Securing the Extended Enterprise: A Method for Analyzing External Insider Threat

Franqueira, Virginia Nunes Leal, van Cleeff, André, van Eck, Pascal and Wieringa, Roel (2012) Securing the Extended Enterprise: A Method for Analyzing External Insider Threat. In: Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions. IGI Global, Hershey, USA, pp. 195-222. ISBN 9781466601970

Full text not available from this repository.

Official URL:


In extended enterprises, the traditional dichotomy between insiders and outsiders becomes blurred: consultants, freelance administrators and employees of business partners are both ?inside? and ?outside? of the enterprise. As a consequence, traditional controls to mitigate insider and outsider threat do not completely apply to this group of individuals, and additional or improved solutions are required. The ISO 27002 security standard, recognizing this need, proposes third-party agreements to cover security requirements in B2B relationships as a solution, but leaves open how to realize them to counter security problems of inter-organizational collaboration. To reduce this gap, this chapter presents a method for identifying external insiders and analyzing them from two perspectives: as threat and as possible mitigation. The output of the method provides input for further engineering of third-party agreements related to non-measurable IT security agreements; we illustrate the method using a manufacturer-retailer example. This chapter also provides an overview of the external insider threat, consisting of a review of extended enterprises and of challenges involved with external insiders.

Repository Staff Only: item control page