C2.a (point 3)—C2.a (point 3)
>Control Description
Your threat hunts follow pre-determined and documented methods (e.g. hypothesis driven, data driven, entity driven) designed to identify adverse activity not detected by automated detections.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.