title: HITRUST CSF Compliance
HITRUST CSF Compliance
HITRUST CSF (Common Security Framework) harmonizes HIPAA, NIST 800-53, ISO 27001, PCI DSS, and other frameworks into a single certifiable standard. Vigo maps its technical controls to HITRUST CSF control references across 8 of the 19 control domains.
Coverage Summary
Vigo satisfies or provides evidence for 31 HITRUST CSF control references across the technically enforceable domains. The remaining domains (HR Security, Physical Security, Privacy Practices, etc.) require organizational policies that no configuration management tool can automate.
| Domain |
Name |
Controls Mapped |
Status |
| 01 |
Access Control |
7 |
Satisfied |
| 06 |
Compliance |
4 |
Satisfied (audit chain dependent) |
| 07 |
Asset Management |
1 |
Satisfied |
| 09 |
Communications and Operations Management |
10 |
Satisfied |
| 10 |
Systems Acquisition, Development, Maintenance |
6 |
Satisfied |
| 11 |
Information Security Incident Management |
2 |
Satisfied |
| 12 |
Business Continuity Management |
1 |
Satisfied |
| 16 |
Endpoint Protection |
1 |
Satisfied |
Control Mapping
Domain 01 — Access Control
| Ref |
Control |
Vigo Implementation |
| 01.b |
User Registration |
Per-user accounts with unique UUIDs, RBAC roles, 13 fine-grained permissions |
| 01.c |
Privilege Management |
Fine-grained RBAC: fleet.read, config.publish, users.manage, etc. Role-based defaults |
| 01.d |
User Password Management |
12-char minimum, complexity rules, bcrypt hashing, AES-256-GCM encrypted storage |
| 01.i |
Policy on Use of Network Services |
mTLS enforced on all gRPC/REST traffic, no plaintext transport ever |
| 01.j |
User Auth for External Connections |
mTLS certificates, ED25519 agent signatures, TOTP MFA |
| 01.n |
Network Connection Control |
Firewall executor enforces iptables, nftables, pf, Windows Firewall rules |
| 01.v |
Information Access Restriction |
File executor enforces permissions, ownership, and mode on all managed files |
Domain 06 — Compliance
| Ref |
Control |
Vigo Implementation |
| 06.c |
Protection of Organizational Records |
AES-256-GCM encrypted backups, SHA-256 integrity verification, file snapshots |
| 06.g |
Compliance with Security Policies |
Continuous drift detection with 5-level compliance status, fleet dashboards |
| 06.h |
Technical Compliance Checking |
Automated convergence on every check-in, relapsed/diverged detection (2/3-run threshold) |
| 06.i |
Information Systems Audit Controls |
SHA-256 hash chain tamper-evident audit trail |
Domain 07 — Asset Management
| Ref |
Control |
Vigo Implementation |
| 07.a |
Inventory of Assets |
25 trait collectors auto-discover hardware, OS, network, packages; FleetIndex real-time inventory |
Domain 09 — Communications and Operations Management
| Ref |
Control |
Vigo Implementation |
| 09.a |
Documented Operating Procedures |
Config-as-code: YAML modules define desired state, version-controlled |
| 09.b |
Change Management |
Stage → publish workflow, git history, modlint validation, audit trail |
| 09.c |
Segregation of Duties |
RBAC with admin/viewer + fine-grained permissions, change approval (two-person rule) |
| 09.d | Separation of Environments | environment_overrides, conditional variables per environment |
| 09.i | Protection Against Malicious Code | Package executor enforces AV/EDR, service executor ensures running |
| 09.k | Back-up | Litestream continuous WAL replication, on-demand snapshots, AES-256-GCM encryption |
| 09.l | Network Security Management | Firewall executor + mTLS on all management traffic |
| 09.q | Audit Logging | SHA-256 hash chain: auth, user, token, config, task, workflow, emergency, remediation events |
| 09.s | Protection of Log Information | Audit chain is tamper-evident, immutable once written |
| 09.v | Clock Synchronization | Package/service executors enforce NTP/chrony across fleet |
Domain 10 — Systems Acquisition, Development, Maintenance
| Ref |
Control |
Vigo Implementation |
| 10.f |
Cryptographic Controls |
AES-256-GCM secrets, mTLS (TLS 1.3), ED25519 signatures, Argon2id KDF |
| 10.g |
