Created with Sketch.

HITRUST

What is HITRUST?

The HITRUST Common Security Framework (HITRUST CSF) is a certifiable framework that provides organizations with a comprehensive, flexible, and efficient approach to regulatory compliance and risk management. The HITRUST Alliance is a not-for-profit organization, founded in 2007, born out of the belief that information protection should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST also leads many efforts in awareness, education, and advocacy related to information protection. In addition, HITRUST’s framework has since been developed to be non-industry specific.

The HITRUST CSF consists of 14 Control Categories (see below), 19 Domains, 49 Control Objectives, 156 Control References, and 3 Implementation Levels. The HITRUST CSF was built on the primary principles of ISO 27001/27002 and has evolved to align with a wide range of regulations, standards, and business requirements. These include HIPAA, PCI-DSS, NIST 800-53, NIST Cybersecurity Framework, COBIT, GDPR, and more.

HITRUST CSF Control Categories

  1. Information Security Management Program
  2. Access Control
  3. Human Resources Security
  4. Risk Management
  5. Security Policy
  6. Organization of Information Security
  7. Compliance
  8. Asset Management
  9. Physical and Environmental Security
  10. Communications and Operations Management
  11. Information Systems Acquisition, Development and Maintenance
  12. Information Security Incident Management
  13. Business Continuity Management
  14. Privacy Practices

Why HITRUST?

  • You have a customer requiring HITRUST compliance
  • You’re looking to improve your overall security posture through a recognized, reputable and certifiable framework
  • You’re looking to establish governance over your risk management and information security programs
  • You’re looking to differentiate your organization through adoption of an efficient, flexible and scalable standard
    • Harmonizes and maps existing controls and requirements from standards, regulations, business, and third-party requirements, including:
    • HIPAA, NIST 800-53, PCI-DSS, ISO 27001/2, COBIT, GDPR, etc.
    • Scales controls based on the size, type, and complexity of your organization
    • Is non-industry specific
  • The HITRUST CSF Assurance Program enables trust in information protection through an efficient and manageable approach
    • The comprehensiveness of the requirement statements for the assessed entity is based on multiple levels within the HITRUST CSF as determined by defined risk factors
OTHER USEFUL LINKS

View our additional IT Risk Advisory services and capabilities

Breached?

Every moment counts. For urgent requests, contact the Schneider Downs digital forensics and incident response team at 1-800-993-8937. For all other requests, please complete the form below.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.