icon-carat-right menu search cmu-wordmark

International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany

Technical Report
This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”
Publisher

Software Engineering Institute

CMU/SEI Report Number
CMU/SEI-2014-TR-008
DOI (Digital Object Identifier)
10.1184/R1/6574682.v1
Topic or Tag

Abstract

This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled "Best Practices Against Insider Threats in All Nations," applying the framework to specific countries for the first time. Using that framework, cybersecurity standards are considered with respect to analysis that takes into account a country's technologies, relevant laws, law enforcement, corruption, and prevalent culture and subcultures. This report provides a detailed profile for each of these factors for each country and considers five best practices for mitigating insider threats recommended in the Common Sense Guide to Mitigating Insider Threats.

This report is intended to help organizations implement cybersecurity best practices internationally. In part, this analysis is meant to help readers understand challenges in India and Germany, plus mitigations for the challenges that are particularly useful in those countries. These insights can be used by organizations that outsource to, offshore to, or have supply chains that include these countries. Furthermore, this report's findings may be helpful on a wide scale for implementing general cybersecurity best practices in countries that share similarities with India or Germany, with regard to the factors studied. Technical, physical, and administrative controls that are helpful for implementing best practices in India and Germany may be helpful for similar countries. Likewise, particular controls may be ineffective (and require substitution controls) in similar countries. This is an initial, exploratory effort that is not exhaustive.

Cite This Technical Report

Flynn, L., Huth, C., Buttles-Valdez, P., Theis, M., Silowash, G., Cassidy, T., Wright, T., & Trzeciak, R. (2014, April 16). International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany. (Technical Report CMU/SEI-2014-TR-008). Retrieved December 22, 2024, from https://doi.org/10.1184/R1/6574682.v1.

@techreport{flynn_2014,
author={Flynn, Lori and Huth, Carly and Buttles-Valdez, Palma and Theis, Michael and Silowash, George and Cassidy, Tracy and Wright, Travis and Trzeciak, Randall},
title={International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany},
month={{Apr},
year={{2014},
number={{CMU/SEI-2014-TR-008},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://doi.org/10.1184/R1/6574682.v1},
note={Accessed: 2024-Dec-22}
}

Flynn, Lori, Carly Huth, Palma Buttles-Valdez, Michael Theis, George Silowash, Tracy Cassidy, Travis Wright, and Randall Trzeciak. "International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany." (CMU/SEI-2014-TR-008). Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, April 16, 2014. https://doi.org/10.1184/R1/6574682.v1.

L. Flynn, C. Huth, P. Buttles-Valdez, M. Theis, G. Silowash, T. Cassidy, T. Wright, and R. Trzeciak, "International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Report CMU/SEI-2014-TR-008, 16-Apr-2014 [Online]. Available: https://doi.org/10.1184/R1/6574682.v1. [Accessed: 22-Dec-2024].

Flynn, Lori, Carly Huth, Palma Buttles-Valdez, Michael Theis, George Silowash, Tracy Cassidy, Travis Wright, and Randall Trzeciak. "International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany." (Technical Report CMU/SEI-2014-TR-008). Carnegie Mellon University, Software Engineering Institute's Digital Library, Software Engineering Institute, 16 Apr. 2014. https://doi.org/10.1184/R1/6574682.v1. Accessed 22 Dec. 2024.

Flynn, Lori; Huth, Carly; Buttles-Valdez, Palma; Theis, Michael; Silowash, George; Cassidy, Tracy; Wright, Travis; & Trzeciak, Randall. International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany. CMU/SEI-2014-TR-008. Software Engineering Institute. 2014. https://doi.org/10.1184/R1/6574682.v1