The CERT® Guide to Insider Threats How to Prevent, Detect, and Respond to Information Technology Crimes
Total Page:16
File Type:pdf, Size:1020Kb
The CERT® Guide to Insider Threats The CERT® Guide to Insider Threats How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) Dawn Cappelli Andrew Moore Randall Trzeciak Upper Saddle River, NJ • Boston• Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City The SEI Series in Software Engineering Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. CMM, CMMI, Capability Maturity Model, Capability Maturity Modeling, Carnegie Mellon, CERT, and CERT Coordination Center are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. ATAM; Architecture Tradeoff Analysis Method; CMM Integration; COTS Usage-Risk Evaluation; CURE; EPIC; Evolutionary Process for Integrating COTS Based Systems; Framework for Software Product Line Practice; IDEAL; Interim Profile; OAR; OCTAVE; Operationally Critical Threat, Asset, and Vulnerability Evaluation; Options Analysis for Reengineering; Personal Software Process; PLTP; Product Line Technical Probe; PSP; SCAMPI; SCAMPI Lead Appraiser; SCAMPI Lead Assessor; SCE; SEI; SEPG; Team Software Process; and TSP are service marks of Carnegie Mellon University. Special permission to reproduce portions of Carnegie Mellon University copyrighted materials has been granted by the Software Engineering Institute. (See page 388 for details.) Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales, (800) 382-3419, [email protected]. For sales outside the United States, please contact: International Sales, [email protected]. Visit us on the Web: informit.com/aw Cataloging-in-Publication Data is on file with the Library of Congress. Copyright © 2012 Pearson Education, Inc. All rights reserved. Printed in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to (201) 236-3290. ISBN-13: 978-0-321-81257-5 ISBN-10: 0-321-81257-3 Text printed in the United States on recycled paper at Courier in Westford, Massachusetts. First printing, January 2012 For Fred, Anthony, and Alyssa. You are my life—I love you! —Dawn For those who make my life oh so sweet: Susan, Eric, Susan’s amazing family, and my own Mom, Dad, Roger, and Lisa. —Andy For Marianne, Abbie, Nate, and Luke. I am the luckiest person in the world to have such a wonderful family. —Randy This page intentionally left blank Contents Preface ........................................................................................................... xvii Acknowledgments ..................................................................................... xxxi Chapter 1. Overview..........................................................................................1 True Stories of Insider Attacks.......................................................3 Insider IT Sabotage........................................................................3 Insider Fraud.................................................................................4 Insider Theft of Intellectual Property.............................................5 The Expanding Complexity of Insider Threats...........................6 Breakdown of Cases in the Insider Threat Database..................7 CERT’s MERIT Models of Insider Threats...................................9 Why Our Profiles Are Useful.......................................................10 Why Not Just One Profile?..........................................................11 Why Didn’t We Create a Single Insider Theft Model?................12 Overview of the CERT Insider Threat Center............................13 Timeline of the CERT Program’s Insider Threat Work.............16 2000 Initial Research...................................................................16 2001 Insider Threat Study...........................................................16 2001 Insider Threat Database......................................................17 2005 Best Practices......................................................................17 2005 System Dynamics Models...................................................17 2006 Workshops...........................................................................17 vii viii Contents 2006 Interactive Virtual Simulation Tool....................................18 2007 Insider Threat Assessment..................................................18 2009 Insider Threat Lab...............................................................18 2010 Insider Threat Exercises......................................................18 2010 Insider Threat Study—Banking and Finance Sector..........19 Caveats about Our Work..............................................................20 Summary........................................................................................20 Chapter 2. Insider IT Sabotage......................................................................23 General Patterns in Insider IT Sabotage Crimes.......................28 Personal Predispositions..............................................................28 Disgruntlement and Unmet Expectations...................................31 Behavioral Precursors..................................................................35 Stressful Events...........................................................................37 Technical Precursors and Access Paths........................................40 The Trust Trap..............................................................................45 Mitigation Strategies.....................................................................46 Early Mitigation through Setting of Expectations......................47 Handling Disgruntlement through Positive Intervention..........49 Eliminating Unknown Access Paths...........................................50 More Complex Monitoring Strategies.........................................52 A Risk-Based Approach to Prioritizing Alerts.............................53 Targeted Monitoring....................................................................55 Measures upon Demotion or Termination...................................56 Secure the Logs.............................................................................56 Test Backup and Recovery Process...............................................57 One Final Note of Caution...........................................................59 Summary........................................................................................59 Chapter 3. Insider Theft of Intellectual Property.......................................61 Impacts............................................................................................66 General Patterns in Insider Theft of Intellectual Property Crimes.............................................................................68 Contents ix The Entitled Independent.............................................................69 Insider Contribution and Entitlement.........................................70 Insider Dissatisfaction.................................................................72 Insider Theft and Deception.........................................................74 The Ambitious Leader..................................................................78 Insider Planning of Theft.............................................................79 Increasing Access.........................................................................80 Organization’s Discovery of Theft...............................................80 Theft of IP inside the United States Involving Foreign Governments or Organizations...................................................83 Who They Are..............................................................................85 What They Stole...........................................................................86 Why They Stole............................................................................88