2024 - HITRUST v11.2.0 - Controls - Tracking Sheet - 6jan2024
2024 - HITRUST v11.2.0 - Controls - Tracking Sheet - 6jan2024
Category # # #
0.00 Information Security 0.01 Information System To implement and manage an 00.a
Management Program Management Program Information Security Management
Program
01.0 Access Control 01.01 Business Requirement To control access to information, 01.a
for Access Control information assets, and business
processes based on business and
security requirements
01.0 Access Control 01.02 Authorized Access to To ensure authorized user 01.b
Information Systems accounts are registered, tracked
and periodically validated to
prevent unauthorized access to
information systems
01.0 Access Control 01.02 Authorized Access to To ensure authorized user 01.c
Information Systems accounts are registered, tracked
and periodically validated to
prevent unauthorized access to
information systems
01.0 Access Control 01.02 Authorized Access to To ensure authorized user 0.1d
Information Systems accounts are registered, tracked
and periodically validated to
prevent unauthorized access to
information systems
01.0 Access Control 01.02 Authorized Access to To ensure authorized user 01.e
Information Systems accounts are registered, tracked
and periodically validated to
prevent unauthorized access to
information systems
01.0 Access Control 01.03 User Responsibilities To prevent unauthorized user 01.f
access, and compromise or theft
of information and information
assets
01.0 Access Control 01.03 User Responsibilities To prevent unauthorized user 01.g
access, and compromise or theft
of information and information
assets
01.0 Access Control 01.03 User Responsibilities To prevent unauthorized user 01.h
access, and compromise or theft
of information and information
assets
01.0 Access Control 01.04 Network Access Control To prevent unauthorized user 01.i
access, and compromise or theft
of information and information
assets
01.0 Access Control 01.04 Network Access Control To prevent unauthorized access to 01.j
networked services
01.0 Access Control 01.04 Network Access Control To prevent unauthorized access to 01.k
networked services
01.0 Access Control 01.04 Network Access Control To prevent unauthorized access to 01.l
networked services
01.0 Access Control 01.04 Network Access Control To prevent unauthorized access to 01.m
networked services
01.0 Access Control 01.04 Network Access Control To prevent unauthorized access to 01.n
networked services
01.0 Access Control 01.04 Network Access Control To prevent unauthorized access to 01.o
networked services
01.0 Access Control 01.05 Operating System To prevent unauthorized access to 01.p
Access Control operating systems
01.0 Access Control 01.05 Operating System To prevent unauthorized access to 01.q
Access Control operating systems
01.0 Access Control 01.05 Operating System To prevent unauthorized access to 01.r
Access Control operating systems
01.0 Access Control 01.05 Operating System To prevent unauthorized access to 01.s
Access Control operating systems
01.0 Access Control 01.05 Operating System Systems for managing passwords 01.t
Access Control shall be interactive and shall
ensure quality passwords
01.0 Access Control 01.05 Operating System To prevent unauthorized access to 01.u
Access Control operating systems
01.0 Access Control 01.06 Application and To prevent unauthorized access to 01.v
Information Access information held in application
Control systems
01.0 Access Control 01.06 Application and To prevent unauthorized access to 01.w
Information Access information held in application
Control systems
01.0 Access Control 01.07 Mobile Computing and To ensure the security of 01.x
Teleworking information when using mobile
computing devices and
teleworking facilities
01.0 Access Control 01.07 Mobile Computing and To ensure the security of 01.y
Teleworking information when using mobile
computing devices and
teleworking facilities
02.0 Human Resources 02.01 Prior to Employment To ensure that employees, 02.a
Security contractors and third-party users
are suitable for the roles for which
they are being considered, to
reduce the risk of fraud, theft, or
misuse of facilities
02.0 Human Resources 02.01 Prior to Employment To ensure that employees, 02.b
Security contractors and third-party users
are suitable for the roles for which
they are being considered, to
reduce the risk of fraud, theft, or
misuse of facilities
02.0 Human Resources 02.02 During On-Boarding To ensure agreements are signed 02.c
Security by employees, contractors and
third-party users of information
assets on their security roles and
responsibilities at the time of their
employment or engagement, prior
to access being granted
02.0 Human Resources 02.03 During Employment To ensure that employees, 02.d
Security contractors and third-party users
are aware of information security
threats and concerns, their
responsibilities and liabilities, and
are equipped to support
organizational security policy in
the course of their normal work,
and to reduce the risk of human
error
02.0 Human Resources 02.03 During Employment To ensure that employees, 02.e
Security contractors and third-party users
are aware of information security
threats and concerns, their
responsibilities and liabilities, and
are equipped to support
organizational security policy in
the course of their normal work,
and to reduce the risk of human
error
02.0 Human Resources 02.03 During Employment To ensure that employees, 02.f
Security contractors and third-party users
are aware of information security
threats and concerns, their
responsibilities and liabilities, and
are equipped to support
organizational security policy in
the course of their normal work,
and to reduce the risk of human
error
02.0 Human Resources 02.04 Termination or Change To ensure that the access rights 02.g
Security of Employment are properly removed, and assets
recovered for terminated
employees and contractors, and
for employees who have changed
employment
02.0 Human Resources 02.04 Termination or Change To ensure that the access rights 02.h
Security of Employment are properly removed, and assets
recovered for terminated
employees and contractors, and
for employees who have changed
employment
02.0 Human Resources 02.04 Termination or Change To ensure that the access rights 02.i
Security of Employment are properly removed, and assets
recovered for terminated
employees and contractors, and
for employees who have changed
employment
03.0 Risk Management 03.01 Risk Management To develop and implement a Risk 03.a
Program Management Program that
addresses Risk Assessments,
Risk Mitigation, and Risk
Evaluations
03.0 Risk Management 03.01 Risk Management To develop and implement a Risk 03.b
Program Management Program that
addresses Risk Assessments,
Risk Mitigation, and Risk
Evaluations
03.0 Risk Management 03.01 Risk Management To develop and implement a Risk 03.c
Program Management Program that
addresses Risk Assessments,
Risk Mitigation, and Risk
Evaluations
03.0 Risk Management 03.01 Risk Management To develop and implement a Risk 03.d
Program Management Program that
addresses Risk Assessments,
Risk Mitigation, and Risk
Evaluations
04.0 Security Policy 04.01 Information Security To provide management direction 04.a
Policy in line with business objectives
and relevant laws and regulations,
demonstrate support for, and
commitment to information
security through the issue and
maintenance of information
security policies across the
organization
04.0 Security Policy 04.01 Information Security To provide management direction 04.b
Policy in line with business objectives
and relevant laws and regulations,
demonstrate support for, and
commitment to information
security through the issue and
maintenance of information
security policies across the
organization
