ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: PV076
  • Created: 22nd October 2025
  • Updated: 22nd October 2025
  • Contributor: David Larsen

Account Inventory and Ownership Validation

Enforce a centralized, actively maintained inventory of all user, system, and service accounts. Each account must be uniquely attributed to a subject or defined function, with metadata sourced from authoritative identity and HR systems. Weak or incomplete attribution enables unmonitored access, account misuse, and persistence beyond employment. Without a reliable inventory, investigative attribution becomes unreliable, particularly when subjects operate across multiple domains or identities.

 

Accounts are not always inherently self-explanatory. Their investigative value is determined by how clearly they map to real individuals, roles, and system relationships.

Key Prevention Measures

  • Maintain a central identity directory using platforms such as Active Directory, Azure Active Directory, Okta, or equivalent enterprise identity provider.
  • Integrate identity directories with the organization's HR information system (HRIS) to import employment status, department, and manager hierarchy.
  • For every account, record the following fields: directory username, full legal name, email address, employee ID (if applicable), employment type (e.g., contractor, intern, vendor), business unit, and account purpose.
  • Tag account types explicitly as either user, administrative, service, shared, or application-integrated.
  • Require all account creation events to originate from a change-managed workflow in platforms like ServiceNow, Jira Service Management, or Access Request systems such as SailPoint or Saviynt.
  • Prohibit manual account creation on production systems without approved and logged justification.
  • Implement monthly account attestation campaigns requiring managers to confirm active accounts for all direct reports and escalate unverified entries.
  • Detect and disable orphaned accounts (no associated subject) and stale accounts (no login activity over defined threshold) through automated tooling.
  • Apply role-based access control to ensure each account has scope-limited privileges in accordance with documented duties.
  • Ensure terminated accounts are disabled immediately upon HR status change using automated identity lifecycle hooks.
  • Retain logs of account provisioning, modification, and deactivation actions in a tamper-evident system.

 

Investigator Considerations

  • During investigations, clear account attribution enables rapid correlation between login activity and subject behavior across systems.
  • Unattributed or misclassified accounts may be a sign of policy bypass, lateral movement, or deliberate obfuscation.
  • Reuse of service accounts for interactive logins can indicate misuse or circumvention of monitoring controls.
  • Accounts with no ownership in the inventory system should be considered high-priority investigative targets for manual review and historical correlation.

Sections

ID Name Description
AF024Account Misuse

The subject deliberately misuses account constructs to obscure identity, frustrate attribution, or undermine investigative visibility. This includes the use of shared, secondary, abandoned, or illicitly obtained accounts in ways that violate access integrity and complicate forensic analysis.

 

Unlike traditional infringement behaviors, account misuse in the anti-forensics context is not about the action itself—but about how identity is obfuscated or displaced to conceal that action. These behaviors sever the link between subject and activity, impeding both real-time detection and retrospective investigation.

 

  • Common anti-forensic account misuse techniques include:
  • Operating across multiple sanctioned accounts to fragment behavior trails.
  • Using shared service accounts to mask individual actions.
  • Re-activating or leveraging dormant credentials to perform access without attribution.
  • Exploiting misconfigured or ghost accounts left from previous users, contractors, or integrations.

 

Investigators encountering unexplainable log artifacts, attribution conflicts, or unexpected session collisions should assess whether account misuse is being used as a deliberate concealment tactic. Particular attention should be paid in environments lacking centralized identity governance or with known privilege sprawl.

 

Account misuse as an anti-forensics strategy often coexists with more overt infringements—enabling data exfiltration, sabotage, or policy evasion while preserving plausible deniability. As such, its detection is crucial to understanding subject intent, tracing activity with confidence, and restoring the chain of custody in incident response.

ME001.001Access to Asset Past Termination

The subject accesses a corporate hardware asset, most commonly a laptop or corporate mobile device, after their employment has formally ended. This typically occurs due to gaps in deprovisioning, delayed hardware recovery, or the subject physically retaining the device despite offboarding procedures. Post-termination access may be opportunistic or intentional, and may precede or coincide with data exfiltration, sabotage, or unauthorized continuation of internal access.

 

This sub-section is relevant in cases where the hardware asset is no longer linked to an active identity in HR systems but remains technically functional and capable of network, VPN, or service access. Such access undermines the assumption that termination alone revokes operational capability and may point to procedural drift in IT, HR, or facilities handover workflows.

ME024.006Access to Sensitive Organization Data

A subject with access to sensitive organizational data possesses the ability to view, retrieve, or manipulate information that is internally critical to the functioning, competitiveness, or integrity of the organization. This may include proprietary intellectual property, financial forecasts, internal audit reports, legal proceedings, incident investigation records, M&A materials, or internal threat detection logic. Access to such data is typically granted to personnel in roles including but not limited to finance, legal, security, compliance, research and development, or executive support functions.

 

While this data may not include customer information, its sensitivity is often equal or greater—particularly when tied to strategic decision-making, regulatory posture, or institutional trust. Misuse of access to sensitive organizational data can result in reputational harm, regulatory breach, loss of competitive advantage, or compromise of security functions. Because this access is frequently held by high-trust individuals or senior personnel, abuses may be harder to detect and more consequential in impact.

 

Unmonitored access to such data—particularly when permissions are inherited, overly broad, or poorly reviewed—can significantly elevate a subject's risk profile. This access may also attract external interest, such as social engineering attempts or recruitment by adversarial entities, making the subject a potential vector for external compromise.

