The vendor should actively monitor its environment for security threats using advanced behavioral and analytical technologies. For example, Marathon Health has engaged a service provider to provide logging and Threat Hunting and Response (TH&R) to provide visibility into our security posture. The THR provider’s security operations center (SOC) and Marathon Health actively monitor, respond, classify, remediate and mitigate vulnerabilities.