Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for...

53
Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions • Digital Forensic Investigations & Incident Response • Information Assurance Risk Management • Open Source Solutions Alex Nicoll Team Lead, Technical Solutions • Information Assurance • Operating System Design • High Assurance Systems (MLS)

Transcript of Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for...

Page 1: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions • Digital Forensic Investigations & Incident Response • Information Assurance Risk Management • Open Source Solutions Alex Nicoll Team Lead, Technical Solutions • Information Assurance • Operating System Design • High Assurance Systems (MLS)

Page 2: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Agenda

•  Introduction

•  Common Sense Guide to Mitigating Insider Threats, 4th Edition

•  19 Best Practices

•  Technical Demonstration(s)

Page 3: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Assist organizations in identifying indications and warnings of insider threat by

•  performing vulnerability assessments

•  assisting in the design and implementation of policies, practices, and technical solutions

CERT Insider Threat Center—Mission

based on our ongoing research of hundreds of actual cases of insider IT sabotage, theft of intellectual property,

fraud, and espionage

Page 4: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

The CERT Program’s definition of a malicious insider is a current or former employee, contractor, or business partner who meets the following criteria:

•  has or had authorized access to an organization’s network, system, or data

•  has intentionally exceeded or intentionally used that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems

Definition of Insider Threat

Page 5: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Research

•  Empirical Evidence

•  Contarol Hypothesis

•  Control Implementation and Testing

•  Control Pilot

•  Revisions

•  Release

Methods

Page 6: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Common Sense Guide to Mitigating Insider Threats,

4th Edition

Page 7: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Who does the CSG apply to?

•  Information Technology / IT Security

•  Physical Security

•  Software Engineering

•  Data Owners

•  Legal

•  Human Resources

•  …..everyone across the organization

Page 8: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

New Features

•  Mappings to other best practices / standards

•  NIST 800-53

•  ISO 27002

•  CERT RMM

•  Quick wins & High Impact Solutions

•  Quick reference guide

Page 9: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Practices you are familiar with Consider threats from insiders and business partners in enterprise-wide risk assessments.

Clearly document and consistently enforce policies and controls.

Institute periodic security awareness training for all employees. Monitor and respond to suspicious or disruptive behavior, beginning with the hiring process.

Anticipate and manage negative workplace issues. Track and secure the physical environment.

Implement strict password and account management policies and practices. Enforce separation of duties and least privilege.

Consider insider threats in the software development life cycle.

Use extra caution with system administrators and technical or privileged users. Implement system change controls.

Log, monitor, and audit employee online actions.

Use layered defense against remote attacks. Deactivate computer access following termination. Implement secure backup and recovery processes. Develop an insider incident response plan.

Page 10: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

New Best Practices

•  Practice 9: Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities.

•  Practice 16: Develop a formalized insider threat program.

•  Practice 17: Establish a baseline of normal network device behavior.

•  Practice 18: Be especially vigilant of emerging social media trends.

•  Practice 19: Close the doors to unauthorized data exfiltration.

Page 11: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Practice 9

Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities.

•  Conduct a Risk Assessment before entering into any agreement.

•  Chose a cloud service provider that meets or exceeds the organization’s own levels of security.

•  Understand how the cloud provider protect data and other assets.

Page 12: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Develop a formalized insider threat program.

•  Work with Legal Counsel.

•  Requires involvement from various departments across the organization.

•  Share information.

Practice 16

Page 13: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Insider Threat Team

Page 14: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Establish a baseline of normal network device behavior.

•  Know what is normal and abnormal for a given system.

•  Excessive traffic, Insufficient traffic

•  Store logs for 60 days or longer

Practice 17

Page 15: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Be especially vigilant regarding social media.

•  Train users to be aware of what they post

•  Small disclosures of information can create bigger problems

•  Develop a social media policy

Practice 18

Page 16: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Close the doors to unauthorized data exfiltration.

•  Understand how data can leave the organization.

•  Control removable media.

•  Watch for “old school” methods: printers, copiers, etc.

Practice 19

Page 17: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Technical Controls: Preventing Data

Exfiltration

Page 18: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

The Problem

•  Organizations need to use web based services on a daily basis for business needs. However, services that offer the ability to upload attachments present an opportunity for sensitive data to leave the organization.

•  Communications that are secured with SSL encryption are difficult to inspect and therefore it is difficult to detect and prevent sensitive data from leaving the organization.

Page 19: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Data Loss Through the Web

Difficult problem

Perfect exfiltration channel

•  Encrypted

•  Appears “normal”

•  Send many files at once

•  Possibly essential to operations

Page 20: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

What can be done to prevent this? Options:

1.  Implement policies regarding how sensitive information is disseminated

2.  Full packet capture of all Internet traffic for further analysis

3.  White listing

4.  Block all webmail services

5.  Allow all webmail services and cross your fingers

6.  Or…

Page 21: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Allow proxied Internet access to any website

•  Inspect encrypted communication sessions for sensitive documents

•  Block sensitive attachments from being uploaded to the Internet

CERT’s Solution

Page 22: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Documents can be stopped based on three methods:

