The hotshot developer your company just lost to a competitor could also be your biggest security risk from employee data theft. You shouldn't wait until he's left carrying a 1TB flash drive full of trade secrets to worry about what else may have just walked out the door.
But suppose you need to clean up a mess, or prevent one from occurring after somebody moves on. What steps can you take?
First, understand what you're stepping into. Employee exfiltration is an underreported problem in network defense. Whether because a former staffer has become disaffected, angry or simply accepting of a better offer elsewhere, there are many ways for a motivated knowledge worker to remove important data. And an IT pro is a special category of knowledge worker for whom data exfiltration is the greatest risk.
Back in 2010, as reported by Network World, DARPA asked researchers to study the ways they could improve detection and defense against network insiders. That program, Cyber Insider Threat (CINDER), attempted to address employee data theft — within military or government facilities. Those DARPA contracts were awarded because insider threats were generally neglected, due in part to a dominant perimeter threat mentality.
Research was well underway when in 2013 Edward Snowden demonstrated the full potential for data exfiltration to any remaining disbelievers.
The takeaway for every system administrator and CSO: If you're only focused on tweaking firewall settings, you may be at risk. Your company's lost data probably won't be published in The Guardian or the The New York Times, and you won't be grilled on "60 Minutes." But you'd be right to sweat it.
After a termination, there are many steps you could take. The proper course of action will depend upon the employee's access to data, organizational role and, generally, a mature risk assessment framework. Here are a few to point you in the right direction:
As with other sysadmin duties, you'll have to decide how much effort you should put into mitigating a potential data loss. Knowing which data has been lost and the potential business impact may be just as important as knowing which logs to examine. In the meantime, don't overwhelm yourself with false alarms, and don't underestimate your opponent. These steps can help you even after the employee has left. Best practices have it that you've done much more before the termination event.
You've probably ceded the first few moves to your opponent. A determined adversary's next moves might well include tripwires, sniffers and other mischief — at which point you're going to need even more tools to get things back to normal.
View all posts from Mark Underwood on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.
Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.
Learn MoreSubscribe to get all the news, info and tutorials you need to build better business apps and sites