Insider Attacks

Attacks as performed by adversaries within the organization’s perimeter, often who have elevated access and privileges to resources.

Affected entity: DFS Provider

Risk: Data exposure and modification

  • Vulnerability: Insufficient internal controls on critical operations (SD: access control)

Risk: Lack of validation of data inputs (SD: data integrity)

  • Control 7.2: DFS providers should ensure sufficient separation of duties for maker-approver; for example, an administrator may not have access rights to both create and activate a DFS account

  • Vulnerability: Inadequate privilege management & control (SD: access control)

Risk: Data inaccuracy and inconsistency

  • Vulnerability: Use of test data & configurations in a production environment (SD: data integrity)

  • Vulnerability: Insufficient logging, inability to protect logs from alteration. (SD: non-repudiation)

  • Vulnerability: Inaccurate and unsynchronised clocks (SD: data integrity)

Last updated