ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: PV024
  • Created: 19th June 2024
  • Updated: 19th June 2024
  • Contributor: The ITM Team

Employee Off-boarding Process

When an employee leaves the organization, a formal process should be followed to ensure all equipment is returned, and any associated accounts or access is revoked.

Sections

ID Name Description
ME021Unrevoked Access

The subject has left the organization but still has access to services or data that is reserved for employees.

MT003Leaver

A subject exits the organization (voluntarily or involuntarily) while retaining access to internal systems, sensitive data, or institutional knowledge. The departure itself becomes a motivational inflection point, during which emotional, professional, or financial drivers may shift the subject’s risk profile. This transitional state can prompt harmful actions, including unauthorized access, data exfiltration, or policy circumvention. Departure-associated infringements often occur in the days leading up to the exit or immediately after, particularly when offboarding controls are delayed, inconsistent, or missed entirely.

 

Leaver behavior should be understood in context: the subject’s access level, sentiment toward the organization, and perceived future value of retained data all influence the likelihood of infringement. Investigators should correlate leaver timing with anomalous activity and consider the specific nature of the departure.

IF025Account Sharing

The subject violates organizational policy by allowing or enabling the use of their credentials by another individual or by using credentials that do not align with their identity and/or they are not authorized to use. 

 

Account sharing undermines accountability, auditability, and access control mechanisms, and is frequently linked to the obfuscation of intent, collusion, or circumvention of oversight. It is often rationalized as a convenience, but may also support broad policy evasion, unauthorized task delegation, or illicit collaboration.

AF024Account Misuse

The subject deliberately misuses account constructs to obscure identity, frustrate attribution, or undermine investigative visibility. This includes the use of shared, secondary, abandoned, or illicitly obtained accounts in ways that violate access integrity and complicate forensic analysis.

 

Unlike traditional infringement behaviors, account misuse in the anti-forensics context is not about the action itself—but about how identity is obfuscated or displaced to conceal that action. These behaviors sever the link between subject and activity, impeding both real-time detection and retrospective investigation.

 

  • Common anti-forensic account misuse techniques include:
  • Operating across multiple sanctioned accounts to fragment behavior trails.
  • Using shared service accounts to mask individual actions.
  • Re-activating or leveraging dormant credentials to perform access without attribution.
  • Exploiting misconfigured or ghost accounts left from previous users, contractors, or integrations.

 

Investigators encountering unexplainable log artifacts, attribution conflicts, or unexpected session collisions should assess whether account misuse is being used as a deliberate concealment tactic. Particular attention should be paid in environments lacking centralized identity governance or with known privilege sprawl.

 

Account misuse as an anti-forensics strategy often coexists with more overt infringements—enabling data exfiltration, sabotage, or policy evasion while preserving plausible deniability. As such, its detection is crucial to understanding subject intent, tracing activity with confidence, and restoring the chain of custody in incident response.

AF025Delayed Execution Triggers

Subjects may embed deferred execution logic into scripts, binaries, or automation systems to evade real-time scrutiny and frustrate future investigation. These anti-forensic techniques decouple the triggering event from the subject’s active presence in the environment—delaying execution until the subject has departed or organizational oversight has waned.

 

Common methods include:

 

  • Time-Based Logic: Conditional execution paths that activate only after a predefined system date or time threshold (e.g., if (date > X)).
  • Extended Sleep or Delay Functions: Use of long-duration sleep, timeout, or delay calls to stall execution for hours or days.
  • Abuse of Scheduled Task Frameworks: Planting jobs in cron, Windows Task Scheduler, or enterprise orchestration systems with future execution dates, often disguised through misleading naming or non-obvious triggers.

 

These deferred actions are designed to blend into the environment and avoid correlation with the subject's session, user ID, or system interaction timeline. They may be used to execute sabotage, establish persistence, or exfiltrate data long after departure—frustrating incident response efforts and increasing dwell time before detection.

PR029Persistent Access via Bots

The subject exploits their technical role to deploy or manipulate automated bots within the organization’s environment—most commonly within collaboration platforms (e.g., Slack, Teams, Discord) or internal operational systems (e.g., Jira, ServiceNow, Helpdesk tooling). These bots are designed to persist beyond the subject’s tenure, leveraging independent service credentials (or other credentials not specifically associated to a user), webhook integrations, or unattended workflows to maintain covert access.

 

The subject may create new bots under the guise of legitimate productivity enhancements, or hijack existing integrations to expand data access, redirect output, or embed hidden monitoring functionality. Once active, these bots operate continuously, harvesting internal conversations, extracting files, or polling sensitive endpoints—often without triggering standard audit alerts tied to user accounts.

