National Counterintelligence and Security Center
NITTF Technical
The NITTF Technical Team is a vital component of the NITTF through its infusion of specialized expertise into other NITTF teams/work-streams as well as its development of effective and cost-effective technical solutions for the insider threat community. The Technical Team provides tailored assistance to inside threat programs spanning the IC, DoD, and NT-50 Federal Partners focusing on User Activity Monitoring (UAM), insider threat data integration and analysis, automated case management, Enterprise Audit Management (EAM), and other technical capabilities. The Technical Team also brokers classified network provider/subscriber relationships across the USG, maintains awareness of the vendor marketplace to identify tools and best practices, provides input to national-level policy frameworks, and explores solutions for emerging technical trends and vulnerabilities.
The NITTF Technical Team developed technical bulletins to provide the insider threat community additional information on key technological issues departments and agencies face when implementing insider threat programs. Bulletins are arraigned by the date of bulletins with the most recent on top. As new bulletins become available, they will be identified as new and placed on the top of the list. Click on the title to view the technical bulletin. For additional information contact the NITTF Technical Team.
Title | Date of Bulletin |
---|---|
How CNSSD 504 Defines UAM | 5/27/2018 |
Abstract : This Tech Bulletin considers the definition of user activity monitoring (UAM) provided by CNSSD 504, and it notes the technical functionality that a UAM solution must have to meet the Directive’s requirements.
Title | Date of Bulletin |
---|---|
How CNSSD 1015 Defines EAM | 4/27/2018 |
Abstract : This Tech Bulletin considers the definition of enterprise audit management (EAM) provided by CNSSD 1015. According to CNSSD 1015, EAM is the “the identification, collection, correlation, analysis, storage, and reporting of audit information, and monitoring and maintenance of this capability.”
Title | Date of Bulletin |
---|---|
Security Information and Event Management for Insider Threat Programs | 3/22/2018 |
Abstract : Security information and event management (SIEM) refers to a cyber tool for the collection and analysis of security events and threat management.
Title | Date of Bulletin |
---|---|
Data Quality for Insider Threat Programs | 1/5/2018 |
Abstract : Executive branch departments and agencies should not overlook the importance of data quality to their insider threat programs. Inaccurate or ‘poor-quality’ data can hinder a program’s ability to identify theta behaviors and conduct an effective inquiry.
......................................................................................................
Provided below are additional technical bulletins that are not available for public release. Please contact NITTF if you have an official need for this item.
Title | Date of Bulletin |
---|---|
Directive on Protecting National Security Systems from Insider Threat (CNSSD 504 w/ Annex C) | 09/15/2016 |
Abstract : This is the latest version of CNSSD 504 which adds Annex C, Privileged User and Privileged Access Controls
Title | Date of Bulletin |
---|---|
Continuous Monitoring and Continuous Evaluation and Their Value for insider Threat Programs | 3/31/2018 |
Abstract : No abstract information available.
Title | Date of Bulletin |
---|---|
Clarification of User Activity Monitoring (UAM) Requirements | 2/25/2018 |
Abstract : No abstract information available.
Title | Date of Bulletin |
---|---|
User (Entity) Behavior Analytics for insider Threat Programs | 2/14/2018 |
Abstract : Executive branch departments and agencies may want to implement a UBA/UEBA tool to enhance their ability to find, track, and mitigate anomalous activity.
Title | Date of Bulletin |
---|---|
The Provider/Subscriber Relationship | 2/10/2018 |
Abstract : No abstract information available.
Title | Date of Bulletin |
---|---|
UAM Solutions for insider Threat Programs | 2/10/2018 |
Abstract : No abstract information available.
Title | Date of Bulletin |
---|---|
Commercial Data Aggregators for Insider Threat Programs | 1/30/2018 |
Abstract : No abstract information available.
Title | Date of Bulletin |
---|---|
Cross Domain Solutions for Insider Threat Programs | 1/14/2018 |
Abstract : Executive branch departments and agencies that operate multiple classified networks may want to employ a Cross Domain Solution (CDS) with their UAM solution(s) to transfer information between two or more differing security domains.
Videos
Cyber Explore - Fundamentals of Cyber
This learning experience is designed for professionals new to the cyber realm. It introduces users to the computer's component layers and associated functions, virtualization concepts, and security methods.
Cyber Aware – Anatomy of a Hack
This learning experience is designed to increase awareness of the protocols that defend information systems and data. It demonstrates to users where network and system vulnerabilities may be while also helping them to understand common hacking methods.
Cyber Exploits – Understand the Threat
This learning experience is designed to increase understanding of the broader categories of cyber-attacks. It introduces specific terminology and real-world applications so users can recognize the threat when they see it.
Federal Partners Outreach
The following materials are provided to support Federal government department and agencies in countering foreign intelligence threats. All materials may be downloaded. For questions about the materials, please contact the Federal Partner Outreach Team via email This email address is being protected from spambots. You need JavaScript enabled to view it..
Federal Partner Newsletters
May Special Edition Newsletter 2021
October Enterprise Threat Mitigation Newsletter 2021
January Enterprise Threat Mitigation Newsletter 2022
Resources
This briefing will enable CI and Security officials within USG departments and agencies to brief employees and contractors on foreign intelligence threats, potential vulnerabilities, and the steps that should be taken to safeguard classified and sensative information. This instructor-led briefing, is designed to allow individual organizations to determine which modules are applicable to their workforce. So, for example, if an organization does not have any employees who travel abroad, that module can be removed from the briefing.
CFIT Workforce Awareness Briefing (108 MB PowerPoint File)
The following materials are provided to support Federal government department and agencies in countering foreign intelligence threats. All materials may be downloaded. For questions about the materials, please contact the Federal Partner Outreach Team via email This email address is being protected from spambots. You need JavaScript enabled to view it..
Resources
Continuous Evaluation - Overview
In his role as the Security Executive Agent (SecEA), the Director of National Intelligence (DNI) established the Continuous Evaluation Program within the National Counterintelligence and Security Center (NCSC). Continuous Evaluation (CE), a personnel security investigative process, is a key component of security clearance reform efforts to modernize personnel security practices and increase the timeliness of information reviewed between periodic reinvestigation cycles. The CE Program provides oversight, policy, and guidance to implement CE across the Executive Branch and operates the ODNI CE System (CES). The CES is an information technology (IT) system that conducts automated checks of security-relevant information, a capability that is the cornerstone of security clearance transformation efforts within the Trusted Workforce 2.0 framework and the move toward government-wide Continuous Vetting.