Hitrust
Hitrust
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 1 of 488
Summary of Changes
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 2 of 488
CSF Table of Contents
Introduction ...................................................................................................................................................................................... 11
Organization of the CSF................................................................................................................................................................ 13
Key Components ........................................................................................................................................................................ 13
Control Categories ..................................................................................................................................................................... 14
Implementation Requirement Levels................................................................................................................................ 15
Segment Specific Requirements .......................................................................................................................................... 16
Risk Factors .................................................................................................................................................................................. 16
Alternate Controls ..................................................................................................................................................................... 18
Evolution of the CSF.................................................................................................................................................................. 18
CSF Assurance and MyCSF ..................................................................................................................................................... 19
Implementing the CSF .................................................................................................................................................................. 21
Management Commitment .................................................................................................................................................... 21
Scope ............................................................................................................................................................................................... 21
Organization ................................................................................................................................................................................ 21
Systems .......................................................................................................................................................................................... 21
Implementation .......................................................................................................................................................................... 22
Critical Success Factors ........................................................................................................................................................... 22
Primary Reference Material ....................................................................................................................................................... 23
Control Category: 0.0 - Information Security Management Program ....................................................................... 27
Objective Name: 0.01 Information Security Management Program..................................................................... 27
Control Reference: 0.a Information Security Management Program ...........................................27
Control Category: 01.0 - Access Control................................................................................................................................ 31
Objective Name: 01.01 Business Requirement for Access Control ....................................................................... 31
Control Reference: 01.a Access Control Policy ...........................................................................31
Objective Name: 01.02 Authorized Access to Information Systems..................................................................... 33
Control Reference: 01.b User Registration ...................................................................................33
Control Reference: 01.c Privilege Management ...........................................................................37
Control Reference: 01.d User Password Management .................................................................42
Control Reference: 01.e Review of User Access Rights ..............................................................46
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 3 of 488
Objective Name: 01.03 User Responsibilities ................................................................................................................ 48
Control Reference: 01.f Password Use .........................................................................................48
Control Reference: 01.g Unattended User Equipment .................................................................51
Control Reference: 01.h Clear Desk and Clear Screen Policy......................................................53
Objective Name: 01.04 Network Access Control .......................................................................................................... 55
Control Reference: 01.i Policy on the Use of Network Services ..................................................55
Control Reference 01.j User Authentication for External Connections .......................................58
Control Reference 01.k Equipment Identification in Networks ...................................................61
Control Reference 01.l Remote Diagnostic and Configuration Port Protection ...........................63
Control Reference: 01.m Segregation in Networks ......................................................................66
Control Reference: 01.n Network Connection Control ................................................................69
Control Reference: 01.o Network Routing Control ......................................................................72
Objective Name: 01.05 Operating System Access Control ........................................................................................ 74
Control Reference: 01.p Secure Log-on Procedures.....................................................................74
Control Reference 01.q User Identification and Authentication ..................................................78
Control Reference 01.r Password Management System ...............................................................82
Control Reference 01.s Use of System Utilities ...........................................................................85
Control Reference: 01.t Session Time-out ....................................................................................88
Objective Name: 01.06 Application and Information Access Control .................................................................. 91
Control Reference: 01.v Information Access Restriction .............................................................91
Control Reference: 01.w Sensitive System Isolation ....................................................................95
Objective Name: 01.07 Mobile Computing and Teleworking .................................................................................. 97
Control Reference: 01.x Mobile Computing and Communications .............................................97
Control Reference: 01.y Teleworking.........................................................................................100
Control Category: 02.0 - Human Resources Security.....................................................................................................104
Objective Name: 02.01 Prior to Employment ..............................................................................................................104
Control Reference: 02.a Roles and Responsibilities ...................................................................104
Control Reference: 02.b Screening ……………………………………………………………106
Objective Name: 02.02 During On-Boarding ................................................................................................................109
Control Reference: 02.c Terms and Conditions of Employment ................................................109
Objective Name: 02.03 During Employment ................................................................................................................113
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 4 of 488
Control Reference: 02.d Management Responsibilities..............................................................113
Control Reference: 02.e Information Security Awareness, Education and Training .................116
Control Reference: 02.f Disciplinary Process .............................................................................120
Objective Name: 02.04 Termination or Change of Employment .........................................................................123
Control Reference: 02.g Termination or Change Responsibilities .............................................123
Control Reference: 02.h Return of Assets ..................................................................................125
Control Reference: 02.i Removal of Access Rights ...................................................................127
Control Category: 03.0 - Risk Management .......................................................................................................................131
Objective Name: 03.01 Risk Management Program ..................................................................................................131
Control Reference: 03.a Risk Management Program Development ...........................................131
Control Reference: 03.b Performing Risk Assessments .............................................................134
Control Reference: 03.c Risk Mitigation ....................................................................................137
Control Reference: 03.d Risk Evaluation ...................................................................................140
Control Category: 04.0 - Security Policy .............................................................................................................................143
Objective Name: 04.01 Information Security Policy .................................................................................................143
Control Reference: 04.a Information Security Policy Document ...............................................143
Control Reference 04.b Review of the Information Security Policy ..........................................146
Control Category: 05.0 - Organization of Information Security ................................................................................151
Objective Name: 05.01 Internal Organization .............................................................................................................151
Control Reference: 05.a Management Commitment to Information Security ............................151
Control Reference: 05.b Information Security Coordination .....................................................154
Control Reference 05.d Authorization Process for Information Assets and Facilities ...............163
Control Reference: 05.e Confidentiality Agreements .................................................................165
Control Reference: 05.f Contact with Authorities ......................................................................168
Control Reference: 05.g Contact with Special Interest Groups ..................................................170
Control Reference: 05.h Independent Review of Information Security .....................................172
Objective Name: 05.02 External Parties.........................................................................................................................174
Control Reference: 05.i Identification of Risks Related to External Parties ..............................174
Control Reference: 05.j Addressing Security When Dealing with Customers ...........................178
Control Reference: 05.k Addressing Security in Third Party Agreements .................................181
Control Category: 06.0 – Compliance ...................................................................................................................................187
Objective Name: 06.01 Compliance with Legal Requirements .............................................................................187
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 5 of 488
Control Reference: 06.a Identification of Applicable Legislation ..............................................187
Control Reference: 06.b Intellectual Property Rights .................................................................189
Control Reference: 06.c Protection of Organizational Records ..................................................191
Control Reference: 06.d Data Protection and Privacy of Covered Information .........................195
Control Reference: 06.e Prevention of Misuse of Information Assets .......................................198
Control Reference: 06.f Regulation of Cryptographic Controls .................................................201
Objective Name: 06.02 Compliance with Security Policies and Standards and Technical Compliance
.........................................................................................................................................................................................................204
Control Reference: 06.g Compliance with Security Policies and Standards ..............................204
Control Reference: 06.h Technical Compliance Checking.........................................................207
Objective Name: 06.03 Information System Audit Considerations ....................................................................209
Control Reference: 06.i Information Systems Audit Controls....................................................209
Control Reference: 06.j Protection of Information Systems Audit Tools ..................................212
Control Category: 07.0 - Asset Management .....................................................................................................................214
Objective Name: 07.01 Responsibility for Assets .......................................................................................................214
Control Reference: 07.a Inventory of Assets ..............................................................................214
Control Reference: 07.b Ownership of Assets ............................................................................218
Control Reference: 07.c Acceptable Use of Assets ....................................................................221
Control Reference: 07.d Classification Guidelines .....................................................................223
Control Reference: 07.e Information Labeling and Handling ....................................................225
..............................................................................................................................................................................................................229
Control Category: 08.0 - Physical and Environmental Security ................................................................................230
Objective Name: 08.01 Secure Areas ...............................................................................................................................230
Control Reference: 08.a Physical Security Perimeter .................................................................230
Control Reference: 08.b Physical Entry Controls .......................................................................233
Control Reference: 08.c Securing Offices, Rooms, and Facilities .............................................237
Control Reference: 08.d Protecting Against External and Environmental Threats ....................239
Control Reference: 08.e Working in Secure Areas .....................................................................242
Objective Name: 08.02 Equipment Security .................................................................................................................246
Control Reference: 08.g Equipment Siting and Protection .........................................................246
Control Reference: 08.h Supporting Utilities .............................................................................249
Control Reference: 08.i Cabling Security ...................................................................................253
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 6 of 488
Control Reference: 08.j Equipment Maintenance .......................................................................255
Control Reference: 08.k Security of Equipment Off-Premises ..................................................260
Control Reference: 08.l Secure Disposal or Re-Use of Equipment ............................................262
Control Reference: 08.m Removal of Property ..........................................................................264
Control Category: 09.0 - Communications and Operations Management.............................................................266
Objective Name: 09.01 Documented Operating Procedures .................................................................................266
Control Reference: 09.a Documented Operations Procedures ...................................................266
Control Reference: 09.b Change Management ...........................................................................268
Control Reference 09.c Segregation of Duties ...........................................................................270
Control Reference: 09.e Service Delivery ..................................................................................275
Control Reference: 09.f Monitoring and Review of Third Party Services .................................278
Control Reference: 09.g Managing Changes to Third Party Services ........................................280
Objective Name: 09.03 System Planning and Acceptance ......................................................................................282
Control Reference: 09.h Capacity Management .........................................................................282
Control Reference: 09.i System Acceptance ..............................................................................284
Objective Name: 09.04 Protection Against Malicious and Mobile Code ...........................................................286
Control Reference: 09.j Controls Against Malicious Code ........................................................286
Control Reference: 09.k Controls Against Mobile Code ............................................................290
Objective Name: 09.05 Information Back-Up ..............................................................................................................293
Control Reference: 09.l Back-up ................................................................................................293
Objective Name: 09.06 Network Security Management ..........................................................................................296
Control Reference: 09.m Network Controls ...............................................................................296
Control Reference: 09.n Security of Network Services ..............................................................304
Objective Name: 09.07 Media Handling .........................................................................................................................306
Control Reference: 09.o Management of Removable Media .....................................................306
Control Reference: 09.p Disposal of Media ...............................................................................310
Control Reference: 09.q Information Handling Procedures .......................................................312
Objective Name: 09.08 Exchange of Information .......................................................................................................317
Control Reference: 09.s Information Exchange Policies and Procedures ..................................317
Control Reference: 09.t Exchange Agreements ..........................................................................323
Control Reference: 09.u Physical Media in Transit ....................................................................325
Control Reference: 09.v Electronic Messaging ..........................................................................328
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 7 of 488
Control Reference: 09.w Interconnected Business Information Systems ...................................329
Objective Name: 09.09 Electronic Commerce Services ...........................................................................................332
Control Reference: 09.x Electronic Commerce Services ...........................................................332
Control Reference: 09.y On-Line Transactions ..........................................................................335
Control Reference: 09.z Publicly Available Information ...........................................................337
Objective Name: 09.10 Monitoring...................................................................................................................................340
Control Reference: 09.aa Audit Logging ....................................................................................340
Control Reference: 09.ac Protection of Log Information ...........................................................351
Control Reference: 09.ad Administrator and Operator Logs ......................................................353
Control Reference: 09.ae Fault Logging .....................................................................................355
Control Reference: 09.af Clock Synchronization .......................................................................357
Control Category: 10.0 - Information Systems Acquisition, Development, and Maintenance......................360
Objective Name: 10.01 Security Requirements of Information Systems .........................................................360
Control Reference: 10.a Security Requirements Analysis and Specification .............................360
Objective Name: 10.02 Correct Processing in Applications ...................................................................................363
Control Reference: 10.b Input Data Validation ..........................................................................364
Control Reference: 10.c Control of Internal Processing .............................................................367
Control Reference: 10.d Message Integrity ................................................................................371
Control Reference: 10.e Output Data Validation ........................................................................372
Objective Name: 10.03 Cryptographic Controls .........................................................................................................374
Control Reference: 10.f Policy on the Use of Cryptographic Controls ......................................374
Control Reference: 10.g Key Management ................................................................................377
Objective Name: 10.04 Security of System Files .........................................................................................................380
Control Reference: 10.h Control of Operational Software .........................................................381
Control Reference: 10.i Protection of System Test Data ............................................................383
Control Reference: 10.j Access Control to Program Source Code .............................................385
Objective Name: 10.05 Security in Development and Support Processes .......................................................387
Control Reference: 10.k Change Control Procedures .................................................................387
Control Reference: 10.l Outsourced Software Development .....................................................394
Objective Name: 10.06 Technical Vulnerability Management ..............................................................................396
Control Reference: 10.m Control of Technical Vulnerabilities ..................................................396
Control Category: 11.0 - Information Security Incident Management ...................................................................402
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 8 of 488
Objective Name: 11.01 Reporting Information Security Incidents and Weaknesses ..................................402
Control Reference: 11.a Reporting Information Security Events ...............................................402
Control Category: 11.0 - Information Security Incident Management .......................................409
Objective Name: 11.02 Management of Information Security Incidents and Improvements .................412
Control Reference: 11.c Responsibilities and Procedures ..........................................................412
Control Reference: 11.d Learning from Information Security Incidents ....................................418
Control Reference: 11.e Collection of Evidence ........................................................................420
Control Category: 12.0 - Business Continuity Management .......................................................................................424
Objective Name: 12.01 Information Security Aspects of Business Continuity Management ...................424
Control Reference: 12.a Including Information Security in the Business Continuity Management
Process ........................................................................................................................................424
Control Reference: 12.b Business Continuity and Risk Assessment ..........................................426
Control Reference: 12.c Developing and Implementing Continuity Plans Including Information
Security .......................................................................................................................................429
Control Reference: 12.d Business Continuity Planning Framework ..........................................436
Control Reference: 12.e Testing, Maintaining and Re-Assessing Business Continuity Plans ...439
Control Category: 13.0 – Privacy Practices ........................................................................................................................444
Objective Name: 13.01 – Openness and Transparency............................................................................................444
Control Reference: 13.a Notice of Privacy Practices..................................................................444
Control Reference: 13.b Rights to Protection and Confidentiality .............................................446
Control Reference: 13.c Authorization Required .......................................................................449
Control Reference: 13.d Opportunity Required ..........................................................................453
Control Reference: 13.e Authorization or Opportunity Not Required .......................................455
Objective Name: 13.02 – Individual Choice and Participation..............................................................................459
Control Reference: 13.f Access to Individual Information .........................................................459
Control Reference: 13.g Accounting of Disclosures ..................................................................461
Control Reference: 13.h Correction of Records .........................................................................463
Control Reference: 13.i Required Uses and Disclosures ............................................................465
Control Reference: 13.j Permitted Uses and Disclosures ...........................................................467
Objective Name: 13.03 - Correction .................................................................................................................................472
Control Reference: 13.k Prohibited or Restricted Uses and Disclosures....................................472
Control Reference: 13.l Minimum Necessary Use .....................................................................474
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 9 of 488
Control Reference: 13.m Confidential Communications............................................................476
Control Reference: 13.n Organizational Requirements ..............................................................479
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 10 of 488
Introduction
The Health Information Trust Alliance (HITRUST) exists to ensure that information security
becomes a core pillar of, rather than an obstacle to, the broad adoption of health information
systems and exchanges.
All organizations within the healthcare industry currently face multiple challenges regarding
information security. These challenges include:
Public and regulatory concern over the increasing number of breaches in the industry
Redundant and inconsistent requirements and standards for healthcare organizations
Inconsistent adoption of minimum controls
Inability to implement security in medical devices and healthcare applications
Rapidly changing business, technology and regulatory environment
Ineffective and inefficient internal compliance management processes
Inconsistent business partner requirements and compliance expectations
Increasing scrutiny from regulators, auditors, underwriters, customers and business
partners
Growing risk and liability associated with information security.
HITRUST collaborated with healthcare, business, technology, and information security leaders
and established the Common Security Framework (CSF) to be used by any and all organizations
that create, access, store, or exchange protected health information. HITRUST is driving
adoption and widespread confidence in the CSF and sound risk mitigation practices through the
HITRUST Central community that provides awareness, education, advocacy, support,
knowledge‐sharing, and additional leadership and outreach activities.
The HITRUST CSF addresses these industry challenges by leveraging and enhancing existing
standards and regulations to provide organizations of varying sizes and risk profiles with
prescriptive implementation requirements. In doing so, the HITRUST CSF accomplishes the
following:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 11 of 488
Obtains industry consensus on the most effective way to address information security
while containing the cost of compliance and the number, complexity, and degree of
variation in security audits or reviews.
By engaging HITRUST, implementing the CSF, and getting assessed, organizations will have a
common security baseline and mechanism for communicating validated security controls to a
variety of constituents without redundant, overlapping, frequent, and costly audits.
The following HITRUST documents located under the Downloads section on HITRUST Central
should be referenced for additional program background and using the CSF:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 12 of 488
Organization of the CSF
HIPAA is not prescriptive, which makes it open to interpretation and difficult to apply.
Organizations must necessarily reference additional standards for guidance on how to
implement the requirements specified by HIPAA. It is also not the only set of security
requirements healthcare organizations need to address (e.g., PCI, state, business partner
requirements).
The HITRUST Common Security Framework (CSF) is not a new standard. The CSF is a
framework that normalizes the security requirements of healthcare organizations including
federal legislation (e.g., ARRA and HIPAA), federal agency rules and guidance (e.g., NIST, FTC
and CMS), state legislation (e.g., Nevada, Massachusetts and Texas), and industry frameworks
(e.g., PCI and COBIT), so the burden of compliance with the CSF is no more than what already
applies to healthcare organizations. The CSF was built to simplify these issues by providing
direction for security tailored to the needs of the organization. The CSF is the only framework
built to provide scalable security requirements based on the different risks and exposures of
organizations in the industry.
The HITRUST CSF also supports the requirements for an industry-specific cybersecurity
program outlined in the new Cybersecurity Framework, developed as part of a public-private
sector partnership between NIST and representatives from multiple critical infrastructure
industries. The NIST framework provides broad guidance to critical infrastructure industries
on the development and implementation of industry, sector, or organizational-level risk
management programs that are holistic, based upon a common set of principles, and can be
communicated with stakeholders regardless of organization, sector or industry. The HITRUST
CSF, along with the CSF Assurance Program and associated methodologies and tools, provides a
model implementation of the Cybersecurity Framework for the healthcare industry.
