Mitigating Insider Data Theft Attacks in the Cloud

Written by Phil Robins, Encode UK Ltd

In our experience 80-90 % of all successful “external” cyber-attacks are initiated through people being tricked or spoofed into opening a company to the attacker. The internal threat is different mainly because external defences are irrelevant and an internal reconnaissance is not required…the insider knows where the Crown Jewels are!

Furthermore, in this new era of the “extended enterprise”, insiders have limitless possibilities of abuse, through the use of cloud services and applications, as well as mobility and remote access.

We need to consider the following:

Who are the Insiders?
They are not necessarily employees! Whoever they are likely to have privileged access to the organisation’s IT infrastructure.

Motivation
Why would anyone want to attack the organisation? The typical reasons are

  • Money or financial reward.. perhaps leaving the organisation to join a competitor
  • Compensated / covertly employed by a competitor
  • Malicious intent driven by some personal issue with the organisation
  • Malicious motivated by an ideological principal ie: environmental, humanitarian, political
  • Fear where perhaps a criminal or terrorist organisation is threatening them in some way

Prevention (…or “Raising the Bar”)
There is one common risk which is the Human factor, all of the suggestions require a discipline that ensures the required tasks take place and with the best will in the world when pressure is up routine tasks get left. (ISO27001/2 provides an excellent structure to address all aspects of security).

There are three clear areas to address:

  • Technology
    • Does the organisation have the appropriate software tools / sensors in place?
    • Are all systems configured and patched to the latest levels?
    • Are privileges regularly reviewed?
    • Does the organisation have the appropriate software security sensors?
    • Are all sensors monitored?
    • Does the IT team have specialist IT security skills?
    • Do you use an independent specialist to simulate internal and external attacks?
  • Procedural
    • Do you “vet” staff ahead of joining?
    • Is a culture of security awareness cultivated?
    • Do you run any activity reports on leavers?
    • Are people audited as part of regular activity?
  • Physical
    • Are critical areas physically protected?
    • Are there different levels of permissions for accessing these critical areas ie: R&D?

What is of importance is that all these controls will take into account the “extended enterprise”.

Detection (…and deterrence)
However, as we all know prevention eventually fails (and nowadays more often than not). This is where detection comes to play, which if implemented correctly can be of great help in deterring insider data theft. This is a blend of technology, physical environment and procedures. Detection shouldn’t be through chance but as much as possible routine. In the words of Liam Neeson ‘I will find you and I will kill you!’… people should have no doubt!

All IT should be monitored by experts (either in-house or outsourced) looking for correlating events that suggest an insider misuse, among other threats. However, as in the case of advanced cyber threats, when it comes to be able to detect a malicious “authorised” access from a benign one, you need a way to model normal activity at the individual user level and be able to detect deviations (aka Security Analytics)

Post Attack
When you have been attacked or think you may have been attacked digital forensics can help identify the method of attack and what was taken; having said that the attackers are becoming really sophisticated and “clean up” when they leave making detection virtually impossible. For this reason the IT environment must be “forensics/monitoring-ready” and incident response plans should be in place and well thought through.

Summary
In summary people are the weakest link for an attacker to exploit and conversely people need to be disciplined and relentless in both prevention and detection. However this relaxes over time so regular independent scrutiny should form part of the overall IT security strategy.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

IDIS

IDIS launches Edge AI Plus Camera Range

IDIS’s new Edge AI Plus Camera range gives users more flexible, affordable options to upgrade their video systems with advanced AI…
ASSA ABLOY Opening Solutions

Digitalising access and optimising workflows

Digitalization is high on the agenda, or well under-way, in all kinds of commercial environments. As part of this process…
Dallmeier

The new AI High Resolution Counting App from Dallmeier

The new Dallmeier AI High Resolution Counting App enables precise counting even with a large number of people and vehicles…
Environfence

Noise-reducing 12K Envirofence by Jacksons Fencing

Noise-reducing 12K Envirofence by Jacksons Fencing installed at Travis Perkins’ new Coventry depot – A case study
TDSi

TDSi Launches UK GARDiS Installer Training

Integrated Access Control and Security manufacturer TDSi announces that it is offering a free Training Kit to individuals taking part…
OneLink

Product Spotlight – Gallagher’s OneLink

Gallagher Security presents, OneLink – the product that is elevating remote security through the power of the cloud 
Pinaccle systems

Pinnacle Systems further supports Installers and System Integrators

Pinnacle Systems has launched the Pinnacle Partner Programme, a new initiative designed to provide enhanced support for installers…
Stephen Tickle

Comelit-PAC Appoints Stephen Tickle as Regional Sales Manager

Comelit-PAC has appointed Stephen Tickle as its new Regional Sales Manager.  Stephen will focus on supporting PAC’s access control…
Intersec Saudi

Intersec Saudi Arabia returns with record exhibition space

Intersec Saudi Arabia, the premier industry platform for security, safety and fire protection, will return to the Riyadh…
Abloy UK

Abloy Academy breaks attendance records

Abloy UK has achieved record breaking attendance at its Academy, with more professionals than ever attending its…
Scroll to Top