👤

Insider Threat

Malicious or negligent activity by an authorized user, employee, contractor, or business partner that compromises data or systems.

25 runbook nodes8 lifecycle stages covered

Triage

(3 nodes)

Containment

(3 nodes)

Preservation

(4 nodes)

Collection

(5 nodes)

Analysis

(4 nodes)

Eradication

(2 nodes)

Recovery

(1 node)

Post-Incident Review

(3 nodes)