Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HiTRUST » HITRUST Inheritance Program

HITRUST Inheritance Program

The HITRUST Inheritance Program lets organizations rely on shared security controls provided by internal IT services or external third parties, like service providers, vendors, cloud platforms (SaaS, IaaS/PaaS), colocation data centers, and other managed services.

For example, if you’re using Salesforce, the HITRUST Inheritance Program allows you to incorporate the controls Salesforce uses into your audits and assessments. 

This means you don’t have to review Salesforce’s audit reports individually. Instead, your assessor can rely on the fact that Salesforce has already met the required testing for those controls and their HITRUST assessor has reviewed everything. It simplifies the process and saves time while ensuring compliance.

Now, here’s how you can use HITRUST Inheritance:

  • External Inheritance:  You can adopt up to 85% of the control testing scores from HITRUST-certified third-party Cloud Service Providers (CSPs). 
  • Internal Inheritance: You can also inherit results from your organization’s assessments, but this feature is available only with Corporate and Premium subscriptions.

This makes it easier to leverage existing compliance work and streamline your own assessments.

Additional reading

Mastering Cybersecurity Dashboards: How to Build One That Works

Data does not always guarantee visibility. More often than not, CISOs find themselves entangled in a maze of tools offering siloed views of security and performance. And with such skewed views, organizations are often susceptible to blind spots that can be extremely hard to trace and resolve.  With a lack of insightful and actionable data,…
fedramp impact levels security controls

FedRAMP Impact Levels: High vs Moderate vs Low

Cloud Service Providers (CSPs) aiming for FedRAMP authorization must categorize their systems’ security impact levels as per FIPS 199, a NIST standard. However, there’s always an initial confusion of how accurately you can categorize systems.   Misclassifying systems, either by over-securing or under-protecting, often cause a delay in authorization or expose sensitive data to risks. So,…

List of PCI DSS Controls (Updated 2025)

Getting your PCI DSS ducks in a row requires a good understanding of the compliance requirements, their relevance in your business environment, and the controls that can help you bolster the protection of cardholder data. The Payment Card Industry Data Security Standard (PCI DSS) is designed to protect the entire payment card value chain and,…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.