Aggressive, violent, or angry behavior

Substance abuse

Model Component Associated Observables

Technical Precursors

Creating backdoor, shared, non-attributable, or unauthorized accounts

Disabling or attempting to disable security controls

Downloading and installing malicious code and / or hacking tools

Concealment

Using backdoor, shared, non-attributable, or unauthorized accounts

Modifying or deleting logs or backups

Failing to record physical access

Hostile ActModification / deletion of critical data

Denial of service attack

Physical attack to equipment

Inserting malicious code into system

Page 46: Five Best Practices to Combat the Insider Threat

46Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 1

Observable Associated Control Control TypeCo-worker conflicts Human Resource Management System Detective

Anonymous / Confidential Reporting System Detective

History of policy / rule violations Human Resource Management System Detective

Background Checks Detective

Aggressive, angry or violent behavior Anonymous / Confidential Reporting System Detective

Being passed over for a promotion Human Resource Management System Detective

Being demoted or transferred Human Resource Management System Detective

Issues with supervisor Human Resource Management System Detective

Disagreement over salary and compensation Human Resource Management System Detective

Page 47: Five Best Practices to Combat the Insider Threat

47Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 2

Observable Associated Control Control TypeSudden decline in work performance or attendance

Employee Performance Management System Detective

Sanctions Corrective

Aggressive, violent, or angry behavior Anonymous / Confidential Reporting System Detective

Substance abuse Human Resource Management System DetectiveCreating backdoor, shared, non-attributable, or unauthorized accounts

Host-based audit logs Detective

Tampering with, disabling, or attempting to disable security controls

Host-based audit logs Detective

Downloading and installing malicious code and / or hacking tools Application blacklisting / whitelisting Preventative

Host-based audit logs Detective

Page 48: Five Best Practices to Combat the Insider Threat

48Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 3

Observable Associated Control Control TypeUsing backdoor, shared, non-attributable, or unauthorized accounts

Host-based audit logs Detective

Authentication server logs Detective

Modifying or deleting logs or backups Host-based audit logs Detective

Failing to record physical access Badging system logs Detective

Modification / deletion of critical data Change and configuration management systems Detective

Backup systems Recovery

Denial of service attack Server logs Detective

Physical attack to equipment Locks Preventative

Cameras Detective

Insertion of malicious code into operational system

Change and configuration management systems Detective

Page 49: Five Best Practices to Combat the Insider Threat

49Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

IP Theft

Page 50: Five Best Practices to Combat the Insider Threat

50Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

TRUE STORY: Theft of IPSimulation software for the reactor control room in a U.S. nuclear power plant was being run from a country outside the U.S. …

A former software engineer born in that country took it with him when he left the company.

Page 51: Five Best Practices to Combat the Insider Threat

51Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Information was valued at $400 Million.

TRUE STORY: Theft of IPResearch scientist downloads 38,000 documents containing his company’s trade secrets before going to work for a competitor…

Page 52: Five Best Practices to Combat the Insider Threat

52Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Theft of IP Example

Insider claimed to have tuberculosis and meningitis• Took medical L.O.A.

While on medial leave• Remotely downloaded

proprietary documents from outside the US

• Met with foreign firms outside the US and was hired by one firm to develop telecomm software

Returned from leave and requested accessto future product information• Downloaded over 200

technical documents that were outside their scope of work

• Physically removed two large bags full of proprietary information (security cameras captured this event)

Insider resigns the day after stealing the information• Returned again to the

site after submitting resignation to download even more information

• Subject was arrested during a random search at the airport with $600,000,000 worth of company trade secrets just prior to boarding a flight out of the US

Computer engineer accesses their company’s systems while on medical leave and downloads many documents in an attempt to transfer IP to foreign competing firm.

Page 53: Five Best Practices to Combat the Insider Threat

53Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

The IP Theft M.O.

