Monitoring & Detection · MD-Q09

Question: Does the organization conduct proactive threat hunting using hypotheses, analytics, and historical data?

Why This Matters

Reactive alerting only catches known threats. Threat hunting discovers unknown adversary behaviors and validates the health of detections before attackers exploit blind spots.

Maturity

0 — Unaware
No proactive threat hunting; rely solely on alerts.
1 — Ad Hoc
Occasional manual searches after incidents.
2 — Defined
Threat-hunting procedure documented; basic hypotheses formed.
3 — Managed
Regular hunts using defined data sources; results tracked.
4 — Integrated
Threat intel and ATT&CK coverage drive hunt campaigns.
5 — Optimized
Continuous hunting powered by analytics and machine learning.

How to Level Up

From → To Actions
0 → 1 Allocate analyst time to manual exploration of key logs.
1 → 2 Document hypotheses and data sources; record findings.
2 → 3 Schedule hunts quarterly; assign ownership and KPIs.
3 → 4 Leverage threat intel + ATT&CK gaps to design new hunts.
4 → 5 Automate recurring hunts and anomaly scoring.

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Hunting queries Sigma / Splunk-like DSL in OpenSearch Reusable hunt scripts.
Notebook Jupyter + Pandas Document hypotheses + results.
Intel feeds MISP / OTX Drive hunt topics.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001:2022 A.8.16 / A.5.23
CERT-In 2022 SOC Threat-Hunting Guidance
DPDP Act 2023 Sec 10 (Accountability)
NIST CSF 2.0 DE.AE-3 / DE.AE-5
NIRMATA Mapping MD-Q09 extends detection into proactive defense.