ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: DT033
  • Created: 31st May 2024
  • Updated: 31st May 2024
  • Contributor: The ITM Team

Closed-Circuit Television

CCTV can be used to observe activity within or around a site. This control can help to detect preparation or infringement activities and record it to a video file.

Sections

ID Name Description
PR007CCTV Enumeration

A subject observes and/or records the locations of CCTV cameras in a target area.

PR008Physical Item Smuggling

A subject attempts to defeat physical security controls by smuggling an item (potentially an innocent item at first) into a controlled area to facilitate an infringement (such as a smart phone with a camera).

PR009Physical Exploration

A subject attempts to defeat physical security controls to gain access to a secured area to conduct an infringement.

IF003Exfiltration via Media Capture

A subject uses an external device, such as a mobile phone or camera, to record audio, photos, or video to capture media.

IF002Exfiltration via Physical Medium

A subject may exfiltrate data via a physical medium, such as a removable drive.

ME013Media Capture

A subject can capture photos, videos and/or audio with an external device, such as taking photos of a screen, documents, or their surroundings.

IF012Public Statements Resulting in Brand Damage

A subject makes comments either in-person or online that can damage the organization's brand through association.

IF006Unauthorized Printing of Documents

A subject exfiltrates information by printing it to paper or other physical medium.

AF010Physical Removal of Disk Storage

A subject may remove attached disk storage from a system to deny investigators access to the files stored within it.

AF011Physical Destruction of Storage Media

A subject may destroy or otherwise impair physical storage media such as hard drives to prevent them from being analyzed.

PR012Physical Disk Removal

A subject removes the physical disk of a target system to access the target file system with an external device/system.

IF003.002Exfiltration via Video Capture

A subject uses an external device, such as a mobile phone or camera, to take video recordings containing sensitive information.

IF003.001Exfiltration via Photography

A subject uses a device, such as a mobile phone or camera, to take photos containing sensitive information.

IF003.003Exfiltration via Audio Capture

A subject uses an external device, such as a mobile phone or camera, to take record audio containing sensitive information, such as conversations.

IF011.002Intentionally Weakening Physical Security Controls For a Third Party

The subject intentionally weakens or bypasses physical security controls for a third party, such as allowing them to piggyback into a secure area, leaving a door unlocked for them, or providing them with a security pass.

IF002.005Exfiltration via Physical Documents

A subject tansports physical documents outside of the control of the organization.

ME021.003Physical Access Credentials

Physical security credentials, such as an ID card or physical keys, that were available to the subject during employment are not revoked and can still be used.

IF015.004Theft of Non-Digital Assets

A subject steals non-digital assets, such as physical documents, belonging to an organization.

IF015.003Theft of Other Digital Assets

A subject steals other digital assets, such as monitors, hard drives, or peripherals, belonging to an organization.

IF015.002Theft of a Corporate Mobile Phone

A subject steals a corporate mobile phone belonging to an organization.

IF015.001Theft of a Corporate Laptop

A subject steals a corporate laptop belonging to an organization.

IF002.008Exfiltration via USB to Mobile Device

The subject uses a USB cable, and any relevant software if required, to transfer files or data from one system to a mobile device. This device is then taken outside of the organization's control, where the subject can later access the contents.

IF002.009Exfiltration via Disk Media

A subject exfiltrates data using writeable disk media.