National Counterintelligence and Security Center

Features

National Counterintelligence and Security Center

NITTF Produced Guides & Templates

This section of the resource library provides guidance developed and produced by the NITTF, including the Any Given Day Video and the 2017 Insider Threat Guide. For additional information please contact This email address is being protected from spambots. You need JavaScript enabled to view it..

NITTF Guides and Multimedia:

2017 NITTF Insider Threat Guide Protect Your Organization Guide
2017 Insider Threat Guide NITTF Government Best Practice
2017 Insider Threat Guide: A Compendium of best practices to accompany the National Insider Threat Minimum Standards Errata
Protect Your Organization from the Inside Out: Government Best Practices (PDF)

 

Any Given Day Video
Any Given Day Video
Click the image to view the video

Any Given Day (VIDEO) is an 8-minute video that was produced to enhance insider threat education and awareness. It highlights the balance between collecting information and privacy concerns and presents a side of insider threat programs that is not often considered: protecting national security at the human level. Executive Order 13587 focuses on safeguarding classified networks and classified information, but it's not just about information; it's also about protecting people. NITTF encourages inclusion of this video in your existing training plan for your workforce.

 

NITTF Technical Bulletins

NITTF has developed Technical Bulletins that identify key technical issues in developing an Insider Threat program. Please click on the NITTF Technical page to review these bulletins.

Additional NITTF Guides and Templates

* This material is For Official Use Only and has not been approved for public release. Please contact the NITTF if you have an official need for this item.

For Additional guidance on Assessment Information please refer to the NITTF Assessment Page.

NITTF Technical

NITTFlogo

The NITTF Technical Team is a vital component of the NITTF through its infusion of specialized expertise into other NITTF teams/work-streams as well as its development of effective and cost-effective technical solutions for the insider threat community. The Technical Team provides tailored assistance to inside threat programs spanning the IC, DoD, and NT-50 Federal Partners focusing on User Activity Monitoring (UAM), insider threat data integration and analysis, automated case management, Enterprise Audit Management (EAM), and other technical capabilities. The Technical Team also brokers classified network provider/subscriber relationships across the USG, maintains awareness of the vendor marketplace to identify tools and best practices, provides input to national-level policy frameworks, and explores solutions for emerging technical trends and vulnerabilities.

The NITTF Technical Team developed technical bulletins to provide the insider threat community additional information on key technological issues departments and agencies face when implementing insider threat programs. Bulletins are arraigned by the date of bulletins with the most recent on top. As new bulletins become available, they will be identified as new and placed on the top of the list. Click on the title to view the technical bulletin. For additional information contact the NITTF Technical Team.

Title Date of Bulletin
How CNSSD 504 Defines UAM 5/27/2018

Abstract: This Tech Bulletin considers the definition of user activity monitoring (UAM) provided by CNSSD 504, and it notes the technical functionality that a UAM solution must have to meet the Directive’s requirements.

Title Date of Bulletin
How CNSSD 1015 Defines EAM 4/27/2018

Abstract: This Tech Bulletin considers the definition of enterprise audit management (EAM) provided by CNSSD 1015. According to CNSSD 1015, EAM is the "the identification, collection, correlation, analysis, storage, and reporting of audit information, and monitoring and maintenance of this capability."

TitleDate of Bulletin
Security Information and Event Management for Insider Threat Programs 3/22/2018

Abstract: Security information and event management (SIEM) refers to a cyber tool for the collection and analysis of security events and threat management.

Title Date of Bulletin
Data Quality for Insider Threat Programs 1/5/2018

Abstract: Executive branch departments and agencies should not overlook the importance of data quality to their insider threat programs. Inaccurate or ‘poor-quality’ data can hinder a program’s ability to identify theta behaviors and conduct an effective inquiry.

......................................................................................................

Provided below are additional technical bulletins that are not available for public release. Please contact NITTF if you have an official need for this item.

Title Date of Bulletin
Directive on Protecting National Security Systems from Insider Threat (CNSSD 504 w/ Annex C) 09/15/2016

Abstract: This is the latest version of CNSSD 504 which adds Annex C, Privileged User and Privileged Access Controls

Title Date of Bulletin
Continuous Monitoring and Continuous Evaluation and Their Value for insider Threat Programs 3/31/2018

Abstract: No abstract information available.

Title Date of Bulletin
Clarification of User Activity Monitoring (UAM) Requirements 2/25/2018

Abstract: No abstract information available.

Title Date of Bulletin
User (Entity) Behavior Analytics for insider Threat Programs 2/14/2018

Abstract: Executive branch departments and agencies may want to implement a UBA/UEBA tool to enhance their ability to find, track, and mitigate anomalous activity.

TitleDate of Bulletin
The Provider/Subscriber Relationship 2/10/2018

Abstract: No abstract information available.

Title Date of Bulletin
UAM Solutions for insider Threat Programs 2/10/2018

Abstract: No abstract information available.

Title Date of Bulletin
Commercial Data Aggregators for Insider Threat Programs 1/30/2018

Abstract: No abstract information available.

Title Date of Bulletin
Cross Domain Solutions for Insider Threat Programs 1/14/2018

Abstract: Executive branch departments and agencies that operate multiple classified networks may want to employ a Cross Domain Solution (CDS) with their UAM solution(s) to transfer information between two or more differing security domains.

Cyber Explore - Fundamentals of Cyber

This learning experience is designed for professionals new to the cyber realm. It introduces users to the computer's component layers and associated functions, virtualization concepts, and security methods.

Cyber Aware – Anatomy of a Hack

This learning experience is designed to increase awareness of the protocols that defend information systems and data. It demonstrates to users where network and system vulnerabilities may be while also helping them to understand common hacking methods.

Cyber Exploits – Understand the Threat

This learning experience is designed to increase understanding of the broader categories of cyber-attacks. It introduces specific terminology and real-world applications so users can recognize the threat when they see it.

Federal Partners Outreach

The following materials are provided to support Federal government department and agencies in countering foreign intelligence threats. All materials may be downloaded. For questions about the materials, please contact the Federal Partner Outreach Team via email This email address is being protected from spambots. You need JavaScript enabled to view it..

Federal Partner Newsletters

Resources

This briefing will enable CI and Security officials within USG departments and agencies to brief employees and contractors on foreign intelligence threats, potential vulnerabilities, and the steps that should be taken to safeguard classified and sensitive information. This instructor-led briefing, is designed to allow individual organizations to determine which modules are applicable to their workforce. So, for example, if an organization does not have any employees who travel abroad, that module can be removed from the briefing.

CFIT Workforce Awareness Briefing (108 MB PowerPoint File)

The following materials are provided to support Federal government department and agencies in countering foreign intelligence threats.  All materials may be downloaded.  For questions about the materials, please contact the Federal Partner Outreach Team via email This email address is being protected from spambots. You need JavaScript enabled to view it..

 

 

Resources

 

CFIT Workforce Awareness Briefing

National Counterintelligence and Security Center