Source: https://www.cisa.gov/sites/default/files/publications/Insider Threat Mitigation Guide_Final_508.pdf