HITRUST announced it is addressing the need for a continuously-relevant cybersecurity assessment that aligns and incorporates best practices and leverages the latest threat intelligence to maintain applicability with information security risks and emerging cyber threats, such as ransomware.

The design and selection of the controls for the HITRUST Implemented 1-year (i1) Assessment puts it in a new class of information security assessment that is threat-adaptive and designed to maintain relevance over time as threats evolve and new risks emerge while retiring controls no longer deemed material.

HITRUST i1 Assessment

HITRUST identifies information security controls relevant to mitigating known risks

Most existing assessment approaches are not designed to keep pace with current and emerging threats; those that do, rely heavily on broad control requirements raise questions about the suitability of control and consistency of review that ultimately impact the reliability of results.

In contrast, HITRUST identifies information security controls relevant to mitigating known risks and leverages cyber threat intelligence data to influence the selection and where necessary, updating of technically-focused HITRUST CSF requirements included in the HITRUST i1 Assessment. As a result, the HITRUST i1 Assessment includes controls selected to address emerging cyber threats actively.

Reliable assessment with compliance

The HITRUST i1 Assessment is unique in both selection of controls and the design of its assurance programme. Effort towards completion is comparable to other moderate assurance vehicles while delivering a higher level of reliability,” said Jeremy Huval, HITRUST Chief Innovation Officer.

The HITRUST i1 Assessment is the first information security assessment of its kind with attributes not available through other assurance programs:

  • Designed to maintain relevant control requirements to mitigate existing and emerging threats and provide updates as new threats are identified (It is threat-adaptive, prescriptive, and focused on controls pertinent to risk).
  • Designed to sunset controls that have lost relevance and have limited assurance value based on the effort required to comply or assess.
  • Its unique control selection and assurance program design delivers a higher level of reliability than other moderate assurance options.
  • The level of time and effort to complete is comparable to other moderate assurance options in the market.
  • Offers a forward-looking, 1-year certification.

As the HITRUST i1 was designed around relevant information security risks and emerging cyber threats, it is not surprising it provides coverage for numerous standards, such as NIST 800-171, GLBA Safeguards Rule, HIPAA Security Rule, and Health Industry Cybersecurity Practices (HICP).

Review and evaluation 

HITRUST will evaluate security controls and review threat intelligence data no less than quarterly

HITRUST will evaluate security controls and review threat intelligence data no less than quarterly, and for each subsequent major and minor release of the HITRUST CSF, to ensure the HITRUST i1 Assessment requirement selection remains relevant.

Guidance documents will also drive enhancements to the HITRUST CSF and HITRUST i1 Assessment control sets as needed.

Webinar

While the HITRUST i1 Assessment is intended to adapt and evolve to maintain relevance, it’s important to note that HITRUST i1 Assessment certified organisations will not be impacted by changes to the HITRUST i1 Assessment control requirements until their next HITRUST assessment cycle.

HITRUST is hosting a webinar at 11 a.m. CT on Thursday, February 3, 2022, discussing the HITRUST Implemented 1-year (i1) Assessment in more detail. 

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?