logo

Database

HITRUST CSF

Last updated: 2023/09/18
logo

HITRUST CSF is both risk and compliance-based, making it possible for organizations of varying risk profiles to customize their security and privacy control baselines. It is sensitive to data protection compliance and the challenges of assembling and maintaining various programs. Therefore, it provides the structure, transparency, guidance and cross-references to authoritative sources that organizations need in order to check their data protection compliance, as well as an approach to ensure the proper alignment, maintenance and comprehensiveness of components. The version used in this section is HITRUST CSF v9.6.0.

Control-Requirement Mapping

DefinitionRequirements
01_a. Access control policy
01_c. Privilege management
01_d. User password management
01_e. Review of user access rights
01_h. Clear desk and clear screen policy
01_i. Policy on the use of network services
01_j. User authentication for external connections
01_k. Equipment identification in networks
01_l. Remote diagnostic and configuration port protection
01_m. Segregation in networks
01_n. Network connection control
01_o. Network routing control
01_p. Secure log-on procedures
01_q. User identification and authentication
01_r. Password management system
01_t. Session time-out
01_u. Limitation of connection time
01_v. Information access restriction
01_w. Sensitive system isolation
01_x. Mobile computing and communications
01_y. Teleworking
02_d. Management responsibilities
03_a. Risk management program development
04_a. Information security policy document
05_c. Allocation of information security responsibilities
05_d. Authorization process for information assets and facilities
05_i. Identification of risks related to external parties
05_k. Addressing security in third party agreements
06_a. Identification of applicable legislation
06_b. Intellectual property rights
06_c. Protection of organizational records
06_d. Data protection and privacy of covered information
06_f. Regulation of cryptographic controls
06_g. Compliance with security policies and standards
07_b. Ownership of assets
08_b. Physical entry controls
08_c. Securing offices, rooms and facilities
08_f. Public access, delivery and loading areas
08_g. Equipment siting and protection
09_c. Segregation of duties
09_d. Separation of development, test and operational environments
09_e. Service delivery
09_f. Monitoring and review of third-party services
09_g. Managing changes to third party services
09_h. Capacity management
09_i. System acceptance
09_j. Controls against malicious code
09_k. Controls against mobile code
09_m. Network controls
09_p. Disposal of media
09_q. Information handling procedures
09_r. Security of system documentation
09_s. Information exchange policies and procedures
09_v. Electronic messaging
09_x. Electronic commerce services
09_y. On-line transactions
09_z. Publicly available information
09_aa. Audit logging
09_ab. Monitoring system use
09_ac. Protection of log information
09_ad. Administrator and operator logs
09_af. Clock synchronization
10_b. Input data validation
10_c. Control of internal processing
10_d. Message integrity
10_e. Output data validation
10_f. Policy on the use of cryptographic controls
10_g. Key management
10_i. Protection of system test data
10_j. Access control to program source code
10_l. Outsourced software development
11_a. Reporting information security events
13_a. Privacy notice
13_b. Openness and transparency
13_c. Accounting of disclosures
13_d. Consent required
13_e. Choice
13_f. Principle access
13_g. Purpose legitimacy
13_h. Purpose specification
13_j. Data minimization
13_k. Use and disclosure
13_l. Retention and disposal
13_m. Accuracy and quality
13_n. Participation and redress
13_s. Privacy monitoring and auditing