This contains a description and summary details of the incident.
id
(required) (string) : A unique string that begins with "incident--" and is appended with a UUIDv4- Uses pattern: ^incident--[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$
cia_effect
(array) : CIA triad components that were affected- One or more constants from cia-vocab
incident_type
(array) : Categorization of the incident- One or more constants from incident-type-vocab
- Required if
incident_subtype
exists
incident_subtype
(array) : The subtype that the incident fits. This MUST match the specified incident_type- One or more constants from incident-subtype-vocab
outcome
(array) : Consequences suffered by the victim organization as a result of the insider's attack. This is NOT the outcome or consequences imposed on the insider- One or more constants from outcome-type-vocab
status
(string) : The current status of the incident- A constant from incident-status-vocab
summary
(string) : A brief prose explanation of the incident. This summary should serve as a stand-alone explanation of the incident and should include the following information as a general rule: who, what, when, where, why, and how.brief_summary
(string) : A shortened version of the summary (two-four sentences, max 500 characters) with anonymized datacomment
(string) : Clarifying details about the incident or any of the above properties
Constants: P
, I
, R
, C
Const | Value | Description |
---|---|---|
P | Open | A case has been opened for the incident |
I | Under Investigation | The incident is being investigated |
R | Referred out | Incident has been referred to another team or organization |
C | Closed | All investigations and legal proceedings are closed |
Constants: C
, I
, A
Const | Value | Description |
---|---|---|
C | Confidentiality | The protection of information from unauthorized access or disclosure |
I | Integrity | The protection of information from unauthorized modification or destruction |
A | Availability | The protection of information and information systems from unauthorized disruption |
Constants: BR
, DC
, DD
, DM
, DR
, DS
, MD
, ML
, MS
, NN
, OT
, PD
, RO
, SI
, SD
, IT
Const | Value | Description |
---|---|---|
BR | Bankruptcy | One or more victim organizations filed for bankruptcy |
DC | Data Created | Newly created data that is a direct result of the insider's attack |
DD | Data Deleted | Data was deleted from the victim organization's systems |
DM | Data Modified | Data was changed or modified on the victim organization's systems |
DR | Data Read | Organizational data was read by the insider |
DS | Data Stolen | Any organizational information or assets that are stolen |
MD | Monetary Damages | The court ordered a sum of money to be paid by the victim organization for the purpose of replacing the monetary value of property or rights which have been lost or damaged, or to cover expenses, loss, pain and suffering relating to a victim's injury or death |
ML | Monetary Losses | Indirect loss of money through damage, detriment, or suffering related to the incident |
MS | Money Stolen | The insider directly stole money from the victim organization |
NN | No net negative | Though an incident occurred, there were no negative consequences to the victim organization as a result |
OT | Other | Other type of outcome not listed in this vocabulary |
PD | Physical Damage | Physical damage to or destruction of property or other physical assets owned by the organization or located on the organization's property at the time of the incident |
RO | Restitution Ordered | The organizatiion was ordered by a court to pay restitution to additional victims of the incident |
SI | Safety Impact | There was an impact or potential for impact to safety as a result of the incident |
SD | System Downtime | System(s) or the network was fully or partially inoperatble for some length of time |
IT | Used in Identity Theft | Identity theft of one or more individuals resulted from the incident. E.g., The insider used stolen PII to file fraudulent tax returns |
Constants: F
, S
, E
, V
, U
Const | Value | Description |
---|---|---|
F | Fraud | Deceiving the organization for personal gain at the organization's expense |
S | Sabotage | Deliberate actions to harm an organization's physical or virtual infrastructure, including noncompliance with maintenance or IT procedures, contaminating clean spaces, physically damaging facilities, or deleting code to prevent regular operations |
E | Espionage | The covert or illicit practice of spying on a foreign government, organization, entity, or person to obtain confidential information for military, political, strategic, or financial advantage |
V | Violence | Includes the threat of violence as well as other threatening behaviors that create an intimidating, hostile, or abusive environment |
U | Unintentional | The insider unwittingly causes harm or substantially increases the probability of future serious harm to the organization through action or inaction without malicious intent |
Constants: F.1
, F.2
, F.3
, S.1
, S.2
, E.1
, E.2
, V.1
, V.2
, U.1
, U.2
Const | Value | Description |
---|---|---|
F.1 | Embezzlement | The fraudulent appropriation of the organization's property (financial or otherwise) by someone who has been entrusted with its possession |
F.2 | Corruption | Conflict of interest, bribery, illegal gratuities, and economic extortion |
F.3 | False Statements | Knowingly and willfully making false or fraudulent statements, or concealing information |
S.1 | Virtual | Taking malicious actions through technical means to disrupt or stop an organization's normal business operations |
S.2 | Physical | Taking deliberate actions aimed at harming an organization's physical infrastructure (e.g., facilities or equipment) |
E.1 | Intellectual Property Theft | Theft or robbery of an individual's or organization's ideas, inventions, or creative expressions, including trade secrets and proprietary products, even if the concepts or items being stolen originated from the insider |
E.2 | Government | Covert intelligence-gathering activities to obtain government or military secrets for the benefit of another government to obtain political or military advantage |
V.1 | Workplace Violence | Any action or threat of physical violence, harassment, sexual harassment, intimidation, bullying, offensive jokes, or other threatening behavior by a co-worker or associate that occurs in a person's place of employment or while a person is working |
V.2 | Self Harm | An incident where an insider attempts, or indicates a desire to attempt, self harm or suicide |
U.1 | Negligence | Threat caused by carelessness. Negligent insiders are generally familiar with security and/or IT policies but choose to ignore them, creating risk for the organization |
U.2 | Accidental | An incident of this type results from an insider mistakenly causing an unintended risk to an organization |
This file is a part of the Insider Incident Data Exchange Standard (IIDES) - see https://github.com/cmu-sei/IIDES
Copyright 2024 Carnegie Mellon University.
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.
This work is provided "AS-IS" with "NO WARRANTIES OF ANY KIND - EXPRESS OR IMPLIED" and is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Requests for permission for non-licensed uses should be directed to the Software Engineering Institute at [email protected].
CERT® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
DM24-0776