Chapter 7: Planning

At this point, every piece that is required for a successful threat hunt has been identified. Now it is time to put all of the pieces together. In doing so, the team will quickly move from thinking we really need to do this to a place that will allow them to say we did this right.

In Chapter 5, Methodologies, the hunting cycle was discussed with the starting point of identifying requirements. These are the business needs and concerns that are the origin of the threat hunt. What are the items that the organizational leadership is concerned with? What are the network administrators and defenders seeing that is of concern? What is being targeted online that is similar to our organization? Is there a critical software vulnerability ...

Get The Foundations of Threat Hunting now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.