pricing-table-shape-1
Table-content-Image

Table of content

date
October 15, 2021

Insider Threats – Who can you trust?

Insider threats are becoming center stage to some of the deadliest cyberattacks in recent news. Identifying insider threats is by no means an easy task, as many times, it includes zombie accounts created by users who are no longer in the organisation. The accounts exist, and when taken over, are lethal enough to carry widespread damage through their legitimate access paths. Insiders typically know what data is valuable to an organisation and where it is stored. Data breaches caused by insiders are significantly more expensive and dangerous for organisations than ones caused by an external attacker.

In a 2019 SANS Institute report on advanced threats, security personnel reported that the major gap in insider threat defense is primarily driven by a lack of visibility into baseline user behavior.

Method to the Madness

According to Gartner, insider threats are categorized into four categories: pawn, goof, collaborator, and lone wolf.

Pawn

Pawns are employees who are manipulated into performing malicious activities without their intentional participation in the rogue behavior through social engineering.

Goof

Goofs are ignorant or arrogant users who believe they are exempt from security policies or overconfident in their actions beyond reason. Every organization faces the challenge of a significant percentage of employees actively trying to bypass security controls and almost 90 percent of insider incidents are caused by goofs.

Collaborator

Collaborators are users who cooperate with a third party, often competitors or nation-states, to use their access in a way that intentionally causes harm to the organisation. Collaborators typically use their access to steal intellectual property and customer information or to cause disruption to normal business operations.

Lone Wolf

Lone wolves are entirely independent and rogue insiders who act without external influence or manipulation. Lone wolves are especially dangerous when they have elevated levels of privilege, such as system administrators or DB admins.

Devising a detection mechanism for Insider Threats

While behavioral signs can be an indication of potential issues, digital forensics and analytics can aid in detecting insider threats. User and Entity Behavior Analytics (UEBA) help detect potential malicious behaviors

To effectively detect insider threats, organisations should address any visibility gaps to prevent security blind spots created due to a lack of control on user accounts and their associated privileges. This is achieved by aggregating security data into a centralized monitoring solution.

In a study conducted by IBM X-Force from 2018 to 2020, the research identified that 40% of incidents were detected through alerts generated via an internet monitoring tool. Organisations need to devise a sound privilege access management policy where the focus is on limiting elevated privileges than enabling a wider group to facilitate faster provisioning and access to organization resources.

After data is aggregated, it can be analyzed and weighted with risk scores behavior. Behavioral anomalies help cybersecurity teams identify when a user has become a malicious insider or if their credentials have been compromised by an external attacker. By adopting a user-focused view, security teams can quickly spot insider threat activity and manage user risk from a centralized location instead of manually piecing disparate data points that individually may not show the full picture.

Remediating Insider Threats

Organizations are constantly challenged with managing user privileges and accounts, often leading to unprecedented sprawl - new accounts, privileges, and resources. Organizations need to adopt a privileged access management (PAM) solution and feed data about access to privileged accounts from that solution into their SIEM. Once validated, an insider threat incident could be created in an integrated incident response workflow solution, where the playbooks specify what remediation is needed. Potential remediation could include challenging the insider with MFA, or revoking access, either of which can be done automatically in an IAM solution.

Insider threats are as much of a headache to organizations as external threats, if not more. Trust and access must be validated at every stage instead of being granted once and never audited. Zero trust is an important technology concept that curtails perpetually and promotes granularity in access which goes a long way in helping organizations to baseline their user population.

polygon

Related Posts

feature image
10 May, 2023

A Deep Dive into Advanced Persistent Threats (APT)

You may well have heard of advanced persistent threats (APT) from recent...
feature image
13 Dec, 2022

What is Network Traffic Analysis (NTA)?

In the present-day cyberthreat landscape, threat actors can come from...
feature image
25 Jul, 2022

What is a Supply Chain Attack? – ForeNova Technologies

In December 2020, U.S. software developer SolarWinds was exposed as the...