Insider Threat Best Practices
Insider threats are influenced by technical, behavioral, and organizational issues and must be addressed by policies, procedures, and technologies, so best practices to mitigate insider threats involve your staff. Decision makers across your organization must understand the overall scope of the insider threat problem and communicate it to everyone. The graphic below illustrates opportunities to prevent, detect, and respond to an insider incident.
To help guide you through this process, we created best practices that mitigate IT theft, IT sabotage, and fraud. For example, your organization should implement strict password and account management policies and practices, enforce separation of duties and least privilege, define explicit security agreements for any cloud services, and institutionalize system change controls.
We created the following best practices for mitigating IP theft, IT sabotage, and fraud:
- Consider threats from insiders and business partners in enterprise-wide risk assessments.
- Clearly document and consistently enforce policies and controls.
- Incorporate insider threat awareness into periodic security training for all employees.
- Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior.
- Anticipate and manage negative issues in the work environment.
- Know your assets.
- Implement strict password and account management policies and practices.
- Enforce separation of duties and least privilege.
- Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities.
- Institute stringent access controls and monitoring policies on privileged users.
- Institutionalize system change controls.
- Use a log correlation engine or security information and event management (SIEM) system to log, monitor, and audit employee actions.
- Monitor and control remote access from all end points, including mobile devices.
- Develop a comprehensive employee termination procedure.
- Implement secure backup and recovery processes.
- Develop a formalized insider threat program.
- Establish a baseline of normal network device behavior.
- Be especially vigilant regarding social media.
- Close the doors to unauthorized data exfiltration.
Learn more about these best practices in the CERT Common Sense Guide to Mitigating Insider Threats, 5th Edition.