Control 1.12: Insider Risk Detection and Response - Verification & Testing
This playbook provides verification and testing guidance for Control 1.12.
Verification Steps
| Step | Action | Expected Result |
|---|---|---|
| 1 | Confirm policies active | All FSI policies enabled |
| 2 | Verify analytics | Analytics showing risk patterns |
| 3 | Test alert generation | Alert generated in queue |
| 4 | Validate workflow | Case created and assignable |
| 5 | Check connectors | Connector status healthy |
| 6 | Review priority groups | Groups configured with members |
Test Cases
Test 1: Data Leak Detection
- Simulate bulk file download (test user)
- Download multiple files from monitored site
- Expected: Alert generated for bulk download activity
- Review alert in Insider risk management > Alerts
Test 2: External Sharing Detection
- Share file externally with test account
- Create anonymous link for test file
- Expected: Alert generated for risky sharing
- Verify external user identified in alert
Test 3: Departing User Workflow
- Set resignation date for test user in HR connector
- Trigger download activity
- Expected: Enhanced monitoring alerts triggered
- Verify departing user policy activation
Test 4: Investigation Workflow
- Confirm test alert
- Create case from alert
- Assign investigator
- Expected: Case workflow functional
- Complete investigation with documented resolution
Test 5: Priority User Monitoring
- Add test user to priority user group
- Trigger monitored activity
- Expected: Alert with priority user flag
- Verify enhanced visibility in dashboard
Evidence Artifacts
- Screenshot: Policy configurations
- Export: Alert summary by policy
- Documentation: Priority user groups
- Screenshot: Connector status
- Audit log: Investigation workflow
- Report: Risk analytics insights
- Documentation: Escalation procedures
Zone-Specific Testing
Zone 1 (Personal Productivity)
- Policies: Data leaks (basic)
- Alert threshold: High only
- Investigation: As-needed
Zone 2 (Team Collaboration)
- Policies: Data leaks + Security violations
- Alert threshold: Medium and above
- Investigation: 48-hour SLA
Zone 3 (Enterprise Managed)
- Policies: All policies including custom
- Alert threshold: All severities
- Investigation: 4-hour SLA for critical
- Automated response: Access suspension capability
Insider Risk Indicators Testing
| Indicator | Test Method | Expected Result |
|---|---|---|
| Bulk download | Download 50+ files | Alert generated |
| External email | Email with attachment to external | Alert generated |
| USB copy | Copy file to removable media | Alert generated |
| Print activity | Print sensitive document | Alert generated |
| After-hours access | Access at unusual time | Alert generated |
Confirmation Checklist
- All insider risk policies created and enabled
- Analytics enabled and showing insights
- Priority user groups configured
- HR connector functional (if used)
- Investigation settings configured
- Alert workflow documented
- Escalation procedures defined
- Test alerts generated and processed
- Evidence artifacts collected
Updated: January 2026 | Version: v1.2