ME024.003Access to Critical Environments (Production and Pre-Production)

Subjects with access to production and pre-production environments—whether as users, developers, or administrators—hold the potential to exploit or compromise highly sensitive organizational assets. Production environments, which host live applications and databases, are critical to business operations and often contain real-time data, including proprietary business information and personally identifiable information (PII). A subject with access to these systems can manipulate operational processes, exfiltrate sensitive data, introduce malicious code, or degrade system performance.

 

Pre-production environments, used for testing, staging, and development, often replicate production systems, though they may contain anonymized or less protected data. Despite this, pre-production environments can still house sensitive configurations, APIs, and testing data that can be exploited. A subject with access to these environments may uncover system vulnerabilities, access sensitive credentials, or introduce code that could be escalated into the production environment.

 

In both environments, privileged access provides a direct pathway to the underlying infrastructure, system configurations, logs, and application code. For example, administrative access allows manipulation of security policies, user permissions, and system-level access controls. Similarly, access to development environments can provide insights into source code, configuration management, and test data—all of which could be leveraged to further insider activity.

 

Subjects with privileged access to critical environments are positioned not only to exploit system vulnerabilities or bypass security controls but also to become targets for recruitment by external actors seeking unauthorized access to sensitive information. These individuals may be approached or coerced to intentionally compromise the environment, escalate privileges, or exfiltrate data on behalf of malicious third parties.

 

Given the sensitivity of these environments, subjects with privileged access represent a significant insider threat to the integrity of the organization's systems and data. Their position allows them to manipulate or exfiltrate sensitive information, either independently or in collaboration with external actors. The risk is further amplified as these individuals may be vulnerable to recruitment or coercion, making them potential participants in malicious activities that compromise organizational security. As insiders, their knowledge and access make them a critical point of concern for both data protection and operational security.

ME024.001Access to Customer Data

A subject with access to customer data holds the ability to view, retrieve, or manipulate personally identifiable information (PII), account details, transactional records, or support communications. This level of access is common in roles such as customer service, technical support, sales, marketing, and IT administration.

Access to customer data can become a means of insider activity when misused for purposes such as identity theft, fraud, data exfiltration, competitive intelligence, or unauthorized profiling. The sensitivity and volume of customer information available may significantly elevate the risk profile of the subject, especially when this access is unmonitored, overly broad, or lacks audit controls.

 

In some cases, subjects with customer data access may also be targeted by external threat actors for coercion or recruitment, given their ability to obtain regulated or high-value personal information. Organizations must consider how customer data is segmented, logged, and monitored to reduce exposure and detect misuse.

AF024.002Unauthorized Credential Use

The subject employs valid credentials that were obtained outside of sanctioned provisioning channels to conceal their identity or perform actions under a false or misleading identity. This behavior, categorized as unauthorized credential use, is distinct from traditional account compromise—it reflects insider-enabled misuse, not external intrusion.

 

Credentials may be acquired through casual observation (e.g., shoulder surfing or unlocked workstations), social engineering, prior access (e.g., retained credentials from a former role), or covert means such as password capture tools. In some cases, credentials may be voluntarily shared by a collaborator or acquired opportunistically from unmonitored or abandoned accounts.

 

This tactic allows the subject to dissociate their actions from their known identity, delay detection, and in some cases, redirect suspicion to another individual. When used within privileged or high-sensitivity environments, unauthorized credential use can enable significant harm while bypassing conventional identity-based controls and alerting mechanisms.

 

Unlike service account sharing or account obfuscation (which involve legitimate, active credentials assigned to the subject), this behavior revolves around unauthorized access to credentials not formally linked to the subject. Investigators should prioritize this sub-section when audit trails show activity under an identity that does not correspond to role expectations, known behavioral patterns, or device history.

 

Key forensic indicators include:

  • Activity under stale or supposedly deactivated credentials.
  • Access from unfamiliar endpoints using accounts with known role assignments.
  • Unusual timing or geographic patterns inconsistent with the account’s assigned user.
  • Discrepancies between identity artifacts (e.g., login metadata) and session content (e.g., typing cadence, application use).

 

Unauthorized credential use is a high-risk concealment technique and often coincides with malicious or high-impact infringements.

AF024.001Account Obfuscation

The subject leverages multiple accounts under their control—each legitimate on its own—to distribute, disguise, or segment activity in a manner that defeats identity-based attribution. This technique, referred to as account obfuscation, is designed to frustrate forensic correlation between subject behavior and account usage.

 

Unlike role-sanctioned multi-account use (e.g., one account for user access, another for administrative tasks), account obfuscation involves the deliberate operational separation of actions across identities to conceal intent, evade controls, or introduce ambiguity. This may involve:

 

  • Using a privileged account to perform high-risk or policy-violating actions while maintaining a clean audit trail on the primary user account.
  • Staging data using an internal identity and exfiltrating it using an external or contractor credential.
  • Alternating between corporate and guest accounts to avoid continuous session logging or alerting thresholds.

 

This behavior is often facilitated by weak identity governance, fragmented access models, or unmanaged role transitions. It is especially difficult to detect in environments where access provisioning is ad hoc, audit scopes are limited, or account correlation is not enforced at the SIEM or UAM level.

 

From an investigative standpoint, account obfuscation serves as a deliberate anti-forensics tactic—enabling subjects to operate with plausible deniability and complicating timeline reconstruction. Investigators should review cross-account behavior patterns, concurrent session overlaps, and role-permission inconsistencies when this technique is suspected.

ME021.001User Account Credentials

User credentials that were available to the subject during employment are not revoked and can still be used.

AF013.002Delete Windows Active Directory User

A subject may delete user accounts to obscure their activities and delete files and information associated with that user.

ME021.002Web Service Credentials

Web credentials that were available to the subject during employment are not revoked and can still be used.