Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HiTRUST » HITRUST CSF Control Categories

HITRUST CSF Control Categories

HITRUST CSF Control Categories are a bit complex, with over 150 individual controls in total. The exact number of controls your company needs to focus on can vary depending on how you define “control” and your specific compliance needs.

HITRUST organizes its framework into 14 distinct Control Categories, each labeled with a unique identifier from 0.0 to 0.13. These are further organized into 49 objectives and then detailed through 156 references. However, the actual controls your company needs to implement depend on the specifications that apply to your business and other compliance requirements.

The various tiers can get complicated, but the key is to focus on the controls relevant to your organization’s security and compliance needs. Here is the list of controls for your reference.

Control NameControl ObjectivesControl Specifications
Information Security Management Program11
Access Control725
Human Resources Security49
Risk Management14
Security Policy12
Organization of Information Security211
Compliance310
Asset Management25
Physical and Environmental Security213
Communications and Operations Management1032
Information Systems Acquisition, Development, and Maintenance613
Information Security Incident Management25
Business Continuity Management15
Privacy Practices721

Additional reading

Cyber security companies

11 Best Cyber Security Companies: How to Choose

The cybersecurity industry is vast and varied, with companies specializing in everything from endpoint protection to compliance automation. But with a seemingly endless list of cyber security companies vying for attention, each offering a unique mix of tools and services, choosing the right one can feel like searching for a needle in a haystack. In…
AI in IAM

AI in Identity & Access Management: Will It Disrupt or Sustain?

While digging through ISO 27001 experts on LinkedIn, I came across Alexandre Blanc’s insights on AI in security. Naturally, I was intrigued. Who better to discus IAM, which forms the backbone of ISO frameworks and every security strategy? Identity & Access Management (IAM) is at the core of protecting sensitive data so that only the…
How to Develop an Effective Cybersecurity Disaster Recovery Plan

Survive And Thrive: Building A Cybersecurity Disaster Recovery Plan That Works

Your company’s digital infrastructure has the potential to crumble in the blink of an eye. Leaders might know this but don’t want to face it. With disasters, it’s almost always the question of “when” not and “if”.  While digital interconnectedness propels us forward with unprecedented efficiency, it also exposes us to vulnerabilities that tend to…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.