top of page
  • Phil Venables

Insider Threat Risk - Blast Radius Perspective

The management of insider threats is a complex and often under-thought process - people who work on it appreciate the subtlety and difficult trade-offs. Some who don’t think it is straightforward. Let’s unpack it.

First of all, this short post isn’t going to even come close to covering all aspects of well managed insider threat programs - instead there is excellent coverage by SIFMA and CERT.

Grossly simplifying, there are 3 types of threats : trusted insiders who go bad over time due to disgruntlement or other (Progressive Insider Risks), trusted insiders who go bad immediately from some cue like coercion from an external actor (Instantaneous Insider Risk), and there are infiltrators, i.e. external attackers who infiltrate the organization. Infiltrators can often look like Instantaneous Insider Risks, so we’ll just discuss the first 2 types.

Note: one of the benefits of effective insider threat risk management is you can protect from error/carelessness often with the same precautionary steps as you would to thwart malicious intent - this can often be worth doing even if you're not considered a significant target.

  1. Progressive Insider Risks. As the name implies, these people go bad over time before perpetrating usually small then progressively large malicious actions. They can get caught by detecting some “disturbance in the force” (h/t @taylopet) for this phrase in this context). Such detections can be from their activities (e.g. accessing more information, leaking data, small infractions, job performance issues, etc.) or changes in their behavior (e.g. change in work patterns, personal circumstances, revealed work stresses, etc.) There will often be signals given off "left of boom” before they commit a more significant event. These can be used to intervene with discipline, but sometimes more helpfully as a trigger for support/counseling to address the root of the disgruntlement / other issues. The usual array of preventative and detective controls in place to mitigate many other risks are critical here from background checks, identity/access management, data rights management, data leakage prevention and detection, logging and anomaly detection and so on.

  2. Instantaneous Insider Risks. As the name implies, these can happen without warning and without pre-signaling. As they say in the trade, “if you hear the boom they’ve already missed you.” Arguably, as organization’s digital defenses improve and limit the reach of attackers, we will see more of the tactics come back that pre-date digitization i.e. bribes, extortion, coercing an employee into doing something nefarious with no warning. The key here is to “reduce the blast radius” of potential events. Specifically, to enumerate job roles and determine, if the person in that position went bad instantaneously, how bad would it be. If the answer to that is beyond whatever your risk appetite is, then work needs to happen. This (*hard*) work includes designing interventions to adjust job roles to reduce blast radius, remembering this isn't just about theft or fraud, it could be destructive events. Interventions can include:

  • Reducing access to what is reasonable for the role

  • Further redesigning the role to need less privileges

  • Adding separation of duties or multi-party control

  • Adding circuit breakers to reduce scale of potential damage- creating means to fast undo actions

  • Adding temporal breakers to delay invocation of activities (time to reverse) or time between progressions of activities (time to intervene)

  • Prohibit direct change to environments and use policy control to mediate change

  • etc.

Bottom line: many insider threat programs are tuned to detect progressive risks. It is important to also deal with hazardous instantaneous risks by limiting the blast radius of potential events. This has the adjacent benefit of reducing error risk & increasing resilience.

293 views0 comments

Recent Posts

See All

Where the Wild Things Are: Second Order Risks of AI

Every major technological change is heralded with claims of significant, even apocalyptic, risks. These almost never turn out to be immediately correct. What often turns out to be riskier are the 2nd

Security and Ten Laws of Technology 

There are many well known, so called, laws of technology. Moore’s law being particularly emblematic. Let’s look at some of them and see what the security implications have been for each and what might


Os comentários foram desativados.
bottom of page