CG
SkillsInvestigating Insider Threat Indicators
Start Free
Back to Skills Library
Security Operations๐ŸŸก Intermediate

Investigating Insider Threat Indicators

Investigates insider threat indicators including data exfiltration attempts, unauthorized access patterns, policy violations, and pre-departure behaviors using SIEM analytics, DLP alerts, and HR data correlation.

6 min read12 code examples

Prerequisites

  • Legal authorization and HR referral documenting investigation justification
  • SIEM with DLP, endpoint, email, proxy, and authentication log sources
  • Data Loss Prevention (DLP) system (Microsoft Purview, Symantec, Forcepoint) with policy alerts
  • Endpoint monitoring capability (EDR with USB/removable media logging)
  • HR data feed providing employment status, notice dates, and access entitlements
  • Chain of custody procedures for evidence preservation

Investigating Insider Threat Indicators

When to Use

Use this skill when:

  • HR refers a departing employee for monitoring during their notice period
  • DLP alerts indicate bulk data downloads or transfers to personal storage
  • UEBA detects anomalous access patterns deviating significantly from peer baselines
  • Management reports concerns about an employee accessing sensitive data outside their role

Do not use without proper legal authorization โ€” insider threat investigations must be coordinated with HR, Legal, and Privacy teams before monitoring begins.

Prerequisites

  • Legal authorization and HR referral documenting investigation justification
  • SIEM with DLP, endpoint, email, proxy, and authentication log sources
  • Data Loss Prevention (DLP) system (Microsoft Purview, Symantec, Forcepoint) with policy alerts
  • Endpoint monitoring capability (EDR with USB/removable media logging)
  • HR data feed providing employment status, notice dates, and access entitlements
  • Chain of custody procedures for evidence preservation

Workflow

Step 1: Establish Investigation Scope and Legal Authorization

Before any monitoring, ensure proper authorization:

INSIDER THREAT INVESTIGATION AUTHORIZATION
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Case ID:           IT-2024-0089
Subject:           [Employee Name] โ€” [Department]
Authorized By:     [CISO / General Counsel]
Referral Source:   HR โ€” Employee submitted resignation, 2-week notice
Justification:     Employee has access to trade secrets and customer PII
Scope:             Email, file access, USB, cloud storage, printing
Duration:          2024-03-15 to 2024-03-29 (notice period)
Privacy Review:    Completed โ€” compliant with acceptable use policy

Step 2: Build Activity Timeline from SIEM

Query comprehensive activity for the subject:

index=* (user="jsmith" OR src_user="jsmith" OR sender="jsmith@company.com"
         OR SubjectUserName="jsmith")
earliest="2024-03-01" latest=now
| eval event_category = case(
    sourcetype LIKE "%dlp%", "DLP",
    sourcetype LIKE "%proxy%", "Web Access",
    sourcetype LIKE "%email%", "Email",
    sourcetype LIKE "%WinEventLog%", "Endpoint",
    sourcetype LIKE "%o365%", "Cloud",
    sourcetype LIKE "%vpn%", "VPN",
    sourcetype LIKE "%badge%", "Physical Access",
    1=1, sourcetype
  )
| stats count by event_category, sourcetype, _time
| timechart span=1d count by event_category

Step 3: Detect Data Exfiltration Indicators

Bulk File Downloads (SharePoint/OneDrive):

index=o365 sourcetype="o365:management:activity" Operation IN ("FileDownloaded", "FileSynced")
UserId="jsmith@company.com" earliest=-30d
| stats count AS downloads, sum(eval(if(isnotnull(FileSize), FileSize, 0))) AS total_bytes,
        dc(SourceFileName) AS unique_files
  by UserId, SiteUrl, _time
| bin _time span=1d
| eval total_gb = round(total_bytes / 1073741824, 2)
| where downloads > 50 OR total_gb > 1
| sort - total_gb

USB/Removable Media Usage:

index=sysmon EventCode=1 Computer="WORKSTATION-JSMITH"
(CommandLine="*removable*" OR CommandLine="*usb*"
 OR Image="*\\xcopy*" OR Image="*\\robocopy*")
| table _time, Computer, User, Image, CommandLine
| append [
    search index=endpoint sourcetype="endpoint:device_connect"
    user="jsmith" device_type="removable"
    | table _time, user, device_name, device_serial, action
  ]
| sort _time