Key Management |
Auto-generated master key, secret rotation via watcher, certificate renewal |
| 10.h |
Control of Operational Software |
Package executor enforces versions, repository executor controls sources |
| 10.k |
Change Control Procedures |
Stage/live separation, modlint, change approval, blast radius limits, auto-rollback |
| 10.l |
Technical Review After OS Changes |
Automatic reconvergence detects drift after OS updates |
| 10.m |
Restrictions on Software Changes |
Package pinning, repository enforcement prevents unauthorized changes |
Domain 11 — Incident Management
| Ref |
Control |
Vigo Implementation |
| 11.a |
Reporting Security Events |
Webhook + SMTP notifications for compliance drift, threshold breaches |
| 11.e |
Collection of Evidence |
Run history, file snapshots, compliance history, tamper-evident audit chain |
Domain 12 — Business Continuity
| Ref |
Control |
Vigo Implementation |
| 12.c |
Developing BCPs |
Config-as-code enables rapid rebuild; backup + restore; disaster recovery documented |
Domain 16 — Endpoint Protection
| Ref |
Control |
Vigo Implementation |
| 16.a |
Endpoint Protection |
Package/service executors enforce AV/EDR/firewall on all managed endpoints |
Quick Start
cp example-configs/stockpile/modules/compliance/hitrust/*.vgo.example /srv/vigo/stockpile/modules/
for f in /srv/vigo/stockpile/modules/hitrust-*.vgo.example; do mv "$f" "${f%.example}"; done
cp example-configs/stockpile/compliance-roles.vgo.example /srv/vigo/stockpile/compliance-roles.vgo
Assign the hitrust role to nodes:
envoys:
- match: "*.example.com"
roles: [hitrust]
Then publish and verify: vigocli config publish && vigocli report hitrust
Generating HITRUST Reports
CLI
# JSON report
vigocli report hitrust
# HTML report (printable, Vigo-branded)
vigocli report hitrust --format html --output hitrust-report.html
REST API
# JSON
curl -s https://vigo:8443/api/v1/report/hitrust | jq .
# HTML
curl -s https://vigo:8443/api/v1/report/hitrust.html > hitrust-report.html
Cross-Reference to Other Frameworks
HITRUST CSF harmonizes multiple standards. The controls Vigo satisfies map across:
| HITRUST Ref |
HIPAA |
NIST 800-53 |
ISO 27001 |
PCI DSS |
| 01.b |
164.312(a)(2)(i) |
IA-2 |
A.9.2.1 |
8.1 |
| 01.c |
164.312(a)(1) |
AC-6 |
A.9.2.3 |
7.1 |
| 01.d |
164.308(a)(5)(ii)(D) |
IA-5 |
A.9.4.3 |
8.2 |
| 06.g |
164.312(b) |
CA-7 |
A.18.2.2 |
11.5 |
| 06.h |
164.312(b) |
CA-7 |
A.18.2.3 |
11.5 |
| 09.b |
164.312(e)(2)(i) |
CM-3 |
A.12.1.2 |
6.4 |
| 09.q |
164.312(b) |
AU-2 |
A.12.4.1 |
10.2 |
| 10.f |
164.312(a)(2)(iv) |
SC-12 |
A.10.1.1 |
3.4 |
| 10.k |
164.312(e)(2)(i) |
CM-3 |
A.14.2.2 |
6.4 |
| 11.a |
164.308(a)(6) |
IR-6 |
A.16.1.2 |
12.10 |
Domains Not Covered (Organizational)
These HITRUST CSF domains require organizational policies and human processes:
| Domain |
Name |
Why Not Automated |
| 00 |
Information Security Management Program |
Executive governance |
| 02 |
Human Resources Security |
Background checks, training |
| 03 |
Risk Management |
Risk assessment methodology |
| 04 |
Security Policy |
Policy documentation |
| 05 |
Organization of Information Security |
Roles and responsibilities |
| 08 |
Physical and Environmental Security |
Data center access |
| 13 |
Privacy Practices |
Consent, notice, data subject rights |
| 14 |
Cloud Security |
Cloud provider contractual controls |
| 15 |
Mobile Security |
MDM policies |
| 17 |
Third Party Assurance |
Vendor management |
| 18 |
Data Protection and Privacy |
Data classification policies |
HITRUST Assessment Preparation
For a formal HITRUST assessment (r2, i1, or e1), Vigo provides:
- Automated evidence — compliance reports, audit logs, drift detection results
- Technical control documentation — this mapping document + architecture docs
- Continuous monitoring — real-time compliance dashboards, threshold alerts
- Change management artifacts — git history, publish audit trail, approval records
Work with your HITRUST assessor to determine which controls are in scope for your assessment type and map the remaining organizational controls to your policies and procedures.