The HITRUST CSF FAQs

Why choose the HITRUST CSF over other control frameworks like NIST SP 800-53 and ISO/IEC 27001?

The HITRUST CSF is designed with certain highly regulated industries in mind; however, it is a region- and industry-agnostic control framework that can be used globally by organizations across all industries. Furthermore, HITRUST is the only standards development organization with a framework, an assessment platform, and an independent assurance program.

Other considerations for the argument are presented in FAQs throughout this section.

The table below compares the HITRUST CSF with other leading information security and risk frameworks:

For more information on why an organization would choose the HITRUST CSF, refer to the Comparing the CSF, ISO/IEC 27001 and NIST SP 800-53 brochure or, for a healthcare organization’s perspective, a joint presentation by HCSC and Children’s Health Selecting a Healthcare Information Security Risk Management Framework in a Cyber World.

Is the scope of the HITRUST CSF too large for most organizations?

Although HITRUST provides for tailoring of the HITRUST CSF, based on an organization’s specific risk factors, any framework can be applied inappropriately. Given the relatively uncontrolled sprawl of sensitive information in many organizations, the HITRUST CSF can (and should) be applied as broadly as necessary to scope to the specific types of information, systems, and/or business units requiring protection.

The scope can be minimized by ensuring that workflows requiring the use of sensitive information is understood and such uses are restricted to the minimum necessary, as required by many legal and regulatory bodies as well as best practice; in addition, information assets and data flows with sensitive information can be isolated from other assets and data flow types, e.g., through network segmentation.

For more information, refer to the CSF Assessment Methodology and the Risk Analysis Guide for HITRUST Organizations and Assessors.

Does the HITRUST CSF take a “one-size-fits-all” approach to information security?

The HITRUST CSF is one of the most flexible information protection frameworks. The HITRUST CSF was created by harmonizing a myriad of standards, frameworks, and regulatory requirements with relevant leading best practices in the information protection space while collaborating with information security and privacy professionals in various industries with differing needs. The resulting controls can then be tailored based on specific organizational, system, and compliance risk factors. While this approach provides the ability for more granular tailoring out-of-the-box than any other framework, HITRUST understands that no two organizations—even similar ones—are exactly alike. Although information may have a common classification (e.g., PII, ePHI), differences such as organizational culture, infrastructure, technology, and risk appetite may result in a slightly different set of controls.

For more information, refer to the Risk Analysis Guide for HITRUST Organizations and Assessors.

What are the goals for the HITRUST CSF?

Through HITRUST, provide organizations a controls framework that is:

  • Relevant through regular maintenance of supporting authoritative sources and changes in the threat environment;
  • Scalable to various sizes and types of organizations or systems in a controlled manner;
  • Tailorable through managed approvals of alternative (compensating) controls;
  • Based on compliance with control baselines intended to manage risk to an industry-accepted level;
  • Capable of providing certifiable risk assurances to internal and external stakeholders, including regulators; and
  • Supported by appropriate guidance and tools.

For more information on HITRUST and the CSF, refer to the HITRUST C-Level Overview.

Why do organizations need a security and privacy framework?

Information security and privacy laws are passed to regulate many industries and require that organizations operating in such industries conduct thorough risk assessments to protect against the threats to the security and privacy of sensitive information. Organizations in other industries—that are less-regulated (or even unregulated)—may also want to protect valuable business information for many reasons, such as protecting patents and trademarks, gaining competitive advantage, and protecting customer data. Unfortunately, there is no ‘one-size-fits-all’ approach to securing sensitive information, and conducting information security risk analyses is not something with which many organizations are intimately familiar.

The textbook approach to risk analysis includes threat and vulnerability assessments, information asset valuation, and the selection of specific risk treatments for the enumerated threat-vulnerability pairs (a process sometimes referred to as threat modeling). This is all designed to support the selection of cost-effective controls that will manage risk at a level determined acceptable by the organization. From a quantitative viewpoint, this process is virtually impossible for most organizations due to the general lack of actuarial-type data for security- and privacy-related threats. One could take a semi- or quasi-quantitative approach, or even a purely qualitative approach; however, it would still be difficult for an organization to perform the analysis for a comprehensive set of risk responses.

Fortunately, HITRUST provides an alternative, easy to adopt, approach to effectively managing data, information risk and compliance through the HITRUST Approach. The HITRUST Approach is built around a risk management process that provides a consistent, managed methodology designed to meet the needs of many organizations operating in various industries. The HITRUST Approach takes a holistic route to effectively analyze the potential risks to information protection. From this, an organization may establish one or more sets of security and privacy safeguards, also referred to as control baselines, which are intended to address similar threats to common classes of information using similar technologies. Organizations may then easily select an appropriate control baseline to help protect against any reasonably anticipated threats or hazards to the security and privacy of information.

For more information on risk analysis and tailoring, refer to the Risk Analysis Guide for HITRUST Organizations and Assessors and the ISSA Journal article entitled, Leveraging a Control-Based Framework to Simplify the Risk Analysis Process.

Chat Now

This is where you can start a live chat with a member of our team