Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HiTRUST » HITRUST Assessment Process

HITRUST Assessment Process

HITRUST requires organizations to follow a step by step process to evaluate their information security posture against its guidelines. The process includes:

  • Conduct a readiness assessment: It is a self assessment that helps organizations identify their current status and identify gaps in the control implementation. Doing this helps you understand how well your organization aligns with HITRUST requirements before you proceed for a formal assessment. 
  • Select controls: Choose the appropriate control set based on the level of your risk and regulatory requirements. HITRUST offers two primary assessment types: the Implemented 1-Year (i1) assessment and the Risk-Based 2-Year (r2) assessment. The i1 is designed for lower-risk environments, while the r2 is more comprehensive and suited for higher-risk organizations. 
  • Undergo the validated assessment: Once you have completed the readiness assessment phase, the next step is to undergo a validated assessment. A HITRUST Authorized External Assessor will review it, followed by an independent third party assessor who evaluates if you have implemented the right controls and if these controls operate as intended. 
  • Submit and get certified: Once the external assessor completes their evaluation, they will share the findings to HITRUST. At this stage, they will verify it for consistency and quality. If the standards are met, you will be certified, which is valid for either one year (i1) or two years (r2).

Additional reading

CIS CSC v8.1: Latest Changes & Difference with V8.0

December 2022: OU Health, an Oklahoma-based hospital, reported a data breach affecting approximately 3,000 patients after an employee’s laptop was stolen. The breach exposed sensitive information, including treatment details, Social Security Numbers, and insurance data. This incident underscores the critical need for comprehensive security controls to safeguard sensitive data. One way to ensure that your…

SOX Controls: A Practical Guide

SOX compliance is rarely viewed as inspiring, but it should be. The Sarbanes-Oxley Act, now more than 20 years old, has been reduced to a set of rules to follow.  In reality, it’s a proven framework for building durable financial systems and long-term credibility. SOX is fundamentally about trust: the kind that guides investor decisions…

SOX Testing Explained: Steps, Methods, and Best Practices 

For public companies, SOX compliance isn’t optional. It ensures that financial reporting is accurate, internal controls are reliable, and stakeholders, especially investors, can trust your numbers. That’s where SOX testing comes in. But what exactly does SOX testing involve? Who needs to do it, and how is it typically carried out? In this article, we’ll…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.