
2024 saw many notable, high-profile cyberattacks. These attacks, like those on Change Healthcare, MediSecure, and Ascension, underscore the current need to understand and strictly adhere to HITRUST compliance requirements.
Following these requirements helps companies take an extra step towards data protection and client trust, while withstanding regulatory scrutiny. But these requirements are often in-depth, making it difficult to navigate.
In this article, we’ll define HITRUST compliance, cover the core requirements, and explain how Assurance Dimensions can help you protect your clients’ most sensitive data.
What Is HITRUST Compliance?
HITRUST compliance derives from the HITRUST Common Security Framework (CSF). This framework integrates regulations and recommendations from various guidance sources, including HIPAA, NIST, and ISO, to provide comprehensive guidance. Unlike HIPAA’s general rules, HITRUST offers certifiable, prescriptive guidance.
Companies that follow this guidance and receive the certification prove they’re committed to data security. Certification demonstrates to clients, regulators, and partners that they adhere to best practices for protecting sensitive information, particularly in healthcare and technology.
Core HITRUST Compliance Requirements
The HITRUST CSF is organized into key domains, each covering an essential aspect of data and security compliance.
Those core domains, or compliance requirements, are:
- Access Control
- Information Protection Program
- Endpoint Protection
- Portable Media Security
- Mobile Device Security
- Wireless Security
- Audit Logging & Monitoring
- Education, Training, & Awareness
- Third Party Assurance
- Incident Management
- Configuration Management
- Vulnerability Management
- Network Protection
- Transmission Protection
- Password Management
- Business Continuity& Disaster Recovery
- Risk Management
- Physical & Environmental Security
- Data Protection & Privacy
HITRUST Assessments
To achieve HITRUST Compliance, organizations must follow the requirements and complete an assessment. There are three types of evaluations:
- Readiness assessments: These are self-assessments, completed in-house to ensure compliance with various HITRUST requirements. They cover about 44 critical controls and provide a basic safeguard for low-level security threats.
- Validated assessments: These assessments are more involved. Validated assessments require a third-party review by a HITRUST authorized assessor firm to achieve certification. They provide a moderate to high level of assurance and include:
- e1 – Foundational Cybersecurity assessment (1-year certification based on 44 requirements)
- i1 – Intermediate maturity assessment (1-year certification based on 182 requirements)
- r2 – Comprehensive cybersecurity assessment (2-year certification generally covering over 300 requirements based on the risk profile of the organization)
- Interim assessments: Once an organization achieves a HITRUST r2 certification, it must undergo an interim assessment to ensure maintained compliance. Typically, this happens one year after the initial validated assessment.
HITRUST Compliance Checklist
To prepare for HITRUST certification, there are several things an organization should do. Follow this checklist:
- Pre-assessment planning: Before contacting a third-party review, take the time to understand the scope and objectives of a validated assessment. Unlike a readiness assessment, validated assessments are more robust.
- Control Selection: Some HITRUST requirements may not apply to your organization. Make a list of applicable controls and tailor CSF controls to best fit your organization. If you’re unsure which applies, ask an experienced HITRUST consultant for clarity.
- Gap Analysis: As you prepare for your assessment, make a note of missing controls or weak points. Test them against HITRUST requirements to determine their appropriateness.
- Remediation: As you uncover weak points or missing controls, take the steps to fix them. This might mean you add in new layers of security or train your staff to ensure continued compliance.
- Evidence Collection: Document your policies, procedures, and security audits for future reference.
- External Validation: Once you’re ready for a validated assessment, engage a HITRUST Authorized Assessor to start the process.
How Assurance Dimensions Supports HITRUST Readiness
Compliance with HITRUST requirements is complicated. And it can be a long process, depending on the level of assurance your organization provides to your clients. However, partnering with Assurance Dimensions eases the pressure.
We help organizations identify gaps and develop a remediation plan to prevent risk and potential cybersecurity attacks. We also work with you to align your policies with HITRUST CSF, ensuring your control practices meet certification standards.
Navigating HITRUST compliance requirements doesn’t need to be overwhelming. Whether you’re preparing for your first assessment or need help closing gaps, Assurance Dimensions can help you move forward with confidence.
Reach out today to learn more about our HITRUST IT advisory and consulting services focused on cyber security and accounting compliance.