Email-Based Exfiltration:

index=email sourcetype="o365:messageTrace"
SenderAddress="jsmith@company.com"
| eval is_external = if(match(RecipientAddress, "@company\.com$"), 0, 1)
| eval has_attachment = if(isnotnull(AttachmentName), 1, 0)
| stats count AS total_emails,
        sum(is_external) AS external_emails,
        sum(has_attachment) AS with_attachments,
        sum(eval(if(is_external=1 AND has_attachment=1, 1, 0))) AS external_with_attach,
        sum(Size) AS total_size_bytes
  by SenderAddress
| eval external_attach_pct = round(external_with_attach / total_emails * 100, 1)
| eval total_size_mb = round(total_size_bytes / 1048576, 1)

Cloud Storage Upload Detection:

index=proxy user="jsmith"
(dest IN ("*dropbox.com", "*drive.google.com", "*onedrive.live.com",
          "*box.com", "*wetransfer.com", "*mega.nz")
 OR category="cloud-storage")
http_method=POST
| stats count AS uploads, sum(bytes_out) AS total_uploaded
  by user, dest, category
| eval uploaded_mb = round(total_uploaded / 1048576, 1)
| sort - uploaded_mb

Step 4: Analyze Access Pattern Anomalies

Accessing Sensitive Systems Outside Normal Scope:

index=auth user="jsmith" action=success earliest=-30d
| stats dc(app) AS unique_apps, values(app) AS apps_accessed by user
| join user type=left [
    | inputlookup role_app_mapping.csv
    | search role="Financial Analyst"
    | stats values(authorized_app) AS authorized_apps by role
    | eval user="jsmith"
  ]
| eval unauthorized = mvfilter(NOT match(apps_accessed, mvjoin(authorized_apps, "|")))
| where isnotnull(unauthorized)
| table user, unauthorized, authorized_apps

After-Hours and Weekend Activity:

index=* user="jsmith" earliest=-30d
| eval hour = tonumber(strftime(_time, "%H"))
| eval is_offhours = if(hour < 7 OR hour > 19, 1, 0)
| eval day = strftime(_time, "%A")
| eval is_weekend = if(day IN ("Saturday", "Sunday"), 1, 0)
| stats count AS total, sum(is_offhours) AS offhours, sum(is_weekend) AS weekend by user
| eval offhours_pct = round(offhours / total * 100, 1)
| eval weekend_pct = round(weekend / total * 100, 1)

Step 5: Correlate with HR and Physical Security Data

Compare activity to resignation timeline:

| makeresults
| eval user="jsmith",
       resignation_date="2024-03-15",
       last_day="2024-03-29",
       access_revocation="2024-03-29 17:00"
| join user [
    search index=* user="jsmith" earliest=-90d
    | bin _time span=1d
    | stats count AS daily_events, dc(sourcetype) AS data_sources by user, _time
  ]
| eval phase = case(
    _time < relative_time(now(), "-30d"), "Normal (Pre-Resignation)",
    _time >= strptime(resignation_date, "%Y-%m-%d") AND _time <= strptime(last_day, "%Y-%m-%d"),
      "Notice Period",
    1=1, "Transition"
  )
| chart avg(daily_events) AS avg_events by phase

Badge/Physical Access Correlation:

index=badge_access employee_id="jsmith" earliest=-30d
| stats count AS badge_events, values(door_name) AS doors_accessed,
        earliest(_time) AS first_badge, latest(_time) AS last_badge by employee_id
| eval areas = mvcount(doors_accessed)

Step 6: Preserve Evidence and Document Findings

Maintain chain of custody for all collected evidence:

import hashlib
import json
from datetime import datetime

evidence_log = {
    "case_id": "IT-2024-0089",
    "investigator": "soc_analyst_tier2",
    "collection_time": datetime.utcnow().isoformat(),
    "items": [
        {
            "item_id": "EV-001",
            "description": "Splunk export โ€” all user activity 2024-03-01 to 2024-03-15",
            "file": "jsmith_activity_export.csv",
            "sha256": hashlib.sha256(open("jsmith_activity_export.csv", "rb").read()).hexdigest(),
            "collected_by": "analyst_doe",
            "collection_method": "Splunk search export"
        },
        {
            "item_id": "EV-002",
            "description": "DLP alert details โ€” 47 policy violations",
            "file": "dlp_alerts_jsmith.json",
            "sha256": hashlib.sha256(open("dlp_alerts_jsmith.json", "rb").read()).hexdigest(),
            "collected_by": "analyst_doe",
            "collection_method": "Microsoft Purview export"
        }
    ]
}

with open(f"evidence_log_{evidence_log['case_id']}.json", "w") as f:
    json.dump(evidence_log, f, indent=2)

