RA-10 - Threat Hunting

a. Establish and maintain a cyber threat hunting capability to: 1. Search for indicators of compromise in organizational systems; and 2. Detect, track, and disrupt threats that evade existing controls; and b. Employ the threat hunting capability [Assignment: organization-defined frequency].


ID: RA-10
Enhancements: 

Space Segment Guidance

Threat hunting on a spacecraft relies on pattern analysis of downlinked telemetry and build-system logs. A small team reviews weekly aggregates looking for subtle indicators, such as a rise in rejected checksum counts when a particular ground station is in view or compiler fingerprints that differ from the approved toolchain. Hunters develop hypotheses, task additional sensor points like firmware debug counters and confirm or dismiss within a sprint cycle. Findings feed the incident-response playbook and update detection rules pushed to the flight software.