Advanced Search

Content Type

Topics

Publication Date

International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany

Abstract

This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled "Best Practices Against Insider Threats in All Nations," applying the framework to specific countries for the first time. Using that framework, cybersecurity standards are considered with respect to analysis that takes into account a country's technologies, relevant laws, law enforcement, corruption, and prevalent culture and subcultures. This report provides a detailed profile for each of these factors for each country and considers five best practices for mitigating insider threats recommended in the Common Sense Guide to Mitigating Insider Threats.

This report is intended to help organizations implement cybersecurity best practices internationally. In part, this analysis is meant to help readers understand challenges in India and Germany, plus mitigations for the challenges that are particularly useful in those countries. These insights can be used by organizations that outsource to, offshore to, or have supply chains that include these countries. Furthermore, this report's findings may be helpful on a wide scale for implementing general cybersecurity best practices in countries that share similarities with India or Germany, with regard to the factors studied. Technical, physical, and administrative controls that are helpful for implementing best practices in India and Germany may be helpful for similar countries. Likewise, particular controls may be ineffective (and require substitution controls) in similar countries. This is an initial, exploratory effort that is not exhaustive.

Cite This Report

Show Citation Formats

SEI

Flynn, Lori; Huth, Carly; Buttles-Valdez, Palma; Theis, Michael; Silowash, George; Cassidy, Tracy; Wright, Travis; & Trzeciak, Randall. International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany (CMU/SEI-2014-TR-008). Software Engineering Institute, Carnegie Mellon University, 2014. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=88410

IEEE

Flynn. Lori, Huth. Carly, Buttles-Valdez. Palma, Theis. Michael, Silowash. George, Cassidy. Tracy, Wright. Travis, and Trzeciak. Randall, "International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Technical Report CMU/SEI-2014-TR-008, 2014. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=88410

APA

Flynn, Lori., Huth, Carly., Buttles-Valdez, Palma., Theis, Michael., Silowash, George., Cassidy, Tracy., Wright, Travis., & Trzeciak, Randall. (2014). International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany (CMU/SEI-2014-TR-008). Retrieved October 31, 2014, from the Software Engineering Institute, Carnegie Mellon University website: http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=88410

CHI

Lori Flynn, Carly Huth, Palma Buttles-Valdez, Michael Theis, George Silowash, Tracy Cassidy, Travis Wright, & Randall Trzeciak. International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany (CMU/SEI-2014-TR-008). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2014. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=88410

MLA

Flynn, Lori., Huth, Carly., Buttles-Valdez, Palma., Theis, Michael., Silowash, George., Cassidy, Tracy., Wright, Travis., & Trzeciak, Randall. 2014. International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany (Technical Report CMU/SEI-2014-TR-008). Pittsburgh: Software Engineering Institute, Carnegie Mellon University. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=88410