Key Concepts

TermDefinition
Insider ThreatRisk posed by individuals with legitimate access who misuse it for unauthorized purposes
Data ExfiltrationUnauthorized transfer of data outside the organization via email, USB, cloud, or other channels
DLPData Loss Prevention โ€” technology monitoring and blocking unauthorized data transfers based on content policies
Notice Period MonitoringEnhanced surveillance of departing employees during their resignation-to-departure window
Chain of CustodyDocumented evidence handling procedures ensuring forensic integrity for potential legal proceedings
Need-to-Know ViolationAccessing information or systems beyond what is required for an employee's role or current tasks

Tools & Systems

  • Microsoft Purview (formerly DLP): Data classification and loss prevention platform monitoring endpoints, email, and cloud storage
  • Splunk UBA: User behavior analytics detecting insider threat patterns through ML-based anomaly detection
  • Forcepoint Insider Threat: Dedicated insider threat detection platform with behavioral indicators and risk scoring
  • DTEX InTERCEPT: Endpoint-based insider threat detection focusing on user activity metadata collection
  • Code42 Incydr: Data risk detection platform specializing in file exfiltration monitoring across endpoints and cloud

Common Scenarios

  • Departing Employee: Bulk download of customer lists and product roadmaps during two-week notice period
  • Disgruntled Employee: After negative performance review, employee accesses executive salary data outside their role
  • Contractor Overreach: External consultant accessing systems beyond contracted scope, downloading source code
  • Account Misuse: Employee sharing credentials with unauthorized third party for competitive intelligence
  • Sabotage Indicator: IT admin creating backdoor accounts and modifying system configurations before departure

Output Format

INSIDER THREAT INVESTIGATION REPORT โ€” IT-2024-0089
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Subject:      jsmith (Financial Analyst, Finance Dept)
Period:       2024-03-01 to 2024-03-15
Status:       Employee resigned 2024-03-15, last day 2024-03-29

Key Findings:
  [HIGH]  3,847 files downloaded from SharePoint (12.4 GB) โ€” 10x peer average
  [HIGH]  USB device connected 14 times during notice period (0 times prior month)
  [HIGH]  187 emails with attachments sent to personal Gmail
  [MEDIUM] After-hours activity increased 340% during notice period
  [MEDIUM] Accessed HR salary database 3 times (not authorized for role)

Timeline:
  Mar 01-14:  Normal activity baseline (avg 150 events/day)
  Mar 15:     Resignation submitted (activity spike to 890 events)
  Mar 16-17:  Weekend access โ€” 2,100 SharePoint downloads
  Mar 18:     USB device first connected, DLP alert triggered

Evidence Collected:   4 items (SHA-256 verified, chain of custody documented)
Recommendation:       Immediate access revocation recommended
                      Evidence package prepared for Legal review

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.1 (Monitoring), CC7.2 (Anomaly Detection), CC7.3 (Incident Identification)
  • ISO 27001: A.12.4 (Logging & Monitoring), A.16.1 (Security Incident Management)
  • NIST 800-53: AU-6 (Audit Review), SI-4 (System Monitoring), IR-5 (Incident Monitoring)
  • NIST CSF: DE.AE (Anomalies & Events), DE.CM (Continuous Monitoring)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add investigating-insider-threat-indicators

# Or load dynamically via MCP
grc.load_skill("investigating-insider-threat-indicators")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact โ€” successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add investigating-insider-threat-indicators
// Or via MCP
grc.load_skill("investigating-insider-threat-indicators")

Tags

socinsider-threatdata-exfiltrationdlpuebainvestigationhr-correlation

Related Skills

Security Operations

Performing User Behavior Analytics

5mยทintermediate
Security Operations

Analyzing DNS Logs for Exfiltration

6mยทintermediate
Security Operations

Analyzing Windows Event Logs in Splunk

5mยทintermediate
Security Operations

Building Automated Malware Submission Pipeline

7mยทintermediate
Security Operations

Building Detection Rule with Splunk Spl

5mยทintermediate
Security Operations

Building Detection Rules with Sigma

5mยทintermediate

Skill Details

Domain
Security Operations
Difficulty
intermediate
Read Time
6 min
Code Examples
12

On This Page

When to UsePrerequisitesWorkflowKey ConceptsTools & SystemsCommon ScenariosOutput FormatVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free โ†’