05.0 Organization of 05.01 Internal Organization To maintain the security of the 05.a
Information Security organization's information and
information assets (data centers
or offices that process covered
information)
05.0 Organization of 05.01 Internal Organization To maintain the security of the 05.b
Information Security organization's information and
information assets (data centers
or offices that process covered
information)
05.0 Organization of 05.01 Internal Organization To maintain the security of the 05.c
Information Security organization's information and
information assets (data centers
or offices that process covered
information)
05.0 Organization of 05.01 Internal Organization To maintain the security of the 05.d
Information Security organization's information and
information assets (data centers
or offices that process covered
information)
05.0 Organization of 05.01 Internal Organization To maintain the security of the 05.e
Information Security organization's information and
information assets (data centers
or offices that process covered
information)
05.0 Organization of 05.01 Internal Organization To maintain the security of the 05.f
Information Security organization's information and
information assets (data centers
or offices that process covered
information)
05.0 Organization of 05.01 Internal Organization To maintain the security of the 05.g
Information Security organization's information and
information assets (data centers
or offices that process covered
information)
05.0 Organization of 05.01 Internal Organization To maintain the security of the 05.h
Information Security organization's information and
information assets (data centers
or offices that process covered
information)
05.0 Organization of 05.02 External Parties To ensure that the security of the 05.i
Information Security organization's information and
information assets, are not
reduced by the introduction of
external party products or services
05.0 Organization of 05.02 External Parties To ensure that the security of the 05.j
Information Security organization's information and
information assets, are not
reduced by the introduction of
external party products or services
05.0 Organization of 05.02 External Parties To ensure that the security of the 05.k
Information Security organization's information and
information assets, are not
reduced by the introduction of
external party products or services
06.0 Compliance 06.01 Compliance with Legal To ensure that the design, 06.a
Requirements operation, use, and management
of information systems adheres to
applicable laws, statutory,
regulatory or contractual
obligations, and any security
requirements
06.0 Compliance 06.01 Compliance with Legal To ensure that the design, 06.b
Requirements operation, use, and management
of information systems adheres to
applicable laws, statutory,
regulatory or contractual
obligations, and any security
requirements
06.0 Compliance 06.01 Compliance with Legal To ensure that the design, 06.c
Requirements operation, use, and management
of information systems adheres to
applicable laws, statutory,
regulatory or contractual
obligations, and any security
requirements
06.0 Compliance 06.01 Compliance with Legal To ensure that the design, 06.d
Requirements operation, use, and management
of information systems adheres to
applicable laws, statutory,
regulatory or contractual
obligations, and any security
requirements
06.0 Compliance 06.01 Compliance with Legal To ensure that the design, 06.e
Requirements operation, use, and management
of information systems adheres to
applicable laws, statutory,
regulatory or contractual
obligations, and any security
requirements
06.0 Compliance 06.01 Compliance with Legal To ensure that the design, 06.f
Requirements operation, use, and management
of information systems adheres to
applicable laws, statutory,
regulatory or contractual
obligations, and any security
requirements
06.0 Compliance 06.02 Compliance with To ensure that the design, 06.g
Security Poilcies and operation, use and management
Standards, and of information systems adheres to
Technical Compliance organizational security policies
and standards
06.0 Compliance 06.02 Compliance with To ensure that the design, 06.h
Security Poilcies and operation, use and management
Standards, and of information systems adheres to
Technical Compliance organizational security policies
and standards
06.0 Compliance 06.03 Information System Ensure the integrity and 06.i
Audit Considerations effectiveness of the information
systems audit process
06.0 Compliance 06.03 Information System Ensure the integrity and 06.j
Audit Considerations effectiveness of the information
systems audit process
07.0 Assest Management 07.01 Responsibility for To ensure that management 07.a
Assets requires ownership and defined
responsibilities for the protection
of information assets
07.0 Assest Management 07.01 Responsibility for To ensure that management 07.b
Assets requires ownership and defined
responsibilities for the protection
of information assets
07.0 Assest Management 07.01 Responsibility for To ensure that management 07.c
Assets requires ownership and defined
responsibilities for the protection
of information assets
08.0 Physical and 08.01 Secure Areas To prevent unauthorized physical 08.b
Environmental Security access, damage, and interference
to the organization's premises and
information
08.0 Physical and 08.01 Secure Areas To prevent unauthorized physical 08.c
Environmental Security access, damage, and interference
to the organization's premises and
information
08.0 Physical and 08.01 Secure Areas To prevent unauthorized physical 08.d
Environmental Security access, damage, and interference
to the organization's premises and
information
08.0 Physical and 08.01 Secure Areas To prevent unauthorized physical 08.e
Environmental Security access, damage, and interference
to the organization's premises and
information
08.0 Physical and 08.01 Secure Areas To prevent unauthorized physical 08.f
Environmental Security access, damage, and interference
to the organization's premises and
information
08.0 Physical and 08.02 Equipment Security To prevent loss, damage, theft or 08.g
Environmental Security compromise of assets and
interruption to the
organization's activities
08.0 Physical and 08.02 Equipment Security To prevent loss, damage, theft or 08.h
Environmental Security compromise of assets and
interruption to the organization's
activities
08.0 Physical and 08.02 Equipment Security To prevent loss, damage, theft or 08.i
Environmental Security compromise of assets and
interruption to the organization's
activities
08.0 Physical and 08.02 Equipment Security To prevent loss, damage, theft or 08.j
Environmental Security compromise of assets and
interruption to the organization's
activities
08.0 Physical and 08.02 Equipment Security To prevent loss, damage, theft or 08.k
Environmental Security compromise of assets and
interruption to the organization's
activities
08.0 Physical and 08.02 Equipment Security To prevent loss, damage, theft or 08.l
Environmental Security compromise of assets and
interruption to the organization's
activities
08.0 Physical and 08.02 Equipment Security To prevent loss, damage, theft or 08.m
Environmental Security compromise of assets and
interruption to the organization's
activities
09.0 Communications and 09.01 Documented Operating To ensure that operating 09.a
Operations Procedures procedures are documented,
Management maintained and made available to
all users who need them
09.0 Communications and 09.01 Documented Operating To ensure that operating 09.b
Operations Procedures procedures are documented,
Management maintained and made available to
all users who need them
09.0 Communications and 09.01 Documented Operating To ensure that operating 09.c
