Insider Threat Indicators in User Activity Monitoring
Insider Threat Indicators in User Activity Monitoring
2023
INSIDER THREAT
INDICATORS IN
USER ACTIVITY
MONITORING
JOB AID
INTRODUCTION
Logging, monitoring, and auditing of information system activities can lead to early discovery and mitigation of
behavior indicative of insider threat. Insider Threat policies require User Activity Monitoring (UAM) on classified
networks in support of Insider Threat Programs for:
• DOD Components under DODD 5205.16
• Federal Agencies under E.O. 13587 and National Minimum Standards
• Cleared Industry under the 32 CFR Part 117 or NISPOM Rule
Implementation will be specific to your location, but all organizations must:
• Define what will be monitored
• Indicate how monitoring will be instituted
• Inform users of monitoring actions via banners
• Identify indicators that require review (e.g., trigger words, activities)
• Protect user activity monitoring methods and results
• Develop a process for verification and review of potential issues
• Establish referral and reporting procedures
UAM also plays a key role in insider threat programs. As such UAM development should include consideration of
potential acts of violence against organizational resources, including suicidal ideation.
Click on the links below for more information on developing your program.
UAM Policy and Defining Activity Key Word Indicators UAM Log Review Reporting and
Implementation Monitoring and Triggers Process Referral Procedures
Below are some of the areas to consider when you are developing UAM indicators and triggers for monitoring
and reporting. The illustrations below depict some of the potential risk indicators that may be detected by UAM.
cdse.edu/catalog/insider-threat.html
INSIDER THREAT INDICATORS IN USER ACTIVITY MONITORING JOB AID 2
cdse.edu/catalog/insider-threat.html
INSIDER THREAT INDICATORS IN USER ACTIVITY MONITORING JOB AID 3
of information systems on which the operational personnel security situations before they become
mission of the enterprise depends. larger problems, either by working with the cleared
Continuous Vetting (CV)- Continuous Vetting (CV) is individual to mitigate potential issues, or in some
a process that involves regularly reviewing a cleared cases suspending or revoking clearances.
individual’s background to ensure they continue to Trusted Workforce 2.0, the whole-of-government
meet security clearance requirements and should approach to reform the personnel security process
continue to hold positions of trust. and establish a single vetting system for the U.S.
CV works as automated record checks pull data Government, began implementation in 2018
from criminal, terrorism, and financial databases, following extensive planning and inter-agency
as well as public records, at any time during an coordination.
individual’s period of eligibility. When DCSA receives Relevant insider threat information partially realizes
an alert, it assesses whether the alert is valid and the agency specific information required for each
worthy of further investigation. DCSA investigators CV program. While complementary, insider threat
and adjudicators then gather facts and make programs operating with robust UAM are not a
clearance determinations. CV helps DCSA mitigate requirement.
cdse.edu/catalog/insider-threat.html
INSIDER THREAT INDICATORS IN USER ACTIVITY MONITORING JOB AID 4
cdse.edu/catalog/insider-threat.html
INSIDER THREAT INDICATORS IN USER ACTIVITY MONITORING JOB AID 5
DOD Components are also required to report the Program may be able to employ alternate
information that meets identified thresholds to the mitigation options concurrent with external actions.
Defense Insider Threat Management and Analysis Your Insider Threat Program must ensure that early
Center via the DITMAC System of Systems or DSOS. In actions taken in incident response do not interfere
addition, items meeting reporting with the ability of law enforcement
thresholds under the DODD 5240.06, or counterintelligence to conduct
Counterintelligence Awareness and investigations or operations, or inhibit
Reporting, must be reported to the future prosecution, in cases that
cognizant Counterintelligence Office. require reporting to external agencies.
Under 32 CFR Part 117.8 (b) or Work with your general counsel and
NISPOM Rule, industry must report the referral agency to ensure that any
certain events that may have an evidence associated with the incident
effect on the status of the entity’s or is handled properly and adheres to
an employee’s eligibility for access the proper chain of custody. See the
to classified information. These include events that CDSE eLearning courses Preserving Investigative and
indicate an insider threat to classified information or Operational Viability in Insider Threat and Insider
to employees with access to classified information, as Threat Mitigation Response for more information.
well as events that affect the proper safeguarding of
classified information or that classified information
has been, or suspected to be lost or compromised. Additional Resources:
Under certain circumstances, such as the opening of Insider Threat Toolkit: Reporting Tab
an investigation or inquiry, your Program may need
to cease activities upon referral. In other instances,
cdse.edu/catalog/insider-threat.html
INSIDER THREAT INDICATORS IN USER ACTIVITY MONITORING JOB AID 6
custodians, supervisors and non-management they meet all legal requirements and disclosures.
workers, security groups, etc.) may contribute their Moreover, organizations should evaluate their
threat detection data and ideas, only a small, core monitoring policies and practices, and take measures
insider threat team should receive and analyze that to ensure that these policies and practices do not
information. These inputs may be the result of a data interfere with lawfully disclosing questionable
call, or they may be a real-time, automated data feed. government activity.
Each stakeholder should have a trusted agent who
can provide data feeds or additional information. The
insider threat team should identify trusted agents
ahead of time, so they can be contacted immediately
when an incident occurs.
Organizations should consult legal counsel before
implementing any monitoring program to ensure
REFERENCES
INDUSTRY REFERENCES DOD Internal Information Collections,” December
• 32 CFR Part 117 (NISPOM Rule) 5, 2022
cdse.edu/catalog/insider-threat.html