search menu icon-carat-right cmu-wordmark

Pattern-Based Design of Insider Threat Programs

Technical Note
In this report, the authors describe a pattern-based approach to designing insider threat programs that could provide a better defense against insider threats.
Publisher

Software Engineering Institute

CMU/SEI Report Number
CMU/SEI-2014-TN-024
DOI (Digital Object Identifier)
10.1184/R1/6576086.v1

Abstract

Despite the high impact of insider attacks, organizations struggle to implement effective insider threat programs. In addition to the mandate for all Department of Defense (DOD) and U.S. Government agencies to build such programs, approval of updates to the National Industrial Security Program Operating Manual regarding insider threat defense require thousands of contractors to have insider threat programs as part of their security defense. Unfortunately, according to the Insider Threat Task Force of the Intelligence and National Security Alliance (INSA) Cyber Council, many such organizations have no insider threat program in place, and most of the organizations that do have serious deficiencies. This report describes a pattern-based approach to designing insider threat programs that could, if further developed, provide a more systematic, targeted way of improving insider threat defense. 

Cite This Technical Note

Moore, A., Collins, M., Mundie, D., Ruefle, R., & McIntire, D. (2014, December 9). Pattern-Based Design of Insider Threat Programs. (Technical Note CMU/SEI-2014-TN-024). Retrieved April 26, 2024, from https://doi.org/10.1184/R1/6576086.v1.

@techreport{moore_2014,
author={Moore, Andrew and Collins, Matthew and Mundie, David and Ruefle, Robin and McIntire, David},
title={Pattern-Based Design of Insider Threat Programs},
month={Dec},
year={2014},
number={CMU/SEI-2014-TN-024},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://doi.org/10.1184/R1/6576086.v1},
note={Accessed: 2024-Apr-26}
}

Moore, Andrew, Matthew Collins, David Mundie, Robin Ruefle, and David McIntire. "Pattern-Based Design of Insider Threat Programs." (CMU/SEI-2014-TN-024). Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, December 9, 2014. https://doi.org/10.1184/R1/6576086.v1.

A. Moore, M. Collins, D. Mundie, R. Ruefle, and D. McIntire, "Pattern-Based Design of Insider Threat Programs," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Note CMU/SEI-2014-TN-024, 9-Dec-2014 [Online]. Available: https://doi.org/10.1184/R1/6576086.v1. [Accessed: 26-Apr-2024].

Moore, Andrew, Matthew Collins, David Mundie, Robin Ruefle, and David McIntire. "Pattern-Based Design of Insider Threat Programs." (Technical Note CMU/SEI-2014-TN-024). Carnegie Mellon University, Software Engineering Institute's Digital Library, Software Engineering Institute, 9 Dec. 2014. https://doi.org/10.1184/R1/6576086.v1. Accessed 26 Apr. 2024.

Moore, Andrew; Collins, Matthew; Mundie, David; Ruefle, Robin; & McIntire, David. Pattern-Based Design of Insider Threat Programs. CMU/SEI-2014-TN-024. Software Engineering Institute. 2014. https://doi.org/10.1184/R1/6576086.v1