RSI Security

What is the HITRUST Threat Catalogue?

Cyber

Organizations in any industry can benefit from threat intelligence, or information that helps identify, analyze, categorize, and ultimately mitigate cybersecurity threats. The HITRUST threat catalogue, a publication of the HITRUST Alliance, is designed with these aims in mind. It breaks down the most common and dangerous kinds of threats into manageable categories, so that an organization can swiftly determine how to address a given threat before it becomes a full event.

 

A Guide to the HITRUST Threat Catalogue

The HITRUST Threat Catalogue, formally titled HITRUST Enumerated Threat List, is available for free download pending a service agreement. It’s one resource the institution provides as part of the HITRUST Approach, and it breaks down into three primary categories of threats:

Understanding each of these categories, along with the individual threats enumerated within them, facilitates HITRUST CSF control mapping to help mitigate all threats.

 

HITRUST Threat Catalogue Category #1: Logical Threats

Logical threats within the HITRUST Threat Catalogue are those that primarily target Information Technology (IT) assets, whether through direct or indirect means. These are the most critical for organizations building out cyberdefense systems, both because of relevance and because this category houses the greatest number and variety of threats.

 

Request a Free Consultation

 

HITRUST’s Enumerated Intentional Logical Threats

The list of Intentional Logical threats covers:

 

HITRUST’s Enumerated Unintentional Logical Threats

The list of Unintentional Logical threats covers:

 

HITRUST Threat Catalogue Category #2: Organizational Threats

Organizational threats within the HITRUST Threat Catalogue relate to compliance with different contractual, regulatory, legal, and other requirements. This is the smallest category, with the fewest total threats, but they are extremely critical. These threats can lead to several immediate consequences through noncompliance. And, in the case of certain cybersecurity requirements, other vulnerabilities may arise in the absence of required controls or protocols.

 

HITRUST’s Enumerated Organizational Compliance Threats

The list of Organizational Compliance threats covers:

 

HITRUST Threat Catalogue Category #3: Physical Threats

The last category in the HITRUST Threat Catalogue pertains to physical threats. These are the farthest removed from cybersecurity—in that many involve natural phenomena that cannot be foreseen or prevented. Still, preparing for them involves creating contingency plans to prevent the spread of any impacts on physical and virtual assets exposed to events’ lingering effects.

 

HITRUST’s Enumerated Force Majeure Physical Threats

The list of Force Majeure Physical threats covers:

 

HITRUST’s Enumerated Intentional Physical Threats

The list of Intentional Physical threats covers:

 

HITRUST’s Enumerated Unintentional Physical Threats

The list of Unintentional Physical threats covers:

 

Mapping HITRUST CSF Controls onto Threats

As noted above, the HITRUST Threat Catalogue is just one part of the broader HITRUST Approach. To mitigate all the threats it enumerates, companies should consider implementing some or all of the HITRUST CSF framework, depending on their specific threat environment.

The CSF comprises 14 Control Categories, which house its 49 Control Objectives. Objectives break down further into Control References, or specific implementation details. These include different Implementation Requirement Levels that depend on size and regulatory requirements.

As of the most recent version, HITRUST V9.5, the Control Categories break down as follows:

In terms of correspondence to the Threat Catalogue, Categories 0.0, 0.2, and 0.11 are the most applicable to the Intentional Logical threats above. Categories 0.0 and 0.4 should prevent most Unintentional Logical and Physical threats. Category 0.6 is directly related to Organizational threats, which include various compliance requirements, and Category 0.8 should cover most if not all Force Majeure and Intentional Physical threats (alongside Categories 0.7 and 0.11).

 

Protect Against All Threats to Your Organization

The best way to address all threats in the HITRUST threat catalogue is to implement the CSF in its entirety. The CSF is an extremely comprehensive framework that offers robust protection and streamlines many other compliance requirements. However, implementation can be challenging for many companies.

RSI Security’s HITRUST advisory services begin with thorough readiness assessment and advisory, then continue through complete implementation, leading to HITRUST CSF certification.

We’ll help your organization with rethinking your approach to compliance and overall cyberdefense. To get started protecting against all threats, contact RSI Security today!

 

 


Download Our HITRUST Compliance Checklist

Exit mobile version