1.  Block all attachments

2.  Keywords

3.  Tags

Blocking Documents

Page 23: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

The Proxy Server

Page 24: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

MERIT CORP

Man-in-the-Middle (MITM) Proxy

SSL/TLS Handshake SSL/TLS Handshake

Page 25: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Ubuntu Linux Version 10.04 LTS

•  Squid Version 3.1.19

•  C-ICAP

•  Clam Antivirus (ClamAV)

The Proxy Server Main Components

Page 26: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  The Organization's Certificate needs installed in the Trusted Root Certificate Store on each client

•  Internet Explorer needs to be configured to use the proxy on port 3128 for HTTP/S traffic

Both of these settings can be configured using

Group Policy

Client Configuration

Page 27: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Page 28: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Page 29: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Page 30: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Page 31: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Page 32: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

MERIT CORP

Man-in-the-Middle (MITM) Proxy

POST https://mail.google.com/mail/ota?zx=24i9nkai14gs

Page 33: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Squid’s HTTP Request Logging

Page 34: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

MERIT CORP

Man-in-the-Middle (MITM) Proxy

POST https://mail.google.com/mail/ota?zx=24i9nkai14gs

Page 35: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Man-in-the-Middle (MITM) Proxy

POST https://mail.google.com/mail/ota?zx=24i9nkai14gs

RegEx: mail.google.com/mail/ota*

Page 36: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Success!

Page 37: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Shortcomings

•  Not very granular

•  Doesn’t account for the scenario where text is copied and pasted into an email

Page 38: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Detection using ClamAV

testSig:0:*:466f72204f6666696369616c20557365204f6e6c79 For Official Use Only

Page 39: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Detection using ClamAV

realSig:0:*:6b6c61736a6466686f3977333872796933756273646b766a6c6177336f79353432337569687467696561756673646c6169723738323330383935723832333735673233383971377238333437383968666b

6c6433393338666e662d1f

klasjdfho9w38ryi3ubsdkvjlaw3oy5423uihtgieaufsdlair78230895r82375g2389q7r834789hf

kld3938fnf-

Page 40: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Detection using ClamAV

Page 41: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Plagiarism Detection & DLP

Page 42: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  What if we could inspect all text flowing through the network?

•  Rather than look for ‘tags’ or keywords, look for similarity

•  How do we test document similarity?

•  Cosine similarity algorithms

•  Laymen’s terms: Plagiarism Detection

•  Even though we’re not checking for plagiarism in academic papers, the process is virtually identical

Solution:

Page 43: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Rather than asking

•  “Does any text in this document sufficiently match anything within its cited references?”

•  We’re asking

•  “Does any text in this outgoing network traffic sufficiently match anything within our repository of intellectual property?”

•  If not – send it through

•  If so – create an alert and/or actively block the traffic from leaving the organization’s perimeter

The Plagiarism Detection Method

Page 44: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Plagiarism Detection

Software

Sources

TextIndex

Text

Not  similar

Similar

Page 45: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Plagiarism Detection in DLP

Proxy

DataRepository

TextIndex

Not  similar

Similar

Internet

Alert!

Outgoing  Web  

Request

Page 46: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Squid proxy server

•  Apache Lucene

•  Apache Tika

•  GreasySpoon ICAP server

Open Source Tools

Page 47: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Powerful open-source text indexer and search engine

•  Used in IBM’s famous Watson AI system

•  Scalable, fast, and mature

•  Perfect for our needs

Apache Lucene

Page 48: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

If any computed score exceeds the organization’s defined threshold (ex: 50%), either create an alert and/or block the outgoing webmail message

Apache Lucene indexer ‘scores’ the outgoing text against all indexed documents containing intellectual property

GreasySpoon ICAP server forwards the webmail message to Apache Lucene indexer

Proxy forwards the webmail message to GreasySpoon ICAP server

Proxy receives the webmail message

User sends a webmail message

Order of Events

Page 49: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Tuning the threshold is difficult

•  Does not detect encodings other than ASCII or Unicode

•  Processing intensive

•  Large index (lots of duplicated data)

•  Index contains sensitive information

Shortcomings

Page 50: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Create an efficient open-source DLP framework for correlating any given input data with any set of data, regardless of their type (i.e. text, image, raw)

•  Tagging network traffic with usernames and other attribution information

•  Improving our “Tagger” tool to automatically store file usage information within documents when they are created/accessed/modified

Future Work

Page 51: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

•  Two Man Control For Operating Systems

•  Why is it so hard?

•  Better Forensics for Insider Threat Indicators

•  How to use what we know more effectively

Upcoming Control Topics

Page 52: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Point of Contact

http://www.cert.org/insider_threat/

Randy Trzeciak Technical Manager, CERT Insider Threat

CERT Division

Software Engineering Institute Carnegie Mellon University

4500 Fifth Avenue Pittsburgh, PA 15213-3890 +1 412 268-7040 – Phone

[email protected] – Email

Page 53: Best Practices and Controls for Mitigating Insider Threats · Best Practices and Controls for Mitigating Insider Threats George Silowash Team Member, Technical Solutions ... Block

Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University

Copyright 2013 Carnegie Mellon University

This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.

Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of AFCEA or the United States Department of Defense.

NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.

This material has been approved for public release and unlimited distribution except as restricted below.

This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected].

Carnegie Mellon® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.

DM-0000556