Peak

Revised DateAuthorComment
20.04.2025Roger JohnsenArticle rewritten

Introduction

Threat hunting is not just an activity; it’s a mindset. As defenders mature, they evolve from passively reviewing alerts to actively pursuing adversaries. The PEAK Threat Hunting Framework, developed by Splunk’s SURGe team (David Bianco, Dr. Ryan Fetterman, and Sydney Marrone), offers a comprehensive approach that helps hunters structure their methodology while driving measurable improvements.


Why PEAK?

PEAK stands for Prepare, Execute, and Act with Knowledge. More than a model, PEAK is a philosophy that emphasizes continuous improvement in proactive defense. It focuses on building repeatable, scalable, and professionalized hunting operations that evolve alongside your environment, ensuring that your threat hunting activities can adapt to emerging threats.

PEAK helps address common challenges in threat hunting, such as poor documentation, inconsistent outcomes, and lack of follow-through. By defining a structured lifecycle focused on preparation, execution, and impact, PEAK ensures that hunting activities contribute effectively to the broader security posture.

Unlike other frameworks that emphasize hypothesis testing in isolation, PEAK stresses the importance of people, processes, and planning alongside analysis. The framework also introduces three hunt types:

TypeDescription
Hypothesis-driven huntingTraditional hypothesis-based hunting focused on investigating specific threats.
Baseline-based huntingAnomaly detection, using historical baselines to identify deviations in normal behavior.
Model-assisted hunting (M-ATH)Leveraging machine learning models to enhance threat detection and hunting capabilities.

Core Phases of the PEAK Framework

The PEAK Threat Hunting Framework consists of three major phases, each with clearly defined objectives and outcomes:

  • Prepare
  • Execute
  • Act (with Knowledge)

Let’s explore each phase!

Phase 1 - Prepare

Before the hunt starts, are you truly ready?

Preparation is crucial for ensuring that the hunt is purposeful and effective. It involves aligning on goals, selecting the right tools, understanding available data, and framing relevant hypotheses. Proper preparation minimizes wasted effort and maximizes the potential for uncovering real threats.

Preparation Activities Include:

TaskDescription
PlanningDefine the scope, objectives, and timeline for the hunt.
Threat Intelligence MappingAlign with frameworks such as MITRE ATT&CK and identify relevant adversary behaviors.
Hunt Team AlignmentEnsure that all team members have defined roles, understand the assumptions, and agree on communication strategies.
Data Availability ReviewVerify that the necessary telemetry and data sources are available and of high quality.
Documentation SetupPrepare templates for reporting and documenting findings throughout the hunt.

Why it matters
Unprepared hunts often devolve into inefficient, aimless explorations. Adequate preparation ensures that the hunt is aligned with organizational priorities, efficient in its execution, and accountable for its outcomes.

Phase 2 - Execute

How do you carry out the hunt effectively?

Execution involves the core hunting activities: exploring data, validating hypotheses, uncovering anomalies, and investigating leads. This phase is where the threat hunter’s skills, tools, and experience come into play.

Execution Activities Include:

  • Query development and testing
  • Execution of hunting playbooks
  • Timeline and graph creation for investigation
  • Anomaly detection and triage
  • Collaboration between hunters and Subject Matter Experts (SMEs)

Example Flow:

Hypothesis: Lateral movement is occurring using SMB.
Action: Search for unusual cross-host file transfers using smbclient or net use commands.
Follow-up: Pivot into host behavior, peer activity, and identity usage to trace lateral movement.

Why it matters
Execution is the heart of threat hunting. It requires technical expertise, investigative intuition, and disciplined processes to follow leads and connect data points. A structured execution phase is key to uncovering actionable intelligence.

Phase 3 - Act (with Knowledge)

What did we learn, and how does it improve our defense posture?

The final phase of the PEAK framework focuses on translating the outcomes of the hunt into meaningful actions that strengthen the organization’s defenses. The results of the hunt should be shared, integrated into existing processes, and used to improve detection, response, and prevention capabilities.

