If you’re used to working with a specific HIPAA framework control, you can use this guide to identify its corresponding Unified Control.
For more information, and to view other framework control maps, visit Unified Controls FAQ.
HIPAA Control | Unified Control |
AC-01-HIPAA-S Access Control Policy and Procedures | CTRL-1 Access Control Policy and Procedures |
AC-01.01-HIPAA Access Control Policy | CTRL-1 Access Control Policy and Procedures |
AC-01.01-HIPAA-S Access Control Policy | CTRL-1 Access Control Policy and Procedures |
AC-02-HIPAA-S User Account Management | CTRL-1 Access Control Policy and Procedures |
AC-02.02-HIPAA Access Provisioning | CTRL-16 Access Provisioning |
AC-02.02-HIPAA-S Access Provisioning | CTRL-16 Access Provisioning |
AC-02.03-HIPAA Access Deprovisioning | CTRL-535 Access Termination |
AC-02.03-HIPAA-S Access Deprovisioning | CTRL-535 Access Termination |
AC-02.04-HIPAA Access Review | CTRL-73 Review of User Privileges |
AC-02.04-HIPAA-S Access Review | CTRL-73 Review of User Privileges |
AC-03-HIPAA-S Role-based Access Controls (RBAC) | CTRL-23 Role-Based Access Control |
AC-03.01-HIPAA Privileged Access | CTRL-9 Privileged User Accounts |
AC-03.01-HIPAA-S Privileged Access | CTRL-9 Privileged User Accounts |
AC-04-HIPAA-S Information Flow Enforcement | CTRL-814 System Integrity Policy and Procedures |
AC-05-HIPAA-S Separation of Duties | CTRL-65 Separation of Duties |
AC-06-HIPAA-S Least Privilege Access | CTRL-23 Role-Based Access Control |
AC-06(07)-HIPAA-S Review of Access Privileges | CTRL-73 Review of User Privileges |
AC-11-HIPAA-S Device Lock and Session Timeouts | CTRL-91 Session Termination |
AC-17-HIPAA-S Remote Access | CTRL-110 Remote Access |
AC-18-HIPAA-S Wireless Access | CTRL-539 Access Agreements |
AC-19-HIPAA-S Access Control for Mobile Devices | CTRL-79 Mobile Device Management |
AT-01-HIPAA-S Awareness and Training Policy and Procedures | CTRL-245 Security and Privacy Awareness Training |
AT-02-HIPAA-S Security Awareness and Privacy Training | CTRL-245 Security and Privacy Awareness Training |
AT-02.01-HIPAA Security Awareness Training Reminders | CTRL-245 Security and Privacy Awareness Training |
AT-02.01-HIPAA-S Security Awareness Training Reminders | CTRL-245 Security and Privacy Awareness Training |
AT-04-HIPAA-S Training Records | CTRL-245 Security and Privacy Awareness Training |
AT-04.01-HIPAA Security Awareness Training | CTRL-245 Security and Privacy Awareness Training |
AT-04.01-HIPAA-S Security Awareness Training | CTRL-245 Security and Privacy Awareness Training |
AU-01-HIPAA-S Audit and Accountability Policy and Procedures | CTRL-833 Logging and Monitoring |
AU-02-HIPAA-S Event Logging in IT Systems | CTRL-833 Logging and Monitoring |
AU-03-HIPAA-S Informative Log Content | CTRL-833 Logging and Monitoring |
AU-06-HIPAA-S Log Review and Reporting | CTRL-833 Logging and Monitoring |
AU-09-HIPAA-S Protection of Audit Information | CTRL-896 Information Management and Retention |
AU-11-HIPAA-S Audit Record Retention | CTRL-896 Information Management and Retention |
AU-11-HIPAA-S Audit Record Retention | CTRL-833 Logging and Monitoring |
AU-11.01-HIPAA Policy Review | CTRL-431 Information Security Policy and Procedures |
AU-11.01-HIPAA-S Policy Review | CTRL-431 Information Security Policy and Procedures |
CA-01-HIPAA-S Assessment, Authorization, and Monitoring Policy and Procedures | CTRL-174 Penetration Testing |
CA-02-HIPAA-S Control Assessments | CTRL-149 Control Assessments |
CA-03-HIPAA-S Third-Party Agreements | CTRL-1129 Third-Party Agreements |
CA-07-HIPAA-S Continuous Monitoring | CTRL-833 Logging and Monitoring |
CA-07-HIPAA-S Continuous Monitoring | CTRL-167 Continuous Monitoring |