Attack Metrics

Target(s) Trade secrets, Source code, Internal information,Customer information, Product information

Method(s) Authorized access but unauthorized downloads

Location On-site, but occasionally remotely

Time During normal working hours

Average Length 15.3 months

Impact Average impact between $9 Million and $30 Million

Page 54: Five Best Practices to Combat the Insider Threat

54Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Theft of IP Precursors and Observations

Mergers & AcquisitionsInsider DemotedInsider TerminatedInsider ResignedGroup ResignationInsider Forms New Competing BusinessInsider Planning with / Went to Work for a CompetitorInsider Seeking New EmploymentUnauthorized DownloadsHR Violations or ComplaintsSuspicious Foreign Travel and/or ContactsInsider Recruits / Attempts to Recruit Other Insiders

Page 55: Five Best Practices to Combat the Insider Threat

55Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IP Theft Model Components to Observables

Model Component Associated Observables

Personal Predispositions History of policy / rule violations

Sense of entitlement

Stress / Life Event Mergers & Acquisitions

Demotion

Termination

Competitor Proposal

Behavioral Precursors Sense of Entitlement

Insider Forms New Competing Business

Model Component Associated Observables

Behavioral Precursors cnt.

Insider Planning with / went to work for a Competitor

Insider Seeks New Employment

HR Violations

Technical Precursors Unauthorized downloads

Hostile Act Theft of data

Page 56: Five Best Practices to Combat the Insider Threat

56Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 1

Observable Associated Control Control TypeHistory of policy / rule violations Human Resource Management System Detective

Background Checks Detective

Sense of entitlement Human Resource Management System Detective

Being passed over for a promotion Human Resource Management System Detective

Being demoted or transferred Human Resource Management System Detective

Issues with supervisor Human Resource Management System Detective

Disagreement over salary and compensation Human Resource Management System Detective

Page 57: Five Best Practices to Combat the Insider Threat

57Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 2

Observable Associated Control Control TypeSudden decline in work performance or attendance

Employee Performance Management System Detective

Sanctions Corrective

Aggressive, violent, or angry behavior Anonymous / Confidential Reporting System Detective

Substance abuse Human Resource Management System DetectiveCreating backdoor, shared, non-attributable, or unauthorized accounts

Host-based audit logs Detective

Tampering with, disabling, or attempting to disable security controls

Host-based audit logs Detective

Downloading and installing malicious code and / or hacking tools Application blacklisting / whitelisting Preventative

Host-based audit logs Detective

Page 58: Five Best Practices to Combat the Insider Threat

58Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 3

Observable Associated Control Control TypeUsing backdoor, shared, non-attributable, or unauthorized accounts

Host-based audit logs Detective

Authentication server logs Detective

Modifying or deleting logs or backups Host-based audit logs Detective

Failing to record physical access Badging system logs Detective

Modification / deletion of critical data Change and configuration management systems Detective

Backup systems Recovery

Denial of service attack Server logs Detective

Physical attack to equipment Locks Preventative

Cameras Detective

Insertion of malicious code into operational system

Change and configuration management systems Detective

Page 59: Five Best Practices to Combat the Insider Threat

59Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Fraud

Page 60: Five Best Practices to Combat the Insider Threat

60Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

ACTUAL CASEEmployee steals money from cash drawer through No-Sale After Void Scheme…

Page 61: Five Best Practices to Combat the Insider Threat

61Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

TRUE STORY: Fraud

An undercover agent who claims to be on the “No Fly list” buys a fake drivers license from a ring of DMV employees...

The identity theft ring consisted of 7 employees who sold more than 200 fake licenses for more than $1 Million.

Page 62: Five Best Practices to Combat the Insider Threat

62Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Fraud Example

Background• Drug and

alcohol abuse• Substantial

gambling habit

Insider social engineered management• New computer

system with improved controls

• Convinced management they should keep using old computer system

Issued fraudulent refunds to fake companies• Almost 20 years• Nearly 250

fraudulent checks• Totaled nearly $50

million

Liked helping people• Gave coworkers money

for tuition, funerals, clothing, etc.

• Told coworkers they had received inheritance

• Owned multiple homes valued at several million dollars

• Owned luxury cars, expensive jewelry, …

A manager and at least 9 accomplices steal almost $50 million over almost 20 years from their employer.

Page 63: Five Best Practices to Combat the Insider Threat

63Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

The Fraud M.O.

