HITRUST is the only framework in the Atlas owned and certified by a private organization. Its product is certainty: a single assessment that maps to ISO 27001, NIST CSF, HIPAA, PCI DSS, GDPR, and dozens more. Customers in healthcare and adjacent industries treat the HITRUST report as table stakes.
Three assessment levels — e1, i1, r2 — calibrated by risk and scope, with very different effort, depth, and certificate validity. The assessor recommends; HITRUST decides.
HITRUST sells certainty, not controls. The CSF itself borrows almost everything from ISO 27001, NIST 800-53, HIPAA, PCI DSS, and others. What HITRUST adds is (1) tailored control selection based on risk factors, (2) maturity-based scoring (PRISMA), (3) a centralized assessment platform (MyCSF), and (4) a certification body that does QA on the assessor's work. The customer using a HITRUST-certified vendor doesn't need to read 50 SOC 2s to figure out if security is acceptable — they read one HITRUST report.
The MyCSF platform is the audit method. Unlike SOC 2 or ISO 27001 where the auditor controls evidence requests and storage, HITRUST mandates everything happens in MyCSF. The assessed entity uploads evidence; the assessor scores in MyCSF; HITRUST QA reviews in MyCSF; the certificate issues from MyCSF. Reproducible — and somewhat cumbersome — but eliminates the "missing email attachments" problem of traditional audits.
Two-party validation is unique. The Authorized External Assessor performs the work and recommends a result, but HITRUST itself reviews the work and issues the certificate. An AEA cannot simply approve a weak assessment — the QA process catches inflated scoring, missing evidence, or undisclosed findings. Certifications take longer (often 60–90 days from validation completion to certificate issuance) than SOC 2 or ISO 27001.
Inheritance is the underrated feature. If your cloud provider (AWS, Azure, GCP) has HITRUST-certified controls and you scope MyCSF to inherit them, you don't re-test those controls — they're carried forward. This is why HITRUST is dominant in healthcare SaaS: a startup can stand up a credible r2 assessment in 9 months by inheriting infrastructure controls and only validating the layer they own.
HITRUST is a unified framework, not an original one. The 14 control categories closely follow ISO/IEC 27002:2013, with HIPAA-specific additions in category 13 (Privacy). The 19 assessment domains were added to organize evidence collection in MyCSF. This dual structure is what gives HITRUST its breadth — you can map controls to ISO, NIST, HIPAA, and PCI simultaneously — but creates a learning curve when you first encounter both organizations.
Authoritative Sources are the real magic. Every HITRUST control points to its sources: HIPAA §164.312(a)(1), ISO 27001 A.5.15, NIST 800-53 AC-2, PCI DSS Req 7. When you implement a HITRUST control, you can show the evidence to a HIPAA auditor, an ISO assessor, and a PCI QSA — and demonstrate the same control satisfies their requirement. This is the inheritance/reciprocity that makes HITRUST attractive in regulated industries.
Risk factors drive r2 control count. When you set up a r2 assessment in MyCSF, you answer questions about your organization (size, regulatory environment), your systems (cloud / on-prem, public / private), and your data (PHI / PCI / PII). MyCSF generates your tailored control set. Two healthcare SaaS companies of the same size can end up with different r2 control counts depending on their answers. This is why "HITRUST has 2,000 controls" is misleading — almost no one tests 2,000.
PRISMA decouples "we have it" from "we measure it." SOC 2 and ISO 27001 ask whether a control operates. PRISMA asks whether it operates and whether you know how well it operates and whether you're improving it. A SOC 2 control is binary (pass/fail). A PRISMA-scored control has texture — you can be at L3 (implemented) without being at L4 (measured). Most controls in most programs sit at L2.5–L3.5.
The maturity dimensions are not equally weighted. Policy (L1) and Procedure (L2) are foundational — without them, the assessor cannot evaluate L3+. Implementation (L3) is the bar most controls need to clear for r2 cert. Measured (L4) and Managed (L5) lift the average above the threshold. Programs targeting only L3 across the board often miss the cert because their L1/L2 documentation is weak.
The CAP mechanism handles partial failures. When a control scores below threshold, you don't fail the assessment — you file a Corrective Action Plan in MyCSF describing how you'll close the gap and by when. HITRUST QA reviews the CAP. If reasonable, the cert issues with the CAP attached. If unreasonable, the cert is held. Most r2 assessments include several CAPs; pristine assessments are rare.
Inheritance is the lever that moves PRISMA. If your cloud provider operates a control and is itself HITRUST-certified, you can mark the control as "inherited" in MyCSF. The provider's PRISMA score flows through. This is why a startup running on AWS can get to L3 averages on infrastructure controls in months, not years.