Operations Procedures procedures are documented,
Management maintained and made available to
all users who need them
09.0 Communications and 09.01 Documented Operating To ensure that operating 09.d
Operations Procedures procedures are documented,
Management maintained and made available to
all users who need them
09.0 Communications and 09.02 Control Third Party To ensure that third party service 09.e
Operations Service Delivery providers maintain security
Management requirements and levels of service
as part of their service delivery
agreements
09.0 Communications and 09.02 Control Third Party To ensure that third party service 09.f
Operations Service Delivery providers maintain security
Management requirements and levels of service
as part of their service delivery
agreements
09.0 Communications and 09.02 Control Third Party To ensure that third party service 09.g
Operations Service Delivery providers maintain security
Management requirements and levels of service
as part of their service delivery
agreements
09.0 Communications and 09.03 System Planning and To ensure that systems meet the 09.h
Operations Acceptance businesses current and projected
Management needs to minimize failures
09.0 Communications and 09.03 System Planning and To ensure that systems meet the 09.i
Operations Acceptance businesses current and projected
Management needs to minimize failures
09.0 Communications and 09.04 Protection Against Ensure that integrity of information 09.j
Operations Malicious and Mobile and software is protected from
Management Code malicious or unauthorized code
09.0 Communications and 09.04 Protection Against Ensure that integrity of information 09.k
Operations Malicious and Mobile and software is protected from
Management Code malicious or unauthorized code
09.0 Communications and 09.05 Information Back-up Ensure the maintenance, integrity, 09.l
Operations and availability of organizational
Management information
09.0 Communications and 09.06 Network Security Ensure the protection of 09.m
Operations Management information in networks and
Management protection of the supporting
network infrastructure
09.0 Communications and 09.06 Network Security Ensure the protection of 09.n
Operations Management information in networks and
Management protection of the supporting
network infrastructure
09.0 Communications and 09.07 Media Handling Prevent unauthorized disclosure, 09.o
Operations modification, removal or
Management destruction of information assets,
or interruptions to business
activities
09.0 Communications and 09.07 Media Handling Prevent unauthorized disclosure, 09.p
Operations modification, removal or
Management destruction of information assets,
or interruptions to business
activities
09.0 Communications and 09.07 Media Handling Prevent unauthorized disclosure, 09.q
Operations modification, removal or
Management destruction of information assets,
or interruptions to business
activities
09.0 Communications and 09.07 Media Handling Prevent unauthorized disclosure, 09.r
Operations modification, removal or
Management destruction of information assets,
or interruptions to business
activities
09.0 Communications and 09.08 Exchange of Information Ensure the exchange of 09.s
Operations information within an organization
Management and with any external entity is
secured and protected, and
carried out in compliance with
relevant legislation and exchange
agreements
09.0 Communications and 09.08 Exchange of Information Ensure the exchange of 09.t
Operations information within an organization
Management and with any external entity is
secured and protected, and
carried out in compliance with
relevant legislation and exchange
agreements
09.0 Communications and 09.08 Exchange of Information Ensure the exchange of 09.u
Operations information within an organization
Management and with any external entity is
secured and protected, and
carried out in compliance with
relevant legislation and exchange
agreements
09.0 Communications and 09.08 Exchange of Information Ensure the exchange of 09.v
Operations information within an organization
Management and with any external entity is
secured and protected, and
carried out in compliance with
relevant legislation and exchange
agreements
09.0 Communications and 09.08 Exchange of Information Ensure the exchange of 09.w
Operations information within an organization
Management and with any external entity is
secured and protected, and
carried out in compliance with
relevant legislation and exchange
agreements
09.0 Communications and 09.09 Electronic Commerce Ensure the security of electronic 09.x
Operations Services commerce services, and their
Management secure use
09.0 Communications and 09.09 Electronic Commerce Ensure the security of electronic 09.y
Operations Services commerce services, and their
Management secure use
09.0 Communications and 09.09 Electronic Commerce Ensure the security of electronic 09.z
Operations Services commerce services, and their
Management secure use
09.0 Communications and 09.10 Monitoring Ensure information security events 09.aa
Operations are monitored and recorded to
Management detect unauthorized information
processing activities in compliance
with all relevant legal
requirements
09.0 Communications and 09.10 Monitoring Ensure information security events 09.ab
Operations are monitored and recorded to
Management detect unauthorized information
processing activities in compliance
with all relevant legal
requirements
09.0 Communications and 09.10 Monitoring Ensure information security events 09.ac
Operations are monitored and recorded to
Management detect unauthorized information
processing activities in compliance
with all relevant legal
requirements
09.0 Communications and 09.10 Monitoring Ensure information security events 09.ad
Operations are monitored and recorded to
Management detect unauthorized information
processing activities in compliance
with all relevant legal
requirements
09.0 Communications and 09.10 Monitoring Ensure information security events 09.ae
Operations are monitored and recorded to
Management detect unauthorized information
processing activities in compliance
with all relevant legal
requirements
09.0 Communications and 09.10 Monitoring Ensure information security events 09.af
Operations are monitored and recorded to
Management detect unauthorized information
processing activities in compliance
with all relevant legal
requirements
10.0 Information Systems 10.01 Security Requirements To ensure that security is an 10.a
Acquisition, of Information Systems integral part of information
Development, and systems
Maintenance
10.0 Information Systems 10.02 Correct Processing in To ensure the prevention of errors, 10.b
Acquisition, Applications loss, unauthorized modification or
Development, and misuse of information in
Maintenance applications, controls shall be
designed into applications,
including user developed
applications to ensure correct
processing. These controls shall
include the validation of input data,
internal processing and output
data
10.0 Information Systems 10.02 Correct Processing in To ensure the prevention of errors, 10.c
Acquisition, Applications loss, unauthorized modification or
Development, and misuse of information in
Maintenance applications, controls shall be
designed into applications,
including user developed
applications to ensure correct
processing. These controls shall
include the validation of input data,
internal processing and output
data
10.0 Information Systems 10.02 Correct Processing in To ensure the prevention of errors, 10.d
Acquisition, Applications loss, unauthorized modification or
Development, and misuse of information in
Maintenance applications, controls shall be
designed into applications,
including user developed
applications to ensure correct
