- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Data Access Abuse Use Case
Learn about the Data Access Abuse use case and what Exabeam functionalities protect against it.
The Data Access Abuse use case describes when someone in your organization anomalously accesses sensitive corporate data and resources, which is usually a precursor to a data leak.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Data Access Abuse use case falls under the Malicious Insiders use case category. It contains specific scenarios, including:
In Case Manager, use the out-of-the-box Data Access Abuse incident type to standardize incident fields, phases, and tasks for data access abuse incidents.