Skip to content

Playbook: Insider Threat

ID: PB-14 Severity: High/Critical | Category: Data Protection / HR MITRE ATT&CK: T1534 (Internal Spearphishing), T1567 (Exfiltration Over Web Service), T1052 (Exfiltration Over Physical Medium) Trigger: UEBA alert, DLP alert, HR referral, Whistleblower report, Manager report

Risk Assessment Flow

graph TD
    Indicator["🚨 Indicator"] --> Risk{"⚖️ Level?"}
    Risk -->|Low: off-hours access| Monitor["👁️ Monitor 30 days"]
    Risk -->|Medium: bulk download| CovertOps["🕵️ Covert Investigation"]
    Risk -->|High: exfil + resignation| Overt["🔴 Overt — Lock Account"]
    CovertOps --> Evidence{"📁 Evidence?"}
    Evidence -->|Yes| HR["👥 HR + Legal"]
    Evidence -->|No| Continue["🔄 Continue Monitoring"]

Coordination Flow

sequenceDiagram
    participant SOC
    participant HR
    participant Legal
    participant Manager
    participant IT
    SOC->>HR: Report insider threat indicators
    HR->>Legal: Consult legal requirements
    Legal-->>HR: Recommend approach
    HR->>Manager: Consult (overt cases)
    SOC->>IT: Increase DLP monitoring
    HR->>SOC: Approve overt action
    SOC->>IT: Lock account + preserve data

⚠️ IMPORTANT: Insider threat investigations are highly sensitive. Coordinate with HR and Legal BEFORE taking visible actions. Do NOT alert the subject prematurely.


Decision Flow

graph TD
    Alert["🚨 Insider Threat Indicator"] --> Type{"📋 Indicator Type?"}
    Type -->|UEBA / DLP Alert| Technical["🔍 Technical Investigation"]
    Type -->|HR Referral| HR["📞 HR Coordination First"]
    Type -->|Tip / Report| Context["🔍 Validate Report"]
    Technical --> Status{"👤 Employment Status?"}
    HR --> Status
    Context --> Status
    Status -->|Leaving / Notice Period| HighRisk["🔴 High Risk — Accelerate"]
    Status -->|Active Employee| Assess["⚠️ Assess Behavior"]
    Status -->|Already Departed| Urgent["🚨 Check What Was Taken"]
    HighRisk --> Scope["📊 Scope Assessment"]
    Assess --> Scope
    Urgent --> Scope
    Scope --> Action{"Confirmed Malicious?"}
    Action -->|Yes| Contain["🔒 Contain + Legal"]
    Action -->|Unclear| Monitor["👁️ Enhanced Monitoring"]

1. Analysis

1.1 Behavioral Indicators

Category Indicators Detection
Data hoarding Bulk file downloads, mass email forwards DLP, CASB
Unusual access Accessing files outside job scope UEBA, file audit
Off-hours activity Logins at 2 AM, weekends (unusual for role) SIEM, UEBA
USB usage Large USB transfers, new USB devices DLP, Endpoint
Cloud uploads Large uploads to personal cloud Proxy, CASB
Email to personal Forwarding work email to personal account Email DLP
Privilege abuse Accessing admin tools beyond role needs SIEM, PAM
Resignation context Recent resignation, PIP, conflict HR referral
Technical evasion Disabling monitoring tools, clearing logs EDR, SIEM

1.2 Employment Context

Check Action Source Done
Employment status Active / Notice / PIP / Terminated? HR
Recent performance issues Written warnings, conflicts? HR
Access level What systems/data can they access? IAM / CMDB
Departure date (if leaving) How much time remains? HR
Known grievances Labor disputes, denied promotion? HR (confidential)

1.3 Technical Scope Assessment

Check How Done
Files accessed in past 30 days DLP / File audit / Cloud audit
Email sent to external addresses Email gateway logs
USB device connections Endpoint agent / SIEM
Cloud uploads (personal services) Proxy / CASB
Print jobs (large or sensitive) Print server logs
Code repository activity Git/SVN audit (clones, downloads)
Screenshots / screen recording Endpoint monitoring

2. Containment

2.1 Covert Containment (Before Confrontation)

# Action Owner Done
1 Enable enhanced monitoring (DLP, UEBA, email) SOC
2 Restrict USB ports (silently via GPO) IT Ops
3 Block personal cloud service URLs Proxy
4 Capture forensic image of laptop (during maintenance window) Forensics
5 Place legal hold on email / cloud storage Legal + IT

2.2 Overt Containment (After Decision to Act)

# Action Owner Done
1 Disable all accounts immediately IT Security
2 Revoke VPN, remote access, badge access IT + Physical Security
3 Seize company devices (laptop, phone) HR + Physical Security
4 Escort from premises (if on-site) Physical Security + HR
5 Disable email / redirect to manager IT

3. Investigation (Forensic)

# Action Done
1 Create forensic image of all assigned devices
2 Analyze email for data sent to personal accounts
3 Review USB connection history (mounted devices, file copies)
4 Analyze browser history (personal cloud, file sharing)
5 Review print history for sensitive documents
6 Check code repository activity (bulk clone, branch downloads)
7 Analyze deleted files (recycle bin, $Recycle.Bin forensics)
8 Document timeline of all suspicious activities

4.1 Immediate

# Action Owner Done
1 Brief HR and Legal on findings SOC Lead
2 Determine employment action (termination, warning) HR + Legal
3 Assess data exposure — what was taken? SOC + Business unit
4 Notify affected parties if PII exposed Legal / DPO

4.2 Long-Term

# Action Done
1 Update DLP rules based on exfiltration method used
2 Review access controls for the role (over-provisioned?)
3 Implement/enhance UEBA baselining
4 Conduct security awareness on insider threat indicators

5. Escalation Criteria

Condition Escalate To
PII or customer data confirmed exfiltrated Legal + DPO (PDPA 72h)
Source code / trade secrets taken CISO + Legal + Executive
Evidence of sabotage (deleting data) CISO + Legal
Armed/threatening behavior Physical Security + Police
Collusion with external party CISO + Legal + Law enforcement

Insider Threat Indicators

graph TD
    UEBA["🔍 UEBA"] --> Behav{"🧠 Behavioral?"}
    UEBA --> Tech{"💻 Technical?"}
    Behav --> Resign["📝 Resignation/dissatisfaction"]
    Behav --> Hours["🕐 Behavioral changes"]
    Tech --> Volume["📊 Excessive downloads"]
    Tech --> Access["🔓 Unusual data access"]
    Tech --> USB["💾 USB/Cloud upload"]
    Volume --> Score["⚠️ Risk Score"]
    Access --> Score
    USB --> Score
    style Score fill:#e74c3c,color:#fff

Covert Investigation Process

sequenceDiagram
    participant HR
    participant Legal
    participant SOC
    participant Forensics
    HR->>Legal: Report abnormal behavior
    Legal->>SOC: ✅ Approve covert investigation
    SOC->>Forensics: Collect evidence (covert)
    Forensics->>SOC: 📋 Reports ready
    SOC->>Legal: Present evidence
    Legal->>HR: Take action
    Note over SOC: ⚠️ Do not alert suspect!

Detection Rules (Sigma)

Rule File
Bulk File Copy to USB file_bulk_usb_copy.yml
Large Upload to External IP net_large_upload.yml
Suspicious Inbox Rule Created cloud_email_inbox_rule.yml

References