processing. These controls shall
include the validation of input data,
internal processing and output
data
10.0 Information Systems 10.02 Correct Processing in To ensure the prevention of errors, 10.e
Acquisition, Applications loss, unauthorized modification or
Development, and misuse of information in
Maintenance applications, controls shall be
designed into applications,
including user developed
applications to ensure correct
processing. These controls shall
include the validation of input data,
internal processing and output
data
10.0 Information Systems 10.03 Cryptographic Controls To protect the confidentiality, 10.f
Acquisition, authenticity and integrity of
Development, and information by cryptographic
Maintenance means. A policy shall be
developed on the use of
cryptographic controls. Key
management should be in place to
support the use of cryptographic
techniques
10.0 Information Systems 10.03 Cryptographic Controls To protect the confidentiality, 10.g
Acquisition, authenticity and integrity of
Development, and information by cryptographic
Maintenance means. A policy shall be
developed on the use of
cryptographic controls. Key
management should be in place to
support the use of cryptographic
techniques
10.0 Information Systems 10.04 Security of System Files To ensure the security of system 10.h
Acquisition, files, access to system files and
Development, and program source code shall be
Maintenance controlled, and IT projects and
support activities conducted in a
secure manner
10.0 Information Systems 10.04 Security of System Files To ensure the security of system 10.i
Acquisition, files, access to system files and
Development, and program source code shall be
Maintenance controlled, and IT projects and
support activities conducted in a
secure manner
10.0 Information Systems 10.04 Security of System Files To ensure the security of system 10.j
Acquisition, files, access to system files and
Development, and program source code shall be
Maintenance controlled, and IT projects and
support activities conducted in a
secure manner
10.0 Information Systems 10.05 Security in Development To ensure the security of 10.k
Acquisition, and Support Processes application system software and
Development, and information through the
Maintenance development process, project and
support environments shall be
strictly controlled
10.0 Information Systems 10.05 Security in Development To ensure the security of 10.l
Acquisition, and Support Processes application system software and
Development, and information through the
Maintenance development process, project and
support environments shall be
strictly controlled
10.0 Information Systems 10.06 Technical Vulnerability To reduce the risks resulting from 10.m
Acquisition, Management exploitation of published technical
Development, and vulnerabilities, technical
Maintenance vulnerability management shall be
implemented in an effective,
systematic, and repeatable way
with measurements taken to
confirm its effectiveness
11.0 Information Security 11.01 Reporting Information To ensure information security 11.a
Incident Management Security Incidents and events and weaknesses
Weaknesses associated with information
systems are handled in a manner
allowing timely corrective action to
be taken
11.0 Information Security 11.01 Reporting Information To ensure information security 11.b
Incident Management Security Incidents and events and weaknesses
Weaknesses associated with information
systems are handled in a manner
allowing timely corrective action to
be taken
12.0 Business Continuity 12.01 Information Security To ensure that strategies and 12.a
Management Aspects of Business plans are in place to counteract
Continuity Management interruptions to business activities
and to protect critical business
processes from the effects of
major failures of information
systems or disasters and to
ensure their timely resumption
12.0 Business Continuity 12.01 Information Security To ensure that strategies and 12.b
Management Aspects of Business plans are in place to counteract
Continuity Management interruptions to business activities
and to protect critical business
processes from the effects of
major failures of information
systems or disasters and to
ensure their timely resumption
12.0 Business Continuity 12.01 Information Security To ensure that strategies and 12.c
Management Aspects of Business plans are in place to counteract
Continuity Management interruptions to business activities
and to protect critical business
processes from the effects of
major failures of information
systems or disasters and to
ensure their timely resumption
12.0 Business Continuity 12.01 Information Security To ensure that strategies and 12.d
Management Aspects of Business plans are in place to counteract
Continuity Management interruptions to business activities
and to protect critical business
processes from the effects of
major failures of information
systems or disasters and to
ensure their timely resumption
12.0 Business Continuity 12.01 Information Security To ensure that strategies and 12.e
Management Aspects of Business plans are in place to counteract
Continuity Management interruptions to business activities
and to protect critical business
processes from the effects of
major failures of information
systems or disasters and to
ensure their timely resumption
13.0 Privacy Practices 13.02 Individual Participation Data subjects are provided a 13.d
reasonable opportunity and
capability to access and review
their PII and to challenge its
accuracy and completeness
13.0 Privacy Practices 13.02 Individual Participation Data subjects are provided a 13.e
reasonable opportunity and
capability to access and review
their PII and to challenge its
accuracy and completeness
13.0 Privacy Practices 13.02 Individual Participation Data subjects are provided a 13.f
reasonable opportunity and
capability to access and review
their PII and to challenge its
accuracy and completeness
13.0 Privacy Practices 13.03 Purpose Specification The authorities which permit the 13.g
collection of PII and specifically
the purpose(s) for which the PII is
intended to be used are articulated
13.0 Privacy Practices 13.03 Purpose Specification The authorities which permit the 13.h
collection of PII and specifically
the purpose(s) for which the PII is
intended to be used are articulated
13.0 Privacy Practices 13.04 Data Minimization Only PII that is directly relevant 13.i
and necessary to accomplish the
specified purpose(s) is collected
13.0 Privacy Practices 13.04 Data Minimization Only PII that is directly relevant 13.j
and necessary to accomplish the
specified purpose(s) is collected
13.0 Privacy Practices 13.05 Use Limitation PII is used solely for the 13.k
purpose(s) specified in the privacy
notice and only for a purpose that
is compatible with the purpose for
which the PII was collected
13.0 Privacy Practices 13.05 Use Limitation PII is used solely for the 13.l
purpose(s) specified in the privacy
notice and only for a purpose that
is compatible with the purpose for
which the PII was collected
13.0 Privacy Practices 13.06 Data Quality and PII is relevant to the purposes for 13.m
Integrity which they are to be used, and, to
the extent necessary for those
purposes, is accurate, complete
and kept up-to-date
13.0 Privacy Practices 13.06 Data Quality and PII is relevant to the purposes for 13.n
Integrity which they are to be used, and, to
the extent necessary for those
purposes, is accurate, complete
and kept up-to-date
13.0 Privacy Practices 13.06 Data Quality and PII is relevant to the purposes for 13.o
Integrity which they are to be used, and, to
the extent necessary for those
purposes, is accurate, complete
and kept up-to-date
13.0 Privacy Practices 13.07 Accountability and The organization is accountable 13.p
