Back to blog
Threats 2026-04-14 5 min

Detecting insider threats without becoming a surveillance state

Insider risk is real but measuring it without poisoning culture is hard — telemetry-driven, role-aware detection works; blanket monitoring does not.


Insider threats encompass three archetypes: the malicious insider (deliberate theft or sabotage), the negligent insider (sharing a password, falling for phishing), and the compromised insider (credentials stolen and used by an external actor). Verizon DBIR data attributes 19 to 25 percent of breaches to insider involvement, but the bulk are negligent rather than malicious. Detection programs that conflate all three end up overwhelmed and damaging trust.

Effective detection starts with data. User and Entity Behavior Analytics (UEBA) platforms — Microsoft Purview Insider Risk Management, Varonis, Splunk UBA, Exabeam — baseline normal behavior per user and role, then flag deviations: bulk download from SharePoint, off-hours access to a system the user never touched before, USB mass storage attached to a finance laptop. Critical inputs are identity logs (Azure AD, Okta), file access logs (M365 Audit, Box, file servers), endpoint telemetry, and DLP events.

Scoping matters as much as tooling. Define High Risk Users — privileged admins, departing employees in the notice period, employees on a performance improvement plan, contractors near contract end. Apply enhanced monitoring to that population only. For the general workforce, alert only on policy violations: mass exfiltration, downloading the customer database, or sending source code to a personal address. The 2023 EU NIS2 and the Azerbaijani Personal Data Law require employee monitoring to be proportionate, transparent, and documented in a data protection impact assessment.

Procedure and culture decide outcomes. Publish the monitoring policy in the employee handbook and have HR sign-off. Build the response playbook with HR, legal, and security as a triad; security never confronts the employee alone. Run yearly tabletop exercises on "departing engineer pulls customer list" and "finance manager wires money to a fake CEO." Implement preventive controls — Just-In-Time access, peer-reviewed admin actions, mandatory leave for finance roles — that remove temptation from honest employees and make malicious paths visible.

#insider-threat#ueba#dlp#threats
Information security, Baku.
© 2026 gpolicy. All rights reserved.