Table 1 Compromise assessment versus threat hunting across goal, scope, cadence, analytic basis, data reviewed, program placement, and outcomes. Abbreviations: CA, compromise assessment; TH, threat hunting; TTPs, tactics-techniques-procedures; SOC, security operations center.

From: Proactive identification of cybersecurity compromises via the PROID compromise assessment framework

Attribute

Compromise Assessment

Threat Hunting

Goal

Determine if any threats are or have been present in the environment

Identify if a specific threat is active or has been active in the environment

Scope

Generally broad, covering a wide range of endpoints, data and TTPs

Narrower, focused on specific TTPs related to the threat being hunted

Recurrence

Periodic

Continuous or ad-hoc

Basis

Evidence-based

Hypothesis-driven

Data Analysis

Extensive review of forensic artifacts from endpoints, domain-wide activities, user activities, network traffic information, and application logs to detect any signs of malicious activity or irregularities

Targeted analysis of data based on the hypothesis being tested

Position in Cybersecurity Program

Integral to risk management

â—Ź Part of the proactive monitoring and within the SOC

â—Ź Part of the CA

â—Ź Part of the Incident Response

Outcome

A comprehensive report detailing any findings, implications, and recommendations for security improvements

Summarized report upon the identification of findings