Threat Hunting Process
To establish the Process for threat hunting initiatives and routine tasks in Corporate Group
Scope
This Process applies to Cyber Analysts and all, including but not limiting to collected logs collected in SIEM and others servers, network devices, external storage media, applications, that contain or transmit Corporate Group’s information.
This Process applies throughout the Corporate Group as part of the information security management system framework.
Process Diagram

Procedures of Process
1.
Create Hypothesis
Hypothesis created to detect threat in Corporate Group network. Hypothesis may arise:
Intelligence,
Environmental Anomalies,
Expert Intuition,
Past Incidents,
Other sources.
Created and documented hypothesis to detect threat
Cyber Analyst
Daily
2.
Collect Data
Data gathered from multiple sources, including human intelligence, imagery, electronic sources, intercepted signals, or publicly available sources.
Gathered data for processing
Cyber Analyst
Within 1 hour for PCI DSS infrastructure Unlimited for not PCI DSS infrastructure
3.
Process Data
Data processed into a comprehensible form. That could include: - translating it from a foreign language,
decrypting it,
sorting data based on how reliable or relevant it is,
other.
Processed data for analysis
Cyber Analyst
Within 2 hours for PCI DSS infrastructure Unlimited for not PCI DSS infrastructure
4.
Analysis
Contradictory data evaluated against each other, and the patterns and implications of inconclusive or insufficient data considered.
Analysed data
Cyber Analyst
Within 2 hours for PCI DSS infrastructure Unlimited for not PCI DSS infrastructure
5.
Documentation
Documented assessment and report that summarize the data for decision.
Documented assessment
Cyber Analyst
Within 2 hours for PCI DSS infrastructure Unlimited for not PCI DSS infrastructure
6.
Whitelisting
Create new rules in detection system to whitelist false positive.
Whitelisted false positive
Cyber Analyst
Within 2 hours for PCI DSS infrastructure Unlimited for not PCI DSS infrastructure
Process Review and Update
This Process must be maintained in accordance with the Information Security Policy.
Revision History
0.1
LŠ
GK
2023-05-20
2023-05-23
0.2
LŠ
DM
2023-11-02
2023-11-02
0.3
GK
DM
2024-09-10
2024-09-10
Last updated