Original Release Date: 6/2/2022
Organizations considering cybersecurity programs to increase their resiliency to cyberattacks must focus as much on defending against threats from inside the organization as they do in guarding against external threats. Insider threat is defined as the potential for an individual who has or had authorized access to an organization’s assets to use that access in a way that could negatively affect the organization. This definition includes both intentional and unintentional insider threats, as well as workplace violence. Although every organization is at risk of falling victim to insider threats, specific industries that acquire and store highly sensitive data could also incur significant fines and reputational damage if that data is exposed or inappropriately handled. The industries and sectors at an increased risk of insider threats include government, healthcare, information technology, and financial services.
Insiders are current or former employees, contractors, business partners, or vendors who have legitimate access to organizational resources, including personnel, facilities, information, equipment, networks, and systems. They typically have elevated levels of access, are familiar with the location of sensitive data, and are aware of the vulnerabilities and security policies and procedures of an organization. According to the Verizon 2022 Data Breach Investigations Report, insider data breaches most often occur via privilege misuse, with financial gain as the leading motive. Insiders can exfiltrate data for personal gain or accidentally leak sensitive data. They can also use the data to discover their organization’s activities and disclose secrets to a competitor or help other countries build similar programs. Because insiders have legitimate access, it can be challenging to distinguish between a user’s typical activity and potentially anomalous activity even with sophisticated detection systems.
Insider threats can result in violence, espionage, sabotage, theft, and cyber operations. Specifically, cyber operations are digital threats related to technology, virtual reality, computers, devices, or the internet. Common types of insider threats include:
Malicious: Insiders who knowingly and intentionally steal, disclose, or destroy company data or IT systems for financial gain or to commit corporate espionage or sabotage. The motivation is personal gain or harming the organization for personal benefit, and they are typically influenced by anger, greed, revenge, or external entities instructing them to act maliciously.
Negligent: Insiders who carelessly expose an organization to threats. They are generally familiar with security or IT policies but choose to ignore them.
Accidental: Insiders who mistakenly cause an unintended risk to an organization.
Technical indicators of insider threats include logging into the network at unusual times, accessing unusual resources or attempting to access other devices or servers containing sensitive data, changing passwords for unauthorized accounts, unauthorized disabling of anti-virus tools and firewall settings, installing unauthorized software or malware, and transferring too much data across the network.
Perhaps one of the best-known examples of insider threats is Edward Snowden, who was a system administrator—a privileged user and the ultimate insider—for the US government’s National Security Agency through defense contractor Booz Allen Hamilton. He stole and shared millions of classified documents with the press, which were later made public, in an attempt to reveal the scope of the US government’s intelligence apparatus. He stated that he wanted to change the way the intelligence agencies operated.
In 2010, the United States brought its first economic espionage case to trial when Dongfan "Greg" Chung was charged and sentenced to more than 15 years in prison. Originally from China, he became a naturalized US citizen and worked for Boeing and Rockwell International as a stress analyst with a high-level security clearance. Chung is accused of spying for the Chinese government for over 30 years. When Chung’s home was searched, investigators found documents related to booster rocket fueling systems and other Boeing-developed aerospace and defense technologies, including those for radar and communications on the US space shuttle. In a separate case, Xudong "William" Yao was charged for the theft of sensitive trade secrets. Yao downloaded over 3,000 electronic files within his first two weeks of employment and, within six months, procured a position with a Chinese company specializing in automotive telematics.
In October, three men were charged with money laundering and aggravated identity theft after conducting a business email compromise (BEC) scheme. The accused began the cyber operation by phishing for employee credentials and dropping malware in order to infiltrate the corporate networks of small and large US and global companies. They accessed email servers and email accounts, intercepted communications, sent fraudulent emails with invoices requesting payment, and diverted the payment to bank accounts under their control.
Other real-world examples of insider threats include exfiltrating data after being fired or furloughed, selling company data for financial gain, stealing trade secrets, exposing customer records, stealing hard drives containing human resources data, leaking customer data, accepting a bribe by a foreign national, and leaking data due to accidentally misconfigured access privileges. These examples of insider threats collectively highlight the critical need to properly vet employees and delegate to the least privileges needed to perform assigned tasks to help prevent data and intellectual property theft, espionage, and sabotage.
Organizations must adopt an approach to protect against insider threats, including security policies, technologies, and employee education. Additionally, know the organization’s people, identify its assets, prioritize risks, and establish the proven operational approach to detect and identify, assess, and manage cybersecurity incidents. Although the IT security department is mostly responsible for protecting an organization’s sensitive information, it is ultimately up to everyone within the organization to do their part to protect the organization and its assets.
Intentional insider threats from current employees, contractors, business partners, and vendors may put an organization at greater risk, as the exfiltration of data may occur slowly over time and without notice. Organizations should consider the following steps to secure confidential data and protect systems and networks:
When employees resign or are fired or laid off, proper offboarding protocols and processes may be forgotten. Privileged accounts may remain enabled, employees may retain company-issued devices, and passwords may not be changed. These security gaps give former employees the opportunity to steal intellectual property, plant malware, or commit other unauthorized actions. The following is a list of steps organizations can take in securing confidential data and protecting systems and networks from departing employees:
Exit Interview: If an employee gives a traditional two-week notice upon resignation and does not appear hostile when doing so, be sure to conduct a thorough exit interview to discuss document retention and technology return policies, as well as a review of current account access and what can be expected as they prepare for departure. It is also advisable to include a member of the IT security team in the meeting to ensure they are aware of any active accounts and company-issued devices still in use by the employee.
Employee Removal: In the event the employee is terminated, gives a resignation notice that is effective immediately, or shows signs of hostility when resigning, they should be removed from the premises as quickly and safely as possible. Especially in the case of termination, it is imperative that the employee not be notified in advance in order to prevent digital tampering or data theft that could negatively impact the organization. Security or management should ensure that the employee does not leave with any data that violates company policy. Make sure to collect all work-issued items, such as:
Immediately Limit Physical and Electronic Access: Before the employee permanently leaves the premises, make sure to immediately deactivate, disable, or delete the following for physical and network security:
Change PINs and passwords: Ensure PINs and passwords are changed to any previously accessed organization-managed accounts, such as root/administrator access, social media pages, website administration, bank accounts, etc.
New Jersey Statewide Information Security Manual
Cybersecurity and Infrastructure Security Agency (CISA) Insider Risk Self-Assessment Tool
CISA Insider Risk Mitigation Program Evaluation (IRMPE): Assessment Instrument
CISA Insider Threat Mitigation
Carnegie Mellon University Software Engineering Institute Common Sense Guide to Mitigating Insider Threats