DE.CM-03.280
Has your organization implemented behavior analytics software to detect anomalous user activity for insider threat detection?
Explanation
Behavior analytics tools establish baseline patterns of normal user activity and can identify deviations that may indicate insider threats such as unauthorized access, data exfiltration, or account compromise. These solutions analyze various data points including login times, access patterns, file operations, and network activities to flag suspicious behaviors that warrant investigation. Effective implementation requires proper configuration, continuous tuning, and integration with your security operations workflow. Evidence could include documentation of the deployed behavior analytics solution (such as UEBA tools), screenshots of the system dashboard showing active monitoring, sample alerts or reports generated by the system, and written procedures for responding to detected anomalies.
Implementation Example
Use behavior analytics software to detect anomalous user activity to mitigate insider threats
ID: DE.CM-03.280
Context
- Function
- DE: DETECT
- Category
- DE.CM: Continuous Monitoring
- Sub-Category
- Personnel activity and technology usage are monitored to find potentially adverse events