Key Components
The HITRUST CSF includes but is not limited to the following major components:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 13 of 488
The CSF includes the control objectives and control specifications based on the ISO/IEC
27001:2005 and ISO/IEC 27002:2005 standards. These guidelines from ISO were enhanced,
leveraging the NIST 800-series framework documents, ISO/IEC 27799:2008 Health Informatics
(guidance for information security management for healthcare organizations using ISO/IEC
27002), HIPAA, PCI, COBIT, HITECH, State requirements, and the experience and best practices
of the HITRUST community.
The CSF normalizes all of this material into the requirements of the CSF, referencing the
applicable standards and regulations as authoritative sources.
Control Categories
The CSF contains 13 security Control Categories comprised of 42 Control Objectives and 135
Control Specifications1. The CSF Control Categories, accompanied with the number of objectives
and specifications, are:
It should be noted that the order of the control categories does not necessarily imply their
importance, and all security controls should be considered important. However, the full
implementation of an Information Security Management Program (Control Category 0) will
1
Although not formally a part of CSF 2014 (v6), HITRUST has proposed a new Control Category, 13.0 Privacy
Practices, to support Texas certification of the HIPAA Privacy Rule. Formal incorporation of privacy requirements into
the CSF will occur once the HITRUST Board of Directors approves of the Privacy Working Group’s recommendations.
However, some of the supporting privacy requirements, which map to the existing 13 Control Categories, are included in
this release
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 14 of 488
allow an organization to better identify and understand their needs, objectives, and
requirements for information security. This will in turn allow the organization to identify,
define, and manage the processes and resources that are necessary for the implementation of
the rest of the CSF.
Risk Factor: Listing of organizational, system, and regulatory factors that drive requirements
for a higher level of control.
Standard Mapping: The cross-reference between each Implementation Requirement Level and
the requirements and controls of other common standards and regulations.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 15 of 488
requirements as determined by the industry; each subsequent level encompasses the lower
levels and includes additional requirements commensurate with increased risk.
Risk Factors
The HITRUST CSF defines a number of organizational, system, and regulatory risk factors that
increase the inherent risk to an organization or system, necessitating a higher level of control.
Organization Factors: The Organizational Factors are defined based on the size of the
organization and complexity of the environment as follows:
Volume of business
o Health Plan / Insurance – Number of Covered Lives
o Medical Facilities / Hospital – Number of Licensed Beds
o Pharmacy Companies – Number of Prescriptions Per Year
o Physician Practice – Number of Visits Per Year
o Third Party Processor – Number of Records Processed Per Year
o Biotech Companies – Annual Spend on Research and Development
o IT Service Provider / Vendor – Number of Employees
o Health Information Exchange – Number of Transactions Per Year
Geographic scope
o State
o Multi-state
o Off-shore (outside U.S.)
Regulatory Factors: The regulatory factors are defined based on the compliance requirements
applicable to an organization and systems in its environment:
Page 16 of 488
Subject to the State of Massachusetts Data Protection Act
Subject to the State of Nevada Security of Personal Information Requirements
Subject to the State of Texas Medical Records Privacy Act
Subject to Joint Commission Accreditation
Subject to CMS Minimum Security Requirements (High-level Baseline)
System Factors: The system factors are defined considering various system attributes that
would increase the likelihood or impact of a vulnerability being exploited. These factors are to
be assessed for each system or system grouping to determine the associated level of control.
The System Factors are:
For example, if a system is accessible from the Internet, exchanges data with a business partner,
and has the Level 2 threshold number of users, but DOES NOT process ePHI, that system is only
required to meet the Level 1 Implementation Requirements. However, if another system DOES
process ePHI AND is accessible from the Internet, then that system must meet an
Implementation Requirement level higher than Level 1.
Factor Logic: If a control contains more than one category of factors, the organization must
adhere to the highest level of Implementation Requirements that the factors drive it to.
For example, if a health plan is at the Level 2 threshold for a control based on their number of
covered lives but must also be FISMA compliant (implementing and adhering to the controls of
NIST), the organization must implement the Level 3 requirements of the CSF since FISMA is a
Level 3 Regulatory Factor for that control.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 17 of 488
Alternate Controls
With the diverse nature of today’s information systems, organizations may have systems in
their environments that do not have the capability to meet the CSF requirements. Consequently,
organizations may need to employ alternate security controls to mitigate risk or compensate
for a system control failure. HITRUST defined the alternate control process to provide the
means for organizations to meet CSF requirements by deploying alternate controls as a
substitute for control weaknesses. An alternate control is defined as a management,
operational, or technical control (i.e., safeguard or countermeasure) employed by an
organization in lieu of a security control for the Level 1, 2 or 3 Implementation Requirements
described in the CSF, and provides equivalent or comparable protection for an information
system.
1. The organization selects the alternate control(s) from the CSF, or if an appropriate
alternate control is not available, the organization proposes a suitable alternate control,
2. The organization provides a complete and convincing rationale to HITRUST addressing
how the alternate control provides an equivalent security capability or level of
protection for the information system, why the related minimum security control could
not be employed, and information about the associated application or device,
3. The HITRUST Alternate Controls Committee reviews and approves the alternate control,
and
4. The organization assesses and formally accepts the risk associated with employing the
alternate control for the information system.
The CSF is designed to easily adapt based on changes to the healthcare environment to address
and incorporate new standards and regulations. HITRUST has done extensive work in the past
two releases to harmonize NIST and CMS requirements, track inconsistencies due to CMS’s
current reliance on an older release of NIST SP 800-53, and better align and eliminate
redundant requirements within the framework. HITRUST will continue streamlining the
framework based on continued analysis of the framework’s implementation requirements and
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 18 of 488
recommendations from the HITRUST Community, and plans to add the following sources in
2014 in two interim releases (versions 6.1 and 6.2):
This fully integrated, optimized, and powerful tool marries the content and methodologies of
the HITRUST CSF and CSF Assurance program with the technology and capabilities of a
governance risk and compliance (GRC) tool. The new user-friendly MyCSF tool provides
healthcare organizations of all types and sizes with a secure, web-based solution for accessing
the CSF, performing assessments, managing remediation activities, and reporting and tracking
compliance. Managed and supported by HITRUST, MyCSF provides organizations with up-to-
date content, accurate and consistent scoring, reports validated by HITRUST and benchmarking
data unavailable anywhere else in the industry, thus going far beyond what a traditional GRC
tool can provide.
Through MyCSF organizations both large and small will maintain complete access to the CSF
and authoritative sources, and now have the expanded benefit of a complete picture of not only
their current state of compliance, but also the support and direction needed to track and
manage their remediation efforts and report on their progress. Organizations will also be able
to easily collaborate and work with HITRUST CSF Assessor organizations to share
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 19 of 488
documentation already in the tool, incorporate necessary corrective action plans, and monitor
progress.
GRC Capabilities and Functionality: MyCSF provides organizations with a sophisticated and
user-friendly tool in which to scope, assess and manage their environment. This new tool
increases the efficiency with which organizations can implement and assess against the CSF by
utilizing advanced workflows, custom criteria and notifications, and enhanced navigation and
search tools. The tool also provides a user-friendly interface with the availability of dashboards
and reports and acts as a central repository for managing documents, corrective action plans,
test plans, and system scoping.
CSF Assurance Methodology: The CSF Assurance program provides simplified and consistent
compliance assessment and reporting against the HITRUST CSF and the authoritative sources it
incorporates. This risk-based approach, which is governed and managed by HITRUST, is
designed for the unique regulatory and business needs of the healthcare industry and provides
organizations with an effective, standardized and streamlined assessment process to manage
compliance. HITRUST CSF Assessments utilize a maturity level scoring model and risk ratings
similar to PRISMA which provide more accurate, consistent and repeatable scoring, and help
organizations to prioritize their remediation efforts. This is a more effective process than that
used by other assessment approaches and toolkits which only support limited requirements
and use classic checkbox approaches.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 20 of 488
Implementing the CSF
The CSF is applicable to all healthcare organizations, of varying size and complexity, as the
framework encompasses the fundamental security controls required by all relevant standards
and regulations for which healthcare organizations are accountable.
The CSF incorporates the concept of an “Information Security Management System (ISMS)”
from the ISO 27001 standard, and it describes the need for this detailed framework of controls
when meeting the security objectives defined within the CSF. Industry experience and
professional best practice principles indicate that ongoing information security and compliance
is best met by the implementation of a formal management program.
Management Commitment
It is essential that an organization have the visible support and commitment of management
before attempting to implement the CSF. Management's active involvement and support are
essential for success and, at minimum, should include written and verbal statements of
commitment to the importance of information security and recognition of its benefits.
Management's clear understanding of purpose and their dedication to adopting the CSF will
help manage expectations and minimize problems around implementation efforts.
Scope
The CSF applies to covered information (i.e., information that organizations deem necessary to
secure, such as Protected Health Information (PHI)) in all its aspects, regardless of the form the
information takes (e.g., words and numbers, sound recordings, drawings, video and medical
images), the means used to store it (e.g. printing or writing on paper or electronic storage), and
the means used to transmit it (e.g., by hand, via fax, over computer networks or by post).
Organization
HITRUST allows organizations to break up their organization into auditable business units. An
auditable business unit is defined as units or departments within the organization that can
operate distinctly from one another. However, depending on the size and complexity of the
organization, they may also represent geographical regions or associations with other
(external) groups. Both distinctions are acceptable for the purposes of a CSF Validated or CSF
Certified assessment.
Systems
The controls of the HITRUST CSF are designed to apply to all information systems irrelevant of
classification or function. This includes all critical business systems and applications that store,
process, or transmit covered information regardless of whether they are standalone systems or
connected to the network. Supporting systems and applications are also within the scope of the
CSF, including application software components, databases, operating systems, interfaces, tools,
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 21 of 488
and servers. For the purposes of the CSF, there is a clear distinction between medical devices
and systems; however, medical devices are within the scope of the assessment.
When implementing the CSF, it is appropriate to aggregate assets into one observation if the
management, function, and environment allow the assets to be logically grouped.
Implementation
Implementation of the HITRUST CSF and assessment process will vary by organization in both
time commitment and level of effort, as a product of the following factors:
Complexity of the environment: Considering the size, amount of data processed, type
of data processed, and sophistication of information systems technology;
Security maturity: Considering the adequacy of people devoted to the security
organization, processes defined and controls currently implemented; and
Resources: Considering the number of resources available and budgetary constraints.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 22 of 488
Primary Reference Material
For the HITRUST CSF, a broad base of U.S. federal regulations and international information
protection standards and frameworks were used to ensure the CSF addresses all areas of
InfoSec governance and control as it relates to the healthcare industry.
The CSF integrates and normalizes these different authoritative sources, incorporating key
objectives under one umbrella framework that also provides prescriptive implementation
requirements for meeting the objectives.
For the 2014 CSF, eighteen (18) of the major information security related standards,
regulations and frameworks are included as the major supporting references to ensure
appropriate coverage, consistency, and alignment:
Page 23 of 488
Joint Commission (formerly the Joint Commission on the Accreditation of Healthcare
Organizations, JCAHO)
NIST Special Publication 800-53 Revision 4 (Final)
Security Controls for Federal Information Systems and Organizations
NIST Special Publication 800-66
An Introductory Resource Guide for Implementing the Health Insurance Portability and
Accountability Act (HIPAA) Security Rule
NRS: Chapter 603A – State of Nevada
Security of Personal Information
Payment Card Industry (PCI) Data Security Standard Version 2.0
Information Management (IM) Standards, Elements of Performance, and Scoring
Texas Gen. Laws § 181 – State of Texas (aka “TX HB 300”)
Texas Medical Records Privacy Act
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 24 of 488
Questions and Comments on the CSF
HITRUST encourages organizations to provide their comments to ensure the CSF continues to
evolve as the most relevant framework for information security in the healthcare industry.
Organizations who wish to provide HITRUST with feedback on the CSF can do so by sending
their comments via email to [email protected]. The forum contains instructions
and a template to document your comments. Any questions about use or distribution of the CSF
should be sent to [email protected].
About HITRUST
The Health Information Trust Alliance or HITRUST was born out of the belief that information
security is critical to the broad adoption, utilization and confidence in health information
systems, medical technologies and electronic exchanges of health information, and in turn
realizing the promise for quality improvement and cost containment in America's healthcare
system.
The CSF in PDF format can be accessed through HITRUST Central – the industry’s first managed
online community for healthcare information security professionals. HITRUST Central is a
resource for individuals who seek to enhance their organization’s knowledge of information
security and interact and collaborate with their peers. HITRUST Central boasts resources such
as user forums, blogs, downloads, and education for all qualified subscribers.
This document has been provided AS IS, without warranty. HITRUST and its agents and
affiliates are not responsible for content of third parties.
HITRUST and CSF are trademarks of HITRUST Alliance LLC. HITRUST CENTRAL is a trademark
of HITRUST Service Corporation. All other marks contained herein are the property of their
respective owners.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 25 of 488
[This page intentionally left blank]
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 26 of 488
Control Category: 0.0 - Information Security Management Program
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 27 of 488
updated at least annually or when there are significant changes in the
environment.
Level 1 Control COBIT 4.1 R2 DS5.2
Standard COBIT 5 APO13.02
Mapping: CSA IS-01
HIPAA §164.308(a)(1)(i)
HIPAA §164.308(a)(1)(ii)(A)
HIPAA §164.308(a)(1)(ii)(B)
HIPAA §164.308(a)(8)
HIPAA §164.316(b)(1)(i)
HIPAA §164.316(b)(2)(iii)
ISO/IEC 27001-2005 4.1
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
1 TAC § 390.2(a)(1)
The ISMP shall incorporate a Plan, Do, Check, Act (PDCA) cycle for
continuous improvement in the ISMP, particularly as information is
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 28 of 488
obtained that could improve the ISMP, or indicates any shortcomings of the
ISMP.
Level 2 Control COBIT 4.1 R2 DS5.5
Standard COBIT 5 DSS05.07
Mapping: ISO/IEC 27001-2005 4.2.1
ISO/IEC 27001-2005 4.2.2
ISO/IEC 27001-2005 4.2.3
ISO/IEC 27001-2005 4.2.4
ISO/IEC 27001-2005 4.3.1
ISO/IEC 27001-2005 4.3.2
ISO/IEC 27001-2005 4.3.3
ISO27799-2008 6.4
ISO 27799-2008 6.5
ISO 27799-2008 6.6
ISO 27799-2008 6.7
NIST SP800-53 R4 PM-1
(State of Mass.) 201 CMR 17.03(1)
The organization shall ensure that all personnel who are assigned
responsibilities defined in the ISMP are competent to perform the required
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 29 of 488
tasks. The organization shall also ensure that all relevant personnel are
aware of the relevance and importance of their information security
activities and how they contribute to the achievement of the ISMP
objectives.
The organization shall conduct internal ISMP audits at planned intervals to
determine the continuing suitability, adequacy and effectiveness of the
program.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 30 of 488
Control Category: 01.0 - Access Control
Page 31 of 488
i. security requirements of individual business applications;
ii. policies for information dissemination and authorization (e.g., need-to-
know, need to share, and least privilege principles; security levels; and
classification of information.)
iii. relevant legislation and any contractual obligations regarding
protection of access to data or services;
iv. standard user access profiles for common job roles in the organization;
v. requirements for formal authorization of access requests;
vi. requirements for emergency access;
vii. requirements for periodic review of access controls; and
viii. removal of access rights.
The organization shall develop, disseminate, and review and update the
access control policy and procedures annually.
Level 1 Control CMSRs 2012v1.5 AC-1 (HIGH)
Standard CSA IS-07
Mapping: HIPAA §164.308 (a)(3)(i)
HIPAA §164.308 (a)(3)(ii)(a)
HIPAA §164.308 (a)(4)(i)
HIPAA §164.308 (a)(4)(ii)(A)
HIPAA §164.308 (a)(4)(ii)(B)
HIPAA §164.308 (a)(4)(ii)(C)
HIPAA §164.312 (a)(1)
JCAHO IM.02.01.03, EP 1
NIST SP800-53 R4 AC-1
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 32 of 488
Level 2 None
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
All information related to the business applications and the risks the
information is facing shall be identified. The access control and information
classification policies of different systems and networks shall be consistent.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control To ensure authorized user accounts are registered, tracked and periodically
Objective: validated to prevent unauthorized access to information systems.
Control There shall be a formal documented and implemented user registration and
Specification: de-registration procedure for granting and revoking access.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 33 of 488
Factor Type: System
Topics: Authorization
Monitoring
Policies and Procedures
User Access
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to State of Massachusetts Data Protection Act, Subject to Joint
Regulatory Commission Accreditation
Factors:
Level 1 The access control procedure for user registration and de-registration shall
Implementation: include policies and procedures for establishing, activating, modifying,
reviewing, disabling, and removing accounts. Account types shall be
identified (individual, shared/group, system, application,
guest/anonymous, emergency and temporary) and conditions for group
and role membership shall be established.
The access control procedure for user registration and de-registration shall:
i. communicate password procedures and policies to all users who have
system access
ii. check that the user has authorization from the system owner for the use
of the information system or service;
iii. separate approval for access rights from management;
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 34 of 488
iv. check that the level of access granted is appropriate to the business
purpose and is consistent with organizational security policy (e.g. it
does not compromise segregation of duties);
v. give users a written statement of their access rights;
vi. require users to sign statements indicating that they understand the
conditions of access;
vii. ensure service providers do not provide access until authorization
procedures have been completed;
viii. ensure default accounts are removed and/or renamed;
ix. maintain a formal record of all persons registered to use the service;
x. remove or block critical access rights of users who have changed roles
or jobs or left the organization immediately and remove or block non-
critical access within 24 hours; and
xi. automatically remove or disable accounts that have been inactive for a
period of sixty (60) days or more.
