Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HiTRUST » HITRUST Inheritance Program

HITRUST Inheritance Program

The HITRUST Inheritance Program lets organizations rely on shared security controls provided by internal IT services or external third parties, like service providers, vendors, cloud platforms (SaaS, IaaS/PaaS), colocation data centers, and other managed services.

For example, if you’re using Salesforce, the HITRUST Inheritance Program allows you to incorporate the controls Salesforce uses into your audits and assessments. 

This means you don’t have to review Salesforce’s audit reports individually. Instead, your assessor can rely on the fact that Salesforce has already met the required testing for those controls and their HITRUST assessor has reviewed everything. It simplifies the process and saves time while ensuring compliance.

Now, here’s how you can use HITRUST Inheritance:

  • External Inheritance:  You can adopt up to 85% of the control testing scores from HITRUST-certified third-party Cloud Service Providers (CSPs). 
  • Internal Inheritance: You can also inherit results from your organization’s assessments, but this feature is available only with Corporate and Premium subscriptions.

This makes it easier to leverage existing compliance work and streamline your own assessments.

Additional reading

Healthcare Compliance Software

Protecting What Matters: Cybersecurity for Critical Infrastructure

There’s a saying—if you can access something remotely, so can hackers. The increasing connectivity and convergence have, on one side, diminished physical perimeters, for the good. But they have also brought an increased influx of new threat classes. When it comes to critical infrastructure, though, the stakes are much higher—disruptions can impact essential services and…
Cyber Essentials Checklist

Cyber Essentials Checklist: Essential Steps for Cybersecurity

A 2022 study by the Ponemon Institute found that the relationship between the cost of a data breach and cloud maturity level is indirectly proportional. In other words, better security posture reduces the average cost of recovery. Cyber essentials checklist helps you implement basic security controls and best practices to reduce the chances of a…
ISO 27001 compliance software

10 Best ISO 27001 Compliance Software to Consider

Data security is one of the top areas of focus for companies this year. Implementing strong data security and compliance practices go a long way in helping them avoid operational disruptions or financial losses. ISO 27001 is one of the most common internationally recognized standards focusing on information security.  The latest updates of ISO 27001…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.