CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

AWS HITRUST Inheritance: What customers should know

admin by admin
June 17, 2022
in Information Security
Share on FacebookShare on Twitter


As an Amazon Web Services (AWS) customer, you don’t have to assess the controls that you inherit from the AWS HITRUST Validated Assessment Questionnaire, because AWS already has completed HITRUST assessment using version 9.4 in 2021. You can deploy your environments onto AWS and inherit our HITRUST CSF certification, provided that you use only in-scope services and apply the controls detailed on the HITRUST website.

HITRUST certification allows you to tailor your security control baselines to a variety of factors—including, but not limited to, regulatory requirements and organization type. HITRUST CSF has been widely adopted by leading organizations in a variety of industries as part of their approach to security and privacy. Visit the HITRUST website for more information.

Have you submitted HITRUST Inheritance Program requests to AWS, but haven’t received a response yet? Understand why …

The HITRUST MyCSF manual provides step-by-step instructions for completing the HITRUST Inheritance process. It’s a simple four-step process, as follows:

  1. You create the Inheritance request in the HITRUST MyCSF tool.
  2. You submit the request to AWS.
  3. AWS will either approve or reject the Inheritance request based on the AWS HITRUST Shared Responsibility Matrix.
  4. Finally, you can apply all approved Inheritance requests to your HITRUST Compliance Assessment.

Unless a request is submitted to AWS, we will not be able to approve it. If a prolonged period of time has gone by and you haven’t received a response from AWS, most likely you created the request but didn’t submit it to AWS.

We are committed to helping you achieve and maintain the highest standard of security and compliance. As always, we value your feedback and questions. Feel free to contact the team through AWS Compliance Contact Us. If you have feedback about this post, submit comments in the Comments section below.

Want more AWS Security how-to content, news, and feature announcements? Follow us on Twitter.

Author

Sonali Vaidya

Sonali leads multiple AWS global compliance programs, including HITRUST, ISO 27001, ISO 27017, ISO 27018, ISO 27701, ISO 9001, and CSA STAR. Sonali has over 20 years of experience in information security and privacy management and holds multiple certifications, such as CISSP, C-GDPR|P, CCSK, CEH, CISA, PCIP, and Lead Auditor for ISO 27001 and ISO 22301.





Source link

Previous Post

Transgender women found and created community in the 1980s internet

Next Post

“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison – Krebs on Security

Related Posts

Information Security

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

by admin
June 24, 2022
Information Security

ToddyCat claws at Asian governments

by admin
June 24, 2022
Information Security

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

by admin
June 23, 2022
Information Security

AWS re:Inforce 2022: Threat detection and incident response track preview

by admin
June 23, 2022
Information Security

Vishing scams on the rise: How to protect yourself

by admin
June 23, 2022
Next Post

“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison – Krebs on Security

Leave Comment

Recommended

“We Need to Get Better”: How CIOs Are Working to Extract More Value from EHRs

June 25, 2022

Innerframeworkforblance

June 25, 2022

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

June 24, 2022

ToddyCat claws at Asian governments

June 24, 2022

“People Are What Makes Tech Work”: Lee Milligan Reflects on His Journey at Asante

June 24, 2022

Innercapabiltyconnectivity

June 24, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.