logo

HITRUST CSF


Summary

HITRUST CSF is both risk and compliance-based, making it possible for organizations of varying risk profiles to customize their security and privacy control baselines. It is sensitive to data protection compliance and the challenges of assembling and maintaining various programs. Therefore, it provides the structure, transparency, guidance and cross-references to authoritative sources that organizations need in order to check their data protection compliance, as well as an approach to ensure the proper alignment, maintenance and comprehensiveness of components. The version used in this section is HITRUST CSF v9.6.0.


Definitions

DefinitionRequirements
HITRUST-01_a. Access control policy
HITRUST-01_c. Privilege management
HITRUST-01_d. User password management
HITRUST-01_e. Review of user access rights
HITRUST-01_h. Clear desk and clear screen policy
HITRUST-01_i. Policy on the use of network services
HITRUST-01_j. User authentication for external connections
HITRUST-01_k. Equipment identification in networks
HITRUST-01_l. Remote diagnostic and configuration port protection
HITRUST-01_m. Segregation in networks
HITRUST-01_n. Network connection control
HITRUST-01_o. Network routing control
HITRUST-01_p. Secure log-on procedures
HITRUST-01_q. User identification and authentication
HITRUST-01_r. Password management system
HITRUST-01_t. Session time-out
HITRUST-01_u. Limitation of connection time
HITRUST-01_v. Information access restriction
HITRUST-01_w. Sensitive system isolation
HITRUST-01_x. Mobile computing and communications
HITRUST-01_y. Teleworking
HITRUST-02_d. Management responsibilities
HITRUST-03_a. Risk management program development
HITRUST-04_a. Information security policy document
HITRUST-05_c. Allocation of information security responsibilities
HITRUST-05_d. Authorization process for information assets and facilities
HITRUST-05_i. Identification of risks related to external parties
HITRUST-05_k. Addressing security in third party agreements
HITRUST-06_a. Identification of applicable legislation
HITRUST-06_b. Intellectual property rights
HITRUST-06_c. Protection of organizational records
HITRUST-06_d. Data protection and privacy of covered information
HITRUST-06_f. Regulation of cryptographic controls
HITRUST-06_g. Compliance with security policies and standards
HITRUST-07_b. Ownership of assets
HITRUST-08_b. Physical entry controls
HITRUST-08_c. Securing offices, rooms and facilities
HITRUST-08_f. Public access, delivery and loading areas
HITRUST-08_g. Equipment siting and protection
HITRUST-09_c. Segregation of duties
HITRUST-09_d. Separation of development, test and operational environments
HITRUST-09_e. Service delivery
HITRUST-09_f. Monitoring and review of third-party services
HITRUST-09_g. Managing changes to third party services
HITRUST-09_h. Capacity management
HITRUST-09_i. System acceptance
HITRUST-09_j. Controls against malicious code
HITRUST-09_k. Controls against mobile code
HITRUST-09_m. Network controls
HITRUST-09_p. Disposal of media
HITRUST-09_q. Information handling procedures
HITRUST-09_r. Security of system documentation
HITRUST-09_s. Information exchange policies and procedures
HITRUST-09_v. Electronic messaging
HITRUST-09_x. Electronic commerce services
HITRUST-09_y. On-line transactions
HITRUST-09_z. Publicly available information
HITRUST-09_aa. Audit logging
HITRUST-09_ab. Monitoring system use
HITRUST-09_ac. Protection of log information
HITRUST-09_ad. Administrator and operator logs
HITRUST-09_af. Clock synchronization
HITRUST-10_b. Input data validation
HITRUST-10_c. Control of internal processing
HITRUST-10_d. Message integrity
HITRUST-10_e. Output data validation
HITRUST-10_f. Policy on the use of cryptographic controls
HITRUST-10_g. Key management
HITRUST-10_i. Protection of system test data
HITRUST-10_j. Access control to program source code
HITRUST-10_l. Outsourced software development
HITRUST-11_a. Reporting information security events
HITRUST-13_a. Privacy notice
HITRUST-13_b. Openness and transparency
HITRUST-13_c. Accounting of disclosures
HITRUST-13_d. Consent required
HITRUST-13_e. Choice
HITRUST-13_f. Principle access
HITRUST-13_g. Purpose legitimacy
HITRUST-13_h. Purpose specification
HITRUST-13_j. Data minimization
HITRUST-13_k. Use and disclosure
HITRUST-13_l. Retention and disposal
HITRUST-13_m. Accuracy and quality
HITRUST-13_n. Participation and redress
HITRUST-13_s. Privacy monitoring and auditing

Last updated

2023/09/18