Accession Number : ADA609926


Title :   Insider Threat Security Reference Architecture


Descriptive Note : Final rept.


Corporate Author : CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST


Personal Author(s) : Montelibano, Joji ; Moore, Andrew


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/a609926.pdf


Report Date : Apr 2012


Pagination or Media Count : 29


Abstract : The Insider Threat Security Reference Architecture (ITSRA) provides an enterprise-wide solution to insider threat. The architecture consists of four security layers: Business, Information, Data, and Application. Organizations should deploy and enforce controls at each layer to address insider attacks. None of the layers function in isolation or independently of other layers. Rather, the correlation of indicators and application of controls across all four layers form the crux of this approach. Empirical data consisting of more than 700 cases of insider crimes show that insider attacks proved successful in inflicting damage when an organization failed to implement adequate controls in any of three security principles: authorized access, acceptable use, and continuous monitoring. The ITSRA draws from existing best practices and standards as well as from analysis of these cases to provide actionable guidance for organizations to improve their posture against the insider threat.


Descriptors :   *COMPUTER SECURITY , COMPUTER ARCHITECTURE , ESPIONAGE , THEFT , THREATS


Subject Categories : Computer Systems Management and Standards


Distribution Statement : APPROVED FOR PUBLIC RELEASE