Auditing for complying with applicable
privacy protection requirements
13.0 Privacy Practices 13.07 Accountability and The organization is accountable 13.q
Auditing for complying with applicable
privacy protection requirements
13.0 Privacy Practices 13.07 Accountability and The organization is accountable 13.r
Auditing for complying with applicable
privacy protection requirements
13.0 Privacy Practices 13.07 Accountability and The organization is accountable 13.s
Auditing for complying with applicable
privacy protection requirements
13.0 Privacy Practices 13.07 Accountability and The organization is accountable 13.t
Auditing for complying with applicable
privacy protection requirements
13.0 Privacy Practices 13.07 Accountability and The organization is accountable 13.u
Auditing for complying with applicable
privacy protection requirements
Control Reference: Control Specification Factor Type
Access Control Policy An access control policy shall be established, documented, Organizational
and reviewed based on business and security requirements
for access
User Registration There shall be a formal documented and implemented user System
registration and deregistration procedure for granting and
revoking access.
Privilege Management The allocation and use of privileges to information systems System
and services shall be restricted and controlled. Special
attention shall be given to the allocation of privileged access
rights, which allow users to override system controls
Review of User Access All access rights shall be regularly reviewed by management System
Rights via a formal documented process
Password Use Users shall be made aware of their responsibilities for Organizational
maintaining effective access
controls and shall be required to follow good security
practices in the selection and use
of passwords and security of equipment.
Unattended User Users shall ensure that unattended equipment has Organizational
Equipment appropriate protection
Clear Desk and Clear A clear desk policy for papers and removable storage media Organizational
Screen Policy and a clear screen policy for information assets shall be
adopted
Policy on the Use of Users shall only be provided with access to internal and Organizational
Network Services external network services that they have been specifically
authorized to use. Authentication and authorization
mechanisms shall be applied for users and equipment
User Authentication for Appropriate authentication methods shall be used to control Organizational
External Connections access by remote users
Network Connection Control For shared networks, especially those extending across the Organizational
organization's boundaries, the capability of users to connect
to the network shall be restricted, in line with the access
control policy and requirements of the business applications
Network Routing Control Routing controls shall be implemented for networks to Organizational
ensure that computer connections and information flows do
not breach the access control policy of the business
applications
Secure Log-on Procedures Access to operating systems shall be controlled by a secure System
log-on procedure
User Identification and All users shall have a unique identifier (user ID) for their System
Authentication personal use only, and an authentication technique shall be
implemented to substantiate the claimed identity of a user
Password Management Systems for managing passwords shall be interactive and System
System shall ensure quality passwords
Use of System Utilities The use of utility programs that might be capable of System
overriding system and application controls shall be restricted
and tightly controlled
Session Time-out Inactive sessions shall shut down after a defined period of System
inactivity
Limitation of Connection Restrictions on connection times shall be used to provide System
Time additional security for high-risk applications
Information Access Logical and physical access to information and application System
Restriction systems and functions by users and support personnel shall
be restricted in accordance with the defined access control
policy
Sensitive System Isolation Sensitive systems shall have a dedicated and isolated System
computing environment
Mobile Computing and A formal policy shall be in place, and appropriate security Organizational
Communications measures shall be adopted to protect against the risks of
using mobile computing and communication devices
Information Security All employees of the organization and contractors and third- Organizational
Awareness, Education, and party users shall receive appropriate awareness training and
Training regular updates in organizational policies and procedures,
as relevant for their job function
Disciplinary Process There shall be a formal disciplinary process for employees Organizational
who have violated security policies and procedures.
Return of Assets All employees, contractors and third-party users shall return Organizational
all of the organization's assets in their possession upon
termination of their employment, contract or agreement.
Removal of Access Rights The access rights of all employees, contractors and third- Organizational
party users to information and information assets shall be
removed upon termination of their employment, contract or
agreement, or adjusted upon a change of employment (i.e.
upon transfer within the organization)
Risk Management Program Organizations shall develop and maintain a risk Organizational
Development management program to manage risk to an acceptable level
Review of the Information The information security policy documents shall be reviewed Organizational
Security Policy at planned intervals or if significant changes occur to ensure
its continuing adequacy and effectiveness
Management Commitment Management shall actively support security within the Organizational
to Information Security organization through clear direction, demonstrated
commitment, explicit assignment, and acknowledgment of
information security responsibilities
Authorization Process for A management authorization process for new information Organizational
Information Assets and assets (e.g. systems and applications) (see Other
Facilities Information), and facilities (e.g. data centers or offices where
covered information is to be processed) shall be defined and
implemented
Contact with Authorities Appropriate contacts with relevant authorities shall be Organizational
maintained
Contact with Special Appropriate contacts with special interest groups or other Organizational
Interest Groups specialist security forums and professional associations
shall be maintained
Independent Review of The organization's approach to managing information Organizational
Information Security security and its implementation (control objectives, controls,
policies, processes, and procedures for information security)
shall be reviewed independently at planned intervals, at a
minimum annually, or when significant changes to the
security implementation occur
Identification of Risks The risks to the organization's information and information Organizational
Related to External Parties assets from business processes involving external parties
shall be identified, and appropriate controls implemented
before granting access
Addressing Security When All identified security requirements shall be addressed Organizational
Dealing with Customers before giving customers access to the organization's
information or assets
Addressing Security in Third Agreements with third parties involving accessing, Organizational
Party Agreements processing, communicating or managing the organization's
information or information assets, or adding products or
services to information assets shall cover all relevant
security requirements.
