Photo by Mike van Schoonderwalt from Pexels
Organizations preparing for HITRUST certification typically have questions around Control Reference 05.h Independent Review of Information Security: "The organization's approach to managing information security and its implementation (control objectives, controls, policies, processes, and procedures for information security) shall be reviewed independently at planned intervals, at a minimum annually, or when significant changes to the security implementation occur."
The first question is typically: Does the requirement for an "independent" review necessitate hiring external auditors? The second question is often: How does this differ from other HITRUST review requirements?
Defining independent: The Level 1 notes for 05.h in the Cyber Security Framework (CSF) begin to clarify things. It says: "The review ... is carried out by individuals independent of the area under review (e.g. the internal audit function, an independent manager or a third-party organization specializing in such reviews." In addition, the HITRUST glossary defines Independent as "With respect to an assessor or measure, one that is not influenced by the person or entity that is responsible for the implementation of the requirement/control being evaluated or measured." So an independent review can be conducted either by staff in a separate department or on a separate team from the function being reviewed as long as it isn't being influenced by the implementors, or by an external team.
Overall HITRUST Review and Assessment Requirements: At a minimum, in addition to independent review, HITRUST baseline requirements typically include:
Baseline requirements are identified for an organization based on an organization's answer to scoping questions.
Besides HITRUST reviews, these organizations may also be subject to SOC, PCI-DSS, ISO27001, penetration tests, and/or other reviews.
Illustrative procedures: In addition to the baseline requirement statements, organizations should also look at the "illustrative procedure" (IP) language for selected 05.h baseline requirements to understand how they are being tested. (Organizations can export a spreadsheet from the reporting section of MyCSF that includes the baseline requirements and the IP language for each requirement.) With a solid understanding of the organization-specific controls, the organization can consider whether existing assessment efforts are sufficient. If so, an organization may create an assurance plan specifying how the independent review requirement is met by existing efforts instead of performing an additional review.
Focus on IPs and not the CSF: Keep in mind that if an organization wants to achieve HITRUST certification with efficiency, it should not consider the HITRUST CSF as equivalent to every organization's HITRUST scope. Not all CSF "Implementation Requirements" apply for every organization. Organizations should primarily focus on their baseline requirements and IPs, referencing the CSF for additional context only.
By Ann Grove, Logical's President
Added Hacker Valley and other updates: 10/2/2020
Original post: 8/2/2017
If you are looking for opportunities to keep your finger on the pulse of security, podcasts fit the bill. Here are some of our favorite security podcasts, in alphabetical order.
Let us know if you have any podcasts to add!
Ann Grove, president of Logical, is Logical’s lead consultant. Logical's clients include security and compliance vendors as well as penetration test consultants.