Under active development Content is continuously updated and improved

C2.a (point 6)C2.a (point 6)

>Control Description

You have justified confidence in the effectiveness of your threat hunts and the threat hunting process is reviewed and updated to match the risks posed to network and information systems supporting your essential function(s).

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.