Insider Abuse Detection Playbook
Introduction: The Need for Effective Insider Abuse Detection Capabilities
Table of Contents
1. Initial Detection of Insider Abuse
Query Option 1: Monitor Unusual File Access
Query Option 2: Detect Suspicious Privileged Account Activity
Query Option 3: Identify Abnormal Login Patterns
2. Sensitive Data Access and Exfiltration
Query Option 1: Detect Large File Transfers
Query Option 2: Monitor Cloud Storage Uploads
Query Option 3: Identify Potential Data Exfiltration via Email
3. Privilege Escalation Indicators
Query Option 1: Track Unusual Process Execution
Query Option 2: Detect Privilege Escalation Attempts
Query Option 3: Identify Abnormal Use of Admin Tools
4. Persistent Abuse Indicators
Query Option 1: Monitor for Unauthorized Access Persistence
Query Option 2: Detect Persistent Privileged User Accounts
Query Option 3: Advanced Credential Abuse Analysis
5. Incident Response and Containment
Query Option 1: Isolate Malicious Insider Activity
Query Option 2: Correlate Indicators of Compromise (IoCs)
Query Option 3: Timeline Reconstruction
6. Conclusion
Last updated