Introduction
Structured threat hunting
Structured threat hunting is a methodical approach to identifying and mitigating potential security threats in an organization's network, systems and applications
It involves a systematic and repeatable process that includes multiple stages, such as planning, data collection, analysis and response
In structured threat hunting, the process is based on a set of predefined steps or procedures that guide the threat hunting activities
This helps to ensure that the process is consistent, repeatable and effective in identifying and addressing potential security threats
Threat hunting is performed based on an Indicator of Attack (IOA), as well as the Tactics, Techniques and Procedures (TTPs) used by attackers
Unstructured threat hunting
Unlike structured threat hunting which is methodical and focuses on IOAs, unstructured threat hunting primarily relies on analyst intuition and IOCs to drive hunts
The hunter searches the network for any IOCs received from one of the various sources like threat intelligence, threat reports, etc
If there are any matches for IOCs in the environment, the hunter looks for malicious patterns before and after the trigger or IOC
Threat hunters can investigate historical data as far as data retention limits permit
This type of threat hunting can discover new types of threats or threats that penetrated the environment in the past and are now dormant
The other form of unstructured hunting is investigative work where a cyber-threat hunter observes behavior and looks for anomalies
Situation- or entity-driven threat hunting
Situational threat hunting looks at an enterprise's individual vulnerabilities, such as those found in a risk assessment
Entity-driven hunting uses external attack data to identify trending TTPs of the latest cyber threats. With this information, hunters can look for specific behaviors within an organization's own environment
Situational threat hunting focuses on high-risk/high-value entities such as sensitive data or critical computing resources
Its main benefit is that it helps focus and prioritize threat-hunting activity to improve its effectiveness
Attackers commonly target specific high-value/high-risk assets such as domain controllers or privileged users such as IT administrators and DevOps Managers
Last updated