3.11.2e—Cyber Threat Hunting
>Control Description
Conduct cyber threat hunting activities [Selection (one or more): ⚙organization-defined frequency; ⚙organization-defined event] to search for indicators of compromise in ⚙organization-defined systems and detect, track, and disrupt threats that evade existing controls.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.