| HITRUST domain | SOX | SOC 2 (TSC) | ISO 27001:2022 | NIST CSF 2.0 | PCI DSS v4.0.1 | HIPAA | Shared evidence |
|---|---|---|---|---|---|---|---|
| D01 Info Protection Program | ELC · governance |
CC1.1 · CC5.3 |
Cl. 5 · A.5.1 |
GV.PO · GV.RR |
Req 12 |
§164.308(a)(2) |
Info sec policy, governance charter, RACI |
| D02 Endpoint Protection | ITGC — Operations |
CC6.8 |
A.8.1 · A.8.7 |
PR.PS-05 |
Req 5 |
§164.308(a)(5)(ii)(B) |
EDR/AV deployment, scan logs, MDM config |
| D03 Portable Media | ITGC — Operations |
CC6.5 |
A.7.10 · A.8.10 |
PR.DS-02 |
Req 9.4 |
§164.310(d) |
Removable media policy, encryption verification |
| D04 Mobile Device Security | ITGC — Operations |
CC6.7 |
A.7.9 · A.8.1 |
PR.PS-05 |
Req 12.3.10 |
§164.310(d)(2) |
MDM enrollment, device inventory, remote-wipe records |
| D06 Configuration Mgmt | ITGC — Change |
CC6.6 · CC8.1 |
A.8.9 · A.8.32 |
PR.PS-01 · PR.PS-06 |
Req 2 · Req 6.5 |
§164.308(a)(8) |
CIS benchmarks, change tickets, drift detection |
| D07 Vulnerability Mgmt | ITGC — Operations |
CC7.1 |
A.8.8 |
ID.RA-01 |
Req 6.3 · Req 11.3 |
§164.308(a)(1)(ii)(B) |
Scan reports, patch SLAs, exception register |
| D08 Network Protection | ITGC — Operations |
CC6.6 |
A.8.20 · A.8.22 |
PR.IR-01 |
Req 1 |
§164.312(e)(1) |
Firewall config, network diagram, segmentation tests |
| D09 Transmission Protection | ITGC — Operations |
CC6.7 |
A.8.24 |
PR.DS-02 |
Req 4 |
§164.312(e)(2)(ii) |
TLS scan, cert inventory, VPN config |
| D10 Password Mgmt | ITGC — Access |
CC6.1 |
A.5.17 |
PR.AA-01 |
Req 8.3 |
§164.308(a)(5)(ii)(D) |
Password policy, MFA enforcement, SSO config |
| D11 Access Control | ITGC — Access |
CC6.1 – CC6.3 |
A.5.15 · A.5.18 · A.8.2 |
PR.AA-05 |
Req 7 · Req 8 |
§164.308(a)(3) · §164.308(a)(4) |
JML tickets, UAR exports, IAM config |
| D12 Audit Logging & Monitoring | ITGC — Operations |
CC7.1 · CC7.2 |
A.8.15 · A.8.16 |
DE.CM-01 |
Req 10 |
§164.312(b) |
SIEM rules, log retention, alert tuning evidence |
| D13 Education & Awareness | ELC · COSO Comp.4 |
CC1.4 |
A.6.3 |
PR.AT-01 |
Req 12.6 |
§164.308(a)(5) |
Completion reports, phishing tests, attestations |
| D14 Third Party Assurance | ITGC + BPC · TPRM |
CC9.2 |
A.5.19 – A.5.23 |
GV.SC |
Req 12.8 · Req 12.9 |
§164.308(b) · BAAs |
Vendor inventory, due diligence pkg, contracts, SOC 2s |
| D15 Incident Mgmt | BPC |
CC7.3 – CC7.5 |
A.5.24 – A.5.27 |
RS.MA |
Req 12.10 |
§164.308(a)(6) |
Incident tickets, IR plan, tabletop reports |
| D16 BCM & DR | BPC · resilience | A1.2 · A1.3 |
A.5.29 · A.5.30 |
RC.RP |
Req 12.10 |
§164.308(a)(7) |
BIA, BCP/DR plans, last-test report, RTO/RPO docs |
| D17 Risk Management | ELC · risk memo |
CC3.1 – CC3.4 |
Cl. 6.1 |
GV.RM · ID.RA |
Req 12.3 |
§164.308(a)(1)(ii)(A) |
Risk register, RCSA, treatment plan |
| D18 Physical & Env Sec | ITGC — Operations |
CC6.4 |
A.7.1 – A.7.14 |
PR.AA-06 |
Req 9 |
§164.310 |
Badge logs, CCTV retention, visitor log |
| D19 Data Protection & Privacy | ITGC + BPC |
C1.1 · P1 – P8 |
A.5.34 · A.8.10 |
PR.DS-01 |
Req 3 |
§164.514 · Privacy Rule |
Data inventory, classification policy, DSAR log |
The crosswalk above is, in essence, what HITRUST sells. A startup pursuing SOC 2 + ISO 27001 + HIPAA separately runs three audits, three sets of evidence, three opinions. The same startup pursuing HITRUST r2 with appropriate Authoritative Sources runs one assessment that yields a single report referencing all three sources. The healthcare buyer knows what they're getting; the startup knows what they paid for.
The trap is that HITRUST is not free — the MyCSF subscription, the AEA fees, the HITRUST QA charges, and the time-to-cert (60–90 days post-validation) all add real cost. Compared to SOC 2 alone, a HITRUST r2 typically costs 2–3× more for an early-stage startup. The math becomes favorable only when you would otherwise pursue 3+ frameworks separately.
The shared-evidence model is HITRUST's native operating mode. Every artifact uploaded to MyCSF is automatically scored against multiple Authoritative Sources. JML tickets satisfy HIPAA §164.308(a)(4), ISO A.5.18, NIST PR.AA-05, PCI Req 7, and HITRUST 01.b simultaneously — all visible in MyCSF, all surface in the HITRUST report's Authoritative Sources mapping. This is GRC engineering by default rather than by deliberate effort.