National Insider Threat Program Foundational Documents - Vocabulary Flashcards
National Insider Threat Program Foundational Documents
- Overview
- Documents establish the Nation’s approach to insider threat programs across the Executive Branch
- Key components: Executive Order 13587 (Structural Reforms), Presidential Memorandum (National Insider Threat Policy and Minimum Standards), National Insider Threat Task Force (NITTF) Maturity Framework, and related FAQs
- Purpose: deter, detect, and mitigate insider threats while safeguarding classified information and protecting privacy and civil liberties
Executive Order 13587 of October 7, 2011
Policy (Sec. 1)
- National security requires rapid sharing of classified information with authorized users globally, paired with sophisticated risk-based safeguards
- Computer networks have vulnerabilities requiring coordinated risk management decisions
- Structural reforms to ensure responsible sharing and safeguarding of classified information on computer networks, with appropriate privacy and civil liberties protections
- Agencies bear primary responsibility for meeting twin goals; reforms enable interagency development and implementation of policies and minimum standards across information security, personnel security, and systems security
- Policies and standards cover all agencies operating or accessing classified networks, all users (including contractors), and all classified information on those networks
General Responsibilities of Agencies (Sec. 2)
- Heads of agencies operating or accessing classified networks must:
- (a) designate a senior official to oversee classified information sharing and safeguarding
- (b) implement an insider threat detection and prevention program in line with guidance by the Insider Threat Task Force (ITTF)
- (c) perform self-assessments of compliance with policies and standards (sections 3.3, 5.2, 6.3) and report results annually to the Senior Information Sharing and Safeguarding Steering Committee (Sec. 3)
- (d) provide information/access to enable independent assessments by the Executive Agent for Safeguarding Classified Information on Computer Networks and the ITTF
- (e) staff appropriately to the Classified Information Sharing and Safeguarding Office and the Insider Threat Task Force on an ongoing basis
- These provisions emphasize risk-based, privacy-preserving, interagency oversight of insider threat programs
Senior Information Sharing and Safeguarding Steering Committee (Sec. 3)
- Sec. 3.1: Establishes the Steering Committee to oversee interagency development and implementation of sharing and safeguarding policies
- Sec. 3.2: Co-chaired by the Office of Management and Budget (OMB) and National Security Staff (NSS); membership includes senior officers from State, Defense, Justice, Energy, Homeland Security, ODNI, CIA, ISOO, and other designated agencies
- Sec. 3.3: Steering Committee responsibilities include:
- (a) setting government-wide goals and reviewing successes/failures annually
- (b) preparing a President-directed report within 90 days of the order and annually thereafter
- (c) developing program and budget recommendations for government-wide goals
- (d) coordinating interagency development and implementation of priorities, policies, and standards
- (e) recommending overarching policies for promulgation by OMB or ISOO
- (f) coordinating compliance assessments and recommending corrective actions
- (g) providing mission guidance for the PM-ISE regarding the Classified Information Sharing and Safeguarding Office
- (h) referring unresolved policy issues to the Deputies Committee of the National Security Council per PPD-1
Classified Information Sharing and Safeguarding Office (CISSO) (Sec. 4)
- Sec. 4.1: Establish CISSO within and subordinate to the PM-ISE office to provide full-time focus on responsible sharing and safeguarding of classified information on networks; CISSO can include detailees from Steering Committee agencies
- Sec. 4.2: CISSO responsibilities include:
- (a) staff support for the Steering Committee
- (b) advising the Executive Agent and ITTF on developing effective compliance monitoring programs
- (c) consulting with State, Defense, DHS, ISOO, ODNI, and others to ensure policy consistency with existing orders such as EO 13526, EO 12829, EO 13549, and EO 13556
Executive Agent for Safeguarding Classified Information on Computer Networks (Sec. 5)
