By Jason Kor, Principal, Third Party Cyber Risk at HITRUST
If you’re using Oracle Cloud Infrastructure (OCI) and working through a HITRUST assessment in MyCSF, inheritance lets you rely on OCI’s existing HITRUST-validated controls instead of re-assessing everything from scratch. In this post, we’ll discuss what inheritance means, how it works in HITRUST MyCSF, and how you can use it to save time and effort on your journey to HITRUST certification.
Inheritance is a mechanism that allows one organization to leverage the assessment results of another. In simple terms, if a third party (like a cloud service provider) has already been assessed and certified for certain HITRUST CSF controls, you can “inherit” those controls instead of undergoing separate testing for them. For example, because Oracle Cloud Infrastructure is HITRUST certified, an OCI customer can reuse OCI’s assessment results for relevant cloud security requirements rather than testing those controls independently. This feature is built into MyCSF.
MyCSF is HITRUST’s online platform for managing assessments, and it enables inheritance of control testing results between assessments. The platform allows the control maturity scores of specific requirements to be transferred from a provider’s HITRUST assessment into your own assessment (with the provider’s permission). In practice, this can dramatically reduce your assessment workload.
Relying on OCI’s HITRUST validated controls offers several clear benefits for your organization, including
It’s important to understand that not all HITRUST requirements can be inherited. It depends on what responsibilities OCI assumes versus what remains with you. The concept of shared responsibility in cloud computing comes into play: OCI covers the security of the cloud (the underlying infrastructure), while you’re responsible for security in the cloud (your applications, data, and internal processes). Some domains lend themselves more readily to inheritance based on this split.
Each domain has many requirements, some of which will be inheritable. For detailed control-level inheritability, please refer to the resources shared below. Here is a summary.
|
Domain |
Customer’s Responsibility |
OCI’s Responsibility |
Inheritability |
|
1. Information Protection Program |
You must own and maintain an information protection program aligned with HITRUST. This includes governance, risk, and compliance policies. |
OCI provides credentials (ISO, SOC, HITRUST) but does not manage your corporate security program. |
Not inheritable |
|
2. Endpoint Protection |
You must secure laptops, workstations, and other endpoints used to access OCI. This includes EDR, patching, and MDM. You must also configure OCI Compute and OKE workloads securely. |
OCI provisions VMs and clusters securely and maintains platform configurations once set. |
Slightly inheritable |
|
3. Portable Media Security |
You must control all portable media outside of OCI facilities (USB drives, laptops, external storage). |
OCI prevents removable media in its datacenters and securely manages any physical media. |
Highly inheritable |
|
4. Mobile Device Security |
You must secure mobile devices used to access OCI Console, APIs, or your application. This includes encryption, MDM, and conditional access. |
OCI IAM supports MFA and federated SSO for secure mobile login. |
Slightly inheritable |
|
5. Wireless Protection |
You must secure your corporate wireless infrastructure (Wi-Fi, VPN, remote access). |
OCI does not manage your wireless networks; its scope ends at the datacenter. AWS manages any wireless networks inside the datacenters. |
Not inheritable |
|
6. Configuration Management |
You must configure compartments, IAM policies, secrets in OCI Vault, and tenancy/app settings securely. Misconfigurations remain your responsibility. |
OCI maintains baseline configurations for its managed services once provisioned. |
Moderately inheritable |
|
7. Vulnerability Management |
You must patch your application code, libraries, and containers, and use the OCI Vulnerability Scanning Service for workloads. |
OCI patches hypervisor, runtimes, and managed services like Autonomous DB. |
Moderately inheritable |
|
8. Network Protection |
You must configure VCNs, Security Lists, Network Security Groups, and OCI WAF to enforce least privilege access. |
OCI secures backbone networking and provides DDoS protection and segmentation at the platform level. |
Moderately inheritable |
|
9. Transmission Protection |
You must enforce HTTPS/TLS for app endpoints and secure data exchanges with third parties. |
OCI enforces TLS in its backbone and provides OCI Certificates for managed certs. |
Moderately inheritable |
|
10. Password Management |
