Mitigating Insider Data Theft Attacks in the Cloud

Written by Phil Robins, Encode UK Ltd

In our experience 80-90 % of all successful “external” cyber-attacks are initiated through people being tricked or spoofed into opening a company to the attacker. The internal threat is different mainly because external defences are irrelevant and an internal reconnaissance is not required…the insider knows where the Crown Jewels are!

Furthermore, in this new era of the “extended enterprise”, insiders have limitless possibilities of abuse, through the use of cloud services and applications, as well as mobility and remote access.

We need to consider the following:

Who are the Insiders?
They are not necessarily employees! Whoever they are likely to have privileged access to the organisation’s IT infrastructure.

Motivation
Why would anyone want to attack the organisation? The typical reasons are

  • Money or financial reward.. perhaps leaving the organisation to join a competitor
  • Compensated / covertly employed by a competitor
  • Malicious intent driven by some personal issue with the organisation
  • Malicious motivated by an ideological principal ie: environmental, humanitarian, political
  • Fear where perhaps a criminal or terrorist organisation is threatening them in some way

Prevention (…or “Raising the Bar”)
There is one common risk which is the Human factor, all of the suggestions require a discipline that ensures the required tasks take place and with the best will in the world when pressure is up routine tasks get left. (ISO27001/2 provides an excellent structure to address all aspects of security).

There are three clear areas to address:

  • Technology
    • Does the organisation have the appropriate software tools / sensors in place?
    • Are all systems configured and patched to the latest levels?
    • Are privileges regularly reviewed?
    • Does the organisation have the appropriate software security sensors?
    • Are all sensors monitored?
    • Does the IT team have specialist IT security skills?
    • Do you use an independent specialist to simulate internal and external attacks?
  • Procedural
    • Do you “vet” staff ahead of joining?
    • Is a culture of security awareness cultivated?
    • Do you run any activity reports on leavers?
    • Are people audited as part of regular activity?
  • Physical
    • Are critical areas physically protected?
    • Are there different levels of permissions for accessing these critical areas ie: R&D?

What is of importance is that all these controls will take into account the “extended enterprise”.

Detection (…and deterrence)
However, as we all know prevention eventually fails (and nowadays more often than not). This is where detection comes to play, which if implemented correctly can be of great help in deterring insider data theft. This is a blend of technology, physical environment and procedures. Detection shouldn’t be through chance but as much as possible routine. In the words of Liam Neeson ‘I will find you and I will kill you!’… people should have no doubt!

All IT should be monitored by experts (either in-house or outsourced) looking for correlating events that suggest an insider misuse, among other threats. However, as in the case of advanced cyber threats, when it comes to be able to detect a malicious “authorised” access from a benign one, you need a way to model normal activity at the individual user level and be able to detect deviations (aka Security Analytics)

Post Attack
When you have been attacked or think you may have been attacked digital forensics can help identify the method of attack and what was taken; having said that the attackers are becoming really sophisticated and “clean up” when they leave making detection virtually impossible. For this reason the IT environment must be “forensics/monitoring-ready” and incident response plans should be in place and well thought through.

Summary
In summary people are the weakest link for an attacker to exploit and conversely people need to be disciplined and relentless in both prevention and detection. However this relaxes over time so regular independent scrutiny should form part of the overall IT security strategy.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Christina Alexander Judge - SecurityBuyer

Christina Alexander Announced as Security Buyer Awards Judge

Security Buyer is proud to announce Christina Alexander as the latest addition to the distinguished judging panel for the Security…
Milestone - SecurityBuyer

Milestone Systems updates across XProtect, BriefCam, Arcules

Milestone Systems today announced updates across its complete security technology portfolio with releases for XProtect
ASSA ABLOY SMARTair - Security Buyer

More flexible management of Gen-Z student accommodation

Almost everyone attending university for the first time is now a digital native. They expect the convenience…
ICT - securitybuyer

ICT announces Martin Vermaak as COO

Integrated Control Technology (ICT), a leading provider of intelligent access control, intrusion detection, building automation..
FLIR - security buyer

New FLIR camera for Perimeter Security

FLIR, a Teledyne Technologies company, today released its newest high-resolution visible/thermal security camera for commercial..
Contacta - Security Buyer

Contacta launches Level 8 ballistically-resistant window intercom

Assistive listening specialist, Contacta, has launched the world’s first window intercom system with a Level 8 UL752 approval.
Big Interview Abdullah Tanoli

Big Interview – Hero of Leicester Square

Rebecca Spayne of Security Buyer has the privilege of speaking with a real-life hero, Abdullah Tanoli, the hero of Leicester Square..
SentinelOne & AWS - Security Buyer

SentinelOne Teams with AWS to bring Cloud Security Protection

SentinelOne announced that it is a launch partner for the new AWS Security Hub. The new collaboration builds on a long standing..
Genetec - Security Buyer

Genetec and Hanwha Vision

The latest in our ongoing series introducing Hanwha Vision’s pioneering partners, leads us to Ben Durrant, Account Executive at Genetec Inc.
Altronix - SecurityBuyer

Altronix POE367 Delivers 277VAC Support

Altronix has expanded its power product line with the new POE367 power supply/charger designed specifically for 277VAC input environments.
Scroll to Top