- Sec. 5.1: The Secretary of Defense and the Director, NSA jointly act as Executive Agent (EA), exercising authorities under NSD-42
- Sec. 5.2: EA responsibilities include:
- (a) developing effective safeguarding policies and standards in coordination with CNSS
- (b) referring unresolved issues to the Steering Committee for resolution
- (c) annual reporting to the Steering Committee on CNSS work and recommendations for changes
- (d) conducting independent assessments of agency compliance and reporting results to the Steering Committee
Insider Threat Task Force (Sec. 6)
- Sec. 6.1: Establish ITTF to develop a Government-wide insider threat program covering deterrence, detection, mitigation, and safeguarding of information
- Sec. 6.2: ITTF is co-chaired by the Attorney General and the DNI; membership includes senior officials from multiple agencies; staff from FBI, ONCIX, and others as designated; ONCIX may provide site and admin support
- Sec. 6.3: ITTF responsibilities include:
- (a) develop government-wide policy for deterrence, detection, and mitigation of insider threats; submit to Steering Committee for review
- (b) develop minimum standards and guidance for implementation within one year; binding on the executive branch
- (c) maintain process to update standards if appropriations permit; otherwise propose updates to OMB/ISOO
- (d) if appropriations are not obtained, propose alternative standards
- (e) refer unresolved issues to the Steering Committee for resolution
- (f) conduct independent assessments of agency programs and report results to the Steering Committee
- (g) provide best-practice dissemination and assistance to agencies
- (h) provide analysis of new and continuing insider threat challenges
General Provisions (Sec. 7)
- (a) Defines terms based on EO 13526 and other related statutes
- (b) EO 13587 does not supersede EO 12333, EO 12829, EO 12968, EO 13388, EO 13467, EO 13526, EO 13549, nor successors
- (c) No change to authorities of other key entities (Energy, Defense, DHS, State, ISOO, PM-ISE, etc.)
- (d) Steering Committee/CISSO/CNSS/Task Force cannot examine other agencies’ facilities without advance consultation
- (e) Policy does not deter protected whistleblowing or disclosures under whistleblower protection acts
- (f) DNI may issue policy directives for the Intelligence Community as needed
- (g) Order does not impair agency authority or OMB functions
- (h) Implemented with applicable law and privacy protections, subject to appropriations
- (i) Order does not create rights enforceable by private parties
Presidential Memorandum: National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs
Purpose and Scope (Page 10-11)
- Transmits policy and minimum standards to promote effective insider threat programs to deter, detect, and mitigate insider threats
- Insider threats include espionage, violent acts, and unauthorized disclosure of classified information; reflects data on networks and systems
- Minimum Standards specify elements for monitoring, training, centralized analysis, and protection of civil liberties and privacy
- Outcome: strengthen protection of classified information across the executive branch and deter insider misuse of access
Policy Aims and Core Elements (Page 12)
- A. Policy Context
- EO 13587 directs departments/agencies to establish, implement, monitor, and report on insider threat program effectiveness
- EO 12968 establishes uniform personnel security for access to classified information
- Policy applies to all executive branch departments/agencies with access to classified information or networks; includes contractors and others who access or operate networks
- Leverages existing laws, authorities, programs to counter insider threats; uses risk management tailored to agency missions; protects privacy and civil liberties
- B. General Responsibilities of Departments and Agencies
1) Within days of policy effective date, establish an insider threat deterrence/detection/mitigation program using CI, security, IA, HR, and other resources
- days: timelines anchor for initial implementation
2) Establish integrated capability to monitor and audit information for insider threat detection and mitigation - Key requirements: monitor user activity on classified networks; evaluate personnel security information; provide insider threat training; centralize analysis/reporting
3) Develop and implement sharing policies/procedures to access/share/integrate information from CI, security, IA, HR, etc.