Attack Metrics

Target(s) Personally Identifiable Information (PII), Customer Information (CI), Accounting and Payment Systems

Method(s) Authorized access

Location On-site

Time During normal working hours

Average Length 21.9 months

Impact Average between $4.5 Million and $6 Million

Page 64: Five Best Practices to Combat the Insider Threat

64Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping Fraud Model Components to Observables

Model Component Associated Observables

Personal Predispositions History of financial difficulties

Substance abuse

Previous arrests/convictions

Gambling problems

Stress / Life Event Emerging financial difficulties

Mergers and acquisitions

Behavioral Precursors Unexplained wealth

Financial conflict of interest

Model Component Associated Observables

Technical Precursors Privileged Access Abuse

Created / used fraudulent assets

Created / used an alias

Modified critical data

Used compromised account

Used unattended, unsecured workstation

Hostile Act Theft of data

Page 65: Five Best Practices to Combat the Insider Threat

65Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 1

Observable Associated Control Control TypeHistory of Financial Difficulties Credit Check Detective

Background Check Detective

Substance Abuse Drug Screen Detective

Background Check Detective

Human Resource Management System

Previous Arrest/Conviction Background Check Detective

Gambling Problems Background Check Detective

Emerging Financial Difficulties Credit Check Detective

Mergers and Acquisitions HR Detective

Unexplained Wealth Credit Check Detective

Page 66: Five Best Practices to Combat the Insider Threat

66Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 2

Observable Associated Control Control Type

Financial Conflict of Interest Anonymous / Confidential Reporting Detective

Sanctions Corrective

Privileged Access Abuse Host-based Audit Logs Detective

Anonymous / Confidential Reporting DetectiveCreating backdoor, shared, non-attributable, or unauthorized accounts

Host-based audit logs Detective

Tampering with, disabling, or attempting to disable security controls

Host-based audit logs Detective

Downloading and installing malicious code and / or hacking tools Application blacklisting / whitelisting Preventative

Host-based audit logs Detective

Page 67: Five Best Practices to Combat the Insider Threat

67Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mapping IT Sabotage Observables to Controls - 3

Observable Associated Control Control TypeUsing backdoor, shared, non-attributable, or unauthorized accounts

Host-based audit logs Detective

Authentication server logs Detective

Modifying or deleting logs or backups Host-based audit logs Detective

Failing to record physical access Badging system logs Detective

Modification / deletion of critical data Change and configuration management systems Detective

Backup systems Recovery

Denial of service attack Server logs Detective

Physical attack to equipment Locks Preventative

Cameras Detective

Insertion of malicious code into operational system

Change and configuration management systems Detective

Page 68: Five Best Practices to Combat the Insider Threat

68Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Falsified or omitted informationFamily medical problemsSubstance abuseGambling problemsPrevious arrests / convictionsRecruitment by / of outsiders or other insidersHistory of or emerging financial difficultiesUnexplained wealthFinancial conflict of interest / Employee side businessMergers and acquisitions

Fraud Precursors and Observables

Page 69: Five Best Practices to Combat the Insider Threat

69Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Summary of Insider Incidents

IT Sabotage IP Theft Fraud

Current or former Employee?

Former Current (within 30 daysof resignation)

Current

Type of position Technical (e.g., sys admins, programmers, DBAs)

Technical (e.g., scientists, programmers, engineers) or sales

Non-technical (e.g., data entry, customer service) or their managers

Target Network, systems, or data

IP (trade secrets) or Customer Information

PII or Customer Information

Access Used Unauthorized Authorized Authorized

When Outside normal workinghours

During normal workinghours

During normal working hours

Where Remote access At Work At work

Page 70: Five Best Practices to Combat the Insider Threat

70Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mitigating the Insider Threat

Page 71: Five Best Practices to Combat the Insider Threat

71Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Mitigating Insider Threat

Presentation Title

Opportunities for Prevention, Detection, and Response for an Insider Attack

Page 72: Five Best Practices to Combat the Insider Threat

72Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

The Three Pillars of a Robust Strategy

Accurately Measure Trust

Right-Size Permissions

Conduct Effective Monitoring

Page 73: Five Best Practices to Combat the Insider Threat

73Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Common Sense Guide (CSG), v5

Page 74: Five Best Practices to Combat the Insider Threat

74Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Common Sense Guide, v5

Recommendations are designed to aid in the development of detection, prevention, and response to aid in the mitigation of the insider threatRecommendations are geared towards six groups

1. Human Resources2. Legal3. Physical Security4. Data Owners5. Information Technology6. Software Engineering

Page 75: Five Best Practices to Combat the Insider Threat

75Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

CSG, new editions from v4

• Includes fraud, IT sabotage, IP (intellectual property) theft, and espionage

• New addition of Unintentional Insider Threat: • has or had authorized access to an organization’s network, system,

or data and• had no malicious intent associated with his or her action (or

inaction) that caused harm or substantially increased the probability of future serious harm to the confidentiality, integrity, or availability of the organization’s information or information systems.

