THR-07—Threat Hunting
Weight: 4
>Control Description
Mechanisms exist to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.
>Cross-Framework Mappings
UK CAF
Ask AI
Configure your API key to use AI features.