RSI Security

The Five-Step Process to HITRUST Healthcare Auditing

CIS

The healthcare industry has unique security and privacy challenges, owing to the sensitive data exchanging hands every second. Complying with multiple government regulations and security standards like HIPAA, PCI DSS, SOC 2, etc. can get complicated, and the added pressure of staying competitive with your peers doesn’t make things easier. Healthcare auditing through HITRUST assessments can help organizations obtain an industry-leading certification and showcase their commitment to protecting and securing patient data. 

 

Five Steps for Optimal Healthcare Auditing

Most organizations in and adjacent to healthcare are moving towards HITRUST certification to streamline their security and compliance needs. As such, the top strategies for healthcare security audits revolve around the HITRUST audits and the HITRUST Approach to security.

To perfect your Healthcare IT audit process, follow these steps:

The intricacies of HITRUST might seem overwhelming at first, but working with third-party healthcare audit firms like RSI Security will optimize your cyberdefense and security ROI.


Download Our Complete Guide to Navigating Healthcare Compliance Whitepaper


#1: Perform Accurate Security Scoping

An efficient healthcare IT audit begins with a plan informed by your organization’s particular regulatory needs, its IT assets, and the risks you are subject to in your security environment.

To begin your scoping process for a HITRUST assessment, you should determine your:

These determinations feed directly into the following strategies; understanding where your organization stands with respect to its requirements is critical to achieving them efficiently.

 

Request a Free Consultation

 

Spotlight: How to Scope for HIPAA Compliance

Nearly all organizations in and around healthcare must safeguard patient data, or protected health information (PHI), per the Health Insurance Portability and Accountability Act (HIPAA).

In particular, scoping for HIPAA begins with determining whether your organization needs to comply—if you are a covered entity. Healthcare providers, health plan administrators, and healthcare clearinghouses all need to comply. So do business associates of said entities.

If HIPAA applies to you, you’ll need to ensure that your organization complies with:

Self-assessment may be adequate to address these requirements, but working with a HIPAA compliance partner will help you avoid the penalties laid out in the HIPAA Enforcement Rule.

NOTE: For most covered entities, HIPAA is the bare minimum. HITRUST is a better target, not least because it addresses all of the HIPAA rules, alongside other common regulations.

#2: Perform Readiness or Self-Assessment

Once your organization has assessed its needs, in light of its security posture, it will need to perform at least one preliminary audit to see where it stands with respect to future HITRUST CSF certification. It’s critical to conduct this readiness assessment, self-directed or with the help of a service provider, to ensure that your official HITRUST audit results in success.

The assessment can be conducted with the MyCSF tool, a SaaS platform offered directly to organizations from the HITRUST Alliance. However, most organizations will want to work with an advisor to get the most out of the self-assessment suite. And some HITRUST CSF certification partners offer proprietary assessment tools independent of the MyCSF platform.

 

Top Consideration: HITRUST CSF Maturity Levels

The scoring of each control requirement (see below) is indexed against five Maturity Levels (with different weights) to assess the degree to which the control has been implemented:

The Policy, Procedure, and Implemented levels account for 15%, 20%, and 40% weight, respectively, totaling 75% of the total points. This means that some organizations can theoretically obtain 75 out of 100 points with only these three levels, without pursuing scores for the Measured and Managed levels, which hold 10% and 15% weights, respectively.

NOTE: HITRUST self-assessments are best considered preparatory, not final. Organizations should seek out Validated Assessments (see below) for certification and trust assurance.

 

#3: Implement All Required Architecture

After scoping out your requirements for a Healthcare IT audit and conducting one or more self or readiness assessments, you’ll need to acquire or develop controls to fill in any gaps you identified. Architecture implementation is most effective when conducted with integration in mind. Any new or updated assets, physical or digital, need to be connected with existing assets for seamless visibility and communication between them. And any physical or virtual components you dispose of must be properly disconnected and wiped prior to termination.

If your organization has determined that it is immediately ready to conduct a validated assessment, you may be able to skip over this step and proceed directly to #4 below.

