RA-10: Threat Hunting

From NIST's SP800-53:

a. Establish and maintain a cyber threat hunting capability to: 1. Search for indicators of compromise in organizational systems; and 2. Detect, track, and disrupt threats that evade existing controls; and b. Employ the threat hunting capability [Assignment: organization-defined frequency].

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1190 Exploit Public-Facing Application Initial Access
T1212 Exploitation for Credential Access Credential Access
T1195.002 Compromise Software Supply Chain Initial Access
T1195.001 Compromise Software Dependencies and Development Tools Initial Access
T1211 Exploitation for Defense Evasion Defense Evasion
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1210 Exploitation of Remote Services Lateral Movement
T1195 Supply Chain Compromise Initial Access