ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: PR010
  • Created: 25th May 2024
  • Updated: 23rd April 2025
  • Contributor: The ITM Team

Software or Access Request

A subject may make a request for software (such as an RDP, SSH or FTP client) or access (such as USB mass storage device access) to be installed or enabled on a target system, to facilitate the infringement.

Prevention

ID Name Description
PV049Managerial Approval

The process for having software installed on a corporate endpoint by IT should require approval from the employee's line manager to ensure the request is legitimate and appropriate.