CA-08-HIPAA-S Penetration Testing | CTRL-174 Penetration Testing |
CA-08.01-HIPAA Technical Evaluations | CTRL-174 Penetration Testing |
CA-08.01-HIPAA-S Penetration Testing | CTRL-174 Penetration Testing |
CA-08.02-HIPAA-S Penetration Testing Remediation | CTRL-174 Penetration Testing |
CM-01-HIPAA-S Configuration and Change Management Policy and Procedures | CTRL-262 Change Management and Software Development Policy and Procedures |
CM-01.01-HIPAA-S Change Management Policies | CTRL-262 Change Management and Software Development Policy and Procedures |
CM-03-HIPAA-S Configuration Change Control | CTRL-190 Change Management and Software Development Life Cycle |
CM-05.01-HIPAA-S Segregation of Duties | CTRL-190 Change Management and Software Development Life Cycle |
CM-05.02.HIPAA-S Confidentiality Data Policy | CTRL-198 Network Segmentation |
CM-06-HIPAA-S System Hardening Through Baseline Configurations | CTRL-208 Configuration Management |
CM-08-HIPAA-S Asset Inventory | CTRL-435 System Inventory |
CM-08.01-HIPAA Asset Inventory | CTRL-435 System Inventory |
CM-08.01-HIPAA-S Asset Inventory | CTRL-435 System Inventory |
CM-08.02-HIPAA-S Change Management | CTRL-190 Change Management and Software Development Life Cycle |
CM-08.03-HIPAA-S Asset Custody Log | CTRL-435 System Inventory |
CP-01-HIPAA-S Contingency Planning Policy and Procedures | CTRL-264 Contingency Plan |
CP-02-HIPAA-S Contingency Plan (BCP/DR) | CTRL-264 Contingency Plan |
CP-02.02-HIPAA Business Continuity & Diaster Recovery Plan | CTRL-264 Contingency Plan |
CP-02.02-HIPAA-S Business Continuity & Disaster Recovery Plan | CTRL-264 Contingency Plan |
CP-02.03-HIPAA Data Restoration | CTRL-301 System Backup Test |
CP-02.03-HIPAA-S Data Restoration | CTRL-301 System Backup Test |
CP-02.04-HIPAA Data Replication | CTRL-306 Redundant Secondary System |
CP-02.04-HIPAA-S Data Replication | CTRL-306 Redundant Secondary System |
CP-02.05-HIPAA Backups | CTRL-300 System Backup |
CP-02.05-HIPAA-S Device Backups | CTRL-300 System Backup |
CP-02.06-HIPAA-S Backup Policies | CTRL-300 System Backup |
CP-02.07-HIPAA-S Backups | CTRL-300 System Backup |
CP-03-HIPAA-S Contingency Training | CTRL-245 Security and Privacy Awareness Training |
CP-04-HIPAA-S Contingency Plan (BCP/DR) Testing | CTRL-276 Contingency Plan Testing |
CP-09-HIPAA-S Data Backup | CTRL-300 System Backup |
IA-01-HIPAA-S Identification and Authentication Policy and Procedures | CTRL-319 Identification and Authentication |
IA-02-HIPAA-S Internal Users Identification and Authentication | CTRL-319 Identification and Authentication |
IA-02.01-HIPAA Authentication Controls | CTRL-319 Identification and Authentication |
IA-02.01-HIPAA-S Authentication Controls | CTRL-319 Identification and Authentication |
IA-02.03-HIPAA Multi-Factor Authentication | CTRL-320 Multi-Factor Authentication |
IA-02.03-HIPAA-S Multi-Factor Authentication | CTRL-320 Multi-Factor Authentication |
IA-02(01)-HIPAA-S Multi-factor Authentication to Privileged Accounts | CTRL-319 Identification and Authentication |
IA-02(02)-HIPAA-S Multi-factor Authentication to Non-privileged Accounts | CTRL-319 Identification and Authentication |
IA-05-HIPAA-S Password Management | CTRL-349 Password-Based Authentication |
IA-05.01-HIPAA Password Configurations | CTRL-349 Password-Based Authentication |
IA-05.01-HIPAA-S Password Configurations | CTRL-349 Password-Based Authentication |
IA-05.02-HIPAA Automated Logoffs | CTRL-91 Session Termination |
IA-05.02-HIPAA-S Automated Logoffs | CTRL-91 Session Termination |
IA-08-HIPAA-S External Users Identification and Authentication | CTRL-319 Identification and Authentication |
IR-01-HIPAA-S Incident Response Policy and Procedures | CTRL-423 Incident Response Plan |
