THR-07
Threat Hunting
Description
Mechanisms exist to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.
Control Question
Does the organization perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls?
Control Metadata
Domain:
Threat Management
Validation Cadence:
Annual
Evidence Request List:
E-THR-05
