Page 410 - ITGC_Audit Guides
P. 410

Appendix D. CERT Best Practices to Mitigate

                   Insider Threats


                   The  following  table  appears  in  the  “Common  Sense  Guide  to  Mitigating  Insider  Threats,  Fifth
                   Edition,” authored by the CERT® Insider Threat Center of Carnegie Mellon University’s Software
                   Engineering Institute. The 20 best practices are intended to be a reference for organizations that
                   need  to  create  or  update  an  insider  threat  program  and  should  be  customized  to  suit  the
                   organization’s needs, culture, and risk appetite. The order in which CERT has arranged the practices
                   is intended to make the process of implementing an insider threat program easier.

                   These 20 best practices are high-level statements or control objectives and each best practice is
                   broken down into more specific control activities in the guide.

                    Order    Best Practice

                       1     Know and protect your critical assets.
                       2     Develop a formalized insider threat program.
                       3     Clearly document and consistently enforce policies and controls.

                       4     Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior.
                       5     Anticipate and manage negative issues in the work environment.
                       6     Consider threats from insiders and business partners in enterprise-wide risk assessments.
                       7     Be especially vigilant regarding social media.

                       8     Structure management and tasks to minimize unintentional insider stress and mistakes.
                             Incorporate malicious and unintentional insider threat awareness into periodic security training
                       9
                             for all employees.
                      10     Implement strict password and account management policies and practices.
                      11     Institute stringent access controls and monitoring polices on privileged users.
                             Deploy solutions for monitoring employee actions and correlating information from multiple
                      12
                             data sources.
                      13     Monitor and control remote access from all end points, including mobile devices.
                      14     Establish a baseline of normal behavior for both networks and employees.
                      15     Enforce separation of duties and least privilege.
                             Define explicit security agreements for any cloud services, especially access restrictions and
                      16
                             monitoring capabilities.
                      17     Institutionalize system change controls.

                      18     Implement security backup and recovery processes.
                      19     Close the doors to unauthorized data exfiltration.
                      20     Develop a comprehensive employee termination procedure.

                   Source: CERT, “Common Sense Guide to Mitigating Insider Threats, Fifth Edition,” 2016, Table 1, pg. xii.



                         www.theiia.org                                      Auditing Insider Threat Programs   42
   405   406   407   408   409   410   411   412   413   414   415