 

Because automation accounts are rarely subject to the same identity governance or offboarding scrutiny as human users, this technique enables long-term persistence, broad data visibility, and operational concealment, facilitating continued access or covert surveillance after the subject’s departure.

PR030Authorization Token Staging

The subject pre-authorizes access to internal or third-party services using OAuth or other token-based mechanisms, creating persistent or stealth access pathways for future use. This staging behavior allows access to be decoupled from standard authentication workflows, enabling the subject to retrieve, manipulate, or exfiltrate data without using core credentials or triggering routine identity-based alerts.

 

Token staging is particularly relevant in cloud and hybrid environments where delegated access via OAuth, SAML, or API keys is commonly used. When authorization tokens grant broad scopes (e.g., full mailbox or document access), they can effectively serve as alternate credentials — often surviving role changes, session terminations, or identity deactivations.

 

From an investigative standpoint, this behavior constitutes an intentional act of access persistence setup. It may indicate foresight, circumvention of governance controls, or preparation for covert activity. Detection typically requires correlating authorization logs with subject role, timing, and expected access boundaries - especially where third-party application use diverges from organizational norms.

PR032Mover

The subject transitions internally within the organization (changing teams, departments, or roles) with the pre-formed intent to gain access to sensitive data, circumvent existing controls, or otherwise contravene internal policies. Unlike ordinary internal mobility driven by career growth or business need, mover-motivated behavior reflects an intentional exploitation of trust, structural opacity, or access privileges.

 

These subjects may actively seek out roles with higher entitlements, reduced scrutiny, or privileged visibility, such as administrative, developer, or compliance-adjacent positions. In some cases, the move may be strategic, occurring only after access restrictions or audit trails were encountered in a prior role. The behavior is often concealed within legitimate transfer processes and is rarely flagged by automated systems due to its formal procedural alignment.

 

Risk is elevated when access control systems do not enforce least privilege during role transitions, resulting in entitlement accumulation or residual access across multiple roles. This enables subjects to retain legacy access while acquiring new privileges in the destination team. Such conditions create a lateral movement surface that mirrors adversarial posturing seen in external threat models but is internally sanctioned.

 

Investigators should be alert to post-transfer behavior that reflects opportunistic access, unaligned with new role expectations, or targeting historically restricted systems. Mover-motivated actions often signal prior drift, dissatisfaction, or premeditated positioning, and should trigger retrospective analysis of behavioral trajectory and entitlement changes.

ME021.001User Account Credentials

User credentials that were available to the subject during employment are not revoked and can still be used.

ME021.002Web Service Credentials

Web credentials that were available to the subject during employment are not revoked and can still be used.

ME021.003Physical Access Credentials

Physical security credentials, such as an ID card or physical keys, that were available to the subject during employment are not revoked and can still be used.

ME021.004API Keys

API keys that were available to the subject during employment are not revoked and can still be used.

ME021.005SSH Keys

SSH keys that were available to the subject during employment are not revoked and can still be used.

ME021.006Multi-Factor Authentication

Subjects who are issued Multi-Factor Authentication (MFA) tokens, whether software-based (such as Google Authenticator or Microsoft Authenticator) or hardware devices (like YubiKeys or FIDO2 devices), may retain access to systems if these tokens or devices are not deactivated upon their departure or role change.

 

When a subject leaves the organization or no longer needs access, failing to deactivate their MFA tokens allows them to continue authenticating to systems, potentially bypassing security controls. If a subject’s software-based MFA token remains active, they can still generate valid authentication codes unless the token is unlinked or deactivated. Similarly, if a subject retains a hardware security key, they can use it to authenticate to services as if they were still an active user.

 

In environments using federated authentication (e.g., SAML, OAuth), a subject’s MFA token can provide access to multiple interconnected services, allowing them to authenticate to systems they should no longer be able to access. This opens the possibility of unauthorized access even after the subject has left the organization.

 

To prevent this, organizations must promptly deactivate MFA tokens when subjects are removed from the network. Automating the deactivation process and regularly auditing active tokens will help close any gaps in access control. Additionally, securely managing backup MFA keys ensures that no unauthorized individual can reuse them.

IF022.005Media Leak

The intentional or negligent disclosure of internal data, documents, or communications to members of the press or external media outlets—resulting in the loss of confidentiality, reputational harm, or operational compromise.


Media leaks represent a unique form of data loss. Unlike data exfiltration for financial gain or competitive advantage, this form of loss often involves symbolic targeting, reputational damage, or pressure tactics. Subjects may seek to embarrass the organization, expose internal misconduct, or spark public or political consequences. Leaks may be anonymous, pseudonymous, or openly attributed.

This behavior is sometimes rationalized by the subject as whistleblowing, though it often occurs outside authorized internal reporting channels and in violation of confidentiality agreements, regulatory constraints, or national security laws.


