ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: PV028
  • Created: 22nd July 2024
  • Updated: 22nd July 2024
  • Contributor: The ITM Team

Corporate Card Spending Limits

Applying spending limits to corporate cards can control the amount of funds a subject could spend legitimately or illegitimately.

Sections

ID Name Description
IF016Misappropriation of Funds

A subject dishonestly makes false representations, fails to disclose information or abuses their access or position to make a financial gain and/or cause a loss to an organization. Methods to achieve this include unauthorized bank transfers, misuse of corporate cards, or creating fictitious invoices.

IF016.001Misuse of a Corporate Card

A subject may misuse a corporate credit for their own benefit by making purchases that are not aligned with the intended purpose of the card or by failing to follow the policies and procedures governing its use.

ME001.002Purchase and Use of Unmanaged Corporate Hardware

The subject purchases a laptop (or similar endpoint) using a corporate payment method but does so outside established procurement and provisioning processes. By bypassing IT and asset management workflows, the subject introduces a corporate-funded but unmanaged device into the environment.

 

Such devices often lack standard security controls—such as endpoint detection and response (EDR), encryption, configuration baselines, or patching—and may not be tracked in asset inventory systems. While the subject may rationalize the purchase as operationally necessary (e.g., urgency, convenience, or perceived lack of IT responsiveness), the result is a sanctioned but invisible device with the potential to bypass monitoring and governance controls.

 

This behavior undermines organizational asset control, complicates investigative attribution, and introduces unmanaged endpoints capable of accessing sensitive networks and data.