RSI Security

How Many HITRUST Controls Are There?

computer

One of the most robust and comprehensive cybersecurity frameworks developed in recent years is the Common Security Framework (CSF), a HITRUST Alliance publication. HITRUST pulls together loose ends from various industry-specific guidelines into one all-inclusive document. The CSF is not required for most businesses, but all companies stand to benefit from adopting its controls and achieving certification. 

But how many HITRUST controls are there? And what’s the best way to implement them and secure HITRUST compliance? This article has you covered.

 

How Many HITRUST Controls Are There?

In total, there are over 150 individual requirements comprising the HITRUST CSF. However, the actual number of HITRUST controls your company needs to implement for compliance and security depends on the applicability of control specifications and other compliance needs. 

The 150+ requirements are complicated by the system of tiers (control categories, objectives, etc.). So, in the sections below, we’ll break down everything you need to know about HITRUST controls:

By the end of this article, you’ll know how many controls there are, how they work, and what it takes to implement them (and how professional services can help).

 

Assess your HITRUST compliance

 

Full Breakdown of the HITRUST CSF Controls

The number of controls HITRUST CSF contains depends on your company’s definition of “control.” At the most basic level, HITRUST comprises 14 “Control Categories,” numbered 0.0 through 0.13. These categories break down into “Objectives,” which number 49 in total. At a more granular level, these Objectives break down further into 156 “References.”

These References are the most practical, which most companies define as “controls.”

Strictly speaking, each Reference also breaks down further into specific requirements, but these vary based on the business. In practice, there are 156 HITRUST CSF controls all companies must implement. But for many companies, it’s easier to conceptualize them as 14 Objectives. Below, we provide a synopsis of each Objective, one Category at a time.

 

Category 0.0: Information Security Management 

There is just one objective, with one corresponding reference, in category 0.0:

 

Category 0.1: Access Control Security

There are seven objectives, with 25 corresponding references, in category 0.1:

 

Category 0.2: Human Resources Security

There are four objectives, with nine corresponding references, in category 0.2: 

 

Category 0.3: Risk Management Policy

There is just one objective, with four corresponding references, in category 0.3:

 

Category 0.4: Information Security Policy

There is just one objective, with two corresponding references, in category 0.4:

 

Category 0.5: Information Security Organization

There are two objectives, with 11 corresponding references, in category 0.5:

 

Category 0.6: Regulatory Framework Compliance

There are three objectives, with ten corresponding references, in category 0.6:

 

Category 0.7: Asset Management Security 

There are two objectives, with five corresponding references, in category 0.7:

 

Category 0.8: Physical and Environmental Security

There are two objectives, with 13 corresponding references, in category 0.8:

 

Category 0.9: Communications and Operations Security

There are ten objectives, with 32 corresponding references, in category 0.9:

 

Category 0.10: Information Systems Management

There are six objectives, with 13 corresponding references, in category 0.10:

 

Category 0.11: Security Incident Management

There are two objectives, with five corresponding references, in category 0.11

 

Category 0.12: Business Continuity Management

There is just one objective, with five corresponding references, in category 0.12:

 

Category 0.13: Privacy Security Practices 

There are seven control objectives, with 21 corresponding references, in category 0.13:

 

Implementation of HITRUST CSF Security Controls

Achieving compliance is about more than understanding and leveraging all 156 controls. It also requires verification of your implementation, whether through self-assessment or external validation by a qualified assessor. The levels or tiers of CSF Assessment include:

RSI Security’s dedicated suite of HITRUST certification and advisory services can help you reach any of these levels of compliance. We’ll work with your internal IT to prepare for self-assessment, then get you certified or verified once you’re ready. We’re a one-stop cybersecurity shop.

 

Professional Compliance and Security

Here at RSI Security, we know how critical compliance is for businesses of all sizes. We also know that compliance is just one part of the cybersecurity architecture you need to keep your business’s personnel and clientele safe. That’s why we’ve offered robust managed IT and security services for over a decade.

Returning to the question posed above: just how many HITRUST controls are there? There are 156 References distributed across 49 Objectives and represented in 14 Control Categories. Understanding all of these controls is only one step on the road toward compliance — and keeping your stakeholders safe. To take the next step, contact RSI Security today!

 

 


Download Our HITRUST Compliance Checklist

Assess where your organization currently stands with being HITRUST compliant by completing this checklist. Upon filling out this brief form you will receive the checklist via email.

Exit mobile version