4) Designate senior official(s) with authority for management, accountability, oversight; provide resource recommendations
5) Consult with records management, legal counsel, privacy officials to address legal/privacy concerns
6) promulgate additional guidance reflecting unique mission needs but not inhibit meeting minimum standards
7) Perform self-assessments of compliance and report to Steering Committee
8) Enable independent assessments per EO 13587 §2.1(d) by providing access to ITTF and others
- days: timelines anchor for initial implementation
- C. Insider Threat Task Force Roles and Responsibilities (ITTF)
- ITTF is the principal interagency task force responsible for developing a government-wide insider threat detection/prevention program
- ITTF to develop min standards and guidance, covering: monitoring user activity, personnel security information, employee awareness training, reporting/reporting responsibilities, and CI/Security/HR data integration
- ITTF to review/update standards, provide ongoing assistance, conduct independent assessments, and coordinate with ISOO, ENS, and CISSO for annual reporting and budget implications
- D. Definitions
- Classified information, Counterintelligence, Agencies (broad statutory definition), Employee, Insider, Insider Threat, Key Information Sharing and Safeguarding Indicators
- E. General Provisions
- Superseding acts, privacy protections, and roles of DNI/IC in implementing directives; limits on authority and scope
Minimum Standards for Executive Branch Insider Threat Programs (Page 15-16)
- A. Authority: EO 13587, EO 12968, National Policy on Insider Threat
- B. Purpose
- Insider threat programs deter cleared employees, detect insiders who pose risk, and mitigate risks through actions outlined in E.2
- Standards are minimum requirements; IC or DoD policies may impose stricter requirements; agencies may add new standards provided they don’t conflict
- Agency heads are ultimately responsible; designated senior officials implement minimum standards
- C. Applicability
- Applies to executive agencies, military departments, independent establishments, and IC elements
- D. Designation of Senior Official(s)
- Senior Official(s) oversee gathering/integration/analysis/responding to CI, Security, IA, HR, LE, etc.
- Responsibilities include management/oversight, developing comprehensive agency policy within days, annual progress reports, policy/records/privacy considerations, oversight mechanisms for records, and facilitating oversight reviews
- E. Information Integration, Analysis, and Response
- Agencies must build insider threat analytic and response capability; centrally manage response actions; document matters and resolutions
- F. Insider Threat Program Personnel
- Personnel must be trained in CI/security fundamentals, insider threat procedures, privacy laws and policies, whistleblower protections, and investigative referral requirements
- G. Access to Information
- Agencies must provide insider threat personnel with regular access to CI, Security, IA, HR data as needed; establish sensitive access procedures; provide reporting channels; ensure access to intelligence products
- H. Monitoring User Activity on Networks
- Agencies must have capability to monitor user activity on classified networks (internally or via external agreements); SLA with providers; protect data; obtain user acknowledgments of monitoring; banner users about monitoring
- I. Employee Training and Awareness
- Insider threat awareness training for all cleared employees within 30 days of employment or access grant and annually thereafter; cover indicators, reporting responsibilities, and CI/security reporting requirements; maintain internal portal with resources and reporting tools
- J. Definitions
- Agency Head, Classified Information, Cleared Employee, Insider, Insider Threat, Insider Threat Response Action(s), Subordinate Entity
Maturity Framework FAQ
Purpose and design (Page 21)
- The Maturity Framework is designed to help D/As mature their Insider Threat Programs beyond the Minimum Standards by providing a roadmap of capability elements
- Framework modeled on capability maturity model (CMM) concepts; aims to enable proactive, comprehensive risk management
- Not a replacement for Minimum Standards; supports ongoing evolution
Development and rationale
- Developed by NITTF under EO 13587 and the National Policy and Minimum Standards
- Draft framework developed from Fall 2017 through Spring 2018 focus groups; vetted with IC, DoD, and Federal Partner programs
Framework vs Framework elements vs standards
- Framework is not a new set of standards; it identifies key elements (capabilities or attributes) that characterize advanced programs
- Agencies evaluate applicability of elements to their environment; flexibility to select frameworks elements that fit mission/technology/infrastructure
- No mandatory timeframe to implement Framework elements; no formal assessment against Framework elements, but NITTF may note incorporation during independent assessments
- Frame of reference used to collect best practices to strengthen programs; NITTF may evolve assessment measures over time
