Skip to content

Latest commit

 

History

History
113 lines (87 loc) · 8.05 KB

incident.md

File metadata and controls

113 lines (87 loc) · 8.05 KB

Incident

This contains a description and summary details of the incident.

Properties

  • id (required) (string) : A unique string that begins with "incident--" and is appended with a UUIDv4
    • Uses pattern: ^incident--[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$
  • cia_effect (array) : CIA triad components that were affected
  • incident_type (array) : Categorization of the incident
  • incident_subtype (array) : The subtype that the incident fits. This MUST match the specified incident_type
  • outcome (array) : Consequences suffered by the victim organization as a result of the insider's attack. This is NOT the outcome or consequences imposed on the insider
  • status (string) : The current status of the incident
  • summary (string) : A brief prose explanation of the incident. This summary should serve as a stand-alone explanation of the incident and should include the following information as a general rule: who, what, when, where, why, and how.
  • brief_summary (string) : A shortened version of the summary (two-four sentences, max 500 characters) with anonymized data
  • comment (string) : Clarifying details about the incident or any of the above properties

Vocabularies

incident-status-vocab

Constants: P, I, R, C

Const Value Description
P Open A case has been opened for the incident
I Under Investigation The incident is being investigated
R Referred out Incident has been referred to another team or organization
C Closed All investigations and legal proceedings are closed

cia-vocab

Constants: C, I, A

Const Value Description
C Confidentiality The protection of information from unauthorized access or disclosure
I Integrity The protection of information from unauthorized modification or destruction
A Availability The protection of information and information systems from unauthorized disruption

outcome-type-vocab

Constants: BR, DC, DD, DM, DR, DS, MD, ML, MS, NN, OT, PD, RO, SI, SD, IT

Const Value Description
BR Bankruptcy One or more victim organizations filed for bankruptcy
DC Data Created Newly created data that is a direct result of the insider's attack
DD Data Deleted Data was deleted from the victim organization's systems
DM Data Modified Data was changed or modified on the victim organization's systems
DR Data Read Organizational data was read by the insider
DS Data Stolen Any organizational information or assets that are stolen
MD Monetary Damages The court ordered a sum of money to be paid by the victim organization for the purpose of replacing the monetary value of property or rights which have been lost or damaged, or to cover expenses, loss, pain and suffering relating to a victim's injury or death
ML Monetary Losses Indirect loss of money through damage, detriment, or suffering related to the incident
MS Money Stolen The insider directly stole money from the victim organization
NN No net negative Though an incident occurred, there were no negative consequences to the victim organization as a result
OT Other Other type of outcome not listed in this vocabulary
PD Physical Damage Physical damage to or destruction of property or other physical assets owned by the organization or located on the organization's property at the time of the incident
RO Restitution Ordered The organizatiion was ordered by a court to pay restitution to additional victims of the incident
SI Safety Impact There was an impact or potential for impact to safety as a result of the incident
SD System Downtime System(s) or the network was fully or partially inoperatble for some length of time
IT Used in Identity Theft Identity theft of one or more individuals resulted from the incident. E.g., The insider used stolen PII to file fraudulent tax returns

incident-type-vocab

Constants: F, S, E, V, U

Const Value Description
F Fraud Deceiving the organization for personal gain at the organization's expense
S Sabotage Deliberate actions to harm an organization's physical or virtual infrastructure, including noncompliance with maintenance or IT procedures, contaminating clean spaces, physically damaging facilities, or deleting code to prevent regular operations
E Espionage The covert or illicit practice of spying on a foreign government, organization, entity, or person to obtain confidential information for military, political, strategic, or financial advantage
V Violence Includes the threat of violence as well as other threatening behaviors that create an intimidating, hostile, or abusive environment
U Unintentional The insider unwittingly causes harm or substantially increases the probability of future serious harm to the organization through action or inaction without malicious intent

incident-subtype-vocab

Constants: F.1, F.2, F.3, S.1, S.2, E.1, E.2, V.1, V.2, U.1, U.2

Const Value Description
F.1 Embezzlement The fraudulent appropriation of the organization's property (financial or otherwise) by someone who has been entrusted with its possession
F.2 Corruption Conflict of interest, bribery, illegal gratuities, and economic extortion
F.3 False Statements Knowingly and willfully making false or fraudulent statements, or concealing information
S.1 Virtual Taking malicious actions through technical means to disrupt or stop an organization's normal business operations
S.2 Physical Taking deliberate actions aimed at harming an organization's physical infrastructure (e.g., facilities or equipment)
E.1 Intellectual Property Theft Theft or robbery of an individual's or organization's ideas, inventions, or creative expressions, including trade secrets and proprietary products, even if the concepts or items being stolen originated from the insider
E.2 Government Covert intelligence-gathering activities to obtain government or military secrets for the benefit of another government to obtain political or military advantage
V.1 Workplace Violence Any action or threat of physical violence, harassment, sexual harassment, intimidation, bullying, offensive jokes, or other threatening behavior by a co-worker or associate that occurs in a person's place of employment or while a person is working
V.2 Self Harm An incident where an insider attempts, or indicates a desire to attempt, self harm or suicide
U.1 Negligence Threat caused by carelessness. Negligent insiders are generally familiar with security and/or IT policies but choose to ignore them, creating risk for the organization
U.2 Accidental An incident of this type results from an insider mistakenly causing an unintended risk to an organization

License

This file is a part of the Insider Incident Data Exchange Standard (IIDES) - see https://github.com/cmu-sei/IIDES

Copyright 2024 Carnegie Mellon University.

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.

This work is provided "AS-IS" with "NO WARRANTIES OF ANY KIND - EXPRESS OR IMPLIED" and is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Requests for permission for non-licensed uses should be directed to the Software Engineering Institute at [email protected].

CERT® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.

DM24-0776