Otherwise, you’ll need to familiarize yourself with the entire HITRUST CSF framework.

Spotlight: HITRUST CSF Control Categories

HITRUST healthcare auditing takes many forms, but it always measures an organization’s implementation of the CSF Controls. You may need to install all of them, or you may need to integrate a selection thereof; in any case, you should understand the frameworks’ scope.

In total, there are 14 Control Categories, which break down into Objectives (49). These break down further into Control References (150+). The full breakdown is as follows:

Beyond References, there are also Specifications for each control, which detail the exact hardware and software needs for respective Implementation Levels. These Levels occur in two series: numbered Levels (1, 2, and 3) and regulation-specific levels (e.g., Level HIPAA).

Some HITRUST assessments measure a specific selection of Controls; others assess a random selection deemed representative of a strong security posture. Prior to your official audit, you should ensure that all relevant controls are installed to the requisite Levels.

 

#4: Optimize Ongoing Security Maintenance

Once your organization has installed its HITRUST CSF Controls up to requisite levels, it may be tempting to jump straight into an assessment. But before doing that, you should set up protocols for seamless maintenance of your security infrastructure to avoid a critical failure that would jeopardize your assessment. You’ll need to monitor your controls over an extended period to ensure they function as expected, and that requires visibility.

The best approach to oversight is third-party program advisory services.

An observer from outside your organization will provide objective, unbiased guidance on maintenance. Another consideration is optimizing top-down control by recruiting a traditional Chief Information Security Officer (CISO) or outsourcing a Virtual CISO (vCISO).

 

#5: Execute a HITRUST Validated Assessment

The last step to successful healthcare auditing involves selecting the appropriate HITRUST assessment, finding a vendor to conduct the audit, and conducting the assessment. While a self-assessment may be appropriate for your short-term needs, it is not sufficient for full CSF certification. Most organizations will find that a Validated Assessment is the best option to satisfy the requirements of their business partners and gain a competitive advantage.

 

Comparison: i1 vs. r2 Validated Assessments

There are two types of Validated Assessments currently available for organizations seeking certification. They offer lower and higher trust assurance, respectively, and involve different scopes of implementation and testing. The recently-debuted assessment modules include:

Depending on your organization’s size and the data you process, an i1 may be sufficient, but the more challenging r2 model offers significantly more assurance, optimizing security ROI.

 

The HITRUST Approach to Healthcare Cybersecurity

HITRUST healthcare auditing can be daunting; the CSF is one of the most robust and complex frameworks an organization must implement. However, it is also one of the most flexible and scalable approaches to cybersecurity, in healthcare and across any industry.

The HITRUST Approach centers on the concept of “Assess once, report many.” This is the most fundamental benefit of HITRUST CSF implementation, aside from the unparalleled security assurance an audit produces. Once your organization installs and assesses its controls, it will be able to map them onto other applicable regulations and report to their governing authorities seamlessly. For this reason, it’s well worth the relatively high entry costs.

  

Pain Point: Mitigating HITRUST CSF Risk Factors

To determine the risk exposure of your organization, the HITRUST CSF describes three risk factors that can affect your audit. These risk factors can be used to determine the right implementation level for each security control in the scope of your assessment:

These concerns overlap, and they are by no means exhaustive. They’re a primary reason why steps #1 and #4 above are essential. Working with a trusted audit partner like RSI Security will help you mitigate these concerns and optimize your healthcare IT audits.

 

Seamless Healthcare Audits with RSI Security

RSI Security is a certified CSF assessor; our experts have compiled decades of experience supporting organizations with HITRUST assessments and healthcare security more broadly.

Our suite of full-service security services covers all of the steps suggested above.

We’ll begin with an intake consultation to begin scoping your implementation, then perform a fuller readiness assessment and install any outstanding architecture. Next, we’ll set your internal personnel up for successful long-term maintenance of all required practices before conducting one or more HITRUST validated assessments at your preferred certification level.

Contact RSI Security today to rethink your healthcare auditing processes!

 

 

Exit mobile version