A coordinated collection of capabilities authorized by the Department/Agency (D/A) that is organized to deter, detect, and mitigate the unauthorized disclosure of sensitive information.
Source(s):
CNSSI 4009-2015
from
CNSSD No. 504
A coordinated group of capabilities under centralized management that is organized to detect and prevent the unauthorized disclosure of sensitive information. At a minimum, for departments and agencies that handle classified information, an insider threat program shall consist of capabilities that provide access to information; centralized information integration, analysis, and response; employee insider threat awareness training; and the monitoring of user activity on government computers. For department and agencies that do not handle classified information, these can be employed effectively for safeguarding information that is unclassified but sensitive.
Source(s):
NIST SP 800-53 Rev. 4
under Insider Threat Program
from
Presidential Memorandum, National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs
A coordinated group of capabilities under centralized management that is organized to detect and prevent the unauthorized disclosure of sensitive information. At a minimum, for departments and agencies that handle classified information, an insider threat program shall consist of capabilities that provide access to information; centralized information integration, analysis, and response; employee insider threat awareness training; and the monitoring of user activity on government computers. For department and agencies that do not handle classified information, these can be employed effectively for safeguarding information that is unclassified but sensitive.
Source(s):
NIST SP 800-53 Rev. 4
under Insider Threat Program
from
Presidential Memorandum, National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs
A coordinated collection of capabilities authorized by the organization and used to deter, detect, and mitigate the unauthorized disclosure of information.
Source(s):
NIST SP 800-53 Rev. 5
from
CNSSI 4009-2015 - Adapted