Level 1 Control COBIT 4.1 DS05.03
Standard CMSRs 2012v1.5 AC-2 (HIGH)
Mapping: CMSRs 2012v1.5 AC-2(3) (HIGH)
CMSRs 2012v1.5 IA-1 (HIGH)
CMSRs 2012v1.5 IA-4 (HIGH)
CMSRs 2012v1.5 IA-5 (HIGH)
CSA IS-08
HIPAA §164.312(a)(2)(i)
HIPAA §164.312(a)(2)(ii)
HIPAA §164.308(a)(3)(ii)(A)
HIPAA §164.308(a)(3)(ii)(B)
HIPAA §164.308(a)(4)(i)
HIPAA §164.308(a)(4)(ii)(B)
HIPAA §164.308(a)(4)(ii)(C)
HIPAA §164.308(a)(5)(ii)(C)
HIPAA §164.308(a)(5)(ii)(D)
JCAHO IM.02.01.03, EP 5
NIST SP800-53 R4 AC-2
NIST SP800-53 R4 AC-2 (3)
NIST SP800-53 R4 IA-1
NIST SP800-53 R4 IA-4
NIST SP800-53 R4 IA-5
PCI DSS v2 8.1
PCI DSS v2 8.2
PCI DSS v2 8.5.1
PCI DSS v2 8.5.4
PCI DSS v2 8.5.5
PCI DSS v2 8.5.7
PCI DSS v2 12.5.4
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 35 of 488
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v.2.1.0 Subsection 3.3
(State of Mass.) 201 CMR 17.04(2)(a)
(State of Mass.) 201 CMR 17.04(2)(b)
(State of Mass.) 201 CMR 17.04(1)(d)
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes
Factors:
Level 2 Subject to PCI Compliance
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
The organization shall require that the registration process to receive
hardware administrative tokens and credentials used for two (2)-factor
authentication be verified in person before a designated registration
authority with authorization by a designated organizational official (e.g., a
supervisor).
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 36 of 488
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
The organization shall employ automated mechanisms to support the
management of information system accounts. Account creation,
modification, disabling, and removal actions shall be automatically logged
and audited providing notification, as required, to appropriate individuals.
CMS Contractors Disable user accounts after sixty (60) days of inactivity.
Disabled accounts shall be deleted during the annual re-certification
process.
Control The allocation and use of privileges to information systems and services
Specification: shall be restricted and controlled. Special attention shall be given to the
allocation of privileged access rights, which allow users to override system
controls.
Factor Type: System
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 37 of 488
Topics: Authorization
User Access
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to State of Massachusetts Data Protection Act, Subject to Joint
Regulatory Commission Accreditation
Factors:
Level 1 The allocation of privileges shall be controlled through a formal
Implementation: authorization process. The access privileges associated with each system
product (e.g. operating system, database management system and each
application) and the users to which they need to be allocated shall be
identified. Privileges shall be allocated to users on a need-to-use basis and
on an event-by-event basis in line with the access control policy (e.g. the
minimum requirement for their functional role only when needed).
Page 38 of 488
HIPAA §164.308(a)(4)(ii)(C)
HIPAA §164.308(a)(5)(ii)(C)
HIPAA §164.312(a)(1)
HIPAA §164.312(a)(2)(i)
HIPAA §164.312(a)(2)(ii)
ISO/IEC 27002-2005 11.2.2
JCAHO IM.02.01.03, EP 5
NIST SP800-53 R4 AC-6
NIST SP800-53 R4 AC-6(1)
PCI DSS v2 7.1
PCI DSS v2 7.1.3
PCI DSS v2 7.2.1
PCI DSS v2 7.2.2
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
(State of Mass.) 201 CMR 17.04(2)(a)
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes, Number of
Factors: Users: > 500, Number of Interfaces to Other Systems: > 25
Level 2 None
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
Access controls are implemented via an automated access control system.
Role-based access control shall be implemented and capable of mapping
each user to one or more roles, and each role to one or more system
functions.
The development and use of system routines shall be promoted to avoid the
need to grant privileges to users. The development and use of programs
which avoid the need to run with elevated privileges shall be promoted.
Page 39 of 488
during each system access session). The use of system administration
privileges (any feature or facility of an information system that enables the
user to override system or application controls) shall be minimized. Access
to privileged functions (e.g., system-level software, administrator tools,
scripts, utilities) deployed in hardware, software, and firmware shall be
restricted. Security relevant information shall be restricted to explicitly
authorized individuals.
The access control system for the system components storing, processing or
transmitting covered information shall be set with a default "deny-all"
setting.
Level 2 Control CMSRs 2012v1.5 AC-2 (HIGH)
Standard CMSRs 2012v1.5 AC-6(2) (HIGH)
Mapping: ISO 27799-2008 7.8.2.2
NIST SP800-53 R4 AC-2
NIST SP800-53 R4 AC-6(2)
NIST SP800-53 R4 AC-21
PCI DSS v2 7.1.1
PCI DSS v2 7.1.2
PCI DSS v2 7.1.4
PCI DSS v2 7.2
PCI DSS v2 7.2.3
Level 3 None
Organizational
Factors:
Level 3 System Processing PHI: Yes - AND -, Number of Users: > 5,500, Number of
Factors: Transactions Per Day: > 85,000, Number of Interfaces to Other Systems: >
75
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 40 of 488
Level 3 Subject to PCI Compliance, Subject to FISMA Compliance, Subject to the CMS
Regulatory Minimum Security Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
The organization shall limit authorization to privileged accounts on
information systems to a pre-defined subset of users and shall track and
monitor privileged role assignments. The organization shall audit the
execution of privileged functions on information systems and ensure
information systems prevent non-privileged users from executing
privileged functions to include disabling, circumventing, or altering
implemented security safeguards.
All file system access not explicitly required for system, application, and
administrator functionality shall be disabled.
Contractors shall be provided with minimal system and physical access, and
shall agree to and support the organization's security requirements. The
contractor selection process shall assess the contractor's ability to adhere
to and support the organization's security policy and procedures.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 41 of 488
Level 3 Control CMSRs 2012v1.5 AC-2(7) (HIGH)
Standard CMSRs 2012v1.5 AC-6 (HIGH)
Mapping: NIST SP800-53 R4 AC-6(5)
NRS 603A.215.1
PCI DSS v2 8.5.16
CMS All system and removable media boot access shall be disabled unless it is
Contractors: explicitly authorized by the organizational CIO for compelling operational
needs. If system and removable media boot access is authorized, boot
access is password protected.
Health HIEs shall, for all employees and for all employees of connecting
Information organizations, define and assign roles to each individual with access to the
Exchanges: HIE. The roles shall be based on the individual’s job function and
responsibilities. The roles shall specify the type of access and level of access.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 42 of 488
Level 1 Subject to State of Massachusetts Data Protection Act, Subject to the CMS
Regulatory Minimum Security Requirements (High)
Factors:
Level 1 The following controls shall be implemented to maintain the security of
Implementation: passwords:
i. passwords shall be prohibited from being displayed when entered;
ii. passwords shall be changed whenever there is any indication of
possible system or password compromise; and
iii. user identity shall be verified before performing password resets.
Page 43 of 488
PCI DSS v2.0 8.5.3
PCI DSS v2 8.5.8
PCI DSS v2 8.5.10
PCI DSS v2 8.5.11
PCI DSS v2 8.5.12
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 1 CORE 153: Eligibility and Benefits Connectivity Rule v1.1.0
Subsection 5.1
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
(State of Mass.) 201 CMR 17.04(1)(b)
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes, Number of
Factors: Interfaces to Other Systems: > 25
Level 2 Subject to PCI Compliance, Subject to FISMA Compliance
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
The following controls shall be implemented to maintain the security of
passwords:
i. passwords shall be protected from unauthorized disclosure and
modification when stored and transmitted;
ii. passwords shall not be included in any automated log-on process (e.g.
stored in a macro or function key);
iii. all passwords shall be encrypted during transmission and storage on all
system components;
iv. users shall sign a statement to keep personal passwords confidential
and to keep group passwords solely within the members of the group;
and
v. temporary passwords shall be unique to an individual and shall not be
guessable;
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 44 of 488
i. maintaining the uniqueness of each combined identification code and
password, such that no two individuals have the same combination of
identification code and password.
ii. ensuring that identification code and password issuances are
periodically checked, recalled, or revised (e.g. to cover such events as
password aging);
iii. following loss management procedures to electronically de-authorize
lost, stolen, missing or otherwise potentially compromised tokens,
cards and other devices that bear or generate identification code or
password information, and to issue temporary or permanent
replacements using suitable, rigorous controls;
iv. use of transaction safeguards to prevent unauthorized use of passwords
and/or identification codes, and to detect and report in an immediate
and urgent manner any attempts at their unauthorized use to the
system security unit, and, as appropriate, to organization management;
and
v. initial and periodic testing of devices, such as tokens or cards, that bear
or generate identification code or password information to ensure that
they function properly and have not been altered in an unauthorized
manner.
Level 2 Control 21 CFR Part 11.30
Standard CMSRs 2012v1.5 IA-5 (HIGH)
Mapping: CMSRs 2012v1.5 IA-5(1) (HIGH)
ISO 27002-2005 11.2.3
ISO 27799-2008 7.8.2.3
NIST SP800-53 R4 IA-5
NIST SP800-53 R4 IS-5(1)
NRS 603A.215.1
PCI DSS v2 8.4
PCI DSS v2 8.5.9
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 45 of 488
CMS Contractors
Control All access rights shall be regularly reviewed by management via a formal
Specification: documented process.
Factor Type: System
Topics: Audit and Accountability
Monitoring
User Access
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to State of Massachusetts Data Protection Act
Regulatory
Factors:
Level 1 The following procedures shall be carried out to ensure the regular review
Implementation: of access rights by management:
i. user's access rights shall be reviewed after any changes, such as
promotion, demotion, or termination of employment; and
ii. user's access rights shall be reviewed and re-allocated when moving
from one employment to another within the same organization.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 46 of 488
Level 1 Control CSA IS-10
Standard HIPAA §164.312(a)(2)(i)
Mapping: HIPAA §164.312(a)(2)(ii)
HIPAA §164.308(a)(3)(ii)(A)
HIPAA §164.308(a)(3)(ii)(B)
HIPAA §164.308(a)(3)(ii)(C)
HIPAA §164.308(a)(4)(i)
HIPAA §164.308(a)(4)(ii)(B)
HIPAA §164.308(a)(5)(ii)(C)
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
(State of Mass.) 201 CMR 17.03(2)(h)
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -
Factors:
Level 2 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 2 Level 1 plus:
Implementation:
The organization shall maintain a documented list of authorized users of
information assets. In addition:
Page 47 of 488
NIST SP800-53 R4 AC-2
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Health HIEs shall, for all employees and for all employees of connecting
Information organizations, review users with access and the appropriateness of each
Exchanges: user’s role every 90 days. Any discrepancies shall be remediated
immediately following the review.
Control Users shall be made aware of their responsibilities for maintaining effective
Specification: access controls and shall be required to follow good security practices in
the selection and use of passwords and security of equipment.
Page 48 of 488
Topics: Authentication
Awareness and Training
Password Management
Page 49 of 488
is assured that a reasonable level of protection has been established for the
storage of the password within each service, system or platform.
Level 1 Control CMSRs 2012v1.5 IA-5 (HIGH)
Standard CMSRs 2012v1.5 IA-5(1) (HIGH)
Mapping: HIPAA §164.308 (a)(5)(ii)(D)
ISO/IEC 27002-2005 11.3.1
ISO 27799-2008 7.8.3
JCAHO IM.02.01.03, EP 5
NIST SP800-53 R4 IA-5
NIST SP800-53 R4 IA-5(1)
NRS 603A.215.1
PCI DSS v2 8.5.3
PCI DSS v2 8.5.7
PCI DSS v2 8.5.9
PCI DSS v2 8.5.10
PCI DSS v2 8.5.11
PCI DSS v2 8.5.12
PCI DSS v2 8.5.13
PCI DSS v2 8.5.14
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 1 CORE 153: Eligibility and Benefits Connectivity Rule v1.1.0
Subsection 5.1
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
(State of Mass.) 201 CMR 17.04(1)(b)
(State of Mass.) 201 CMR 17.04(1)(e)
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 50 of 488
Level 3 Implementation Requirements
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
CMS A password minimum age of one (1) and maximum age of sixty (60) days
Contractors: (one hundred eighty (180) days for a system account maximum) shall
be set.
Control Users shall ensure that unattended equipment has appropriate protection.
Specification:
Factor Type: Organizational
Topics: Awareness and Training
Media and Assets
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 51 of 488
Level 1 All users shall be made aware of the security requirements and procedures
Implementation: for protecting unattended equipment, as well as their responsibilities for
implementing such protection.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 52 of 488
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control A clear desk policy for papers and removable storage media and a clear
Specification: screen policy for information assets shall be adopted.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 53 of 488
The following practices shall be established:
i. covered or critical business information (e.g. on paper or on electronic
storage media) shall be locked away (ideally in a safe or cabinet or
other forms of security furniture) when not required, especially when
the office is vacated;
ii. computers and terminals shall be left logged off or protected with a
screen and keyboard locking mechanism controlled by a password,
token or similar user authentication mechanism that conceals
information previously visible on the display when unattended and
shall be protected by key locks, passwords or other controls when not
in use;
iii. incoming and outgoing mail points and unattended facsimile machines
shall be protected;
iv. unauthorized use of photocopiers and other reproduction technology
(e.g., scanners, digital cameras) shall be prevented;
v. documents containing covered or classified information shall be
removed from printers, copiers, and facsimile machines immediately;
and
vi. when transporting documents with covered information within
facilities and through inter-office mail, information shall not be visible
through envelope windows, and envelopes shall be marked according to
its classification level (e.g. "Confidential").
Level 1 Control CMSRs 2012v1.5 AC-11 (HIGH)
Standard CSA IS-17
Mapping: HIPAA §164.310(b)
HIPAA §164.312(a)(2)(i)
ISO/IEC 27002-2005 11.3.3
ISO 27799-2008 7.8.3
NIST SP800-53 R4 AC-11
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 2.2: Certification Policy v2.1.0 Subsection 3.3
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 54 of 488
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Users shall only be provided with access to internal and external network
Specification: services that they have been specifically authorized to use. Authentication
and authorization mechanisms shall be applied for users and equipment.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 55 of 488
Level 1 System None
Factors:
Level 1 Subject to FISMA Compliance
Regulatory
Factors:
Level 1 The organization shall specify the networks and network services to which
Implementation: users are authorized access.
Level 1 Control CMSRs 2012v1.5 AC-1 (HIGH)
Standard HIPAA §164.308(a)(3)(i)
Mapping: HIPAA §164.308(a)(3)(ii)(A)
HIPAA §164.308(a)(4)(i)
HIPAA §164.308(a)(4)(ii)(B)
HIPAA §164.308(a)(4)(ii)(C)
HIPAA §164.312(a)(1)
ISO/IEC 27001-2005 A:11.4.1
NIST SP800-53 R4 AC-1
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 56 of 488
Use of external information systems shall be managed effectively including:
i. information systems or components of information systems that are
outside of the accreditation boundary established by the organization
shall be identified as external information systems including:
1. information systems or components of information systems for
which the organization typically has no direct control over the
application of required security controls or the assessment of
security control effectiveness shall be identified as external
information systems;
2. personally owned information systems (e.g. computers, cellular
telephones, or personal digital assistants) shall be identified as
external information systems; and
3. privately owned computing and communications devices
resident in commercial or public facilities (e.g. hotels,
convention centers, or airports) shall be identified as external
information systems.
ii. authorized individuals shall be prohibited from using an external
information system to access the information system or to process,
store or transmit organization-controlled information except in
situations where the organization:
1. can verify the employment of required security controls on the
external system as specified in the organization’s information
security policy and system security plan; or
2. has approved information system connection or processing
agreements with the organizational entity hosting the external
information system.
The organization shall identify ports, services, and similar applications (e.g.,
protocols) necessary for business and provide the rationale or identify
compensating controls implemented for those protocols considered to be
insecure.
Level 2 Control CMSRs 2012v1.5 AC-20 (HIGH)
Standard CMSRs 2012v1.5 CM-7 (HIGH)
Mapping: CSA IS-08
CSA SA-08
ISO/IEC 27002-2005 11.4.1
ISO 27799-2008 7.8.4
NIST SP800-53 R4 AC-20
NIST SP800-53 R4 CM-7
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 57 of 488
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Page 58 of 488
Additional authentication controls shall be implemented to control access
to wireless networks. In particular, special care is needed in the selection of
controls for wireless networks due to the greater opportunities for
undetected interception and insertion of network traffic.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 59 of 488
Companies: > 10,000,000 Prescriptions Per Year, Health Information
Exchange: >1,000,000 Transactions Per Year
Level 2 System None
Factors:
Level 2 Subject to FISMA Compliance
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
Authentication of remote users shall be implemented via virtual private
network (VPN) solutions that support a cryptographic based technique,
hardware tokens, or a challenge/response protocol. Dedicated private lines
may also be used to provide assurance of the source of connections. Control
all remote access through a limited number of managed access control
points.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 60 of 488
Level 3 BioTech Organizations: > $200,000,000 Spend on Research and
Organizational Development Per Year, Pharmaceutical Companies: > 70,000,000
Factors: Prescriptions Per Year, Third Party Processor: > 60,000,000 Records
Processed Per Year, Physician Practice: > 180,000 Visits Per Year, Medical
Facilities / Hospital: > 10,000 Licensed Beds, Health Plan / Insurance /
PBM: > 7,500,000 Covered Lives, IT Service Providers (Vendors): > 2,500
Employees, Pharmacy Companies: > 70,000,000 Prescriptions Per Year,
Health Information Exchange: >6,000,000 Transactions Per Year
Level 3 System None
Factors:
Level 3 Subject to PCI Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
Automated mechanisms shall be employed to facilitate the monitoring and
control of remote access methods.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 61 of 488
Control Automatic equipment identification shall be used as a means to
Specification: authenticate connections from specific locations and equipment.
Factor Type: System
Topics: Authentication
Communications and Transmissions
Media and Assets
Network Security
Level 1 None
Organizational
Factors:
Level 1 System Processing PHI: Yes -AND-, Accessible from the Internet: Yes, Exchanges
Factors: Data with a Business Partner: Yes, Third Party Support (Vendor Access or
Maintenance): Yes, System Connects with or Exchanges Data with an HIE:
Yes
Level 1 Subject to FISMA Compliance
Regulatory
Factors:
Level 1 An identifier in or attached to the equipment shall be used to indicate
Implementation: whether this equipment is permitted to connect to the network. These
identifiers shall clearly indicate to which network the equipment is
permitted to connect, if more than one network exists and particularly if
these networks are of differing sensitivity.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 62 of 488
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements.
Implementation:
Control Physical and logical access to diagnostic and configuration ports shall be
Specification: controlled.
Factor Type: Organizational
Topics: Authorization
Media and Assets
Physical and Facility Security
Network Security
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 63 of 488
Level 1 System None
Factors:
Level 1 None
Regulatory
Factors:
Level 1 Access to network equipment shall be physically protected (e.g. a router
Implementation: must be stored in a room that is only accessible by authorized employees or
contractors).
