👤 Insider Threat

Malicious or negligent activity by an authorized user, employee, contractor, or business partner that compromises data or systems.

25 procedures8 lifecycle stages

Triage

(3 procedures)

Containment

(3 procedures)
Sponsored

Preservation

(4 procedures)

Collection

(5 procedures)

Analysis

(4 procedures)

Eradication

(2 procedures)

Recovery

(1 procedure)

Post-Incident Review

(3 procedures)