Doctor using digital tablet with AI and data graphics, symbolizing healthcare technology and HITRUST compliance requirements.

 

2024 saw many notable, high-profile cyberattacks. These attacks, like those on Change Healthcare, MediSecure, and Ascension, underscore the current need to understand and strictly adhere to HITRUST compliance requirements.

Following these requirements helps companies take an extra step towards data protection and client trust, while withstanding regulatory scrutiny. But these requirements are often in-depth, making it difficult to navigate.

In this article, we’ll define HITRUST compliance, cover the core requirements, and explain how Assurance Dimensions can help you protect your clients’ most sensitive data. 

 

What Is HITRUST Compliance? 

HITRUST compliance derives from the HITRUST Common Security Framework (CSF). This framework integrates regulations and recommendations from various guidance sources, including HIPAA, NIST, and ISO, to provide comprehensive guidance. Unlike HIPAA’s general rules, HITRUST offers certifiable, prescriptive guidance. 

Companies that follow this guidance and receive the certification prove they’re committed to data security. Certification demonstrates to clients, regulators, and partners that they adhere to best practices for protecting sensitive information, particularly in healthcare and technology.

 

Core HITRUST Compliance Requirements

The HITRUST CSF is organized into key domains, each covering an essential aspect of data and security compliance.

Those core domains, or compliance requirements, are:

  • Access Control
  • Information Protection Program
  • Endpoint Protection
  • Portable Media Security
  • Mobile Device Security
  • Wireless Security
  • Audit Logging & Monitoring
  • Education, Training, & Awareness
  • Third Party Assurance
  • Incident Management
  • Configuration Management
  • Vulnerability Management
  • Network Protection
  • Transmission Protection
  • Password Management
  • Business Continuity& Disaster Recovery
  • Risk Management
  • Physical & Environmental Security
  • Data Protection & Privacy

 

HITRUST Assessments

To achieve HITRUST Compliance, organizations must follow the requirements and complete an assessment. There are three types of evaluations:

  • Readiness assessments: These are self-assessments, completed in-house to ensure compliance with various HITRUST requirements. They cover about 44 critical controls and provide a basic safeguard for low-level security threats.
  • Validated assessments: These assessments are more involved. Validated assessments require a third-party review by a HITRUST authorized assessor firm to achieve certification. They provide a moderate to high level of assurance and include:
    • e1 – Foundational Cybersecurity assessment (1-year certification based on 44 requirements)
    • i1 – Intermediate maturity assessment (1-year certification based on 182 requirements)
    • r2 – Comprehensive cybersecurity assessment (2-year certification generally covering over 300 requirements based on the risk profile of the organization)
  • Interim assessments: Once an organization achieves a HITRUST r2 certification, it must undergo an interim assessment to ensure maintained compliance. Typically, this happens one year after the initial validated assessment.

 

HITRUST Compliance Checklist

To prepare for HITRUST certification, there are several things an organization should do. Follow this checklist:

  1. Pre-assessment planning: Before contacting a third-party review, take the time to understand the scope and objectives of a validated assessment. Unlike a readiness assessment, validated assessments are more robust. 
  2. Control Selection: Some HITRUST requirements may not apply to your organization. Make a list of applicable controls and tailor CSF controls to best fit your organization. If you’re unsure which applies, ask an experienced HITRUST consultant for clarity.
  3. Gap Analysis: As you prepare for your assessment, make a note of missing controls or weak points. Test them against HITRUST requirements to determine their appropriateness. 
  4. Remediation: As you uncover weak points or missing controls, take the steps to fix them. This might mean you add in new layers of security or train your staff to ensure continued compliance. 
  5. Evidence Collection: Document your policies, procedures, and security audits for future reference.
  6. External Validation: Once you’re ready for a validated assessment, engage a HITRUST Authorized Assessor to start the process.

 

How Assurance Dimensions Supports HITRUST Readiness 

Compliance with HITRUST requirements is complicated. And it can be a long process, depending on the level of assurance your organization provides to your clients. However, partnering with Assurance Dimensions eases the pressure. 

We help organizations identify gaps and develop a remediation plan to prevent risk and potential cybersecurity attacks. We also work with you to align your policies with HITRUST CSF, ensuring your control practices meet certification standards.

Navigating HITRUST compliance requirements doesn’t need to be overwhelming. Whether you’re preparing for your first assessment or need help closing gaps, Assurance Dimensions can help you move forward with confidence. 

Reach out today to learn more about our HITRUST IT advisory and consulting services focused on cyber security and accounting compliance.

 

A person typing on a computer with cybersecurity icons featured on top of the image, symbolizing the importance of cyber security in HITRUST compliance.

“Assurance Dimensions” an independent member of the Crete Professionals Alliance, is the brand name under which Assurance Dimensions, LLC including its subsidiary McNamara and Associates, LLC (referred together as “AD LLC”) and AD Advisors, LLC (“AD Advisors”), provide professional services. AD LLC and AD Advisors practice as an alternative practice structure in accordance with the AICPA Code of Professional Conduct and applicable laws, regulations, and professional standards. AD LLC is a licensed independent CPA firm that provides attest services to its clients, and AD Advisors provide tax and business consulting services to their clients. AD Advisors, its subsidiary entities, and Crete Professionals Alliance are not licensed CPA firms. The entities falling under the Assurance Dimensions brand are independently owned and are not liable for the services provided by any other entity providing the services under the Assurance Dimensions brand. Our use of the terms “our firm” and “we” and “us” and terms of similar import, denote the alternative practice structure conducted by AD LLC and AD Advisors.