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 64 of 488
NIST SP800-53 R4 MA-4
NIST SP800-53 R4 MA-4(2)
NIST SP800-53 R4 MA-4(3)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 65 of 488
CMS Contractor Requirements
CMS A list of specifically needed system services, ports, and network protocols
Contractors: will be maintained and documented in the security plan.
Page 66 of 488
be capable of enforcing security policies, be configured to filter traffic
between these domains, and block unauthorized access in accordance with
the organization's access control policy.
The organization shall require a firewall between any wireless network and
the covered information systems environment.
A web-application firewall shall be placed in front of public-facing web
application to detect and prevent web-based attacks.
Level 1 Control CSA SA-08
Standard HIPAA §164.308(a)(3)(ii)(A)
Mapping: HIPAA §164.308(a)(3)(ii)(B)
HIPAA §164.310(b)
PCI DSS v2.1.1.3
PCI DSS v2.6.6
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 67 of 488
Networks shall be divided into separate logical network domains (e.g. an
organization's internal network domains and external network domains)
each protected by a defined security perimeter. A graduated set of controls
shall be applied in different logical network domains to further segregate
the network security environments (e.g. publicly accessible systems,
internal networks, and critical assets).
The domains shall be defined based on a risk assessment and the different
security requirements within each of the domains.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 68 of 488
Level 3 System None
Factors:
Level 3 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
Level 3 Control CMSRs 2012v1.5 AC-4 (HIGH)
Standard CMSRs 2012v1.5 SC-32 (HIGH)
Mapping: ISO 27799-2008 7.8.4
NIST SP800-53 R4 SC-32
CMS The organization shall partition the information system into components
Contractors: residing in separate physical domains (or environments) as deemed
necessary.
Control For shared networks, especially those extending across the organization's
Specification: boundaries, the capability of users to connect to the network shall be
restricted, in line with the access control policy and requirements of the
business applications.
Page 69 of 488
Level 1 At managed interfaces, network traffic is denied by default and allowed by
Implementation: exception (i.e., deny all, permit by exception).
The organization shall restrict the ability of users to connect to the internal
network in accordance with the access control policy and the requirements
of the clinical and business applications.
Level 1 Control CMSRs 2012v1.5 SC-7 (HIGH)
Standard CMSRs 2012v1.5 SC-7(5) (HIGH)
Mapping: CSA DG-07
HIPAA §164.310(b)
NIST SP800-53 R4 SC-7
NIST SP800-53 R4 SC-7(5)
NRS 603A.215.1
(State of Mass.) 201 CMR 17.04(6)
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 70 of 488
v. review exceptions to the traffic flow policy within every three hundred
sixty-five (365) days or implementation of a major new systems; and
The organization shall limit the number of access points to the information
system (e.g., prohibiting desktop modems) to allow for more
comprehensive monitoring of inbound and outbound communications and
network traffic.
The organization shall use strong cryptography and security protocols, such
as SSL/TLS or IPSEC, to safeguard covered information during transmission
over open, public networks.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 71 of 488
CMSRs 2012v1.5 SC-7(3) (HIGH)
CMSRs 2012v1.5 SC-7(4) (HIGH)
CMSRs 2012v1.5 SC-7(7) (HIGH)
CSA SA-08
CSA SA-11
ISO/IEC 27002-2005 11.4.6
ISO/IEC 27002-2005 12.5.4
ISO 27799-2008 7.8.4
NIST SP800-53 R4 AC-17
NIST SP800-53 R4 AC-17(3)
NIST SP800-53 R4 SC-7(3)
NIST SP800-53 R4 SC-7(4)
NIST SP800-53 R4 SC-7(7)
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 72 of 488
Topics: Network Segmentation
Network Security
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 73 of 488
proxy and/or network address translation technologies (e.g. DNS) are
employed.
The requirements for network routing control shall be based on the access
control policy. Routing controls shall also be based on positive source and
destination address checking mechanisms.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 74 of 488
Topics: Authorization
Policies and Procedures
User Access
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to PCI Compliance
Regulatory
Factors:
Level 1 A secure log-on procedure shall:
Implementation: i. display a general notice warning that the computer shall only be
accessed by authorized users;
ii. limit the number of unsuccessful log-on attempts allowed to six
attempts;
iii. enforce recording unsuccessful and successful attempts;
iv. force a time delay of 30 minutes before further log-on attempts are
allowed or rejecting any further attempts without specific
authorization; and
v. not display the password being entered by hiding the password
characters with symbols.
vi. force a time delay of 30 minutes before further log-on attempts are
allowed or rejecting any further attempts without specific authorization
from an administrator;
Level 1 Control HIPAA §164.308(a)(5)(ii)(D)
Standard NRS 603A.215.1
Mapping: PCI DSS v2 8.5.13
PCI DSS v2 8.5.14
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500, Exchanges Data with a
Factors: Business Partner: Yes, Third Party Support (Vendor Access or
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 75 of 488
Maintenance): Yes, Publicly Accessible: Yes, System Connects with or
Exchanges Data with an HIE: Yes
Level 2 None
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
The procedure for logging into an operating system shall be designed to
minimize the opportunity for unauthorized access. The log-on procedure
shall therefore disclose the minimum of information about the system, in
order to avoid providing an unauthorized user with any unnecessary
assistance.
Level 3 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 76 of 488
Level 3 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes
Factors:
Level 3 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
Configure the information system to lock out the user account automatically
after three failed log-on attempts by a user during a one hour time period.
Require the lock out to persist for a minimum of three hours.
CMS The number of concurrent network sessions for a user shall be limited and
Contractors: enforced to one (1) session. The number of concurrent application/process
sessions shall be limited and enforced to the number of sessions expressly
required for the performance of job duties. The requirement and use of
more than one (1) application/process session for each user shall be
documented in the system security profile.
The organization shall configure the information system to lock out the user
account automatically after three (3) invalid login attempts during a one (1)
hour time period. The lock out shall persist for a minimum of three (3)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 77 of 488
hours unless unlocked by an administrator. The control applies whether
the login occurs via a local or network connection.
Control All users shall have a unique identifier (user ID) for their personal use only,
Specification: and an authentication technique shall be implemented to substantiate the
claimed identity of a user.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to State of Massachusetts Data Protection Act
Regulatory
Factors:
Level 1 The organization shall require verifiable unique ID's for all types of users
Implementation: including, but not limited to:
i. technical support personnel;
ii. operators;
iii. network administrators;
iv. system programmers; and
v. database administrators.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 78 of 488
2. approval by management shall be documented for such cases;
and
3. additional controls are required to maintain accountability.
iii. generic IDs:
1. generic IDs for use by an individual shall only be allowed either
where the functions accessible or actions carried out by the ID
do not need to be traced (e.g. read only access).
Users shall be uniquely identified and authenticated for both local and
remote accesses to information systems.
Level 1 Control CMSRs 2012v1.5 IA-4 (HIGH)
Standard CMSRs 2012v1.5 IA-8 (HIGH)
Mapping: COBIT 4.1 DS5.3
COBIT 5 DSS05.04
HIPAA §164.308(a)(3)(i)
HIPAA §164.312(a)(2)(i)
HIPAA §164.312(d)
NIST SP800-53 R4 IA-2
NIST SP800-53 R4 IA-4
NIST SP800-53 R4 IA-8
NRS 603A.215.1
PCI DSS v2 8.1
PCI DSS v2 8.3
PCI DSS v2 8.5.8
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 79 of 488
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 1 CORE 153: Eligibility and Benefits Connectivity Rule v1.1.0
Subsection 5.1
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
(State of Mass.) 201 CMR 17.04(1)(a)
(State of Mass.) 201 CMR 17.04(2)(b)
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes, Third Party
Factors: Support (Vendor Access or Maintenance): Yes
Level 2 None
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
Appropriate authentication methods including strong authentication
methods in addition to passwords shall be used for communicating through
an external, non-organization-controlled network (e.g., the Internet).
Help desk support shall require user identification for any transaction that
has information security implications.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 80 of 488
The information system shall use replay-resistant authentication
mechanisms such as nonce, one-time passwords, or time stamps (e.g.,
Kerberos, TLS, etc.) for network access to privileged accounts implement
multifactor authentication for remote such that one of the factors is
provided by a device separate from the system gaining access.
Level 2 Control CMSRs 2012v1.5 IA-2 (HIGH)
Standard CMSRs 2012v1.5 IA-2(8) (HIGH)
Mapping: CMSRs 2012v1.5 IA-5 (HIGH)
CMSRs 2012v1.5 IA-5(2) (HIGH)
CMSRs 2012v1.5 IA-5(3) (HIGH)
CSA SA-07
ISO/IEC 27002-2005 11.5.2
ISO 27799-2008 7.8.4
ISO 27799-2008 7.8.5.1
NIST SP800-53 R4 IA-2(3)
NIST SP800-53 R4 IA-2(8)
NIST SP800-53 R4 IA-5
NIST SP800-53 R4 IA-5(2)
NIST SP800-53 R4 IA-5(3)
NIST SP800-53 R4 IA-2(11)
PCI DSS v2 3.2
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 3 The organization shall employ multifactor authentication for network
Implementation: access to privileged and non-privileged accounts and for local access to
privileged accounts (including those used for non-local maintenance and
diagnostic sessions).
Level 3 Control CMSRs 2012v1.5 IA-2(1) (HIGH)
Standard CMSRs 2012v1.5 IA-2(2) (HIGH)
Mapping CMSRs 2012v1.5 IA-2(3) (HIGH)
CMSRs 2012v1.5 IA-2(4) (HIGH)
CMSRs 2012v1.5 IA-2(9) (HIGH)
CMSRs 2012v1.5 SC-14 (HIGH)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 81 of 488
NIST SP800-53 R4 IA-2(1)
NIST SP800-53 R4 IA-2(2)
NIST SP800-53 R4 IA-2(3)
CMS The information system shall use multifactor authentication for local access
Contractors: to non-privileged accounts.
Control Systems for managing passwords shall be interactive and shall ensure
Specification: quality passwords.
Page 82 of 488
Topics: Cryptography
Password Management
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 Refer to Sections 1.b and 1.f for a full list of password controls.
Implementation:
In addition, a password management system shall be implemented to:
i. require the use of individual user IDs and passwords to maintain
accountability;
ii. allow users to select and change their own passwords and include a
confirmation procedure to allow for input errors;
iii. force users to change temporary passwords at the first log-on (see 1.b);
iv. not display passwords on the screen when being entered; and
v. always change vendor-supplied defaults before installing a system on
the network including passwords, simple network management
protocol (SNMP) community strings and the elimination of unnecessary
accounts.
Level 1 Control HIPAA §164.308 (a)(5)(ii)(D)
Standard PCI DSS v2 2.1
Mapping: PCI DSS v2 8.5.8
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 1 CORE 153: Eligibility and Benefits Connectivity Rule v1.1.0
Subsection 5.1
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
(State of Mass.) 201 CMR 17.04(1)(b)
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 83 of 488
Level 2 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes, Number of
Factors: Users: > 500, Exchanges Data with a Business Partner: Yes, Third Party
Support (Vendor Access or Maintenance): Yes, Publicly Accessible: Yes,
Number of Interfaces to Other Systems: > 25, System Connects with or
Exchanges Data with an HIE: Yes
Level 2 Subject to PCI Compliance, Subject to FISMA Compliance, Subject to State of
Regulatory Massachusetts Data Protection Act
Factors:
Level 2 Level 1 plus:
Implementation:
Refer to Sections 1.b and 1.f for a full list of password controls.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 84 of 488
CMS Contractor Requirements
Control The use of utility programs that might be capable of overriding system and
Specification: application controls shall be restricted and tightly controlled.
Factor Type: System
Topics: Authorization
Monitoring
Network Segmentation
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 The use of system utilities (e.g., administrative tools in Windows, the
Implementation: settings section--specifically network/device/security configuration--on
VoIP phones, etc.) shall be controlled by implementing the following:
i. use of identification, authentication, and authorization procedures for
system utilities;
ii. segregation of system utilities from applications software; and
iii. limitation of the use of system utilities to the minimum practical
number of trusted, authorized users (see 1.b-1.o).
Level 1 Control CMSRs 2012v1.5 AC-6 (HIGH)
Standard CSA IS-34
Mapping: HIPAA §164.308(a)(3)(i)
HIPAA §164.308(a)(3)(ii)(A)
HIPAA §164.308(a)(4)(i)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 85 of 488
HIPAA §164.308(a)(4)(ii)(A)
HIPAA §164.308(a)(4)(ii)(B)
HIPAA §164.308(a)(4)(ii)(C)
HIPAA §164.310(a)(2)(iii)
HIPAA §164.310(b)
HIPAA §164.312(a)(1)
HIPAA §164.312(a)(2)(i)
HIPAA §164.312(a)(2)(ii)
HIPAA §164.312(a)(2)(iv)
NIST SP800-53 R4 AC-6
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes, Exchanges
Factors: Data with a Business Partner: Yes, Third Party Support (Vendor Access or
Maintenance): Yes, Publicly Accessible: Yes, Number of Interfaces to Other
Systems: > 25, System Connects with or Exchanges Data with an HIE: Yes
Level 2 Subject to PCI Compliance; Subject to FISMA Compliance; Subject to the
Regulatory CMS Minimum Security Requirements (HIGH)
Factors:
Level 2 Level 1 plus:
Implementation:
The use of system utilities shall be controlled by implementing the
following:
i. authorization for ad hoc use of systems utilities;
ii. limitation of the availability of system utilities (e.g. limitation of
availability by setting restrictive file system level permissions for the
access and execution of system utilities such as cmd.exe, ping, tracert,
ipconfig, ifconfig, etc.).
iii. disable public "read" access to files, objects, and directories;
iv. logging of all use of system utilities;
v. defining and documenting authorization levels for system utilities;
vi. deletion of, or file system file execution permission denial of, all
unnecessary software based utilities and system software; and
vii. not making system utilities available to users who have access to
applications on systems where segregation of duties is required.
The information system owner shall regularly review the system utilities
available to identify and eliminate unnecessary functions, such as scripts,
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 86 of 488
drivers, features, subsystems, file systems, and unnecessary web servers.
Public "read" and "write" access to all system files, objects, and directories
shall be disabled.
Level 2 Control CMSRs 2012v1.5 AC-3 (HIGH)
Standard COBIT 4.1 DS5.7
Mapping: COBIT 5 DSS05.05
ISO/IEC 27002-2005 11.5.4
ISO 27799-2008 7.8.4
NIST SP800-53 R4 AC-3
NRS 603A.215.1
PCI DSS v2 2.2.4
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 None
Implementation:
Level 3 Control None
Standard
Mapping:
CMS The organization shall prohibit the use of Voice over Internet Protocol
Contractors: (VoIP) technologies, unless explicitly authorized, in writing, by the CMS CIO
or his/her designated representative.
Page 87 of 488
Control Reference: 01.t Session Time-out
Control Inactive sessions shall shut down after a defined period of inactivity.
Specification:
Factor Type: System
Topics: User Access
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to PCI Compliance, Subject to FISMA Compliance
Regulatory
Factors:
Level 1 A time-out system that conceals information previously visible on the
Implementation: display with a publically viewable image (e.g. a screen saver) shall pause
the session screen after 15 minutes of inactivity and closes network
sessions after 30 minutes of inactivity. The system shall require the user to
reestablish access using appropriate identification and authentication
procedures.
A limited form of time-out system can be provided for legacy systems that
cannot be modified to accommodate this requirement, which clears the
screen and prevents unauthorized access through re-authentication
requirements to continue the active session but does not close down the
application or network sessions.
Level 1 Control CMSRs 2012v1.5 AC-11 (HIGH)
Standard CMSRs 2012v1.5 AC-12 (HIGH)
Mapping: CSA SA-03
HIPAA §164.310(b)
HIPAA §164.312(a)(2)(iii)
ISO/IEC 27002-2005 11.5.5
ISO 27799-2008 7.8.4
NIST SP800-53 R4 AC-12
NIST SP800-53 R4 AC-11
NIST SP800-53 R4 SC-10
NRS 603A.215.1
PCI DSS v2 8.5.15
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 88 of 488
PCI DSS v2 12.3.8
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Publicly Accessible: Yes
Factors:
Level 2 Subject to the CMS Minimum Security Requirements (High)
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
A time-out system (e.g. a screen saver) shall pause the session screen
after 2 minutes of inactivity and closes network sessions after 30 minutes of
inactivity.
Level 2 Control CMSRs 2012v1.5 SC-10 (HIGH)
Standard
Mapping:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 89 of 488
CMS The information system shall automatically terminate the network
Contractors: connection associated with a communications session at the end of the
session (as specified by the appropriate CSF level), OR:
i. forcibly de-allocates communications session Dynamic Host
Configuration Protocol (DHCP) leases after seven (7) days or other
organization-defined time period; AND
ii. forcibly disconnects inactive Virtual Private Network (VPN) connections
after thirty (30) minutes of inactivity or other organization-defined time
period.
Level 1 None
Organizational
Factors:
Level 1 System Processing PHI: Yes -AND-, Accessible from the Internet: Yes, Exchanges
Factors: Data with a Business Partner: Yes, Third Party Support (Vendor Access or
Maintenance): Yes, Publicly Accessible: Yes, System Connects with or
Exchanges Data with an HIE: Yes
Level 1 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 1 Connection time controls shall be implemented for sensitive computer
Implementation: applications, especially from high risk locations (e.g. public or external
areas that are outside the organization's security management) including:
i. using predetermined time slots (e.g. for batch file transmissions or
regular interactive sessions of short duration);
ii. restricting connection times to normal office hours if there is no
requirement for overtime or extended-hours operation; and
iii. re-authentication at timed intervals.
Level 1 Control CMSRs 2012v1.5 AC-10 (HIGH)
Standard ISO/IEC 27002-2005 11.5.6
Mapping: ISO 27799-2008 7.8.4
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 90 of 488
Level 2 Implementation Requirements
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements.
