Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HiTRUST » HITRUST CSF Control Categories

HITRUST CSF Control Categories

HITRUST CSF Control Categories are a bit complex, with over 150 individual controls in total. The exact number of controls your company needs to focus on can vary depending on how you define “control” and your specific compliance needs.

HITRUST organizes its framework into 14 distinct Control Categories, each labeled with a unique identifier from 0.0 to 0.13. These are further organized into 49 objectives and then detailed through 156 references. However, the actual controls your company needs to implement depend on the specifications that apply to your business and other compliance requirements.

The various tiers can get complicated, but the key is to focus on the controls relevant to your organization’s security and compliance needs. Here is the list of controls for your reference.

Control NameControl ObjectivesControl Specifications
Information Security Management Program11
Access Control725
Human Resources Security49
Risk Management14
Security Policy12
Organization of Information Security211
Compliance310
Asset Management25
Physical and Environmental Security213
Communications and Operations Management1032
Information Systems Acquisition, Development, and Maintenance613
Information Security Incident Management25
Business Continuity Management15
Privacy Practices721

Additional reading

ISO 27001 compliance software

10 Best ISO 27001 Compliance Software to Consider

ISO 27001 is one of the most widely recognized international standards for information security management, and many businesses are now turning to ISO 27001 compliance software to streamline implementation and ongoing audits.  The latest update to ISO 27001, released in September 2022, introduced notable changes to Annex A, including 11 new controls and a reorganization…
SOC 2 Auditors

SOC 2 Auditors: How to Choose Service Providers

Every business aiming to become SOC 2 (Service Organization Control) compliant must eventually engage with SOC 2 Auditors at the end of their SOC 2 audit readiness journey. Only a credible SOC 2 auditor such as a licensed CPA individual, or third-party consultant firm accredited by the American Institute of Certified Public Accountants (AICPA) can…
Conducting a Compliance Risk Assessment

Compliance Risk Assessment: Key Steps and Best Practices

Risk and compliance programs are evolving. The number of “mature and advanced” risk and compliance programs increased to 53% in 2023 from 38% in 2022: Navex 2023 Risk and Compliance Report. This indicates that organizations are increasingly recognizing the importance of compliance risk management.. Compliance risks are characterized as possible harm or negative repercussions of…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.