Under active development Content is continuously updated and improved

THR-07Threat Hunting

Weight: 4

>Control Description

Mechanisms exist to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.