Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HiTRUST » HITRUST CSF Control Categories

HITRUST CSF Control Categories

HITRUST CSF Control Categories are a bit complex, with over 150 individual controls in total. The exact number of controls your company needs to focus on can vary depending on how you define “control” and your specific compliance needs.

HITRUST organizes its framework into 14 distinct Control Categories, each labeled with a unique identifier from 0.0 to 0.13. These are further organized into 49 objectives and then detailed through 156 references. However, the actual controls your company needs to implement depend on the specifications that apply to your business and other compliance requirements.

The various tiers can get complicated, but the key is to focus on the controls relevant to your organization’s security and compliance needs. Here is the list of controls for your reference.

Control NameControl ObjectivesControl Specifications
Information Security Management Program11
Access Control725
Human Resources Security49
Risk Management14
Security Policy12
Organization of Information Security211
Compliance310
Asset Management25
Physical and Environmental Security213
Communications and Operations Management1032
Information Systems Acquisition, Development, and Maintenance613
Information Security Incident Management25
Business Continuity Management15
Privacy Practices721

Additional reading

More Money =/= More Security. A Conversation on Budget with Christophe Fuolon 

During a recent conversation with Christophe Foulon, a vCISO at Qusitive who has over 17 years of experience, I naively asked him Can we equate bigger cybersecurity budgets with better protection—or are we missing the bigger picture? Christophe didn’t hesitate. “A big budget doesn’t guarantee good security—if it did, we’d never hear of billion-dollar companies…
NIST CSF Maturity Levels

A Quick Walk-Through of NIST CSF Maturity Levels and Models

Former U.S. Deputy Attorney General Paul McNulty once said, “If you think compliance is expensive, try non-compliance.” And we firmly believe that, and we know you believe that too, as you are serious about implementing NIST CSF maturity levels. So, without beating around the bush, let’s dive in and understand NIST CSF maturity levels and…

What is Cybersecurity Strategy Due Diligence? How to Automate ?

Are your vendors in line with your security policies and procedures? Do you conduct regular risk assessments of your third and fourth-party vendors to ensure compliance throughout their lifecycle? Organizations are increasingly relying on service providers, third and fourth-party vendors for their day-to-day operations. The adoption of integration to solve for agility, speed, and cost…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.