Shared Responsibility and Inheritance Program
The HITRUST® Shared Responsibility and Inheritance Program allows organizations to reuse inheritable controls from internal and external third-party organizations. Controls can be inherited from vendors, major cloud service providers (CSPs) and your organization’s existing HITRUST Validated or Certified Assessments.
No other framework provides this capability.
Because major CSPs hold HITRUST certifications, customers who are pursuing HITRUST certification can automatically inherit their CSP’s security controls, making it easier and quicker to achieve security certification.
Clarity
Clarity
A simple methodology and standardized structure clearly define who owns the different cloud security controls to avoid ambiguity in cloud environments.
Transparency
Transparency
Inheritance is transparent, easily accessible, and commonly adopted by major CSPs and their users. This enables organizations to quickly understand and efficiently inherit existing control assessment data.
Time and Cost Savings
Time and Cost Savings
With inheritance from prior HITRUST assessments, organizations can inherit as much as 70%-85% of requirements in HITRUST assessments from participating CSPs, eliminating redundancy and helping save time and costs.
Efficient Risk Management
Efficient Risk Management
Organizations can have seamless communication with CSPs and other vendors to facilitate efficient cyber risk management by aligning understanding and logistics to share controls equitably.
Shared Responsibility Matrices
Download the specific Shared Responsibility Matrix from our list of major CSPs and many other prominent cloud data platforms.
See our Baseline Matrix
HITRUST Baseline Shared
Responsibility Matrix
Download our free, easy-to-use baseline template.
Need more information?
View all relevant resources about our Shared Responsibility
and Inheritance Program.
journey through inheritance
journey through inheritance
Shared Responsibility Matrices (SRMs)