Threat Hunting Steps
The process of proactive cyber threat hunting
typically involves three steps: a trigger, an investigation and a resolution.
Step
1: The Trigger
A trigger points
threat hunters to a specific system or area of the network for further
investigation when advanced detection tools identify unusual actions that may
indicate malicious activity. Often, a hypothesis about a new threat can be the
trigger for proactive hunting. For example, a security team may search for
advanced threats that use tools like fileless malware to
evade existing defenses.
Step
2: Investigation
During the investigation phase, the
threat hunter uses technology such as EDR (Endpoint Detection and Response) to
take a deep dive into potential malicious compromise of a system. The
investigation continues until either the activity is deemed benign or a
complete picture of the malicious
behavior has been created.
Step
3: Resolution
The resolution phase involves
communicating relevant malicious activity intelligence to operations and
security teams, so they can respond to the incident and mitigate
threats. The data gathered about both malicious and benign activity can be fed
into automated technology to improve its effectiveness without further human
intervention.
Throughout this process, cyber threat hunters
gather as much information as possible about an attacker’s actions, methods and
goals. They also analyze collected data to determine trends in an
organization’s security environment, eliminate current vulnerabilities and make
predictions to enhance security in the future.
Comments
Post a Comment