• Workplace violence is mentioned and may be included in next edition following continuing research

• Maps to security best practices in NIST controls, NITTF, Minimum Standards, CERT-RMM and ISO 27002

Page 76: Five Best Practices to Combat the Insider Threat

76Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

CSG, v51 - Know and protect your critical assets. 11 - Institute stringent access controls and monitoring

policies on privileged users.2 - Develop a formalized insider threat program. 12 - Deploy solutions for monitoring employee actions and

correlating information from multiple data sources.3 - Clearly document and consistently enforce policies and controls.

13 - Monitor and control remote access from all endpoints, including mobile devices.

4 - Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior.

14 - Establish a baseline of normal behavior for both networks and employees

5 - Anticipate and manage negative issues in the work environment.

15 - Enforce separation of duties and least privilege.

6 - Consider threats from insiders and business partners in enterprise-wide risk assessments.

16 - Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities.

7 - Be especially vigilant regarding social media. 17 - Institutionalize system change controls.8 - Structure management and tasks to minimize unintentional insider stress and mistakes.

18 - Implement secure backup and recovery processes.

9 - Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees.

19 - Close the doors to unauthorized data exfiltration.

10 - Implement strict password and account management policies and practices.

20 - Develop a comprehensive employee termination procedure.

CERT’s Common Sense Guide to Mitigating Insider Threats, Fifth Editionhttp://resources.sei.cmu.edu/library/asset-view.cfm?assetID=484738

Page 77: Five Best Practices to Combat the Insider Threat

77Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

CSG, v5

For each best practice, we note• Challenges to implementation• Quick wins & high impact solutions• Corresponding security standards• Relevant responsible unit• Employee privacy considerations

Page 78: Five Best Practices to Combat the Insider Threat

78Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

CSG, Benefits

Executives and Decision Makers• Provides familiarity with requirements and scope of InTh

programsInsider Threat program Managers• Learn best practices and how to best engage them for insider

threat prevention, detection, and response• Way to effectively communicate with decision makers• Utilize to build InTh programSecurity Practitioners• Gain understanding of best practices• Ensure staff are following and fully implementing BPs

Page 79: Five Best Practices to Combat the Insider Threat

79Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

5 Best Practices for Small – Medium Sized Orgs

1 - Know and protect your critical assets. 11 - Institute stringent access controls and monitoring policies on privileged users.

2 - Develop a formalized insider threat program. 12 - Deploy solutions for monitoring employee actions and correlating information from multiple data sources.

3 - Clearly document and consistently enforce policies and controls.

13 - Monitor and control remote access from all endpoints, including mobile devices.

4 - Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior.

14 - Establish a baseline of normal behavior for both networks and employees

5 - Anticipate and manage negative issues in the work environment.

15 - Enforce separation of duties and least privilege.

6 - Consider threats from insiders and business partners in enterprise-wide risk assessments.

16 - Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities.

7 - Be especially vigilant regarding social media. 17 - Institutionalize system change controls.8 - Structure management and tasks to minimize unintentional insider stress and mistakes.

18 - Implement secure backup and recovery processes.

9 - Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees.

19 - Close the doors to unauthorized data exfiltration.

10 - Implement strict password and account management policies and practices.

20 - Develop a comprehensive employee termination procedure.

CERT’s Common Sense Guide to Mitigating Insider Threats, Fifth Editionhttp://resources.sei.cmu.edu/library/asset-view.cfm?assetID=484738

Page 80: Five Best Practices to Combat the Insider Threat

80Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Best Practice 1

Know and protect your critical assets

Page 81: Five Best Practices to Combat the Insider Threat

81Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Identifying Critical Assets

Page 82: Five Best Practices to Combat the Insider Threat

82Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Identifying Critical Assets

Don’t guess! Get the right people involved• Enterprise risk management• Business process owners• Executive leadership team• Board of directors

Prioritize threats relative to potential impacts / priorities of your organization

• What’s more important: your organization’s reputation, or its intellectual property?- Who makes this call?

