3.1.6—Threat Modeling and Hunting
>Control Description
Where feasible, FRFIs should maintain cyber threat models to identify cyber security threats directly facing its technology assets and services. Threats should be assessed regularly to enhance the cyber security program, capabilities and controls required to mitigate current and emerging threats. FRFIs should use manual techniques to proactively identify and isolate threats which may not be detected by automated tools (e.g., threat hunting).
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.