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Page 91 of 488
Topics: Authentication
Policies and Procedures
User Access
Viruses and Malware
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 Restrictions to access shall be based on individual business application
Implementation: requirements. The access control policy shall also be consistent with the
organizational access policy.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 92 of 488
HIPAA §164.308(a)(4)(ii)(B)
HIPAA §164.308(a)(4)(ii)(C)
HIPAA §164.310(a)(2)(iii)
HIPAA §164.310(b)
HIPAA §164.312(a)(1)
HIPAA §164.312(a)(2)(i)
HIPAA §164.312(a)(2)(ii)(i)
HIPAA §164.312(a)(2)(ii)(iv)
NIST SP800-53 R4 AC-6
NIST SP800-53 R4 CM-2(7)
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
1 TAC § 390.2(a)(1)
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500, Number of Interfaces
Factors: to Other Systems: > 25
Level 2 Subject to FISMA Compliance
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
The following guidelines shall be implemented in order to support access
restriction requirements:
i. controlling access rights to other applications according to applicable
access control policies;
ii. ensuring that outputs from application systems handling covered
information contain only the information relevant to the use of the
output and are sent only to authorized terminals and locations; and
iii. periodic reviews of such outputs to ensure that redundant information
is removed.
Data stored in the information system shall be protected with system access
controls and shall be encrypted when residing in non-secure areas.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 93 of 488
Specific user actions that can be performed on the information system
without identification or authentication shall be identified and supporting
rationale documented. Actions to be performed without identification and
authentication shall be permitted only to the extent necessary to
accomplish mission objectives.
Level 2 Control CMSRs 2012v1.5 AC-3 (HIGH)
Standard CMSRs 2012v1.5 AC-14 (HIGH)
Mapping: CMSRs 2012v1.5 SC-15 (HIGH)
ISO/IEC 27002-2005 11.6.1
NIST SP800-53 R4 AC-3
NIST SP800-53 R4 AC-14
NIST SP800-53 R4 SC-15
Level 3 None
Organizational
Factors:
Level 3 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes, Third Party
Factors: Support (Vendor Access or Maintenance): Yes
Level 3 Subject to PCI Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
For individuals accessing covered information from a remote location,
prohibit the copy, move, print (and print screen) and storage of cardholder
data onto local hard drives and removable electronic media, unless
explicitly authorized for a defined business need.
Level 3 Control NRS 603A.215.1
Standard PCI DSS v2 12.3.10
Mapping:
CMS Encryption as access enforcement shall extend to all government and non-
Contractors: government furnished desktop computers that store sensitive information.
Page 94 of 488
protection of desktop computers with the approval of the CIO or his/her
designated representative.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 The sensitivity of an application system shall be explicitly identified and
Implementation: documented by the application owner.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500
Factors:
Level 2 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 95 of 488
Level 2 Level 1 plus:
Implementation:
The sensitive application system shall run on a dedicated computer, or only
share resources with trusted applications systems. Isolation shall be
achieved using physical or logical methods. When a sensitive application is
to run in a shared environment, the application systems with which it will
share resources and the corresponding risks should be identified and
accepted by the owner of the sensitive application.
Level 2 Control ISO/IEC 27002-2005 11.6.2
Standard ISO 27799-2008 7.8.5.2
Mapping: NIST SP800-53 R4 SC-4
Level 3 None
Organizational
Factors:
Level 3 System Processing PHI: Yes - AND -, Number of Users: > 5,500
Factors:
Level 3 Subject to the CMS Minimum Security Requirements (High); Subject to PCI
Regulatory Compliance
Factors:
Level 3 Level 2 plus:
Implementation:
Users of shared system resources cannot intentionally or unintentionally
access information remnants, including encrypted representations of
information, produced by the actions of a prior user or system process
acting on behalf of a prior user.
System resources shared between two (2) or more users are released back
to the information system, and are protected from accidental or purposeful
disclosure.
Implement only one primary function per server to prevent functions that
require different security levels from co-existing on the same server. (For
example, web servers, database servers, and DNS should be implemented
on separate servers.) If virtualization technologies are used, verify that one
component or primary function is implemented per virtual system device.
Level 3 Control CMSRs 2012v1.5 SC-4 (HIGH)
Standard PCI DSS v2 2.2.1
Mapping: 1 TAC § 390.2(a)(4)(A)(xi)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 96 of 488
FTI Custodians Requirements
FTI Custodians: Organizations transmitting FTI from one computer to another need only
identify the bulk records transmitted. This identification will contain the
approximate number of personal records, the date of the transmissions, the
best possible description of the records, and the name of the individual
making/receiving the transmission.
Control To ensure the security of information when using mobile computing devices
Objective: and teleworking facilities.
Control A formal policy shall be in place, and appropriate security measures shall be
Specification: adopted to protect against the risks of using mobile computing and
communication devices.
Level 1 None
Organizational
Factors:
Level 1 System Mobile Devices Used: Yes, Processing PHI: Yes -AND-
Factors:
Level 1 Subject to PCI Compliance, Subject to FISMA Compliance, Subject to State of
Regulatory Massachusetts Data Protection Act, Subject to the CMS Minimum Security
Factors: Requirements (High)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 97 of 488
Level 1 The organization shall use full-disk encryption to protect the confidentiality
Implementation: of information on laptops and other mobile devices that support full-disk
encryption. Encryption shall be required for all other mobile computing
devices in accordance with the organization's data protection policy (see
06.d). If it is determined that encryption is not reasonable and appropriate,
the organization shall document its rationale and acceptance of risk.
Page 98 of 488
organization shall be established for cases of theft or loss of the mobile
computing devices. Equipment carrying important, covered, and/or critical
business information shall not be left unattended without being physically
protected.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Page 99 of 488
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
CMS The organization shall monitor for unauthorized mobile device connections
Contractors: and prohibit the connection of portable and mobile devices ...
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Verifiable unique ID's shall be required for all teleworkers accessing the
organization's network via a remote connection. The connection between
the organization and the teleworker's location shall be secured via an
encrypted channel. The organization shall maintain ownership over the
assets used by the teleworker in order to achieve the requirements of this
control (e.g. issuance of a USB device to allow for remote access via an
encrypted tunnel).
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control To ensure that employees, contractors and third party users are suitable for
Objective: the roles for which they are being considered, to reduce the risk of fraud,
theft, or misuse of facilities.
Control Security roles and responsibilities of employees, contractors and third party
Specification: users shall be defined and documented in accordance with the
organization's information security policy.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall define the roles, responsibilities and authority of all
security personnel.
Level 2 Control CMSRs 2012v1.5 PS-2 (HIGH)
Standard NIST SP800-53 R4 PS-2
Mapping:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 None
Implementation:
All applicants shall be required to complete an I-9 form to verify that they
are eligible to work in the United States. Where a job, either on initial
appointment or on promotion, involves the person having access to
information assets, and in particular those handling covered information
(e.g. financial information, personal health information or highly
confidential information) the organization shall, at a minimum, verify the
identity, current address and previous employment of such staff.
Procedures shall define criteria and limitations for verification checks (e.g.
who is eligible to screen people, and how, when and why verification checks
are carried out).
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall consider applicable state and federal law (reference
02.b, level 1) with regards to information exchanged in the notification
process with business associates described in 05.k, level 1, which is meant
to ensure third party workforce members pass verification checks prior to
employment.
If there has been a long gap, at a minimum five years, between recruitment
and the date of the employee starting, the organization shall repeat the
screening process, or its key elements.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Credit checks shall be carried out for personnel who will have access to
financial information.
Control To ensure agreements are signed by employees, contractors and third party
Objective: users of information assets on their security roles and responsibilities at the
time of their employment or engagement, prior to access being granted.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 None
Implementation:
Level 3 Control None
Standard
Mapping:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control To ensure that employees, contractors and third party users are aware of
Objective: information security threats and concerns, their responsibilities and
liabilities, and are equipped to support organizational security policy in the
course of their normal work, and to reduce the risk of human error.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
For all system connections that allow customers to access the computing
assets such as web sites, kiosks and public access terminals, the
organization shall ensure the following:
i. provide appropriate text or a link to the privacy policy for data use and
protection as well as the customer's responsibilities when accessing the
data; and
ii. have a formal mechanism to authenticate the customer's identity prior
to granting access to covered information.
Control All employees of the organization and contractors and third party users
Specification: shall receive appropriate awareness training and regular updates in
organizational policies and procedures, as relevant for their job function.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall document that the training has been provided to the
individual.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS The organization shall incorporate simulated events into incident response
Contractors: training to facilitate effective response by personnel in crisis situations.
Control There shall be a formal disciplinary process for employees who have
Specification: violated security policies and procedures.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control To ensure that the access rights are properly removed, and assets
Objective: recovered for terminated employees and contractors, and for employees
who have changed employment.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS All access and privileges to CMS systems, networks, and facilities are
Contractors: suspended when employees or contractors temporarily separate from the
organization (e.g., leave of absence).
Control All employees, contractors and third party users shall return all of the
Specification: organization's assets in their possession upon termination of their
employment, contract or agreement.
Factor Type: Organizational
Topics: Media and Assets
Personnel
Third Parties and Contractors
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control The access rights of all employees, contractors and third party users to
Specification: information and information assets shall be removed upon termination of
their employment, contract or agreement, or adjusted upon a change of
employment (i.e. upon transfer within the organization).
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 Medical Facilities / Hospital: > 10,000 Licensed Beds, Health Information
Organizational Exchange: >6,000,000 Transactions Per Year
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 Subject to FTC Red Flags Rule Compliance
Regulatory
Factors:
Level 3 Level 2 plus:
Implementation:
The organization shall develop and implement a written Identity Theft
Prevention Program that is designed to detect, prevent, and mitigate
identity theft in connection with the opening of an account or any existing
account that involves or is designed to permit multiple payments or
transactions.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS The organization shall document the risk assessment results as part of
Contractors: issuing a new Authorization to Operate (ATO) package.
The organization shall assess the security controls in the information
system within every three hundred sixty-five (365) days in accordance with
the CMS Information Security (IS) Acceptable Risk Safeguards (ARS)
including CMS Minimum Security Requirements (CMSR) Standard, to
determine the extent to which the controls are implemented correctly,
operating as intended, and producing the desired outcome with respect to
meeting the security requirements for the system.
The Business Owner notifies the CMS CISO within thirty (30) days
whenever updates are made to system security authorization artifacts or
significant role changes occur (e.g., Business Owner, System
Developer/Maintainer, ISSO).
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall review corrective action plans (plans of action and
milestones) for consistency with the organizational risk management
strategy and organization-wide priorities for risk response actions.
The covered entity mitigates any harmful effect that is known to the
covered entity of a use or disclosure of PHI by the covered entity or its
business associates, in violation of its policies and procedures.
Level 1 Control CMSRs 2012 v1.5 CA-5 (HIGH)
Standard CMSRs 2012 v1.5 CA-5(1) (HIGH)
Mapping: CSA RI-03
HIPAA § 164.306(e)
HIPAA § 164.308(a)(ii)(B)
HIPAA §164.530(f)
ISO/IEC 27002-2005 4.2
ISO/IEC 27002-2005 6.2.1
NIST SP800-53 R4 CA-5
NIST SP800-53 R4 PM-4
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
CMS The organization shall employ automated mechanisms to help ensure that
Contractors: the POA&M for the information system is accurate, up to date, and readily
available.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
FTI Custodians
FTI Custodians: The organization shall develop and disseminate a formal, documented,
system and services acquisition policy that includes IRS documents
received and identified by:
i. taxpayer name
ii. tax year(s)
iii. type of information (e.g., revenue agent reports, Form 1040, work
papers)
iv. the reason for the request
v. date requested
vi. date received
vii. exact location of the FTI
viii. who has had access to the data, and
ix. if disposed of, the date and method of disposition.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The information security policy shall have an owner who has approved
management responsibility for the development, review, and evaluation of
the security policy. The review shall include assessing opportunities for
improvement of the organization's information security policy and
approach to managing information security in response to changes to the
organizational environment, business circumstances, legal conditions, or
technical environment. There shall be defined management review
procedures of the information security policy including a schedule to re-
evaluate, at least annually or upon significant changes to the operating or
business environment, to assess their adequacy and appropriateness, and
amended as necessary.
The output from the management review shall include any decisions and
actions related to:
i. improvement of the organization's approach to managing information
security and its processes;
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
FTI Custodians
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization develops a security plan for the information system that:
i. is consistent with the organization’s enterprise architecture;
ii. explicitly defines the authorization boundary for the system;
iii. describes the operational context of the information system in terms of
missions and business processes;
iv. provides the security categorization of the information system including
supporting rationale;
v. describes the operational environment for the information system;
vi. describes relationships with or connections to other information
systems;
vii. provides an overview of the security requirements for the system;
viii. describes the security controls in place or planned for meeting those
requirements including a rationale for tailoring and supplementation
decisions;
ix. is reviewed and approved by the authorizing official or designated
representative prior to plan implementation;
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
FTI Custodians: The organization shall develop and submit a Safeguard Procedures Report
(SPR) that describes the procedures established and used by the
organization for ensuring the confidentiality of the information received
from the IRS. Annually thereafter, the organization must file a Safeguard
Activity Report (SAR). Whenever significant changes occur in the safeguard
program the SPR will be updated and resubmitted. (See IRS Pub. 1075,
sections 7 & 8) The SAR advises the IRS of minor changes to the procedures
or safeguards described in the SPR. It also advises the IRS of future actions
that will affect the organization’s current efforts to ensure the
confidentiality of FTI, and certifies that the organization is protecting FTI
pursuant to IRC Section 6103(p)(4) and the organization’s own security
requirements.
CMS Contractors
CMS The organization shall establish a discrete line item in CMS’ programming
Contractors: and budgeting documentation for the implementation and management of
information systems security.
The organization shall develop a security plan for the information system
that is consistent with the CMS System Security Plan (SSP) Procedure.
(For FTI only) When FTI is incorporated into a Data Warehouse, the
controls described in IRS Pub. 1075, Exhibit 11 are to be followed, in
addition to those specified in other controls. The organization shall develop
and submit a Safeguard Procedures Report (SPR) that describes the
procedures established and used by the organization for ensuring the
confidentiality of the information received from the IRS. Annually
thereafter, the organization must file a Safeguard Activity Report (SAR). The
SAR advises the IRS of minor changes to the procedures or safeguards
described in the SPR. It also advises the IRS of future actions that will affect
the organization’s current efforts to ensure the confidentiality of FTI, and
certifies that the organization is protecting FTI pursuant to IRC Section
6103(p)(4) and the organization’s own security requirements. Whenever
significant changes occur in the safeguard program the SPR will be updated
and resubmitted. (See IRS Pub. 1075, section 7)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization's single point of contact for security matters shall provide
supplemental security awareness and training. The contact for security
shall be responsible for review reports related to the security organization,
network, systems and programs implemented. Any material changes to
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Local responsibilities for the protection of assets and for carrying out
specific security processes, such as business continuity planning, shall be
clearly defined.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Organizations under attack from the Internet may need external third
parties (e.g. an Internet service provider or telecommunications operator)
to take action against the attack source. The appropriate contact
information for these third parties shall be documented, and instances
when they must be contacted to take action shall be communicated.
Level 1 Control CSA CO-04
Standard
Mapping:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
It shall be ensured that the external party is aware of their obligations, and
accepts the responsibilities and liabilities involved in accessing, processing,
communicating, or managing the organization's information and
information assets.
Level 1 Control 16 CFR Part §681.2 (e)(4)
Standard CSA RI-05
Mapping: HIPAA §164.308(b)(1)
HIPAA §164.308(b)(4)
HIPAA §164.314(a)(2)(ii)
ISO/IEC 27002-2005 6.2.1
PCI DSS v2 12.8.3
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS Each system interconnection shall be recorded in the security plan and
Contractors: Information Security (IS) Risk Assessment (RA) for the CMS system that is
connected to the remote location.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
A screening process shall also be carried out for contractors and third party
users. Where contractors are provided through an organization the contract
with the organization shall clearly specify the organization’s responsibilities
for screening and the notification procedures they need to follow if
screening has not been completed or if the results give cause for doubt or
concern. In the same way, the agreement with the third party shall clearly
specify all responsibilities and notification procedures for screening.
Level 1 Control CMSRs 2012v1.5 PS-7 (HIGH)
Standard CSA LG-02
Mapping: HIPAA §164.308(a)(3)(ii)(A)
HIPAA §164.308(a)(4)(ii)(B)
HIPAA §164.308(b)(1)
HIPAA §164.314(a)(2)(i)
HITECH Act, Subpart D 164.404(b)
HITECH Act, Subpart D 164.410(a)(1)
HITECH Act, Subpart D 164.410(a)(2)
HITECH Act, Subpart D 164.410(b)
HITECH Act, Subpart D 164.410(c)(1)
HITECH Act, Subpart D 164.414(b)
ISO/IEC 27002-2005 6.2.3
NIST SP800-53 R4 PS-7
NRS 603A.210.2
NRS 603A.215.1
PCI DSS v2 2.4
PCI DSS v2 12.8.2
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
(State of Mass.) 201 CMR 17.03(2)(f)
1 TAC § 390.2(a)(1)
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Health Ad part of the agreement with the connecting organizations, the HIE shall
Information specify the requirements of the connecting organization to define and
Exchanges: communicate to the HIE access roles for the connecting organization’s
employees. The agreement shall specify that it is the sole responsibility of
the connecting organization to appropriately restrict access in accordance
with federal and state requirements (e.g., mental health information). As
part of the agreement with the connecting organizations, the HIE shall
specify the requirements of connecting organizations to request and receive
detailed access logs (see 09.aa) related to the connecting organization’s
records.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control To ensure that the design, operation, use, and management of information
Objective: systems adheres to applicable laws, statutory, regulatory or contractual
obligations, and any security requirements.
Control All relevant statutory, regulatory, and contractual requirements and the
Specification: organization's approach to meet these requirements shall be explicitly
defined, documented, and kept up to date for each information system and
the organization.
Factor Type: Organizational
Topics: Awareness and Training
Documentation and Records
Policies and Procedures
Requirements (Legal and Contractual)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The covered entity documents and maintains the designated record sets
that are subject to access by individuals and the titles of the persons or
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
FTI Custodians: The organization shall employ a permanent system of standardized records
of request for disclosure of FTI and maintain the records for five (5) years
or the applicable records control schedule, whichever is longer.
CMS The organization shall retain output, including but not limited to audit
Contractors: records, system records, business and financial reports, and business
records, from the information system in accordance with CMS Policy and all
applicable National Archives and Records Administration (NARA)
requirements.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 Subject to PCI Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High), Subject to FISMA Compliance
Factors:
Level 2 Level 1 plus:
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements.
Implementation:
CMS The organization shall conduct a Privacy Impact Assessment (PIA) on the
Contractors: information system in accordance with OMB policy.
