Preventing Insider Threats: Avoiding the Nightmare Scenario of a Good Employee Gone Bad Dawn Cappelli October 31, 2008 © 2008 Carnegie Mellon University TRUE STORY: Personal information stolen for millions of customers of phone companies, credit card companies and banks … Companies contracted with a consumer data organization that hired a data mining organization whose system administrator stole the data 2 TRUE STORY: Emergency services are forced to rely on manual address lookups for 911 calls on Friday night …. Employee sabotages the system and steals all backup tapes 3 TRUE STORY: Financial institution discovers $691 million in losses ... Covered up for 5 years by trusted employee 4 Agenda Introduction How bad is the insider threat? Background on CERT’s insider threat research Brief overview of findings from our research Tools for preventing or detecting insider threats 5 What is CERT? Center of Internet security expertise Established in 1988 by the US Department of Defense on the heels of the Morris worm that created havoc on the ARPANET, the precursor to what is the Internet today Located in the Software Engineering Institute (SEI) • Federally Funded Research & Development Center (FFRDC) • Operated by Carnegie Mellon University (Pittsburgh, Pennsylvania) 6 CERT’s Definition of Malicious Insider Current or former employee, contractor, or business partner who o has or had authorized access to an organization’s network, system or data and o intentionally exceeded or misused that access in a manner that o negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems. Note: This presentation does not address national security espionage involving classified information. 7 2007 e-Crime Watch Survey CSO Magazine, USSS, Microsoft, & CERT Percentage of Participants Who Experienced an Insider Incident 671 respondents 100 80 60 55 40 41 39 2004 2005 49 20 0 2006 2007 8 CERT’s Insider Threat Research Insider Threat Cases Hundreds of cases have been analyzed • US cases from 1996 to 2007 in critical infrastructure sectors • US Secret Service • Carnegie Mellon CyLab • Department of Defense Database Data includes both technical & behavioral information 9 Breakdown of Insider Threat Cases in CERT Database 80 70 76 74 60 50 40 30 20 24 17 10 0 Theft or Modification for Financial Gain Theft for Business Advantage IT Sabotage Misc 10 [1 Comparison of Insider Crimes - 1 % of crimes in case database Current or former employee? Type of position Gender IT Sabotage Theft or Modification for Financial Gain Theft for Business Advantage 45% 44% 14% Former Current Current (95% resigned) Technical (e.g. sys admins or DBAs) Male Non-technical, lowlevel positions with access to confidential or sensitive information (e.g. data entry, customer service) Fairly equally split between male and female Technical (71%) scientists, programmers, engineers Sales (29%) Male 11 [1 Comparison of Insider Crimes - 2 IT Sabotage Target Access used When Where Network, systems, or data Unauthorized Outside normal working hours Remote access Recruited by outsiders None Collusion None Theft or Modification for Financial Gain PII or Customer Information Theft for Business Advantage IP (trade secrets) – 71% Customer Info – 33% Authorized During normal working hours At work Authorized During normal working hours At work ½ recruited for theft; less than 1/3 Less than 1/4 recruited for mod Mod: almost ½ Almost ½ colluded colluded with with at least one another insider insider; ½ acted Theft: 2/3 colluded alone; 25% stole for with outsiders foreign gov/org 12 What Can You Do? Review CERT’s Common Sense Guide to Prevention and Detection of Insider Threats http://www.cert.org/archive/pdf/CommonSenseInsider ThreatsV2.1-1-070118.pdf Version 3 to be published in January 2009 13 Tools for Preventing or Detecting Insider Threats 14 Change Control Help to prevent or detect • Planting or downloading of malicious code or unauthorized software • Unauthorized modification of critical files • Unauthorized changes to source code • Unauthorized installation of hardware devices 15 Data Leakage Tools Help to prevent or detect accidental or intentional leakage of confidential information • Emails • Documents • Printing, copying, or downloading • Removable media 16 Network/Employee Monitoring Tools Help to detect • Unauthorized access • Suspicious activity around resignation • Unauthorized escalation of privileges • Anomalous user activity 17 Identity Management Systems Help to • • • Prevent creation of or detect usage of backdoor accounts Implement and maintain access control Disable all access upon termination 18 Others Encryption Physical access control systems Automated data integrity checks Backup and recovery systems 19 Contact Information Insider Threat Team Lead: Dawn M. Cappelli Technical Manager, Threat and Incident Management CERT Program Software Engineering Institute Carnegie Mellon University 4500 Fifth Avenue Pittsburgh, PA 15213-3890 +1 412 268-9136 – Phone dmc@cert.org – Email http://www.cert.org/insider_threat/ 20