What it is: A mapping between the HITRUST CSF requirements and AICPA’s Trust Services Categories and Criteria has been developed and made available to enable service organizations to provide information to users of their system about whether controls relevant to security, availability and confidentiality are suitably designed and operating effectively to meet the applicable trust services criteria (TSC) and HITRUST CSF requirements. This enables the service organization to communicate information about the processes and procedures it uses to meet the HITRUST CSF, in addition to the applicable TSC. This increases transparency and provides information for decision making.
What it is: This reporting option is used when a service organization wants to obtain both a SOC 2 + HITRUST CSF report in addition to a HITRUST CSF certification.
| Attribute | SOC 2 | HITRUST Certification | SOC 2 + HITRUST | SOC 2 + HITRUST CSF + CSF Certfication |
|---|---|---|---|---|
| Framework | AICPA TSC | Tes | A/C/P TSC and HITRUST CFS+ Certification | This reporting option is used when a service organization wants to obtain both a SOC 2 + HITRUST CSF report in addition to a HITRUST CSF certification. Please contact us if you are considering this reporting option. |
| Requires HITRUST scoping factors | NO | CSF Assesor | Yes | |
| Independent third party examiner | CPA Firm | HITRUST Alliance | CPA Firm with valid licensure | |
| Governing body for the report | AICPA | HITRUST Alliance | AICPA | |
| Who prepares the report? | CPA FIRM | No | Yes | |
| Incorporate SOC 2 Trust Services Criteria (TSC) | Yes | No | Yes | |
| Allows Type 1 (point in time) explanation option | Yes | Yes | Yes | |
| Requires a risk rating to be established for controls | Yes | No, but CorrectiveAction Plans are issued | Yes | |
| Reporting control gaps (exceptions) | Yes (Type 2) | Yes (Type 2) | Yes (Type 2) | |
| Allow for Corrective Action Plans | No | No | Yes | |
| Requires a full scope examinations each year | Yes | Yes | Yes | |
| List of attestation | 1 year | 2 years, plus an interim review within 1 year | 1 year |
Schneider Downs’ team of experienced risk advisory professionals focus on collaborating with your organization to identify and effectively mitigate risks. Our goal is to understand not only the risks related to potential loss to the organization but to drive solutions that add value to your organization and advise on opportunities to ensure minimal disruption to your business.
To learn more, visit our dedicated IT Risk Advisory page.
Our Thoughts On
Valentine’s Day is right around the corner, making it a good time for an annual reminder to stay alert for…
Read More >Why do attackers continue to impersonate the brands we trust most? Imitation is the sincerest form of flattery. In cybersecurity,…
Read More >For the fourth year in a row, manufacturing was the most targeted industry by cybercriminals in 2025. Why has this…
Read More >What were the most commonly used passwords of 2025?When it comes to passwords, I’ve made almost every mistake you can…
Read More >Article Summary: 5 Holiday Season Scams to Watch for in 2025 This article outlines five emerging holiday scams, from AI-powered…
Read More >