Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HiTRUST » HITRUST CSF Control Categories

HITRUST CSF Control Categories

HITRUST CSF Control Categories are a bit complex, with over 150 individual controls in total. The exact number of controls your company needs to focus on can vary depending on how you define “control” and your specific compliance needs.

HITRUST organizes its framework into 14 distinct Control Categories, each labeled with a unique identifier from 0.0 to 0.13. These are further organized into 49 objectives and then detailed through 156 references. However, the actual controls your company needs to implement depend on the specifications that apply to your business and other compliance requirements.

The various tiers can get complicated, but the key is to focus on the controls relevant to your organization’s security and compliance needs. Here is the list of controls for your reference.

Control NameControl ObjectivesControl Specifications
Information Security Management Program11
Access Control725
Human Resources Security49
Risk Management14
Security Policy12
Organization of Information Security211
Compliance310
Asset Management25
Physical and Environmental Security213
Communications and Operations Management1032
Information Systems Acquisition, Development, and Maintenance613
Information Security Incident Management25
Business Continuity Management15
Privacy Practices721

Additional reading

CCPA Compliance Checklist (This is All You Need)

CCPA is one of the most stringent compliance frameworks there is. This marks a significant shift where consumers have more access than ever to control how their personal data is processed. So, if your business is  collecting data on California residents, you must ask yourself, “When am I gonna get compliant.” However, don’t rush it;…

Risk Management in Healthcare: Strategies for a Safer Future

The healthcare sector has seen immense efficiency gains from technology—improved patient outcomes, centralized services through third-party vendors, better data management, and a constant drive for innovation. However, beneath the benefits lie a complex web of interconnected challenges—regulatory laws, clinical issues, patient data concerns, and an under-preparedness for cyber attacks. It’s no wonder that year after…

Security Assessment: Key Types and How to Get Started

Hackers today are constantly upgrading and using advanced techniques to exploit weaknesses and get their hands on data. As a CISO or founder, it is your responsibility to proactively develop countermeasures and protect your organization. The agility to respond however, comes with the understanding of your deficiencies. And that’s where security assessments come in.  Security…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.