The management of insider threats is a complex and often under-thought process - people who work on it appreciate the subtlety and difficult trade-offs. Some who don’t think it is straightforward. Let’s unpack it.
1/16
2/16
3/16
4/16
5/16
As the name implies, these people go bad over time before perpetrating usually small then progressively large malicious actions. They can get caught by detecting some “disturbance in the force” (h/t @taylopet for this phrase in this context).
6/16
7/16
8/16
9/16
As the name implies, these can happen without warning and without pre-signaling. As they say in the trade, “if you hear the boom they’ve already missed you.”
10/16
11/16
12/16
13/16
- reducing access to what is reasonable for the role
- further redesigning the role to need less privileges
- adding separation of duties or multi-party control
- adding circuit breakers to reduce scale of potential damage
14/16
- adding temporal breakers to delay invocation of activities (time to reverse) or time between progressions of activities (time to intervene)
- prohibit direct change to environments and use policy control to mediate change
- etc.
15/16
16/16