Page 83: Five Best Practices to Combat the Insider Threat

83Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Best Practice 3

Clearly document, and consistently enforce policies and controls

Page 84: Five Best Practices to Combat the Insider Threat

84Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Policies and Procedures for Insider Threat Mitigation

Reminder

Don’t forget your administrative controls!

• Policies, procedures, documentation codify “normal” behavior - important for anomaly detection

Exemplars

IT Acceptable Use Policy

Intellectual Property Policy

Data Handling and Classification Policy

Change Control and Configuration Management Policy

Employee Onboarding Procedures

Incident Response Plan

Disciplinary Action Procedures

Employee Separation Handling

Trusted Business Partner Agreements

Page 85: Five Best Practices to Combat the Insider Threat

85Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Best Practice 4

Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior.

Page 86: Five Best Practices to Combat the Insider Threat

86Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Formal Response

Removable Media Alert

HR Complaint

IT Violation

Monitor & Respond

Page 87: Five Best Practices to Combat the Insider Threat

87Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Policies and Procedures for Insider Threat Mitigation

Acceptable Use PolicyIntellectual Property PolicyData Handling and Classification PolicyChange Control and Configuration ManagementEmployee OnboardingIncident Response PlanDisciplinary ActionEmployee Separation HandlingTrusted Business Partner Agreements

Page 88: Five Best Practices to Combat the Insider Threat

88Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Best Practice 11

Institute stringent access controls and monitoring policies on privileged users

Page 89: Five Best Practices to Combat the Insider Threat

89Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Best Practice 18

Implement secure backup and recovery processes

Page 90: Five Best Practices to Combat the Insider Threat

90Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Refine and Refresh

Page 91: Five Best Practices to Combat the Insider Threat

91Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

The threat landscape changes• Disruptive technologies• Organization-level events

- Mergers, acquisitions, reductions in force, etc.• Current events• The workforce changes

Your organization’s appetite for risk changesStuff breaks

• “Why isn’t that data in the SIEM anymore?”

Insider Threats are Dynamic

Page 92: Five Best Practices to Combat the Insider Threat

92Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Implement periodic:• Re-assessments of the highest priority insider threats to your

organization’s critical assets• Tests designed to measure the effectiveness of the deployed

insider threat controls• Improvements to deployed controls based on testing and

feedback from insider threat program stakeholders

… So Your Mitigation Strategy Must Be Dynamic

Page 93: Five Best Practices to Combat the Insider Threat

93Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

• Insider Threat Models vary – and so do the related components and mitigation strategies!

• 5 Best Practices for Small-Medium Sized Organizations1. Know Your Critical Assets2. Clearly Document and Consistently Enforce Policies and

Controls3. Beginning with the Hiring Process, Monitor and Respond to

Suspicious or Disruptive Behavior4. Insitute Stringent Access Controls and Monitoring Policies on

Privileged Users5. Implement Secure Backup and Recovery Processes

• Your security posture should build-in a continuous evaluation improvement process

Final Thoughts

Page 94: Five Best Practices to Combat the Insider Threat

94Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

National Insider Threat Center websitehttp://www.cert.org/insider-threat/

National Insider Threat Center Email:[email protected]

National Insider Threat Bloghttp://www.cert.org/blogs/insider-threat/

For More Information

Page 95: Five Best Practices to Combat the Insider Threat

95Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Thank you!

Questions?

Page 96: Five Best Practices to Combat the Insider Threat

96Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Carrie GardnerCyber Security EngineerCERT National Insider Threat Center (NITC)Telephone: +1 412.268.7903Email: [email protected], [email protected]

Contact Information

Website: http://www.cert.org/insider-threat/

Page 97: Five Best Practices to Combat the Insider Threat

98Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

National Insider Threat Services

Page 98: Five Best Practices to Combat the Insider Threat

99Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Threat Analyst (new course!)Insider Threat Program EvaluatorInsider Threat Program ManagerInsider Threat Vulnerability Assessor

Workshops

Page 99: Five Best Practices to Combat the Insider Threat

100Title of the Presentation Goes Here© 2018 Carnegie Mellon University

[Distribution Statement A] Approved for public release and unlimited distribution.

Insider Threat Program Evaluation (ITPE)Insider Threat Vulnerability Assessment (ITVA)

Assessments


Recommended