Insider threat data
Insider threat data refers to the information, logs, alerts, and records generated by systems and tools that monitor, detect, or investigate potentially harmful activities performed by trusted individuals—such as employees, contractors, or partners—who have legitimate access to an organization’s systems or data. This data helps identify behaviors that might indicate malicious, negligent, or compromised insider actions that could lead to data breaches, fraud, sabotage, or other security incidents.
Insider threat data is aggregated from endpoints, applications, network, identity systems, and many other types. It supports detection and investigation through alerting, auditing, and forensic analysis.
Examples of insider threat data include:
- Unusual data access patterns: Large or atypical downloads, file access spikes
- Unauthorized data transfers: Sending sensitive info to personal email or external accounts
- Access outside normal hours: Logins or activity at odd times or from new locations
- Privileged account misuse: Disabling controls, unauthorized system changes
- Attempts to bypass security controls: Repeated failed access, attempts to override policies
- Use of unauthorized devices or applications: Use of unapproved storage/media or applications
- Anomalous network activity: Data exfiltration to cloud or unusual destinations
Add-ons and apps
Because insider threat data is aggregated from many other data, you should review the other data descriptors on Splunk Lantern to find add-ons and apps that can help with your data sources.