Control Users shall be deterred from using information assets for unauthorized
Specification: purposes.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS Contractors
CMS The approved banner for CMS information systems shall read:
Contractors: i. you are accessing a U.S. Government information system, which
includes: (1) this computer, (2) this computer network, (3) all
computers connected to this network, and (4) all devices and storage
media attached to this network or to a computer on this network. This
information system is provided for U.S. Government-authorized use
only.
ii. unauthorized or improper use of this system may result in disciplinary
action, as well as civil and criminal penalties.
iii. by using this information system, you understand and consent to the
following:
1. you have no reasonable expectation of privacy regarding any
communication or data transiting or stored on this information
system. At any time, and for any lawful Government purpose,
the Government may monitor, intercept, and search and seize
any communication or data transiting or stored on this
information system.
2. any communication or data transiting or stored on this
information system may be disclosed or used for any lawful
Government purpose.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Legal advice shall be specific to either the country where the cryptographic
controls are used, or the country to which such controls are imported or
exported.
Level 2 Control CMSRs 2012v1.5 IA-7 (HIGH)
Standard CMSRs 2012v1.5 SC-13 (HIGH)
Mapping: CMSRs 2012v1.5 SC-13(1) (HIGH)
ISO/IEC 27002-2005 15.1.6
ISO 27799-2008 7.12.2.3
NIST SP800-53 R4 IA-7
NIST SP800-53 R4 SC-13
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control To ensure that the design, operation, use and management of information
Objective: systems adheres to organizational security policies and standards.
Control Managers shall ensure that all security procedures within their area of
Specification: responsibility are carried out correctly to achieve compliance with security
policies and standards.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall report the security state of the information system to
appropriate organizational officials monthly.
Results of reviews and corrective actions carried out shall be recorded and
these records shall be maintained. The security organization shall maintain
records of the compliance results in order to better track security trends
within the organization and to address longer term areas of concern.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Ensure the integrity and effectiveness of the information systems audit
Objective: process.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Access to information systems audit tools shall be protected to prevent any
Specification: possible misuse or compromise.
Factor Type: Organizational
Topics: Audit and Accountability
Authorization
User Access
Products and 06.j Protection of Information Systems Audit Tools
Services Guide:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control All assets including information shall be clearly identified and an inventory
Specification: of all assets drawn up and maintained.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
The organization shall create, document, and maintain a process and
procedure to physically inventory and reconcile IT asset inventory
information on hand for:
i. capital Assets (Inventory must be conducted at least annually)
ii. non-Capital Assets
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This owner shall ensure that the IT Asset Lifecycle Program shall:
i. identify and document personnel with IT asset roles and
responsibilities;
ii. provide procurement training to personnel with IT asset roles and
responsibilities;
iii. provide procurement training material addressing the procedures and
activities necessary to fulfill IT asset roles and responsibilities;
iv. define the frequency of refresher training; and
v. provide refresher IT asset training in accordance with organization
defined frequency, at least on an annual basis.
Control All information and assets associated with information processing systems
Specification: shall be owned by a designated part of the organization.
Factor Type: Organizational
Topics: IT Organization and Management Roles and Responsibilities
Media and Assets
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Rules for the acceptable use of information and assets associated with
Specification: information processing systems shall be identified, documented, and
implemented.
*Required for HITRUST Certification 2014
Factor Type: Organizational
Topics: Awareness and Training
Documentation and Records
Media and Assets
Personnel
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Organizations shall identify, record, and control inventory items that have a
high risk of loss such as computer and electronic equipment and hand tools
and instruments. Personal property meeting the definition of capital assets
shall be capitalized, tagged with an organization identification tag and
property control number, listed on the capital asset property inventory, and
physically inventoried at least annually. Discrepancies shall be investigated.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall create and document process and procedure to affix
an organization identification tag to:
i. newly purchased IT-related assets (Tagging required prior to
deployment in the computing environment)
ii. existing non-capital assets (Tagging required within 1 year);
iii. existing capital assets (Tagging required within 1 year)
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Texas Covered Freestanding emergency medical facilities shall implement the Health and
Entities: Human Services Executive Commissioner’s minimum standards for the
contents, maintenance, and release of medical records and shall designate
an individual to be in charge of the creation, maintenance and disposal of
medical records per TAC § 131.53, including the confidentiality, security
and safe storage of medical records throughout the record’s lifecycle.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Security perimeters (barriers such as walls, card controlled entry gates or
Specification: manned reception desks) shall be used to protect areas that contain
information and information assets.
Factor Type: Organizational
Topics: Authorization
Physical and Facility Security
Third Parties and Contractors
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Two (2) barriers to access covered information under normal security shall
be required:
i. secured perimeter/locked container;
ii. locked perimeter/secured interior; or
iii. locked perimeter/security container.
Control Secure areas shall be protected by appropriate entry controls to ensure that
Specification: only authorized personnel are allowed access.
For facilities where the information system resides, the organization shall
enforce physical access authorizations, maintain physical access audit logs,
and provide security safeguards the organization determines are necessary
for areas officially designated as publicly accessible.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The log shall be reviewed no less than monthly and upon occurrence of
organization-defined security events, and retained for at least three months
in accordance with the organization's retention policy. Visitors shall only
be granted access for specific and authorized purposes and shall be issued
with instructions on the security requirements of the area and on
emergency procedures.
Authentication controls (e.g. access control card plus PIN) shall be used to
authorize and validate all access. An audit trail of all access shall be securely
maintained. All employees, contractors and third party users and all visitors
shall be required to wear some form of visible identification and shall
immediately notify security personnel if they encounter unescorted visitors
and anyone not wearing visible identification. Visitors shall be given a
badge or access device that identifies them as non-employees, and they
shall be required to surrender the badge or device before leaving the facility
or upon expiration.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Physical security for offices, rooms, and facilities shall be designed and
Specification: applied.
Factor Type: Organizational
Topics: Physical and Facility Security
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Physical protection against damage from fire, flood, earthquake, explosion,
Specification: civil unrest, and other forms of natural or man-made disaster shall be
designed and applied.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Physical protection and guidelines for working in secure areas shall be
Specification: designed and applied.
Factor Type: Organizational
Topics: Personnel
Physical and Facility Security
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
CMS The organization maintains a record of all physical access, both visitor and
Contractors: authorized individuals, and employs automated mechanisms to facilitate
the maintenance and review of access records.
Control Access points such as delivery and loading areas and other points where
Specification: unauthorized persons may enter the premises shall be controlled and, if
possible, isolated from information processing facilities to avoid
unauthorized access.
Factor Type: Organizational
Topics: Media and Assets
Physical and Facility Security
User Access
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
The organization plans the location or site of the facility where the
information system resides with regard to physical and environmental
hazards and for existing facilities, considers the physical and environmental
hazards in its risk mitigation strategy.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Equipment shall be protected from power failures and other disruptions
Specification: caused by failures in supporting utilities.
Factor Type: Organizational
Topics: Contingency Planning
Maintenance
Monitoring
Physical and Facility Security
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The water supply shall be stable and adequate to supply air conditioning,
humidification equipment and fire suppression systems, where used.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Provider Requirements
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization disables any physical ports (e.g., wiring closets, patch
panels, etc.) not in use.
Level 2 Control CMSRs 2012v1.5 PE-4 (HIGH)
Standard CSA RS-08
Mapping: ISO/IEC 27002-2005 9.2.3
ISO 27799-2008 7.6.2.2
NIST SP800-53 R4 PE-4
NRS 603A.215.1
PCI DSS v2 9.1.2
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall obtain maintenance support and/or spare parts for
CMS critical systems and applications (including Major Applications [MA]
and General Support Systems [GSS] and their components) within twenty-
four (24) hours of failure.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Security shall be applied to off-site equipment taking into account the
Specification: different risks of working outside the organization's premises.
Factor Type: Organizational
Topics: Authorization
IT Organization and Management Roles and Responsibilities
Media and Assets
Physical and Facility Security
Equipment and media taken off the premises shall not be left unattended in
public places. Portable computers shall be carried as hand luggage and
disguised where possible when travelling.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control All items of equipment containing storage media shall be checked to ensure
Specification: that any covered information and licensed software has been removed or
securely overwritten prior to disposal.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
See NIST SP800-88 Guidelines for Media Sanitization for more information
on implementing media sanitization and destruction techniques.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Equipment, information or software shall not be taken off-site without prior
Specification: authorization.
Factor Type: Organizational
Topics: Authorization
Documentation and Records
Media and Assets
Personnel
Third Parties and Contractors
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to PCI Compliance, Subject to FISMA Compliance
Regulatory
Factors:
Level 1 Documented procedures shall be prepared for system activities associated
Implementation: with information and communication assets, including computer start-up
and close-down procedures, backup of data, equipment maintenance, media
handling, electronic communications, computer room and mail handling
management, and safety.
The operating procedures shall specify the detailed instructions for the
execution of each job including:
i. processing and handling of information;
ii. the backup of data;
iii. scheduling requirements, including interdependencies with other
systems, earliest job start and latest job completion times;
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 2 Control NIST SP800-53 R4 MP-5
Standard
Mapping:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements.
Implementation:
Control Changes to information assets and systems shall be controlled and archived.
Specification:
Factor Type: System
Topics: IT Organization and Management Roles and Responsibilities
Media and Assets
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 Changes to information assets, including systems, networks and network
Implementation: services, shall be controlled and archived.
Level 2 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500, Number of
Factors: Transactions Per Day: > 6,750, Number of Interfaces to Other Systems: > 25
Level 2 Subject to PCI Compliance
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
The level of separation between operational, test, and development
environments shall be identified and controls shall be implemented to
prevent operational issues, including:
i. along with removing accounts, a review of all custom code preceding
the release to production or to customers must be completed in order to
identify any possible coding vulnerability.
ii. test data and accounts shall be removed completely before the
application is placed into a production state.
iii. organizations shall remove all custom application accounts, user IDs,
and passwords before applications go from development to production
or are released to customers
iv. rules for the transfer of software from development to operational
status shall be defined and documented;
v. development and operational software shall run on different systems or
computer processors and in different domains or directories;
vi. compilers, editors, and other development tools or system utilities shall
not be accessible from operational systems when not required;
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control It shall be ensured that the security controls, service definitions and
Specification: delivery levels included in the third party service delivery agreement are
implemented, operated and maintained by the third party.
Level 1 None
Organizational
Factors:
Level 1 System Third Party Support (Vendor Access or Maintenance): Yes
Factors:
Level 1 None
Regulatory
Factors:
Level 1 In an agreed service arrangement, service delivery by a third party (e.g., a
Implementation: certification authority for the provision of cryptographic services) shall
include:
i. service definitions;
ii. delivery levels;
iii. security controls, including third-party personnel security, information
classification, transmission, and authorization; and
iv. aspects of service management, including monitoring, auditing, and
change management; and
v. issues of liability, reliability of services and response times for the
provision of services.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall ensure that the third party maintains sufficient
service capabilities together with workable plans designed to ensure that
agreed service continuity levels are maintained following major service
failures or disaster.
Level 2 Control 16 CFR Part §681.2(e)(4)
Standard 16 CFR Part §681 Appendix A VI(c)
Mapping: CMSRs 2012v1.5 SA-9 (HIGH)
ISO/IEC 27002-2005 10.2.1
NIST SP800-53 R4 SA-9
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control The services, reports and records provided by the third party shall be
Specification: regularly monitored and reviewed, and audits shall be carried out regularly
to govern and maintain compliance with the service delivery agreements.
Level 1 None
Organizational
Factors:
Level 1 System Third Party Support (Vendor Access or Maintenance): Yes
Factors:
Level 1 None
Regulatory
Factors:
Level 1 A periodic review of service-level agreements (SLAs) shall be conducted at
Implementation: least annually and compared against the monitoring records.
Level 1 Control CSA CO-03
Standard HIPAA §164.308(b)(1)
Mapping: HIPAA §164.308(b)(4)
HIPAA §164.314(a)(1)
HIPAA §164.314(a)(2)(i)
HIPAA §164.314(a)(2)(ii)
ISO 27799-2008 7.7.2
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall monitor the network service features and service
levels to detect abnormalities and violations. The organization shall
periodically audit the network services to ensure that network service
providers implement the required security features and meet the
requirements agreed with management, including with new and existing
regulations.
Level 2 Control 16 CFR Part §681.2 (e)(4)
Standard 16 CFR Part §681 Appendix A VI(c)
Mapping: CMSRs 2012v1.5 SA-9 (HIGH)
ISO/IEC 27002-2005 10.2.2
NIST SP800-53 R4 SA-9
PCI DSS v2 12.8.4
1 TAC § 390.2(a)(3)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control To ensure that systems meet the businesses current and projected needs to
Objective: minimize failures.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall protect against or limit the effects of the types of
denial of service attacks defined in NIST SP 800-63 Rev. 1, Computer
Security Incident Handling Guide, and the following Websites:
i. SANS Organization www.sans.org/dosstep;
ii. SANS Organization's Roadmap to Defeating DDoS
www.sans.org/dosstep/roadmap.php; and
iii. NIST CVE List National Vulnerability Database:
http://nvd.nist.gov/home.cfm.
Level 2 Control CMSRs 2012v1.5 SC-5 (HIGH)
Standard CSA OP-03
Mapping: ISO 27799-2008 7.7.3.1
NIST SP800-53 R4 SC-5
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Acceptance criteria for new information systems, upgrades, and new
Specification: versions shall be established and suitable tests of the system(s) carried out
during development and prior to acceptance to maintain security.
Factor Type: System
Topics: Awareness and Training
Documentation and Records
IT Organization and Management Roles and Responsibilities
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 Managers shall ensure that the requirements and criteria for acceptance of
Implementation: new systems are clearly defined, agreed, documented, and tested. New
information systems, upgrades, and new versions shall only be migrated
into production after obtaining formal acceptance from management.
Level 1 Control CSA RM-01
Standard
Mapping:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The checks carried out by the malicious code detection and repair software
to scan computers and media shall include:
i. checking any files on electronic or optical media, and files received over
networks, for malicious code before use;
ii. checking electronic mail attachments and downloads for malicious code
before use; this check shall be carried out at different places (e.g. at
electronic mail servers, desk top computers and when entering the
network of the organization); and
iii. checking web traffic, such as HTML, JavaScript, and HTTP, for malicious
code.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Mobile code shall be authorized before its installation and use, and the
Specification: configuration shall ensure that the authorized mobile code operates
according to a clearly defined security policy. All unauthorized mobile code
shall be prevented from executing.
Factor Type: Organizational
Topics: Authorization
Cryptography
Policies and Procedures
Viruses and Malware
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
A formal policy shall be in place for mobile code protection and to ensure
protective measures including anti-virus and anti-spyware are in place and
regularly updated.
Level 1 Control CSA SA-15
Standard HIPAA §164.308(a)(5)(ii)(B)
Mapping: 1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Back-up copies of information and software shall be taken and tested
Specification: regularly.
Factor Type: Organizational
Topics: Cryptography
Documentation and Records
Physical and Facility Security
Policies and Procedures
Third Parties and Contractors
When the back-up service is delivered by the third party, the service level
agreement shall include the detailed protections to control confidentiality,
integrity, and availability of the back-up information.
Level 1 Control CSA DG-04
Standard HIPAA §164.308(a)(7)(ii)(A)
Mapping: HIPAA §164.308(a)(7)(ii)(B)
HIPAA §164.310(d)(2)(iv)
HIPAA §164.312(c)(1)
JCAHO IM.01.01.03, EP 4
NIST SP800-53 R4 CP-9
NRS 603A.215.1
PCI DSS v2 9.5
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS Contractors
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
When configuring wireless access points and devices, the organization shall
change the following:
i. vendor default encryption keys.
ii. encryption keys anytime anyone with knowledge of the keys leaves the
company or changes positions
iii. default SNMP community strings on wireless devices
iv. default passwords/passphrases on access points
v. firmware on wireless devices to support strong encryption for
authentication and transmission over wireless networks
vi. other security-related wireless vendor defaults, if applicable.
A current network diagram (for example, one that shows how covered
information flows over the network) shall exist, documenting all
connections to systems storing, processing or transmitting covered
information, including any wireless networks. Review and update the
network diagram as based on the changes in the environment and no less
than every 6 months.
Extra attention shall be given to the use of Voice over Internet Protocol
(VoIP) technologies. Usage restrictions and implementation guidance shall
be defined and documented for VoIP, including the authorization and
monitoring of the service.
Level 1 Control CSA SA-10
Standard HIPAA §164.308(a)(2)(ii)(A)
Mapping: HIPAA §164.308(a)(4)(ii)(B)
HIPAA §164.310(b)
PCI DSS v2 1.1.2
PCI DSS v2 1.1.3
PCI DSS v2 1.1.4
PCI DSS v2 2.1.1
PCI DSS v2 4.1.1
Phase 1 CORE 102: Eligibility and Benefits Certification Policy v1.1.0
Subsection 3.3
Phase 2 CORE 202: Certification Policy v2.1.0 Subsection 3.3
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Extra attention shall be given to the use of Voice over Internet Protocol
(VoIP) technologies. Usage restrictions and implementation guidance shall
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Documentation and business justification shall be provided for the use of all
services, protocols, and ports allowed, including documentation of security
features implemented for those protocols considered to be insecure. The
firewall and router rule sets shall be reviewed at least every six months.
Wireless access points shall be shut down when not in use (e.g. nights,
weekends). MAC address authentication and static IP addresses shall be
utilized. Access points shall be placed in secure areas. File sharing shall
be disabled on all wireless clients.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall prohibit direct public access between the Internet
and any system component in the covered data environment.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 None
Implementation:
Level 3 Control None
Standard
Mapping:
CMS The organizational shall prohibit service providers from outsourcing any
Contractors: system function outside the U.S. or its territories.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization:
i. protects and controls digital and non-digital media containing sensitive
information during transport outside of controlled areas using
cryptography and tamper evident packaging and
1. if hand carried, using securable container (e.g., locked briefcase)
via authorized personnel, or
2. if shipped, trackable with receipt by commercial carrier;
ii. maintains accountability for information system media during transport
outside of controlled areas; and
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS Contractors
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Media shall be disposed of securely and safely when no longer required,
Specification: using formal procedures that are documented.
*Required for HITRUST Certification 2014
Factor Type: Organizational
Topics: Media and Assets
Policies and Procedures
Services and Acquisitions
Third Parties and Contractors
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Procedures for the handling and storage of information shall be established
Specification: to protect this information from unauthorized disclosure or misuse.