Media leaks blur the line between insider threat and whistleblowing. While some disclosures may raise legitimate ethical concerns, organizations must distinguish between protected disclosures under law (e.g., protected whistle-blower status) and unauthorized leaks that expose sensitive, regulated, or classified information.

These events often generate external investigative pressure (from regulators, media, or lawmakers) and may undermine internal trust—requiring not just forensic containment, but narrative and reputational management.

AF024.001Account Obfuscation

The subject leverages multiple accounts under their control—each legitimate on its own—to distribute, disguise, or segment activity in a manner that defeats identity-based attribution. This technique, referred to as account obfuscation, is designed to frustrate forensic correlation between subject behavior and account usage.

 

Unlike role-sanctioned multi-account use (e.g., one account for user access, another for administrative tasks), account obfuscation involves the deliberate operational separation of actions across identities to conceal intent, evade controls, or introduce ambiguity. This may involve:

 

  • Using a privileged account to perform high-risk or policy-violating actions while maintaining a clean audit trail on the primary user account.
  • Staging data using an internal identity and exfiltrating it using an external or contractor credential.
  • Alternating between corporate and guest accounts to avoid continuous session logging or alerting thresholds.

 

This behavior is often facilitated by weak identity governance, fragmented access models, or unmanaged role transitions. It is especially difficult to detect in environments where access provisioning is ad hoc, audit scopes are limited, or account correlation is not enforced at the SIEM or UAM level.

 

From an investigative standpoint, account obfuscation serves as a deliberate anti-forensics tactic—enabling subjects to operate with plausible deniability and complicating timeline reconstruction. Investigators should review cross-account behavior patterns, concurrent session overlaps, and role-permission inconsistencies when this technique is suspected.

AF024.002Unauthorized Credential Use

The subject employs valid credentials that were obtained outside of sanctioned provisioning channels to conceal their identity or perform actions under a false or misleading identity. This behavior, categorized as unauthorized credential use, is distinct from traditional account compromise—it reflects insider-enabled misuse, not external intrusion.

 

Credentials may be acquired through casual observation (e.g., shoulder surfing or unlocked workstations), social engineering, prior access (e.g., retained credentials from a former role), or covert means such as password capture tools. In some cases, credentials may be voluntarily shared by a collaborator or acquired opportunistically from unmonitored or abandoned accounts.

 

This tactic allows the subject to dissociate their actions from their known identity, delay detection, and in some cases, redirect suspicion to another individual. When used within privileged or high-sensitivity environments, unauthorized credential use can enable significant harm while bypassing conventional identity-based controls and alerting mechanisms.

 

Unlike service account sharing or account obfuscation (which involve legitimate, active credentials assigned to the subject), this behavior revolves around unauthorized access to credentials not formally linked to the subject. Investigators should prioritize this sub-section when audit trails show activity under an identity that does not correspond to role expectations, known behavioral patterns, or device history.

 

Key forensic indicators include:

  • Activity under stale or supposedly deactivated credentials.
  • Access from unfamiliar endpoints using accounts with known role assignments.
  • Unusual timing or geographic patterns inconsistent with the account’s assigned user.
  • Discrepancies between identity artifacts (e.g., login metadata) and session content (e.g., typing cadence, application use).

 

Unauthorized credential use is a high-risk concealment technique and often coincides with malicious or high-impact infringements.

ME001.001Access to Asset Past Termination

The subject accesses a corporate hardware asset, most commonly a laptop or corporate mobile device, after their employment has formally ended. This typically occurs due to gaps in deprovisioning, delayed hardware recovery, or the subject physically retaining the device despite offboarding procedures. Post-termination access may be opportunistic or intentional, and may precede or coincide with data exfiltration, sabotage, or unauthorized continuation of internal access.

 

This sub-section is relevant in cases where the hardware asset is no longer linked to an active identity in HR systems but remains technically functional and capable of network, VPN, or service access. Such access undermines the assumption that termination alone revokes operational capability and may point to procedural drift in IT, HR, or facilities handover workflows.

MT005.005Extortion

The subject makes direct or implied threats against the organization to cause material harm unless demands, typically financial, are met. These threats often rely on the subject's access to sensitive data or reputationally damaging information, with the stated intent to release, leak, or misuse that data unless a specific outcome is achieved.

 

Extortion of this nature is typically transactional and opportunistic. Unlike sabotage or ideological coercion, this behavior is rooted in self-enrichment. The subject does not seek systemic disruption, but rather personal advantage through the exploitation of institutional fear, risk aversion, or reputational sensitivity.

 

In many cases, the subject conceals their identity during the extortion, using anonymous communication platforms, burner accounts, or pseudonyms, to increase pressure while delaying attribution. This anonymity may also allow the subject to continue operating within the organization undetected.