Protection of Organizational Important records shall be protected from loss, destruction, Organizational
Records and falsification, in accordance with statutory, regulatory,
contractual, and business requirements
Data Protection and Privacy Data protection and privacy shall be ensured as required in Organizational
of Covered Information relevant legislation, regulations, and contractual clauses
Prevention of Misuse of Users shall be deterred from using information assets for Organizational
Information Assets unauthorized purposes
Regulation of Cryptographic Cryptographic controls shall be used in compliance with all Organizational
Controls relevant agreements, laws, and regulations
Compliance with Security Managers shall ensure that all security procedures within Organizational
Policies and Standards their area of
responsibility are carried out correctly to achieve compliance
with security policies and standards
Inventory of Assets All assets including information shall be clearly identified and
an inventory of all assets drawn up and maintained
Acceptable Use of Assets Rules for the acceptable use of information and assets
associated with information processing systems shall be
identified, documented, and implemented
Securing Offices, Rooms, Physical security for offices, rooms, and facilities shall be
and Facilities designed and applied
Protecting Against External Physical protection against damage from fire, flood,
and Environmental Threats earthquake, explosion, civil unrest, and other forms of
natural or man-made disaster shall be designed and applied
Working in Secure Areas Physical protection and guidelines for working in secure
areas shall be designed and applied
Public Access, Delivery, Access points such as delivery and loading areas and other
and Loading Access points where unauthorized persons may enter the premises
shall be controlled and, if possible, isolated from information
processing facilities to avoid unauthorized access.
Equipment Siting and Equipment shall be sited or protected to reduce the risks
Protection from environmental threats and hazards, and opportunities
for unauthorized access
Supporting Utilities Equipment shall be protected from power failures and other
disruptions caused by failures in supporting utilities
Security of Equipment Off- Security shall be applied to off-site equipment taking into
Premises account the different risks of working outside the
organization's premises
Secure Disposal or Re-Use All items of equipment containing storage media shall be
of Equipment checked to ensure that any covered information and
licensed software has been removed or securely overwritten
prior to disposal
Removal of Property Equipment, information or software shall not be taken off site
without prior authorization
Documented Operations Operating procedures shall be documented, maintained, and
Procedures made available to all users who need them
Monitoring and Review of The services, reports and records provided by the third party
Third Party Services shall be regularly monitored and reviewed, and audits shall
be carried out regularly to govern and maintain compliance
with the service delivery agreements
Controls Against Mobile Mobile code shall be authorized before its installation and
Code use, and the configuration shall ensure that the authorized
mobile code operates according to a clearly defined security
policy. All unauthorized mobile code shall be prevented from
executing
Information Handling Procedures for the handling and storage of information shall
Procedures be established to protect this information from unauthorized
disclosure or misuse
Administrator and Operator System administrator and system operator activities shall be
Logs logged and regularly reviewed
Fault Logging Faults shall be logged, analyzed, and appropriate
remediation action taken
Input Data Validation Data input to applications and databases shall be validated
to ensure that this data is correct and appropriate
Policy on the Use of A policy on the use of cryptographic controls for protection of
Cryptographic Controls information shall be developed and implemented, and
supported by formal procedures
Protection of System Test Test data shall be selected carefully, and protected and
Data controlled in nonproduction environments
Learning from Information There shall be mechanisms in place to enable the types,
Security Information volumes, and costs of information security incidents to be
quantified and monitored
Business Continuity and Events that can cause interruptions to business processes
Risk Assessment shall be identified, along with the probability and impact of
such interruptions and their consequences for information
security
Developing and Plans shall be developed and implemented to maintain or
Implementing Continuity restore operations and ensure availability of information, at
Plans Including Information the required level and in the required time scales, following
Security interruption to, or failure of, critical business processes
Testing, Maintaining and Business continuity plans shall be tested and updated
Re-Assessing Business regularly, at a minimum annually, to ensure that they are up
Continuity Plans to date and effective
Openness and To provide data subjects with clear and easily accessible
Transparency information about the PII controller’s policies, procedures
and practices with respect to the handling of PII
Purpose Legitimacy To ensure that the purpose(s) for processing PII complies
with applicable laws and relies on a permissible legal ground
Purpose Specification To specify the purposes for which PII are collected no later
than at the time of PII collection where feasible and limit the
subsequence use to the fulfillment of original purposes
Collection Limitation To limit the collection of PII to that which is within the
boundaries of applicable law and strictly necessary for the
specified purpose(s)
Use and Disclosure To limit the use and disclosure of PII for specific, explicit and
legitimate purposes and to fulfill the stated purpose(s) or to
abide by applicable laws
Retention and Disposal To retain PII no longer than necessary to fulfill the stated
purpose(s) or to abide by applicable laws
Accuracy and Quality To ensure that the PII processed is accurate, complete, up-
to-date, adequate and relevant for the purpose of use
Privacy Requirements for To ensure, through contractual or other means, that third
Contractors and Processors party recipients provide at least equivalent levels of PII
protection
Privacy Monitoring and To monitor and audit PII protection controls and the
Auditing effectiveness of internal PII protection policy
The organization has a formal information security management program (ISMP) that is
documented and addresses the overall security program of the organization.