Practical use and implementation
- Agencies can use the Framework to develop strategic goals and actions to enhance governance, processes, and resources for insider threat management
- Agencies should involve OGC, privacy/civil liberties officials, and OIG early in planning to ensure compliance with legal and civil liberties requirements
- NITTF offers ongoing support, guidance, and connections to other programs; resources for implementing Framework elements are the responsibility of the agencies
- For small D/As with fewer cleared employees, Framework elements are flexible and not all elements are mandatory; goal is to tailor maturity elements to fit mission and environment
Assessment and accountability
- Framework elements are not formally assessed as standards; independent assessments by NITTF may note incorporation of maturity elements
- Ongoing best-practice collection to support maturation across the insider threat community
Key Definitions and Concepts (Summary)
- Classified information: Information designated as classified under EO 13526 or related acts and marked as such in documentary form
- Insider: An individual with authorized access to US Government resources (people, facilities, information, equipment, networks, or systems)
- Insider Threat: The risk that an insider will use authorized access to harm national security, including espionage, terrorism, or unauthorized disclosure
- Cleared Employee: Any employee or contractor with access to classified information (with various categories defined in policy)
- Subordinate Entity: An office or command that manages its own insider threat program
- Key Information Sharing and Safeguarding Indicators: KPIs used to measure reporting progress and guide resource allocation
Practical Implications and Real-World Relevance
- Emphasizes risk management and interagency coordination for safeguarding classified information
- Balances security with privacy and civil liberties protections; requires consultation with privacy, civil liberties, and legal officials
- Establishes centralized analysis and reporting structures to improve detection/mitigation capabilities across the executive branch
- Provides a structured path from minimum standards to matured, proactive insider threat programs via the Maturity Framework
- Allows agencies to tailor approaches to their unique missions and environments while maintaining overarching government-wide standards
Notable Timeframes and References (Examples in Markdown)
- Initial implementation window: to establish a baseline insider threat program (from policy effective date)
- Self-assessment and annual reporting cycles tied to Steering Committee processes throughout the EO framework
- 90-day reporting requirement to the President for annual assessment of successes/shortcomings (Sec. 3.3(b))
- One-year horizon for minimum standards and guidance development by ITTF (Sec. 6.3(b)) to be binding on the executive branch
- 180-day requirement for agency senior officials to develop a comprehensive insider threat policy (Minimum Standards section D2.2 in the Presidential Memorandum)
Connections to Foundational Principles
- Aligns with broader national security architecture: CI, security, IA, HR integration; governance via Steering Committee; EA oversight via CNSS coordination
- Demonstrates a lifecycle approach: policy formation → standard setting → implementation → monitoring → independent assessment → continuous improvement
- Emphasizes privacy and civil liberties protections as a core element of security programs
Ethical, Philosophical, and Practical Implications
- Balances national security needs with individuals’ privacy rights and civil liberties
- Recognizes the potential for whistleblower protections and safeguards against retaliatory or abusive monitoring
- Encourages responsible data handling, retention, and access controls for sensitive information
- Acknowledges the need for independent assessments to prevent mission creep and maintain public trust
Formulas and Numerical References (LaTeX)
- Timeframes and counts cited in the documents are presented below in LaTeX format for study reference:
- The initial establishment of an insider threat program: from the policy effective date
- Annual reporting requirement timeline: , plus recurring annual reviews
- Interim review/report within: of the order date
- Minimum standards development and guidance: within from policy issuance
Final Notes for Exam Preparation
- Be able to explain the relationship between EO 13587, the Presidential Memorandum, and the ITTF/NITTF structures
- Understand the roles and responsibilities of CISSO, the EA, and the Steering Committee
- Distinguish between minimum standards and the maturity framework; know that the framework is not a new set of standards but a path for maturation
- Recall key definitions and why privacy/civil liberties protections are embedded in the framework
- Recognize the essential workflow: policy creation → standards creation → agency implementation → independent assessments → best-practice sharing