You must define and enforce strong credential policies and MFA for your app’s users. |
OCI IAM enforces password/MFA policies for tenancy administrators. |
Slightly inheritable |
|
11. Access Control |
You must design and manage IAM policies, compartments, and application-level authorization (RBAC/ABAC). |
OCI provides IAM framework, groups, dynamic groups, and federation capabilities. |
Moderately inheritable |
|
12. Audit Logging & Monitoring |
You must enable OCI Audit, configure Logging & Monitoring, and analyze logs in a SIEM or Logging Analytics. |
OCI automatically generates platform Audit events and exposes native logging streams. |
Moderately inheritable |
|
13. Education, Training & Awareness |
You must train developers, admins, and users on security responsibilities and cloud best practices. |
OCI provides documentation and security guidance, but does not train your workforce. |
Not inheritable |
|
14. Third-Party Assurance |
You must review OCI compliance reports and manage assurance for your vendors (SaaS, APIs, processors). |
OCI provides attestation reports through the Compliance portal. |
Not Inheritable |
|
15. Incident Management |
You must implement an incident response plan for your applications and tenancy. Subscribe to OCI Service Health notifications. |
OCI manages platform-level incidents and posts advisories on the OCI Service Health Dashboard. |
Moderately inheritable |
|
16. Business Continuity & Disaster Recovery |
You must design for resiliency across regions, perform backups to Object Storage, and test restores. |
OCI provides redundant regional services and SLAs for core infrastructure. |
Moderately inheritable |
|
17. Risk Management |
You must conduct risk assessments, identify threats, and document treatment plans for your applications. |
OCI provides a secure platform, but does not perform risk management on your behalf. Notably, some change management requirements appear in those domains, which are handled by OCI where appropriate. |
Moderately Inheritable |
|
18. Physical & Environmental Security |
|
OCI fully manages datacenter security, biometrics, HVAC, redundant power, and other physical or environmental controls |
Highly inheritable |
|
19. Data Protection & Privacy |
You must classify sensitive data, apply retention/ deletion policies, and fulfill privacy obligations (e.g., DSARs). |
OCI provides default encryption at rest, Vault for key management, and data residency controls. |
Moderately inheritable |
Before and during your use of inheritance, make sure to take advantage of official HITRUST and MyCSF resources that define the rules and best practices.
Finally, remember that you don’t have to navigate the HITRUST inheritance process alone. If you have questions or run into confusion, consider reaching out to a HITRUST Approved External Assessor or consultant for guidance. HITRUST maintains a directory of authorized External Assessor organizations. These are firms trained in the HITRUST CSF and assessment process. An experienced assessor can help you identify inheritance opportunities, interpret the SRM, and ensure you apply inherited controls correctly. In fact, if you are pursuing a Validated Assessment, you will need an External Assessor to validate your results, so involving them early can smooth out the process.
Don’t hesitate to use these expert resources. A quick consultation with a HITRUST assessor or a cloud security consultant can clarify doubts about what you can inherit and how to document it. They can also verify that you’re meeting all HITRUST requirements in the areas you don’t inherit (so nothing falls through the cracks).
Inheritance is a powerful feature in HITRUST MyCSF that can make your certification journey far more efficient. By leaning on OCI’s already-certified security controls, you can save time, reduce costs, and focus your energy on the areas that truly require your attention. Just remember that with great power comes responsibility. Always use the HITRUST Shared Responsibility Matrix and official guidance to know exactly what can be inherited versus what remains your duty. When in doubt, consult the experts (HITRUST-approved assessors or seasoned consultants) to ensure you’re on the right track. Leveraging the work of others through inheritance, when done correctly, helps turn HITRUST compliance manageable and collaborative effort. Good luck with your HITRUST assessment, and happy inheriting!
Key Takeaway: Use OCI’s HITRUST certification to your advantage. Inherit what you can, implement what you must, and always refer to HITRUST’s official resources for clarity. And if you need help, the HITRUST assessor community is there to support you in achieving a successful, stress-reduced certification.