11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

which <strong>SEI</strong> insider threat experts use to collect data that organizations can use as a benchmark. As<br />

a supplement to <strong>the</strong> face-to-face workshops already in place, insider threat experts developed exercises<br />

for STEPfwd, an <strong>SEI</strong> web-based platform that enables participants in multiple locations to<br />

work toge<strong>the</strong>r on simulations <strong>of</strong> <strong>the</strong> latest threats. Both government and private industry have<br />

taken advantage <strong>of</strong> <strong>the</strong> ITAs and <strong>the</strong> online exercises.<br />

In 2009, <strong>the</strong> <strong>SEI</strong> set up <strong>the</strong> CERT Insider Threat Lab, where its technologists could test existing<br />

technical solutions for <strong>the</strong> insider threat problem and identify new or refined solutions in gap areas.<br />

For example, research is underway on methods that help cloud service providers deal with insider<br />

threats [Porter 2013]. The lab is developing new technical controls for government and industry<br />

and making <strong>the</strong> controls available online. 44<br />

The Consequence: Improved Insider Threat Detection and Response<br />

Using <strong>SEI</strong> results, information assurance staff and counterintelligence analysts have implemented<br />

technical controls for catching insiders. The DoD and federal civilian agencies can now identify<br />

insider threat proactively using <strong>SEI</strong> techniques and tools instead turning to forensics after <strong>the</strong><br />

crime. In case <strong>of</strong> an attack, organizations are armed with policies, practices, and technical<br />

measures to help with recovering from <strong>the</strong> attack, identifying <strong>the</strong> perpetrator, and implementing<br />

new measures for improved incident management in <strong>the</strong> future.<br />

The <strong>SEI</strong> Contribution<br />

Law enforcement had long been pr<strong>of</strong>iling miscreants in general but did not focus on insider threat<br />

to computer systems and <strong>the</strong> information that resides on <strong>the</strong>m. Similarly, network security experts<br />

focused on protecting against <strong>the</strong> technical attacks from outside <strong>the</strong> perimeter ra<strong>the</strong>r than attacks<br />

from inside. The <strong>SEI</strong> contribution was to examine cyber attacks by insiders from both technical<br />

and behavioral perspectives and to use real-life cases in this research. The ultimate goal <strong>of</strong> <strong>SEI</strong> insider<br />

threat research is to help all organizations, including <strong>the</strong> DoD, federal agencies, and critical<br />

sector industries, prevent insider attacks and, if <strong>the</strong>re is such an attack, to provide <strong>the</strong>se organizations<br />

with <strong>the</strong> tools, techniques, and methods that enable <strong>the</strong>m to detect and respond to <strong>the</strong> illicit<br />

activity early, thus minimizing <strong>the</strong> impact to critical assets. This goal is well on its way to realization.<br />

References<br />

[Cappelli 2012] Cappelli, Dawn; Moore, Andrew P.; & Trzeciak, Randy. The CERT Guide to Insider<br />

Threat: How to Prevent, Detect, and Respond to Information Technology Crime. Addison<br />

Wesley Pr<strong>of</strong>essional, February 2012 (ISBN 0321812573).<br />

[CERT IT Team 2013] Unintentional Insider Threats: A Foundational Study (CMU/<strong>SEI</strong>-2013-<br />

TN-022). S<strong>of</strong>tware Engineering Institute, Carnegie Mellon University, 2013. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=58744<br />

[Chabrow 2011] Chabrow, Eric. “Obama Reiterates Cybersec as a Priority.” The Public Eye. December<br />

1, 2011. http://www.inforisktoday.com/blogs/public-eye-b-13/p-21<br />

44 See http://www.cert.org/insider-threat/research/controls-and-indicators.cfm<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 186<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!