(952) 943-0900

HITRUST Compliance


Healthcare Information Security, Audit Ready

The Compliance Coaching Process:


Why is your process?
  1. An ESX ICSG expert pairs with your organization to determine the correct level of security or compliance required
  2. The expert and key stakeholders in the organization work together to perform a risk assessment or an audit, depending on what suits the organizational requirements
  3. The assessor collects artifacts and evidence to supplement the report
  4. Security implementation experts compile the list of the organization’s requirements and results to create a remediation or Corrective Action Plan
  5. The report documents are delivered along with a letter of attestation as to the state of the organization’s security program and guidance for improving the organization’s security posture

If you are serious about information security, the NIST standards are the correct way to proceed!

What are the NIST 800-171 Requirements?
  1. Access Control
  2. Awareness and Training
  3. Auditing and Accountability
  4. Configuration Management
  5. Identification and Authentication
  6. Incident Response
  7. Maintenance
  8. Media Protection
  9. Personnel Security
  10. Physical Protection
  11. Risk Assessment
  12. Security Assessment
  13. System and Communication Protection
  14. System and Information Integrity
Do the NIST guidelines apply to my organization?

That is highly dependent on what your organization does and who they do it for. If your organization is a branch of the federal government or supports the federal or local government in some way, there is a NIST standard that is applicable.

I already do a SOC2 report. Why should I do NIST assessment?

A SOC2 report is not a security framework. It is a well known medium to provide information for stakeholders outside of your organization about your security program, according to the auditor. Conversely, the NIST Risk Assessment or Audit measures your organization’s security posture based upon continually updated best practices and modern technologies, even to the point of specific hacking attack vectors. Combining a SOC2 report in conjunction with a NIST assessment not only let you know how you can do to protect your organization, it provides stakeholders the information about the state of your security program.

We don’t have a lot of users or systems. Is there a NIST standard for my organization?

Yes! The NIST is customizable based upon the needs of the organization, adjustable to the technologies used, size of the organization, and information that needs to be protected.

My organization is very mature and we have multiple standards that we comply with. Why would we want to use the NIST standards?

Most information security standards are based off of the NIST Special Publications in one way or another but are pared down for protecting a specific kind of information. The NIST guidelines take a holistic security approach and allow the organization to ensure the right amount of security for all applications and data concerns, even physical security and paperwork.

How do I find out more?

We know that every organization is different and requires a slightly different approach. Reach out in order to talk more about your organization’s security desires and requirements.


Risk Assessments




Get a Plan


Over 3000 Customers