Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC

3.1.6Threat Modeling and Hunting

>Control Description

Where feasible, FRFIs should maintain cyber threat models to identify cyber security threats directly facing its technology assets and services. Threats should be assessed regularly to enhance the cyber security program, capabilities and controls required to mitigate current and emerging threats. FRFIs should use manual techniques to proactively identify and isolate threats which may not be detected by automated tools (e.g., threat hunting).

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.