Threat hunting is a proactive approach for finding and remediating undetected cyberattacks. It is a process that involves searching for indicators of compromise (IoC), investigating, classifying and remediating.
Since https://www.crowdstrike.com/resources/white-papers/crowdstrike-security-cloud-guidebook/?utm_campaign=blog&utm_medium=syn&utm_source=cont, threat hunting is required to detect and disrupt advanced threats originating, operating and persisting in the cloud.
Threat hunting involves using manual and software-assisted techniques to detect possible threats that have eluded other security systems.
Checking the integrity of critical system processes that are always active is an important part of the forensics side of threat hunting.