*Required for HITRUST Certification 2014
Factor Type: Organizational
Topics: Cryptography
Data Loss Prevention
Documentation and Records
Media and Assets
Monitoring
User Access
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS The information system shall use cryptographic mechanisms to protect and
Contractors: restrict access to information on organization-defined portable digital
media.
The organization physically controls and securely stores digital and non-
digital media defined within NIST SP 800-88, Guidelines for Media
Sanitization, within controlled areas using physical security safeguards
prescribed for the highest system security level of the information ever
recorded on it.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Ensure the exchange of information within an organization and with any
Objective: external entity is secured and protected, and carried out in compliance with
relevant legislation and exchange agreements.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
See NIST SP800-52 Guidelines for the Selection and Use of Transport Layer
Security (TLS) Implementation and NIST SP800-77 Guide to IPsec VPNs for
more information on implementing encryption technologies for information
transmissions.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
CMS The organization shall prohibit the use of external information systems,
Contractors: including but not limited to, Internet kiosks, personal desktop computers,
laptops, tablet personal computers, personal digital assistant (PDA) devices,
cellular telephones, facsimile machines, and equipment available in hotels
or airports to store, access, transmit, or process CMS sensitive information,
unless explicitly authorized, in writing, by the CIO or his/her designated
representative. If external information systems are authorized, the
organization shall establish strict terms and conditions for their use.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements.
Implementation:
Control Ensure the security of electronic commerce services, and their secure use.
Objective:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS The information system shall protect against an individual falsely denying
Contractors: having performed a particular action.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall ensure the storage of the transaction details are
located outside of any publicly accessible environments (e.g. on a storage
platform existing on the organization's intranet) and not retained and
exposed on a storage medium directly accessible from the Internet.
Where a trusted authority is used (e.g. for the purposes of issuing and
maintaining digital signatures and/or digital certificates) security shall be
integrated and embedded throughout the entire end-to-end
certificate/signature management process.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS web sites are operated within the restrictions addressed in OMB
directives M-10-22 "Guidance for Online Use of Web Measurement and
Customization Technologies" and M-10-23 "Guidance for Agency Use of
Third-Party Websites and Applications" and applicable CMS and DHHS
directives and instruction.
The organization shall monitor the CMS and DHHS security programs to
determine if there are any modified directives and instruction.
Control Ensure information security events are monitored and recorded to detect
Objective: unauthorized information processing activities in compliance with all
relevant legal requirements.
Control Audit logs recording user activities, exceptions, and information security
Specification: events shall be produced and kept for an agreed period to assist in future
investigations and access control monitoring.
Level 1 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500, Number of
Factors: Transactions Per Day: > 6,750, Number of Interfaces to Other Systems: > 25
Level 2 None
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
Messaging systems used to transmit messages containing covered
information shall keep a log of message transmissions, such a log shall
contain the time, date, origin and destination of the message, but not its
content. The organization shall carefully assess and determine the retention
period for these audit logs, with particular reference to professional
standards and legal obligations, in order to enable investigations to be
carried out when necessary and to provide evidence of misuse where
necessary.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System Processing PHI: Yes - AND -, Number of Users: > 5,500, Number of
Factors: Transactions Per Day: > 85,000, Number of Interfaces to Other Systems: >
75
Level 3 Subject to PCI Compliance, Subject to FISMA Compliance, Subject to the CMS
Regulatory Minimum Security Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
i. server alerts and error messages;
ii. user log-on and log-off (successful or unsuccessful);
iii. all system administration activities;
iv. modification of privileges and access;
v. Start up and shut down;
vi. application modifications;
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
A real time alert shall be provided when the audit record log is full or there
is an authentication or encryption logging failure.
Level 1 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500, Number of
Factors: Transactions Per Day: > 6,750, Number of Interfaces to Other Systems: > 25
Level 2 Subject to FTC Red Flags Rule Compliance, Subject to State of Massachusetts
Regulatory Data Protection Act
Factors:
Level 2 Level 1 plus:
Implementation:
Information systems containing covered information shall actively be
provided with automated assets for monitoring events of the system(s),
detecting attacks, and analyzing logs and audit trails that:
i. allow the identification of all system users who have accessed or
modified a given record(s) over a given period of time; and
ii. allow the identification of all records that have been accessed or
modified by a given system user over a given period of time.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Systems shall support audit reduction and report generation, and the
results of monitoring activities shall be reviewed regularly.
Systems shall support audit reduction and report generation that supports
expeditious, on-demand review, analysis, reporting and incident
investigators and does not alter the original audit records, and the results of
monitoring activities shall be reviewed regularly.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System Processing PHI: Yes - AND -, Number of Users: > 5,500, Number of
Factors: Transactions Per Day: > 85,000, Number of Interfaces to Other Systems: >
75
Level 3 Subject to PCI Compliance, Subject to FISMA Compliance, Subject to the CMS
Regulatory Minimum Security Requirements (High)
Factors:
Level 3 Level 2 plus:
Implementation:
Unauthorized remote connections to the information systems shall be
monitored and reviewed at least quarterly, and appropriate action shall be
taken if an unauthorized connection is discovered.
The results of monitoring activities shall be reviewed daily, through the use
of automated tools, for those servers that perform security functions like
intrusion detection system (IDS), intrusion prevention system (IPS) and
authentication, authorization, and accounting protocol (AAA) servers (for
example, RADIUS).
The automated tools shall generate alert notification for technical staff
review and assessment.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall integrate the audit review, analysis, and reporting
processes to support organizational processes for investigation and
response to suspicious activities.
The organization shall specify the permitted actions for information system
processes, roles, and/or users associated with review, analysis, and
reporting of audit records (e.g., read, write, execute, append, and delete).
The information system shall provide near real-time alerts when the
following indications of compromise or potential compromise occur:
i. presence of malicious code;
ii. unauthorized export of information;
iii. signaling to an external information system; or
iv. potential intrusions.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
A real time alert shall be provided when the audit record log is full.
Control Logging systems and log information shall be protected against tampering
Specification: and unauthorized access.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 Access to system audit tools and audit trails shall be safeguarded from
Implementation: unauthorized access and use to prevent misuse or compromise of logs.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500, Number of
Factors: Transactions Per Day: > 6,750, Number of Interfaces to Other Systems: > 25
Level 2 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 2 Level 1 plus:
Implementation:
Access to audit tools and audit trails shall be limited to those with a job-
related need. Authorized and unauthorized access attempts to the audit
system and audit trails shall be logged and protected from modification.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control System administrator and system operator activities shall be logged and
Specification: regularly reviewed.
Factor Type: System
Topics: Audit and Accountability
Documentation and Records
Monitoring
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 5,500, Number of
Factors: Transactions Per Day: > 85,000, Number of Interfaces to Other Systems: >
25
Level 2 Subject to the CMS Minimum Security Requirements (High); Subject to
Regulatory FISMA Compliance
Factors:
Level 2 Level 1 plus:
Implementation:
An intrusion detection system managed outside of the control of system and
network administrators shall be used to monitor system and network
administration activities for compliance.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Faults shall be logged, analyzed, and appropriate remediation action taken.
Specification:
Factor Type: System
Topics: Audit and Accountability
Documentation and Records
Incident Response
Products and 09.ae Fault Logging
Services Guide:
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 Faults reported by users or by system programs related to problems with
Implementation: information processing or communications systems shall be logged.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500, Number of
Factors: Transactions Per Day: > 6,750, Number of Interfaces to Other Systems: > 25
Level 2 Subject to the CMS Minimum Security Requirements (High); Subject to
Regulatory FISMA Compliance
Factors:
Level 2 Level 1 plus:
Implementation:
The information system shall:
i. identify potentially security-relevant error conditions;
ii. generate error messages that provide information necessary for
corrective actions without revealing information that could be exploited
by adversaries in error logs and administrative messages that could be
exploited by adversaries; and
iii. reveal error messages only to authorized personnel.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control The clocks of all relevant information processing systems within the
Specification: organization or security domain shall be synchronized with an agreed
accurate time source to support tracing and reconstitution of activity
timelines.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to FISMA Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None, Processing PHI: Yes - AND -, Number of Users: > 500, Number of
Factors: Transactions Per Day: > 6,750, Number of Interfaces to Other Systems: > 25
Level 2 Subject to PCI Compliance
Regulatory
Factors:
Level 2 Time data shall be protected according to the organizations access controls
Implementation: (see 01.c) and logging controls (see 09.ad).
Level 2 Control NRS 603A.215.1
Standard PCI DSS v2 10.4.2
Mapping:
Level 3 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Security requirements and controls shall reflect the business value of the
information assets involved (see 7.d), and the potential business damage
that might result from a failure or absence of security.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS The organization shall manage the information system using the
Contractors: information security steps of IEEE 12207.0 standard for SDLC, as provided
in the CMS eXpedited Life Cycle (IXLC).
Control Data input to applications and databases shall be validated to ensure that
Specification: this data is correct and appropriate.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to FISMA Compliance, Subject to FTC Red Flags Rule Compliance,
Regulatory Subject to Joint Commission Accreditation
Factors:
Level 1 For organizations doing system development (e.g. applications, databases)
Implementation: checks shall be applied to the input of business transactions, standing data,
and parameter tables and minimally for covered information.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Web-based applications shall be checked for the most current OWASP top
10 input-validation related vulnerabilities.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes, Number of
Factors: Users: > 5,500, Number of Transactions Per Day: > 85,000, Number of
Interfaces to Other Systems: > 25
Level 2 Subject to PCI Compliance, Subject to the CMS Minimum Security
Regulatory Requirements (High)
Factors:
Level 2 Level 1 plus:
Implementation:
Applications that store, process or transmit covered information shall
undergo application vulnerability testing at least annually by a qualified
party, with an emphasis on input validation controls. Application input
validation testing shall be automated through use of tools or other non-
manual methods.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to Joint Commission Accreditation
Regulatory
Factors:
Level 1 For organizations doing system development (e.g. applications, databases)
Implementation: the design and implementation of applications shall ensure that the risks of
processing failures leading to a loss of integrity are minimized.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 Refer to the Provider specific requirements.
Implementation:
Level 3 Control ISO 27799-2008 7.9.2.1
Standard
Mapping:
CMS The information system shall fail to a known secure state of all failures
Contractors: preserving the maximum amount of state information in failure.
The information system shall verify the correct operation of system security
functions upon system startup and restart, upon command by a user with
appropriate privilege, periodically on a monthly basis, provide notification
of failed automated security tests, and notify system administration when
anomalies are discovered.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 1 None
Organizational
Factors:
Level 1 System Processing PHI: Yes -AND-, Accessible from the Internet: Yes, Exchanges
Factors: Data with a Business Partner: Yes
Level 1 Subject to Joint Commission Accreditation
Regulatory
Factors:
Level 1 The information system provides mechanisms to protect the authenticity of
Implementation: communications sessions.
See NIST SP800-52 Guidelines for the Selection and Use of Transport Layer
Security (TLS) Implementations for more information on
implementing integrity checks for information transmissions.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Data output from an application shall be validated to ensure that the
Specification: processing of stored information is correct and appropriate to the
circumstances.
Factor Type: System
Topics: None
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 Subject to Joint Commission Accreditation
Regulatory
Factors:
Level 1 For organizations doing system development (e.g. applications, databases)
Implementation: output validation shall be manually or automatically performed.
Level 2 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS The organization shall require cryptographic procedures that address the
Contractors: approach to key management, including methods to deal with the
protection of cryptographic keys and the recovery of encrypted information
in the case of lost, compromised or damaged keys.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control To ensure the security of system files, access to system files and program
Objective: source code shall be controlled, and IT projects and support activities
conducted in a secure manner.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 To minimize the risk of corruption to operational systems, the following
Implementation: procedures shall be implemented to control changes:
i. the updating of the operational software, applications, and program
libraries shall only be performed by authorized administrators; and
ii. operational systems shall only hold approved programs or executable
code (i.e. no development code or compilers).
Any decision to upgrade to a new release shall take into account the
business requirements for the change, and the security and privacy impacts
of the release (e.g. the introduction of new security functionality or the
number and severity of security problems affecting this version).
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Number of Users: > 500, Third Party Support
Factors: (Vendor Access or Maintenance): Yes, Number of Transactions Per Day: >
6,750
Level 2 None
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
Applications and operating system software shall only be implemented
after successful testing. The tests shall include tests on usability, security,
and effects on other systems, and shall be carried out on separate systems.
It shall be ensured that all corresponding program source libraries have
been updated.
A configuration control system shall be used to keep control of all
implemented software as well as the system documentation.
Level 3 None
Organizational
Factors:
Level 3 System Processing PHI: Yes - AND -, Number of Users: > 5,500, Number of
Factors: Transactions Per Day: > 85,000
Level 3 None
Regulatory
Factors:
Level 3 No additional Requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 The use of operational databases containing covered information for non-
Implementation: production (e.g. testing) purposes shall be avoided. If covered or otherwise
sensitive information must be used for testing purposes, all sensitive details
and content shall be removed or modified beyond recognition (e.g. de-
identified) before use.
The following requirements shall be applied to protect data, when used for
testing purposes:
i. the access control procedures, which apply to operational application
systems, shall also apply to test application systems (see 1.0);
ii. there shall be formal management authorization for instances where
operational information is copied to a non-production application
system; and
iii. operational information and test accounts shall be erased from a test
application system immediately after the testing is complete.
Level 1 Control CSA DG-06
Standard ISO 27799-2008 7.9.4.2
Mapping:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Personnel developing and testing system code shall not have access to
production libraries.
Level 2 Control ISO/IEC 27002-2005 12.4.2
Standard
Mapping:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 1 None
Organizational
Factors:
Level 1 System Applicable to all systems
Factors:
Level 1 None
Regulatory
Factors:
Level 1 Access to program source code (code written by programmers, which is
Implementation: compiled and linked to create executables) and associated items (such as
designs, specifications, verification plans and validation plans) shall be
strictly controlled, in order to prevent the introduction of unauthorized
functionality and to avoid unintentional changes. An organization will not
have access to source code for the majority of purchased software
applications, and this requirement does not apply.
Level 2 None
Organizational
Factors:
Level 2 System Processing PHI: Yes - AND -, Accessible from the Internet: Yes, Number of
Factors: Users: > 500, Number of Transactions Per Day: > 6,750
Level 2 None
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
Program source code shall be stored in a central location, specifically in
program source libraries.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This process shall include a risk assessment, analysis of the security and
privacy impacts of changes, and specification of security controls needed.
This process shall also ensure that existing security and control procedures
are not compromised, that support programmers are given access only to
those parts of the system necessary for their work, and that formal
agreement and approval for any change is obtained.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall review and update the baseline configuration of the
information system:
i. at least once every six (6) months;
ii. when required due to critical security patches, upgrades and emergency
changes (e.g., unscheduled changes, system crashes, replacement of
critical hardware components), major system changes/upgrades;
a. as an integral part of information system component installations,
b. upgrades, and
c. supporting baseline configuration documentation reflects ongoing
implementation of operational configuration baseline updates,
either directly or by policy.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS The CMS hierarchy for implementing all security configuration guidelines is
Contractors: as follows:
i. CMS
ii. DHHS
iii. OMB
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS The organization shall protect against supply chain threats by employing
Contractors: best practices and methodologies, wherever possible, selecting components
that have been previously reviewed by other government entities (e.g.,
National Information Assurance Partnership [NIAP]) as part of a
comprehensive, defense-in-breadth information security strategy.
The organization shall require that all information systems meet a level of
security functionality and security assurance that is sufficient to preserve
the confidentiality, integrity, and availability of the information being
processed, stored, or transmitted by the system by establishing system
trustworthiness objectives as part of the security authorization by following
the CMS eXpedited Life Cycle (XLC).
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
The organization shall define and establish the roles and responsibilities
associated with technical vulnerability management, including vulnerability
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The action taken shall be carried out according to the controls related to
change management (see 10.k) or by following information security
incident response procedures (see 11.c).
Level 3 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
CMS Contractors
The organization shall centrally manage the flaw remediation process and
shall install software updates automatically where possible.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Employees and other workforce members, including third parties, are able
to freely report security weaknesses (real and perceived) without fear of
repercussion.
All employees, contractors and third party users shall receive mandatory
incident response training to ensure they are aware of their responsibilities
to report any information security events as quickly as possible, the
procedure for reporting information security events and the point(s) of
contact.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Examples include:
i. a break-in leading to theft of IT hardware, resulting in a confidentiality
breach; or
ii. a fire could be set to disguise misuse of IT equipment.
Level 3 Control CMSRs 2012v1.5 SI-4 (HIGH)
Standard ISO/IEC 27002-2005 13.1.1
Mapping: NIST SP800-53 R4 SI-4
Texas Covered Organizations or persons that conduct business in Texas and own or license
Entities: computerized data that includes sensitive personal information shall
disclose any breach of system security, after discovering or receiving
notification of the breach, to any individual whose sensitive personal
information was, or is reasonably believed to have been, acquired by an
unauthorized persons. The disclosure shall be made as quickly as possible,
except at the request of a law enforcement agency that determines
notification will impede a criminal investigation, or as necessary to
determine the scope of the breach and restore the reasonable integrity of
the data system.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Employees, contractors and third party users shall be informed via the
policies and procedures and incident response training that they shall not,
in any circumstances, attempt to prove a suspected weakness.
Level 1 Control CMSRs 2012v1.5 PL-4 (HIGH)
Standard CMSRs 2012v1.5 SI-2 (HIGH)
Mapping: HIPAA §164.308(a)(1)(ii)(D)
HIPAA §164.308(a)(5)(ii) (B)
ISO/IEC 27002-2005 13.1.2
ISO 27799-2008 7.10.1
NIST SP800-53 R4 PL-4
NIST SP800-53 R4 SI-2
1 TAC § 390.2(a)(1)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 Subject to FTC Red Flags Rule Compliance
Regulatory
Factors:
Level 2 Level 1 plus:
Implementation:
All employees, contractors and third party users shall report potential
weaknesses that may lead to organization or system breaches, or lead to
identity theft for the following categories:
i. alerts, notifications, or other warnings received from third parties, state
or federal agencies or service providers, such as fraud detection
services;
ii. the presentation of suspicious documents associated with an
individual's account;
iii. the presentation of suspicious covered information (e.g., an address
change that is inconsistent with existing information);
iv. the unusual use of, or other suspicious activity related to, an individual's
account; and
v. notice from customers, law enforcement authorities, or other persons
regarding possible weaknesses in connection with accounts held by the
organization.