Management support for the ISMP is demonstrated through signed acceptance or
approval by management. The ISMP is based on an accepted industry framework,
considers all the control objectives of the accepted industry framework, documents any
excluded control objectives of the accepted industry framework and the reasons for
their
Accessexclusion, and isand
control rules updated
rights at
forleast
eachannually or when
user or group of there
users are
are significant changes in the environment.
based on clearly
defined requirements for information dissemination and authorization (e.g., need-toknow, need-to-share, least privilege, security levels, and information classifica
policy further defines logical and physical access control rules and rights for each user
or group of users are considered together and clearly defined in standard user access
profiles (e.g., roles). The access control program takes into account security
requirements of individual business applications and business units and ensures
standard
Default anduser access profiles
unnecessary for common
accounts jobs roles
are removed, in the or
disabled, organization.
otherwise secured.
The allocation of privileges for all systems and system components is controlled through
a formal authorization process. The organization ensures access privileges associated
with each system product (e.g., operating system, database management system and
each application) and the users associated with each system product which need to be
allocated are identified. Privileges are allocated to users on a need-to-use basis and on
an event-by-event basis in line with the access control policy (e.g., the minimum
requirement for their functional role–user or administrator, only when needed).
The organization limits authorization to privileged accounts on information systems to a
User identities are verified prior to performing password resets.
The organization changes all default passwords for applications, operating systems,
routers, firewalls, wireless access points, and other systems to have values consistent
with administration-level accounts before deploying any new devices in a networked
environment.
The organization reviews all accounts (including user, privileged, system, shared, and
seeded accounts), and privileges (e.g., user-to-role assignments, user-to-object
assignments) periodically (annually at a minimum).
The organization ensures users are made aware of the organization’s password policies
and requirements, are made aware to keep passwords confidential, avoid keeping a
record (e.g., paper, software file, or hand-held device) of passwords, unless this can be
stored securely and the method of storing has been approved, change passwords
whenever there is any indication of possible system or password compromise, do not
share individual user accounts or passwords, do not provide their password to anyone
for any reason
All users (to avoid
are made awarecompromising their
of: the security user credentials
requirements through social
and procedures engineering
for protecting
unattended equipment; their responsibilities for terminating active sessions when
finished, unless they can be secured by an appropriate locking mechanism (e.g., a
password protected screen saver); their responsibilities for logging-off mainframe
computers, servers, and office PCs when the session is finished (e.g., not just switch off
Covered or critical business information is locked away (ideally in a safe or cabinet or
other forms of security furniture) when not required, especially when the office is
vacated. Workstations are left logged off or protected with a screen and keyboard
locking mechanism controlled by a password, token, or similar user authentication
mechanism that conceals information previously visible on the display when
The organization: determines who is allowed to access which network and networked
services; specifies the means that can be used to access networks and network
services (e.g., the conditions for allowing access to a remote system); at a minimum,
manages all enterprise devices remotely logging into the internal network, with remote
control of their configuration; at a minimum, manages all enterprise devices remotely
logging into the internal network, with installed software; at a minimum, manages all
enterprise devices remotely logging into the internal network, with patch levels;
Remote access by vendors and business partners (e.g., for remote maintenance) is disabled unless specifically authorized by m
The organization uniquely identifies and authenticates network devices that require authentication mechanisms before establ
Ports, services, and applications installed on a computer or network systems, which are
not specifically required for business functionality, are disabled or removed.
Security gateways (e.g., a firewall) are used between the internal network, external
networks (Internet and third-party networks), and any demilitarized zone (DMZ). An
internal network perimeter is implemented by installing a secure gateway (e.g., a
firewall) between two interconnected networks to control access and information flow
At managed interfaces, network traffic is denied by default and allowed by exception (i.e., deny all, permit by exception). The organization restricts the ability of u
The organization ensures that security gateways (e.g., a firewall) are used to validate source and destination addresses at internal and external network control p
A policy applicable to the organization’s information systems addressing account lockout after consecutive unsuccessful login attempts is documented and enfor
Employees, contractors, and third-party users are: properly briefed on their information security roles and responsibilities prior to being granted access to covere
The organization’s risk management program includes: objectives of the risk management process; management’s clearly stated level of acceptable risk, inform
The organization implements an integrated control system characterized using different control types (e.g., layered, preventative, detective, corrective, and comp
The risk management process is integrated with the change management process.
The organization’s information security policy is developed, published, disseminated, and implemented. The information security policy documents: state the pur
The information security policy documents are reviewed at planned intervals or if significant changes occur to ensure the policies’ continuing adequacy and effec
The organization clearly allocates and assigns responsibilities to identify and protect individual IT assets in accordance with the security policies. Where necessa
Management formally authorizes (approves) new information assets and facilities for processing (use) before commencing operations and periodically reviews a
Requirements for confidentiality and non-disclosure agreements are reviewed at least annually and when changes occur that influence these requirements. Con
The organization includes key contacts including phone numbers and email addresses as part of its incident management and/or business continuity plan. The o
Membership in organization-defined special interest groups or forums/services are considered as a means to: improve knowledge of best practices and stay up t
An independent review of the information security management program and information security controls is conducted at least annually or whenever there is a m
Access granted to external parties is limited to the minimum necessary, limited in duration, and is revoked when no longer needed.
The following security term is addressed prior to giving customers access to any of the organization’s assets: description of the product or service to be provided
The organization identifies and mandates information security controls to specifically address supplier access to the organization’s information and information a
The organization establishes restrictions on the use of open source software. Open source software used by the organization is legally licensed, authorized, and
Guidelines are issued and implemented by the organization on the ownership, classification, retention, storage, handling, and disposal of all records and informa
Covered and/or confidential information, at minimum, is rendered unusable, unreadable, or indecipherable anywhere it is stored, including on personal computer
All employees and contractors are informed in writing that violations of the security policies will result in sanctions or disciplinary action.
