Describe the techniques used in security assessments.
Examples: threat hunting, vulnerability scans, security information and event management (SIEM)