HITRUST is becoming increasingly required by organizations to ensure robust protection of sensitive data. Manage third-party risk effectively.
“The HITRUST CSF is a comprehensive set of controls designed to help organizations manage and safeguard sensitive information, ensuring compliance with various regulations and standards such as HIPAA, NIST, PCI-DSS, and GDPR.”
HITRUST is becoming increasingly required by organizations to ensure robust protection of sensitive data, such as PII and PHI, particularly when working with third parties. For example, initiatives like Health 3PT accept HITRUST certification as a trusted way to manage third-party risk effectively.
There's the e1, the i1, and the r2 assessment types.
A HITRUST e1 assessment, which stands for "Essential 1-year Validated Assessment," is a cybersecurity evaluation by the Health Information Trust Alliance (HITRUST) that focuses on an organization's compliance with foundational cybersecurity controls, designed to be a low-effort way for companies to demonstrate basic security practices, particularly suitable for startups or those with low-risk profiles; it is considered an entry-level assessment within the HITRUST framework, validating adherence to 44 critical security controls for a one-year period.
The i1 assessment builds on the e1 by including its 44 controls plus additional ones, totaling about 182 controls. It focuses on leading cybersecurity practices and operates on a two-year cycle. In the first year, all 182 controls are reviewed, while the second year involves a rapid re-certification with only 60 controls, making it more cost-effective. This step-up assessment is suited for organizations aiming for enhanced security assurance.
The r2 assessment is considered the gold standard for HITRUST, offering the most comprehensive coverage. It includes the controls from the e1 and i1 assessments and adds any additional controls applicable to your business. The number of controls varies based on your organization’s complexity, typically ranging from 200 to over 2,000.
Before starting an r2 assessment, a detailed analysis of your company’s attributes is required to determine the scope. This assessment is ideal for organizations seeking the highest level of security assurance.
The timeline for certification depends on the assessment type and your organization’s complexity:
Internal deadlines and the organizational environment will play a significant role in determining the most suitable approach. "We acknowledge that the process may become intricate; however, it does not necessarily need to be if one maintains a smaller operational footprint.”
Yes, there is flexibility and “you don't have to feel like you're locked into any one particular standard.”
You can start with an e1 and transition to an i1 or r2 in subsequent years. The process is fluid, so you're not locked into one standard. Additionally, both the i1 and r2 operate on two-year cycles, with the second year involving a reduced scope assessment, which lowers costs and effort.
Preparing for a HITRUST assessment can require significant time and effort, especially if you're managing it alone, potentially demanding several hours of work per week. Many organizations find it challenging to balance this with their daily operations, which is why partners like Privaxi offer comprehensive support.
“This is one of the reasons why SecurityMetrics brought Privaxi in as a partner, because a lot of our customers simply were throwing their hands up and saying this is crazy, we don't have time for this” (Lee Pierce).
Privaxi acts as an extension of your team, managing the entire process from gap analysis to evidence gathering. They break down the HITRUST domains, cross-reference existing frameworks like PCI or ISO 27001, and assist with technical configurations for platforms like AWS and Azure. They also help develop and tailor policies and procedures to your organization’s needs. By leveraging their expertise, organizations can focus on daily operations while ensuring readiness for validation with less strain on internal resources.
When working with Privaxi, your commitment is typically 1–2 hours per week. These sessions focus on understanding your business environment, identifying systems processing ePHI, and gathering requirements. “It’s crucial and essential to understand the business operations and their environment so we can identify what's processing ePHI, who it touches, the systems that it has, and so forth” (Peter Briel).
Privaxi handles the heavier lifting on the back end, providing full support with auditors, policy experts, and technology specialists to streamline the process.
Start by addressing the technology requirements since HITRUST mandates a 90-day incubation period for technologies to be operational before they can be validated. For example, you can't install a firewall and submit it as evidence the next day—it must be in place for at least 90 days.
Next, focus on policies and procedures, which require a 60-day incubation period. By tackling these early, you ensure they meet the timeframe requirements while freeing up time to work on other framework areas. Using a predefined list of requirements can help streamline this process and keep you ahead of deadlines.
HITRUST integrates elements from frameworks like NIST, ISO, PCI, and HIPAA, but it is more comprehensive and rigorous. While frameworks like NIST focus on specific controls, HITRUST covers a broader range of domains, including cybersecurity, privacy, and risk management. It also requires more thorough documentation and evidence collection—simply having policies and procedures, as in a HIPAA audit, isn't enough; HITRUST demands detailed evidence at a granular level.
HITRUST is considered the gold standard in cybersecurity because of the depth and the customization required to meet its standards. Additionally, organizations can leverage prior efforts from other assessments (like SOC or PCI) through a mapping exercise, reducing redundancy in the process.
A readiness assessment is crucial before attempting HITRUST validation. It ensures your organization is fully prepared and that the foundational work is solid, making the validation process smoother.
Yes, this happens often. Many organizations, due to limited resources or internal staff turnover, find themselves unable to fully prepare for assessments. They may engage us primarily to gather the necessary evidence, including policies and procedures. This situation can arise when companies are already under pressure or when key team members leave, disrupting the continuity of preparation efforts.
In these cases, we step in to assist, often offering services ranging from light consulting to full evidence gathering. Some organizations prefer minimal external involvement and may limit us to "read-only" access to their systems, while others are more open to hands-on support. The key challenge in these situations is ensuring that all required evidence is properly collected and meets HITRUST’s rigorous standards, even when preparation has been minimal.
1. Scoping:
2. Technology and Documentation Preparation:
3. Evidence Gathering
4. Timeline Estimation:
5. Validation Setup:
6. MyCSF Subscription and Costs:
7. Validation and QA Review:
8. Remote Validation:
9. Collaboration Tools:
This structured approach helps ensure that the readiness assessment is comprehensive and on track for a successful HITRUST certification.
When staff leave during the HITRUST preparation process, it can be a significant disruption. However, having a readiness assessor partner like Privaxi helps mitigate this issue by providing additional staffing support to ensure the project continues smoothly. Here’s how it works:
1. Staff Augmentation:
2. Full Spectrum of Support:
3. Continued Progress:
This approach ensures continuity and reduces the impact of staff turnover on the readiness and validation process.
When working with both SecurityMetrics and Privaxi, you only need to engage SecurityMetrics for all legal and contractual aspects.
Here's how it works:
1. Single Point of Contact for Legal Documentation:
2. Carve-Out for Intellectual Property:
3. Billing and Invoicing:
4. Seamless Collaboration:
This approach eliminates the need for multiple agreements and invoicing, offering a more streamlined experience while still getting the combined expertise of both organizations.
Yes, HITRUST certification makes it easy to jump on the path to other certifications, such as:
HITRUST's comprehensive nature and the fact that it addresses a broad range of cybersecurity, privacy, and risk management domains mean that it provides a great foundation for achieving a variety of other certifications.
If your organization undergoes significant changes after completing a HITRUST validation (such as changes in technology, processes, or business structure), here's what you need to do:
It's important to work closely with HITRUST in such situations to avoid missteps and ensure compliance with the standards. Consulting with HITRUST directly helps clarify what specific changes will trigger reassessments or additional validation.