Key Impact Areas Include:

OutcomeExamples
DetectionsDevelop or refine detection logic based on findings.
DocumentationCreate reusable reports, playbooks, and dashboards.
Coverage EnhancementsIdentify visibility gaps, missing logs, or overlooked assets.
Training & EnablementShare findings with SOC and IR teams to improve their capabilities.
Metrics & KPIsTrack and report metrics such as time-to-hunt, hypotheses tested, and systems covered.

Why it matters
PEAK emphasizes closing the loop. Threat hunting should never be a “hunt and forget” exercise. Instead, findings must be fed back into the security ecosystem to refine defenses, enhance detection capabilities, and support continuous improvement.

PEAK Threat Hunting Lifecycle

The diagram below illustrates the PEAK Threat Hunting Lifecycle. The feedback loop is crucial—each hunt informs the next, driving continuous improvement in readiness, execution, and defense capabilities.

graph TD
    A[Prepare] --> B[Execute]
    B --> C[Act with Knowledge]
    C -->|Feedback| A

PEAK in Practice: A Practical Example

Scenario
A surge in ransomware attacks targeting backup servers prompts your team to act.

1. Prepare

  • Define scope: Hunt across all backup infrastructure.
  • Identify MITRE techniques: T1485 (Data Destruction), T1003 (Credential Dumping).
  • Validate EDR and file access logs.
  • Assign roles across the team and align with threat intelligence.

2. Execute

  • Query for suspicious access to backup volumes.
  • Analyze PowerShell execution and NTFS permission changes.
  • Investigate use of vssadmin delete shadows.
  • Identify unauthorized lateral movement into backup systems.

3. Act with Knowledge

  • Develop detection logic for shadow copy deletion patterns.
  • Recommend hardening controls on backup servers.
  • Document findings and share them with the team.
  • Feed outcomes into incident response playbooks.

Hunt Program Maturity with PEAK

PEAK represents a maturity leap, transitioning from isolated hunts to an integrated, strategic program. As teams adopt and mature their hunting capabilities, they move through stages from ad hoc hunts to fully integrated PEAK-based frameworks.

graph LR
    HMM0[HMM0 - Initial
    Relies primarily on
    automated alerting
    Little or no routine
    data collection] --> HMM1[HMM1 - Minimal
    Incorporates
    threat intelligence
    indicator searchers
    Moderate or high level of
    routine data collection];
    HMM1 --> HMM2[HMM2 - Procedural
    Follows data analysis
    procedures created
    by others
    High or very high level of
    routine data collection];
    HMM2 --> HMM3[HMM3 - Innovative
    Creates new data
    analysis procedures
    High or very high level of
    routine data collection];
    HMM3 --> HMM4[HMM4 - Leading
    Automates the majority
    of successful data
    analysis procedures
    High or very high level of];

Conclusion

The PEAK Threat Hunting Framework provides organizations with a structured, strategic approach to developing, measuring, and evolving threat hunting programs. By balancing preparation, disciplined execution, and actionable outcomes, PEAK transforms hunting from a chaotic activity into a repeatable, professional function.

With PEAK, you can:

  • Foster a culture of hunting within your SOC.
  • Elevate junior analysts through structured processes and clear documentation.
  • Bridge gaps between intelligence, detection, and incident response.
  • Continuously improve your security posture through iterative learning and adaptation.

Threat hunting is more than just finding threats—it’s about building a smarter, more resilient defense over time. PEAK makes that journey structured, sustainable, and effective.


References

ResourceDescription
Introducing the PEAK Threat Hunting FrameworkIntroduction to the PEAK Threat Hunting Framework
The PEAK Threat Hunting FrameworkThe document about PEAK framework to read!
MITRE ATT&CKFramework for mapping tactics, techniques, and procedures used by adversaries.
ThreatHunting.orgCommunity-driven hunt library and knowledge base.
Pyramid of Pain – David BiancoA framework for understanding the value of detection targets.
Red Canary’s Threat Detection ReportAnnual report providing insights into detection trends and best practices.