October 28 2014 the hitrust common security framework csf is an important tool that healthcare organizations of all sizes can use in their approach to regulatory compliance and risk.
Hitrust cyber security framework.
This publication was developed in consultation with this sg.
As a result hitrust reviewed several cybersecurity related best practice frameworks including the sans 20 critical controls for cybersecurity.
Advance the implementation of the cybersecurity framework in the sector and provide a forum for discussion of cybersecurity issues related to risk management among a wide variety of hph sector stakeholders.
The framework was developed to cater to the security issues organizations within the health industry face when managing it security.
The hitrust csf is a scalable and extensive security framework used to efficiently manage the regulatory compliance and risk management of organizations.
Hitrust has launched a certification program for the nist cybersecurity framework that makes it easier for security teams to report on their implementation of the framework to upper management.
Hitrust health information trust alliance cybersecurity framework addresses the various measures for enhancing security.
Hitrust csf v9 4 overview.
The cybersecurity framework is for organizations of any size in any sector in the critical infrastructure that already have a mature cyber risk management and cybersecurity program that don t yet have a cyber risk management or cybersecurity program with a mission of helping keep up to date on managing risk and facing business or societal threats.
This version integrates the department of defense dod cybersecurity maturity model cmmc version 1 0 standard into the hitrust csf and includes added language to the glossary to better clarify terms found in the framework.
Hitrust in collaboration with private sector government technology and information privacy and security leaders has established the hitrust csf a certifiable framework that can be used by any organization that creates accesses stores or exchanges sensitive information.
Rm sg members who assisted with the review of this guide include.