How many security controls are there in HITRUST?
1. Risk Management Program Development: The HITRUST CSF requires organizations to develop and implement a comprehensive risk management program to identify, assess, and mitigate risks associated with their information systems and data. This includes developing policies and procedures for security risk management, conducting risk assessments, implementing risk mitigation strategies, and performing ongoing risk evaluations.
2. Performing Risk Assessments: The HITRUST CSF requires organizations to conduct periodic risk assessments to identify potential risks and vulnerabilities in their systems and data. These assessments should include an analysis of the security controls in place, the potential threats and vulnerabilities, and the potential impact of any identified risks.
3. Risk Mitigation: The HITRUST CSF requires organizations to develop and implement risk mitigation strategies to reduce the impact of any identified risks. This includes implementing security controls to reduce the likelihood of a risk occurring and/or mitigating the impact of a risk if it does occur.
4. Risk Evaluation: The HITRUST CSF requires organizations to regularly evaluate the effectiveness of their risk mitigation strategies and adjust them as necessary. This includes monitoring the effectiveness of the security controls in place and making changes as needed to ensure they remain effective. In total, there are four security controls in the HITRUST CSF.
Useful References
Blogs & Thought Leadership
- HITRUST Common Security Framework vs ISO 27001
- HITRUST Common Security Framework vs Right Fit For Risk (RFFR)
- HITRUST Common Security Framework vs PCI-DSS
- HITRUST Common Security Framework vs NIST Cybersecurity Framework (CSF)
- HITRUST Common Security Framework vs ASD IRAP
Answers
Hear from world-renowned GRC analyst Michael Rasmussen about 6clicks and why it's breakthrough approach is winning
Get up and running with 6clicks in just a matter of hours.

'Push-down' standards to teams
'Push' your standard templates, controls, and risk libraries to your teams.

'Roll up' analytics for reporting
Roll-up analytics for consolidated reporting across your teams.
Our customers have spoken.
They genuinely love 6clicks.
"The best cyber GRC platform for businesses and advisors."
David Simpson | CyberCX
"We chose 6clicks not only for our clients, but also our internal use”
Chief Risk Officer | Publically Listed
"We use Hub & Spoke globally for our cyber compliance program. Love it."
Head of Compliance | Fortune 500






"The 6clicks solution simplifies and strengthens risk, compliance, and control processes across entities and can grow and adapt as the organization changes and evolves."
Michael Rasmussen
GRC 20/20 Research LLC
6clicks is powered by AI and includes all the content you need.
Our unique 6clicks Hub & Spoke architecture makes it simple to use and deploy.
.png)

.png)

.png)
.png)