ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: PR032
  • Created: 27th November 2025
  • Updated: 27th November 2025
  • Contributor: The ITM Team

Mover

The subject transitions internally within the organization (changing teams, departments, or roles) with the pre-formed intent to gain access to sensitive data, circumvent existing controls, or otherwise contravene internal policies. Unlike ordinary internal mobility driven by career growth or business need, mover-motivated behavior reflects an intentional exploitation of trust, structural opacity, or access privileges.

 

These subjects may actively seek out roles with higher entitlements, reduced scrutiny, or privileged visibility, such as administrative, developer, or compliance-adjacent positions. In some cases, the move may be strategic, occurring only after access restrictions or audit trails were encountered in a prior role. The behavior is often concealed within legitimate transfer processes and is rarely flagged by automated systems due to its formal procedural alignment.

 

Risk is elevated when access control systems do not enforce least privilege during role transitions, resulting in entitlement accumulation or residual access across multiple roles. This enables subjects to retain legacy access while acquiring new privileges in the destination team. Such conditions create a lateral movement surface that mirrors adversarial posturing seen in external threat models but is internally sanctioned.

 

Investigators should be alert to post-transfer behavior that reflects opportunistic access, unaligned with new role expectations, or targeting historically restricted systems. Mover-motivated actions often signal prior drift, dissatisfaction, or premeditated positioning, and should trigger retrospective analysis of behavioral trajectory and entitlement changes.