MT003.002Resignation

The subject initiates their voluntary departure from the organization, typically through formal resignation. While not inherently malicious, resignation marks a critical inflection point, particularly when paired with future employment at a competitor, ongoing interpersonal conflict, or dissatisfaction with organizational direction.

 

Subjects who resign may experience a shift in loyalty, a reduced sense of accountability, a weakened sense of confidentiality, or surface a previously held belief that organizational data is now personally justifiable to retain. These attitudes may lead to pre-exit infringement such as covert (or overt) data transfers to personal systems or accounts.

 

In many cases, resignation can introduce a false sense of finality or detachment, wherein the subject no longer adheres to internal policy boundaries. Risk is elevated during the notice period, especially in environments with weak offboarding processes.

MT003.001Workforce Reduction

The subject is affected by an involuntary organizational decision to reduce headcount, commonly referred to as a workforce reduction, layoff, or redundancy. Unlike terminations for other reasons, workforce reduction typically affects multiple employees at once and is driven by budget constraints, restructuring, or strategic realignment.

 

A subject affected by workforce reduction may experience acute emotional responses (particularly resentment, betrayal, or perceived devaluation) which can develop into retaliatory or self-serving behaviors. These emotional states, when combined with continued access to internal systems, can motivate infringements.

 

Subjects impacted by workforce reductions may engage in infringements during the period between notification and final termination. When the workforce reduction is publicly known, subjects may further rationalize inappropriate actions as justified by circumstance or organizational failure. Investigators should consider the timing of the reduction announcement, the subject’s level of access, and any prior indicators of behavioral drift, before and during the offboarding window. Elevated risk is especially present where access revocation is delayed beyond a few hours after notification.

MT003.003Termination for Cause

The subject is involuntarily removed from the organization due to misconduct, performance failure, policy breach, or other cause-based grounds. Unlike workforce reductions (which typically involves a process and/or negotiation) terminations for cause are highly personal and often carry significant emotional charge, especially if the subject perceives the action as unjust, humiliating, or damaging to reputation or career prospects.

 

Subjects terminated for cause may exhibit high-risk behaviors during the pre-termination window (e.g., after being placed under investigation or on performance review) or immediately following notification. Even brief access persistence post-notification can present significant risk. The subject may attempt to delete evidence, exfiltrate data for leverage, disrupt systems, or stage retaliatory actions. The motivational blend of perceived injustice and loss of control often drives urgent, overt behavior with little regard for concealment.

 

Investigators should assess not only the subject’s final actions, but also the timeline of organizational awareness, specifically whether the subject had foreknowledge of the impending termination, and whether access controls were applied in parallel with disciplinary measures.

MT003.004Retirement or Departure from Workforce

The subject departs the organization due to permanent withdrawal from the workforce (commonly through retirement, long-term medical leave, or other non-return scenarios). These exits are typically low-conflict and pre-announced, leading many organizations to deprioritize insider threat risk during the transition. However, this assumption can obscure several operational realities.

 

Retiring subjects (particularly long-tenured employees) often retain extensive institutional knowledge, broad access privileges, and deep familiarity with unmonitored systems or legacy processes. Emotional drivers such as nostalgia, ownership over work product, or a desire to “preserve” professional contributions may lead to data exfiltration, sometimes unconcealed or rationalized as harmless.

 

These behaviors are not necessarily malicious, but they still represent infringements, particularly when proprietary data, customer records, or sensitive infrastructure documentation is copied to personal devices or cloud accounts. Investigators should be attentive to the informal norms that often surround retirements, which may suppress scrutiny or allow boundary-stretching.

MT003.005Contract Expiry

The subject departs the organization due to the planned or unplanned end of a temporary engagement  (typically as a contractor, consultant, vendor, or contingent worker). These non-renewals may lack the emotional intensity of involuntary terminations but introduce distinct insider threat risks tied to access posture, entitlement hygiene, and perceived ownership of deliverables.

 

Unlike full-time employees, contract-based personnel are frequently managed outside standard HR and identity governance systems. As a result, they often fall outside formal offboarding processes - retaining access to internal systems, repositories, or communication channels due to limited integration with core IT asset and access management workflows.

 

Separation timelines are commonly informal, unstructured, or delayed - particularly when procurement, business units, and security functions operate in silos. If the subject disagrees with the decision not to renew, or views their contributions as personally owned, data loss or intellectual property exfiltration may occur as a form of leverage or to support future portfolio use.

 

Investigators should recognize that contract-based relationships introduce a structurally distinct insider risk profile, particularly at time of exit. These subjects may exploit offboarding blind spots, reuse credentials, or transfer sensitive materials under the belief that they are exempt from internal policy enforcement. This hubris, combined with reduced visibility and limited organizational recourse, can enable undetected or unchallenged infringement.