Commentary by Jim Henderson
The concept of putting an insider threat program (ITP) in place is to provide greater attention to protecting an organization’s assets — personnel, data, information systems and networks — from the malicious insider.
But before an organization decides to put an ITP in place, it should first have its house in order. Just trying to put an ITP in place may provide the organization with a false sense of security.
If you look at the countless surveys, studies and reports that have been written about many government agencies and businesses with regard to cyber threats and insider threats, the foundation of security 101 is not in place. So it is no wonder cyber attacks and insider threat incidents continue to happen.
Insight by Kodak Alaris: Practitioners provide insight into how states and the IT industry are dealing with Real ID in this exclusive executive briefing.
It’s time we get back to the basics. Quite a number of insider threat incidents have happened because basic security 101 and risk management principles were absent, overlooked or ignored. A determined malicious insider will look at all vulnerabilities in an organization and exploit the one with the greatest change of success, and least chance of detection.
The organization should first have a foundation of security in place that starts with:
If an organization has its in-house in order, it’s off to a much better start to put an ITP in place. While each organization’s ITP could be structured somewhat differently, below is a template for what one could look like:
The individuals that must be part of the ITP include everyone from the ITP manager, ITP analyst(s), to personnel from facilities security, human resources, to counterintelligence investigators, to senior directors, to chief risk officers, to network security administrators, to the legal department, and many others.
The insider threat program will:
There are certain requirements under the National Insider Threat Policy that agencies need to take into account as they create an ITP.
The ITP manager plays a vital role in establishing the process of gathering, integrating, analyzing, coordinating and responding to potential insider threat information. The ITP manager is responsible for managing and overseeing the ITP and will provide resource and staffing recommendations to the agency director or CEO. The manager will draft and submit the ITP concept of operations plan (CONOPS) to the agency director or CEO and provide reports to the agency director or CEO concerning everything from insider threat incidents to status of existing threats to vulnerabilities and weaknesses that could lead to an insider attack to risk mitigation strategies.
Personnel may be assigned directly to the ITP and the ITP manager must ensure that they are trained in several different disciplines, including counterintelligence and security fundamentals to include applicable legal issues; procedures for conducting insider threat response action(s) for a potential threat or actual insider threat incident and all applicable laws and regulations regarding the gathering, integration, retention, data classification, safeguarding and use of records and data, including the consequences of misuse of such information.
A third area under the NITP that organizations must address is enterprise information sharing. In order for the ITP to have any effect against the insider threat, the ITP manager must direct and coordinate that all relevant organizational components, securely provide the ITP personnel with the information needed to identify, analyze, respond, mitigate or neutralize insider threat matters.
As a part of information sharing, the NITP also requires agencies to have an IT auditing and monitoring program. Various security software tools can be used to audit, monitor or record the activities of insiders using computers, laptops and mobile devices that are connected to an organization’s network and the Internet. Insider or user attributable activities to be audited, monitored or recorded may include prohibited activities stated in security policies, anomalous behavior, suspicious activities, unusual actions, unauthorized access to data, exceeding threshold-limits, printing and much more. Another important aspect of this program is the integration and correlation of logs from other sources, facility access logs, phone logs and other communications.
Finally, agencies should establish an insider threat awareness program — yet another NITP requirement. The program must continuously educate employees on what may be considered suspicious activities, behavioral indicators, signals or indicators of espionage or malicious intent by insiders. The importance of detecting problems with an insider, before an incident happens, is crucial to reduce the risk of damage to the organization. This awareness will create a “See Something-Say Something Culture.” The workforce needs to know what to report, when to report and who to report to. Good insiders are the eyes and ears of an organization and can be the first line of defense in helping an organization protect itself from malicious insiders.
Aside from the NITP, there are other areas agencies and companies should focus on. One is the personnel security-human resources department (PSHRD). The PSHRD is a key element supporting the ITP as it will provide services such as hiring, reference checks, law enforcement background checks, polygraphs, security briefings, continuous evaluation of personnel and terminations.
Another best practice for organizations is to have an employee assistance program. Employees may have personal circumstances that may put the organization at risk. The program can act as a confidential open door to provide an outlet for the insider to turn to for assistance. This is a proactive step to get in front of the insider before an incident occurs.
There are several other important aspects that could proactively address insider threat risks. These could include employee satisfaction surveys, policies coupled with disciplinary actions for non-compliance, and focusing more attention and depth to an organizations vulnerabilities.
An organization must identify and inventory its most important data. Key decision makers or stakeholders must be involved from across the organization to protect the organization’s data using an enterprise approach, not a silo-stove pipe approach.
Want to stay up to date with the latest federal news and information from all your devices? Download the revamped Federal News Network app
Communication is critical. The workforce must be made aware of the policies and procedures for protecting the data, the sanctions or disciplinary actions for non-compliance, as well as how to report suspicious activities or indicators of a possible insider threat.
The insider threat program sits atop this security foundation as a group that is free from an organization’s politics and conflicts of interest. It’s number one goal is to protect the organization assets — its people and data.
Jim Henderson is the CEO of InsiderThreatDefense.Com.