Skip to Content

Insider Threat Leading Practices

February 18, 2026

Copyright Notice All content is protected by international copyright laws. You may reference or quote small portions of this document with proper attribution to The IIA, but unauthorized reproduction, distribution, or use beyond that, other than for your own personal use, is strictly prohibited and may constitute a violation of copyright law, resulting in civil and criminal penalties. Contact copyright@theiia.org for permission to use our materials.
IIA Audit Tool: Insider Threat Leading Practices

Misuse of authorized access to an organization’s critical assets is a significant and complex threat that requires a coordinated, proactive, enterprisewide effort to sufficiently address. This tool is designed to assist auditors in preparing an audit program for insider threats.

Additional resources to use with this IIA Audit Tool

Auditing Insider Threat Programs
Insider Threat Assessment Using NIST Cybersecurity Framework