Level 2 Control 16 CFR Part §681 Appendix A II(c)
Standard 1 TAC § 390.2(a)(3)
Mapping:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Action to recover from security breaches and correct system failures shall
be carefully and formally controlled. The procedures shall ensure that:
i. only clearly identified and authorized personnel are allowed access to
live systems and data;
ii. all emergency actions taken are documented in detail;
iii. emergency action is reported to management and reviewed in an
orderly manner; and
iv. the integrity of business systems and controls is confirmed with
minimal delay.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall test and/or exercise the incident response capability
for the information system within every three hundred sixty-five (365) days
using reviews, analyses, and simulations to determine the incident response
effectiveness and documents the results. A formal test need not be
conducted if the organization actively exercises its response capability
using real incidents.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall distributes copies of the incident response plan to:
i. CMS Chief Information Security Officer;
ii. CMS Chief Information Officer;
iii. Information System Security Officer;
iv. CMS Office of the Inspector General/Computer Crimes Unit;
v. All personnel within the organization Incident Response Team;
vi. All personnel within the PII Breach Response Team; and
vii. All personnel within the organization Operations Centers.
Control There shall be mechanisms in place to enable the types, volumes, and costs
Specification: of information security incidents to be quantified and monitored.
Factor Type: Organizational
Topics: Awareness and Training
Incident Response
IT Organization and Management Roles and Responsibilities
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
CMS The organization shall implement an incident handling capability using the
Contractors: current CMS Incident Handling and Breach Notification Standard and
Procedures. Relevant information related to a security incident shall be
documented according to the current CMS Incident Handling and Breach
Notification Standard and Procedures.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control To ensure that strategies and plans are in place to counteract interruptions
Objective: to business activities and to protect critical business processes from the
effects of major failures of information systems or disasters and to ensure
their timely resumption.
Control A managed program and process shall be developed and maintained for
Specification: business continuity throughout the organization that addresses the
information security requirements needed for the organization's business
continuity.
Factor Type: Organizational
Topics: Contingency Planning
Documentation and Records
IT Organization and Management Roles and Responsibilities
Media and Assets
Personnel
Risk Management and Assessments
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Business continuity risk assessments shall be carried out annually with full
involvement from owners of business resources and processes. This
assessment shall consider all business processes and shall not be limited to
the information assets, but shall include the results specific to information
security. It is important to link the different risk aspects together, to obtain
a complete picture of the business continuity requirements of the
organization. The assessment shall identify, quantify, and prioritize risks
against key business objectives and criteria relevant to the organization,
including critical resources, impacts of disruptions, allowable outage times,
and recovery priorities.
Level 2 Control ISO/IEC 27002-2005 14.1.2
Standard ISO 27799-2008 7.11
Mapping: JCAHO IM.01.01.03, EP 6
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The type of configuration for the alternate site shall be defined by the risk
assessment (see 12.b). Acceptable solutions include:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall provide for the recovery and reconstitution of the
information system to a known state after a disruption, compromise, or
failure. Recovery of the information system after a failure or other
contingency shall be done in a trusted, secure, and verifiable manner.
The organization shall plan for the resumption of systems included on the
CMS Critical Infrastructure Protection (CIP) list within twelve (12) hours
and for the resumption of other essential missions and business functions
within one (1) week of contingency plan activation.
The organization shall ensure all equipment and supplies required for
resuming system operations at the alternate processing site are available,
or contracts are in place to support delivery to the site, to permit
resumption of systems included on the CMS Critical Infrastructure
Protection (CIP) list within twelve (12) hours and resumption of other
essential missions and business functions within one (1) week of
contingency plan activation.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
The test schedule for business continuity plan(s) shall indicate how and
when each element of the plan is tested. These techniques shall be applied
on a 'programmatic' basis with the tests in that program building upon one
another, and in a way that is relevant to the specific response and recovery
plan. The results of tests shall be recorded and actions taken to improve the
plans, where necessary.
The organization shall review test results and initiate corrective actions to
ensure the continued effectiveness of the plan.
CMS The organization shall test/exercise the contingency plan at the alternate
Contractors: processing site to familiarize contingency personnel with the facility and
available resources and to evaluate the site’s capabilities to support
contingency operations.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Individuals shall have a right to adequate notice of the uses and disclosures
Specification: of protected health information that may be made by the covered entity,
and of the individual's rights and the entity's legal duties with respect to
protected health information.
Factor Type: Organizational
If the covered entity provides a health plan, the covered entity provides
notice or notices relevant to the individual (other than an inmate) no later
than the compliance date or upon enrollment thereafter, within 60 days of a
material revision, and no less than every three years.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The covered entity ensures revisions to its privacy practices stated in the
notice are compliant with relevant standards, regulatory requirements and
best practices and that its practices are modified to reflect the changes in
the notice. If the right to change a privacy practice is not stated in its notice,
the covered entity only applies such changes to PHI created or received
after the effective date of the revised notice.
Level 1 Control 1 TAC 390 § 390.2(a)(1)
Standard HIPAA § 164.502(i)
Mapping: HIPAA § 164.520(a)
HIPAA § 164.520(b)
HIPAA § 164.520(c)
HIPAA § 164.520(d)
HIPAA § 164.530(i)(4)
HIPAA §164.530(j)
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No Additional Requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Group Health The health insurance issuer or HMO provides an individual—other than an
Plans: inmate—enrolled in a group health plan a notice of privacy practices for
that portion of the group health plan through which the individual receives
benefits.
Control Individuals shall have the right to request restriction of uses and
Specification: disclosures of their protected health information.
Factor Type: Organizational
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The covered entity agrees to and complies with requests by individuals for
restrictions on disclosure of PHI to a health plan for a health care item or
service for which someone other than the health plan pays in full,
The covered entity ensures that individuals who exercise any of their lawful
rights, including the filing of a complaint, are not subject to intimidation,
threats, discrimination, or any other retaliatory action.
Level 1 Control 1 TAC § 390.2(a)(4)(B)(i)
Standard 1 TAC § 390.2(a)(4)(B)(ii)
Mapping: 1 TAC § 390.2(a)(4)(B)(iii)
1 TAC § 390.2(a)(4)(B)(v)
1 TAC § 390.2(a)(4)(B)(xiv)
1 TAC § 390.2(a)(4)(B)(xv)
1 TAC § 390.2(a)(4)(B)(xvi)
1 TAC § 390.2(a)(4)(C)(ii)
1 TAC 390 § 390.2(a)(1)
HIPAA § 164.502(g)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Texas Covered Organizations shall ensure that a minor child as defined in Texas Civil
Entities: Practice Code § 129.001 or non-parent of a minor child may consent to
medical, dental, psychological, counseling and surgical treatment for the
child by a licensed physician or dentist for those circumstances specified in
Texas Family Code §§ 32.003 and 32.004. Organizations shall also ensure a
parent, foster parent, guardian, or managing conservator of a minor child
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Organizations shall ensure that a parent of a minor child retains the rights
and duties specified in Texas Family Code §§ 151.001, 153.073, 153.074
and 153.132 pursuant to the exceptions provided by §§ 32.003 and 32.004.
Control 1 TAC § 390.2(a)(4)(C)(i)
Standard 1 TAC § 390.2(a)(4)(C)(ii)
Mapping:
The covered entity does not use or disclose PHI without a valid
authorization, when such authorization is required, including the use or
disclosure of psychotherapy notes or for the purposes of marketing.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No Additional Requirements
Implementation:
Level 3 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The organization shall provide for the recovery and reconstitution of the
information system to a known state after a disruption, compromise, or
failure. Recovery of the information system after a failure or other
contingency shall be done in a trusted, secure, and verifiable manner.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
If an individual does not object, the covered entity limits the PHI contained
in a directory of individuals at its facility to the individual's name, location,
general condition, and religious affiliation and only uses or discloses such
information for directory purposes to members of the clergy or, except for
religious affiliation, to other persons who ask for the individual by name.
The covered entity provides directory information for allowed uses only in
cases where the individual has not objected to such use or when the
opportunity to object cannot be practicably provided because of incapacity
or an emergency treatment circumstance.
If an individual is present or has the capacity, the covered entity obtains the
individual's agreement, provides the individual an opportunity to object, or
reasonably infers from the circumstances that the individual does not object
to disclosure of PHI.
The covered entity ensures that, when an individual is not present or the
opportunity to agree or object to the use or disclosure cannot practicably be
provided, it only allows uses or provides disclosures of PHI to a person that
is directly relevant to that person's involvement with the individual's health
care.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Protected health information may only be used or disclosed without written
Specification: authorization of the individual or the opportunity for the individual to agree
or object only when such use or disclosure is authorized by applicable laws
or regulations.
Factor Type: Organizational
The covered entity complies with the regulatory criteria for permitted uses
and disclosures of PHI for public health activities prior to the use or
disclosure for said activities.
The covered entity discloses PHI about an individual whom the entity
reasonably believes to be a victim of abuse, neglect, or domestic violence to
government authorities authorized by law to receive such reports only to
the extent necessary and required by law, and notifies the individual when
required by law.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The covered entity ensures that satisfactory assurances are obtained before
providing the appropriate disclosures of PHI pursuant to court orders,
subpoenas, or discovery requests for judicial and administrative
proceedings
The covered entity only discloses PHI to law enforcement for valid law
enforcement purposes when specifically defined criteria are met.
The covered entity discloses PHI to law enforcement for identification and
location purposes subject to specifically defined criteria, including whether
or not notice or consent is provided.
The covered entity discloses PHI related to an individual who has died to
law enforcement subject to specifically defined criteria.
The covered entity uses or discloses PHI for research only if approved by a
valid IRB or privacy board and receives appropriate representations from
the research regarding the appropriate uses and disclosures necessary for
research purposes.
The covered entity uses or discloses the PHI of Armed Forces personnel for
activities deemed necessary by appropriate military command authorities
only if the authority has published notice in the Federal Register with
specific, required information.
The covered entity discloses PHI to authorized federal officials for the
conduct of lawful intelligence, counter-intelligence, and other national
security activities.
The covered entity discloses PHI to authorized Federal officials for the
provision of protective services to authorized officials or for the conduct of
authorized investigations.
The covered entity only discloses PHI as authorized and to the extent
necessary to comply with laws relating to workers' compensation or
similar programs.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional Requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Texas Covered Cancer data may be provided to the Texas Cancer Registry without patient
Entities: authorization or consent in accordance with 25 TAC § 91.3(e).
Control Individuals shall have a right of access to inspect and obtain a copy of
Specification: protected health information about themselves for as long as the
information is maintained.
Factor Type: Organizational
Level 1 With limited exceptions, the covered entity provides individuals the right of
Implementation: access to review and obtain a copy of their PHI in a designated record set
for as long as the record set is maintained, and provides such access in a
timely manner (30 days with no more than one 30 day extension), for no
more than a reasonable, cost-based fee, or, if the covered entity does not
maintain the PHI but knows where it's located, the covered entity informs
the individual where to direct the request.
The covered entity provides the individual access to the PHI in the
designated record set in a written or electronic form and format requested
by the individual or otherwise agreed to by the covered entity and the
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The covered entity only denies an individual access provided the individual
is given the right to have such denials reviewed when a licensed health care
professional determines access would endanger the life or physical safety
of, or otherwise cause substantial harm to, the individual or another person.
The covered entity provides timely (30 days plus no more than a 30 day
extension), written denial to an individual's request for access in plain
language that addresses the basis for denial, a statement of the individual's
rights for review of the denial, and a description of procedures for
complaints to the entity and the Secretary of Health and Human Services. If
the covered entity does not maintain the PHI that is the subject of the
individual's request for access, and the covered entity knows where the
requested information is maintained, the covered entity informs the
individual where to direct the request for access.
Level 1 Control 1 TAC 390 § 390.2(a)(1)
Standard HIPAA § 164.524(a)
Mapping: HIPAA § 164.524(b)
HIPAA § 164.524(c)
HIPAA § 164.524(d)
HIPAA §164.530(j)
Level 2 None
Organizational
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
The covered entity's accounting of disclosures includes, for the six years
prior to the request, the date, a name and address of the entity provided the
PHI, a description of the PHI disclosed, and why the information was
disclosed; and, if for research, the name of the research activity, the period
of time the PHI was disclosed, the contact information of the research
sponsor (name, address and phone number), and a statement that the PHI
may or may not have been disclosed for a particular research activity.
When requested by the individual, the covered entity provides assistance to
the individual in contacting the research sponsor and researcher for an
accounting.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control Individuals shall have a right to have protected health information amended
Specification: for as long as the information is maintained.
Factor Type: Organizational
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No Additional Requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Group Health The group health plan limits exceptions to the general requirements for
Plans: amendments to PHI to health benefits provided other than solely through
an insurance contract with a health insurance issuer or HMO and PHI that it
does not create or receive, except for summary health information or
information on whether the individual is participating in the group health
plan, or is enrolled in or has disenrolled from a health insurance issuer or
HMO offered by the plan. Amended plan documents are subject to the
organization’s retention policy.
The business associate shall disclose PHI when required by the Secretary of
Health and Human Services to investigate or determine the business
associate's compliance with the HIPAA Privacy Rule and to the covered
entity, individual, or individual's designee, as necessary to satisfy a covered
entity's obligations as described in CSF control 13.f with respect to an
individual's request for an electronic copy of PHI.
Level 1 Control 1 TAC § 390.2(a)(4)(A)(iii)
Standard 1 TAC § 390.2(a)(4)(A)(xii)
Mapping: 1 TAC § 390.2(a)(4)(A)(xiv)
1 TAC § 390.2(a)(4)(B)(x)
1 TAC 390 § 390.2(a)(1)
HIPAA § 164.502(a)(2)
HIPAA § 164.502(a)(4)
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Texas Covered The entity that performed the genetic test shall disclose the test results to
Entities: the individual or a physician designated by the individual upon written
request.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The covered entity complies with restrictions on use and disclosure of PHI
for which it has agreed.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
The covered entity only discloses PHI for specific, allowed treatment,
payment or health care operations, including quality assessments,
competency or qualification reviews, health care fraud and abuse detection
or compliance, and patient safety activities.
The covered entity only uses or discloses specific, limited types of PHI
under specific, defined conditions to a business associate or an
institutionally-related foundation for the purpose of raising funds for its
own benefit.
The covered entity restricts uses and/or disclosures of PHI used for
underwriting purposes for any other purpose except as may be required by
law.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional Requirements
Implementation:
Texas Covered Organizations shall ensure reports, records, and other documents
Entities: containing sensitive personal information lawfully obtained by state
agencies are not subject to subpoena and may not otherwise be released or
made public except as authorized by law.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Persons and organizations shall ensure that the section of a birth certificate
entitled “For Medical and Health Use Only” is not considered part of the
legal birth certificate and is not released or made public on subpoena or
otherwise, except that release may be made for statistical purposes only so
that no person, patient, or facility is identified, or to medical personnel of a
health care entity, as that term is defined in Subtitle B, Title 3, TX
Occupations Code, or appropriate state or federal agencies for statistical
research, except as provided in § 192.002.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
FTI Custodians
Control To ensure individuals are provided with a timely means to dispute the
Objective: accuracy of their individually identifiable health information, and to have
erroneous information corrected or to have a dispute documented if their
requests are denied.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Texas Covered Records relating to the deaths of residents with an intellectual disability or
Entities: related condition are also confidential and not subject to release or
disclosure under the provisions of TX Government Code § 552.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Control The use or disclosure of protected health information shall be limited to the
Specification: minimum necessary to accomplish the intended purpose of the use,
disclosure, or request.
Factor Type: Organizational
The covered entity only creates and uses information that is not
individually identifiable (i.e., de-identified) when a code or other means of
record identification designed to enable coded or otherwise de-identified
information to be re-identified is not disclosed. If the de-identified
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
When de-identifying PHI, the covered entity removes all eighteen (18) data
elements required by the HIPAA Administrative Simplification's Privacy
Rule and has no knowledge the resulting data set could be re-identified, or
an appropriate person applies generally accepting scientific principles and
methods for rendering information not individually identifiable and
determines the risk of re-identification is appropriately small.
The covered entity ensures codes or other means used to re-identify de-
identified information are not derived from or related to information about
the individual(s) or are otherwise capable of being translated to identify the
individual(s), nor does the covered entity use or disclose the code, means or
mechanism for any other purpose.
The covered entity limits the PHI disclosed to the minimum amount
reasonably necessary to achieve the purpose of the disclosure.
The covered entity must implement policies and procedures (or standard
protocols) that limit PHI for recurring requests to the minimum necessary.
A covered entity must develop criteria designed to limit all other requests
to the minimum necessary to accomplish the purpose for which it was made
and review all requests for disclosure on an individual basis in accordance
with such criteria.
The covered entity enters into a data use agreement with a recipient before
allowing the use or disclosure of a limited data set and ensures the data
provided meets the requirements for a limited data set.
The covered entity terminates data use agreements and takes reasonable
steps to secure limited data sets when it becomes aware of a pattern of
activity or practice of the recipient that constitutes a material breach or
violation of the data use agreement.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Control Individuals shall be afforded the right to request and must accommodate
Specification: reasonable requests to receive communications of protected health
information by alternative means or at alternative locations.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 2 None
Organizational
Factors:
Level 2 System None
Factors:
Level 2 None
Regulatory
Factors:
Level 2 No additional requirements
Implementation:
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
If the covered entity has multiple functions, it ensures the use and
disclosure of PHI is only for the purpose related to the appropriate function
being performed.
Level 1 Control 1 TAC 390 § 390.2(a)(1)
Standard HIPAA § 164.504(e)
Mapping: HIPAA § 164.504(g)
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
Level 3 None
Organizational
Factors:
Level 3 System None
Factors:
Level 3 None
Regulatory
Factors:
Level 3 No additional requirements
Implementation:
Texas Covered The group health plan documents appropriately restrict the use and
Entities: disclosure of PHI by the plan sponsor.
The group health plan, or a health insurance issuer or HMO with respect to
the group plan, limits disclosures to the plan sponsor information on
whether an individual is participating in the plan, or is enrolled in or
disenrolled from a health insurance issuer or HMO offered by the plan.
Plan documents ensure adequate separation between the group health plan
and the plan sponsor by describing employees or classes of employees to
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.
This document contains copyrighted information owned by HITRUST or its suppliers. The use and distribution of this information
are subject to the following terms: (1) The information is for internal or personal use by the licensee only and (2) The information
may be used only during the term of a valid HITRUST license. Copying, dissemination or use of this information contrary to these
terms is a violation of U.S. law and may be grounds for criminal or civil penalties.