The encryption policy addresses the type and strength of the encryption algorithm and when used to protect the confidentiality of information. The organization e
Annual compliance assessments are conducted. Compliance reviews are conducted by security, privacy, and/or audit individuals, and incorporate reviews of doc
The organization performs annual checks on the technical security configuration of systems, either manually by an individual with experience with the systems a
Alorica Contact Evidence Audit Status
Available (Open / Closed)
(Yes / No)
mechanisms before establishing a connection. Network devices that require authentication mechanisms use shared information (e.g., MA
ganization restricts the ability of users to connect to the internal network in accordance with the access control policy and the requirements of its business applications
nal and external network control points. The organization designs and implements network perimeters so that all outgoing network traffic to the Internet must pass through at le
es’ continuing adequacy and effectiveness. Security policies are communicated throughout the organization
security policies. Where necessary, the organization supplements policies with more detailed guidance for specific assets and facilities. When security responsibilities are dele
rations and periodically reviews and updates authorizations (approvals) at a frequency defined by the organization – but no less than three years.
fluence these requirements. Confidentiality and non-disclosure agreements comply with all applicable laws and regulations for the jurisdiction to which it applies.
or business continuity plan. The organization designates a point of contact to review the list at least annually to keep it current.
ge of best practices and stay up to date with relevant security information; ensure the understanding of the information security environment is current and complete (e.g., threa
annually or whenever there is a material change to the business practices that may implicate the security or integrity of records containing personal information.
product or service to be provided; the right to monitor, and revoke, any activity related to the organization’s assets; the respective liabilities of the organization and the custome
s legally licensed, authorized, and adheres to the organizations secure configuration policy.
d, including on personal computers (laptops, desktops) portable digital media, backup media, servers, databases, or in logs. Exceptions to encryption requirements are authoriz
of information. The organization employs cryptographic modules that are certified and that adhere to the minimum applicable standards.
ls, and incorporate reviews of documented evidence. If any non-compliance is found as a result of the review, managers will: determine the causes of the non-compliance; eva
th experience with the systems and/or with the assistance of automated software tools. If any non-compliance is found as a result of a technical security configuration complian
Remarks
ness partner accounts (e.g., remote maintenance) is immediately deactivated after use.
es that require authentication mechanisms use shared information (e.g., MAC or IP address) to control remote network access and access
ordance with the access control policy and the requirements of its business applications
nts network perimeters so that all outgoing network traffic to the Internet must pass through at least one application layer filtering proxy server. The application-layer filtering pro
n systems; provided with guidelines to state security expectations of their role within the organization; motivated and comply with the security policies of the organization; achiev
business-specific risk analysis; the plan for managing operational risk communicated to stakeholders; the connection between the risk management policy and the organization’
anagement’s commitment; describe management and workforce members’ roles and responsibilities; and establish the organization’s approach to managing information secur
h more detailed guidance for specific assets and facilities. When security responsibilities are delegated to others, the individual originally assigned these responsibilities remains
mply with all applicable laws and regulations for the jurisdiction to which it applies.
ure the understanding of the information security environment is current and complete (e.g., threat monitoring/intelligence services); receive early warnings of alerts, advisories,
may implicate the security or integrity of records containing personal information.
related to the organization’s assets; the respective liabilities of the organization and the customer. It is ensured that the customer is aware of their obligations. It is ensured that
ackup media, servers, databases, or in logs. Exceptions to encryption requirements are authorized by management and documented. Encryption is implemented via one-way h
ed and that adhere to the minimum applicable standards.
found as a result of the review, managers will: determine the causes of the non-compliance; evaluate the need for actions to ensure that non-compliance do not recur; determin
re tools. If any non-compliance is found as a result of a technical security configuration compliance review, the organization: determines the causes of the non-compliance; eva
network access and access control lists to control remote network access.
er. The application-layer filtering proxy supports decrypting network traffic, logging individual TCP sessions, blocking specific URLs, domain names, and IP addresses to implem
y policies of the organization; achieve a level of awareness on security relevant to their roles and responsibilities within the organization; conform to the terms and conditions of
gement policy and the organization’s strategic planning processes; documented risk assessment processes and procedures; regular performance of risk assessments; mitigatio
oach to managing information security.
igned these responsibilities remains accountable, and the organization determines that any delegated tasks have been correctly performed.
early warnings of alerts, advisories, and patches pertaining to attacks and vulnerabilities; gain access to specialist information security advice; share and exchange information
of their obligations. It is ensured that the customer accepts the responsibilities and liabilities prior to accessing, processing, communicating, or managing the organization’s infor
yption is implemented via one-way hashes, truncation, or strong cryptography and key-management procedures. For full-disk encryption, logical access is independent of O/S a
n-compliance do not recur; determine and implement appropriate corrective action; and review the corrective action taken.
causes of the non-compliance; evaluates the need for actions to ensure that noncompliance do not recur; determines and implements appropriate corrective action; and review
es, and IP addresses to implement a disallow list, or applying lists of allowed sites that can be accessed through the proxy while blocking all other sites. The organization forces
to the terms and conditions of employment, which includes the organization’s information security policy and appropriate methods of working; and continue to have the skills an
e of risk assessments; mitigation of risks identified from risk assessments and threat monitoring procedures; risk tolerance thresholds are defined for each category of risk; reas
are and exchange information about new technologies, products, threats, or vulnerabilities; and provide suitable liaison points when dealing with information security incidents.
naging the organization’s information and information assets.
access is independent of O/S access. Decryption keys are not tied to user accounts. If encryption is not applied because it is determined to not be reasonable or appropriate, the
te corrective action; and reviews the corrective action taken.
r sites. The organization forces outbound traffic to the Internet through an authenticated proxy server on the enterprise perimeter. Internal directory services and internal IP add
nd continue to have the skills and qualifications appropriate to their roles and responsibilities
for each category of risk; reassessment of the risk management policy to ensure management’s stated level of acceptable risk is still accurate, previously decided upon securi
information security incidents.
e reasonable or appropriate, the organization documents its rationale for its decision or uses alternative compensating controls other than encryption if the method is approved a
ry services and internal IP addresses are protected and hidden from any external access. Requirements for network routing control are based on the access control policy.
previously decided upon security controls are still applicable and effective, and to evaluate the possible risk level changes in the environment; updating the risk management pol
ion if the method is approved and reviewed annually by the CISO.
ating the risk management policy if any of these elements have changed; and repeating the risk management process prior to any significant change, after a serious incident, w
ange, after a serious incident, whenever a new significant risk factor is identified, or at a minimum annually.