ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: IF002.010
  • Created: 13th September 2024
  • Updated: 13th September 2024
  • Contributor: Ismael Briones-Vilar

Exfiltration via Bring Your Own Device (BYOD)

A subject connects their personal device, under a Bring Your Own Device (BYOD) policy, to organization resources, such as on-premises systems or cloud-based platforms. By leveraging this access, the subject exfiltrates sensitive or confidential data. This unauthorized data transfer can occur through various means, including copying files to the personal device, sending data via email, or using cloud storage services.

Prevention

ID Name Description
PV016Enforce a Data Classification Policy

A Data Classification Policy establishes a standard for handling data by setting out criteria for how data should be classified and subsequently managed and secured. A classification can be applied to data in such a way that the classification is recorded in the body of the data (such as a footer in a text document) and/or within the metadata of a file.

PV003Enforce an Acceptable Use Policy

An Acceptable Use Policy (AUP) is a set of rules outlining acceptable and unacceptable uses of an organization's computer systems and network resources. It acts as a deterrent to prevent employees from conducting illegitimate activities by clearly defining expectations, reinforcing legal and ethical standards, establishing accountability, specifying consequences for violations, and promoting education and awareness about security risks.

PV041Mobile Device Management (MDM)

MDM solutions require employees to register their personal devices with the organization's MDM system before gaining access to corporate networks and applications. This process ensures that only approved and known devices are permitted to connect.

 

Once a device is enrolled, the MDM system can enforce security policies that include:

  • Access Control: Restricting or granting access based on the device's compliance with corporate security standards.
  • Configuration Management: Ensuring that devices are configured securely, with up-to-date operating systems and applications.
  • Remote Wipe and Lock: Allowing the organization to remotely wipe or lock a device if it is lost, stolen, or if suspicious activity is detected.
  • Data Encryption: Enforcing encryption for data stored on and transmitted by the device to protect sensitive information.
  • Application Control: Managing and restricting the installation of unauthorized applications that could pose security risks.
PV040Network Access Control (NAC)

Network Access Control (NAC) manages and regulates devices accessing a organization's network(s), including personal devices under a Bring Your Own Device (BYOD) policy. NAC systems ensure that only authorized and compliant devices can connect to the network, reducing security risks.
 

NAC performs the following functions:

  • Device Authentication and Authorization: Checks whether the device meets the organization’s security policies before granting access.
  • Compliance Checks: Verifies that devices have up-to-date security patches and configurations. Non-compliant devices may be denied access or placed in a quarantined network zone.
  • Segmentation and Isolation: Restricts devices' access to sensitive areas, limiting potential impact from compromised devices.
  • Continuous Monitoring: Tracks connected devices for ongoing compliance and can automatically quarantine or disconnect those that fall out of compliance.
  • Policy Enforcement: Applies security policies to ensure devices can only access appropriate resources based on their security status.

 

NAC functionality can be provided by dedicated NAC appliances, next-generation firewalls, unified threat management devices, and some network switches and routers.

Detection

ID Name Description
DT102Cloud User and Entity Behavior Analytics (UEBA)

Deploy UEBA solutions designed for cloud environments to monitor and analyze the behavior of users, applications, network devices, servers, and endpoints accessing cloud resources. Cloud UEBA systems track normal behavior patterns and detect anomalies that could indicate potential security risks. For instance, they can identify when a user or entity is downloading unusually large volumes of data, accessing an excessive number of resources, or engaging in data transfers that deviate from their usual behavior.

DT101Cloud User Behavior Analytics (UBA)

Implement UBA tools tailored for cloud environments to continuously monitor and analyze user activities, detecting anomalies that may signal security risks. Typically offered as services by cloud providers or third-party platforms, Cloud UBA can track and flag unusual behavior, such as excessive data downloads, accessing a higher-than-usual number of resources, or large-scale transfers inconsistent with a user’s typical patterns. These tools can also provide real-time alerts when users engage in behavior that deviates from established norms, such as accessing sensitive data during off-hours or from unfamiliar locations. By identifying such anomalies, UBA enhances the detection of insider threats and unauthorized activities within cloud environments.

DT100Virtual Private Network (VPN) Logs

Depending on the type of VPN appliance or service used, VPN logs can provide detailed records of user activity. These logs typically include information such as user IDs, device types, IP addresses, and connection timestamps. By analyzing VPN logs, security teams can identify deviations from normal usage patterns, such as connections from unusual geographic locations, access during odd hours, or unusually large data transfers. Anomalies in VPN usage can serve as early indicators of suspicious behavior, potentially signaling attempts at data exfiltration or other unauthorized activities. Alerts triggered by these irregularities allow for further investigation to assess potential threats.