IR-01.01-HIPAA Incident Response Policy | CTRL-423 Incident Response Plan |
IR-01.01-HIPAA-S Incident Response Policies | CTRL-423 Incident Response Plan |
IR-01.02-HIPAA-S Breach Notification Policy | CTRL-423 Incident Response Plan |
IR-03-HIPAA-S Incident Response Testing | CTRL-23 Role-Based Access Control |
IR-04-HIPAA-S Incident Handling and Reporting | CTRL-423 Incident Response Plan |
IR-05-HIPAA-S Incident Monitoring | CTRL-423 Incident Response Plan |
IR-08-HIPAA-S Incident Response Plan | CTRL-423 Incident Response Plan |
IR-08.01-HIPAA Security Incidents | CTRL-423 Incident Response Plan |
IR-08.01-HIPAA-S Security Incidents | CTRL-423 Incident Response Plan |
IR-08.02-HIPAA-S Incident Response Test | CTRL-394 Incident Response Testing |
KT-01-HIPAA Key Tool Selection (HR) | CTRL-1134 Key Tools Selection (HR) |
KT-01-HIPAA-S Key Tool Selection (HR) | CTRL-1134 Key Tools Selection (HR) |
KT-02-HIPAA Key Tool Selection (Technical) | CTRL-1135 Key Tools Selection (Technical) |
KT-02-HIPAA-S Key Tool Selection (Technical) | CTRL-1135 Key Tools Selection (Technical) |
MA-01-HIPAA-S Maintenance Policy and Procedures | CTRL-468 Maintenance Policy and Procedures |
MA-02-HIPAA-S Controlled Maintenance | CTRL-468 Maintenance Policy and Procedures |
MP-01-HIPAA-S Media Protection Policy and Procedures | CTRL-498 Media Protection Policy and Procedures |
MP-01.01-HIPAA Physical Device Security | CTRL-255 Physical Security Controls |
MP-01.01-HIPAA-S Physical Device Security | CTRL-255 Physical Security Controls |
MP-02-HIPAA-S Media Access | CTRL-23 Role-Based Access Control |
MP-02-HIPAA-S Media Access | CTRL-16 Access Provisioning |
MP-05-HIPAA-S Media Transport | CTRL-506 Media Transport |
PE-01-HIPAA-S Physical and Environmental Policy and Procedures | CTRL-546 Physical and Environmental Protection Policy and Procedures |
PE-01.01-HIPAA Physical Security Measures | CTRL-255 Physical Security Controls |
PE-01.01-HIPAA-S Physical Access | CTRL-255 Physical Security Controls |
PE-01.02-HIPAA-S Physical Access Visitors | CTRL-255 Physical Security Controls |
PE-01.03-HIPAA-S Physical Access Admins | CTRL-9 Privileged User Accounts |
PE-01.04-HIPAA-S Physical Access Review | CTRL-73 Review of User Privileges |
PE-01.05-HIPAA-S Physical Access Entry | CTRL-255 Physical Security Controls |
PE-01.06-HIPAA-S Physical Equipment Maintanence | CTRL-468 Maintenance Policy and Procedures |
PE-02-HIPAA-S Physical Access Authorizations | CTRL-551 Physical Access Control |
PE-03-HIPAA-S Physical Access Control | CTRL-255 Physical Security Controls |
PE-05-HIPAA-S Access to Output Devices | CTRL-551 Physical Access Control |
PE-08-HIPAA-S Visitor Access Records | CTRL-255 Physical Security Controls |
PL-01-HIPAA-S Planning Policy and Procedures | CTRL-263 Contingency Planning Policy and Procedures |
PL-01-HIPAA-S Planning Policy and Procedures | CTRL-266 Capacity Planning |
PL-02-HIPAA-S System Security and Privacy Plans | CTRL-431 Information Security Policy and Procedures |
PL-04-HIPAA-S Rules of Behavior | CTRL-539 Access Agreements |
PM-01-HIPAA-S Information Security Program Management Policy and Procedures | CTRL-431 Information Security Policy and Procedures |
PM-01.01-HIPAA HIPAA Security Rule | CTRL-431 Information Security Policy and Procedures |
PM-01.01-HIPAA-S HIPAA Security Rule | CTRL-431 Information Security Policy and Procedures |
PM-02-HIPAA-S Information Security Program Leadership Role | CTRL-432 Information Security Program Leadership Role |
PM-02.01-HIPAA Roles and Responsibilities | CTRL-432 Information Security Program Leadership Role |
PM-02.01-HIPAA-S Roles and Responsibilities | CTRL-432 Information Security Program Leadership Role |
PM-03.01-HIPAA-S Information Security Policies | CTRL-431 Information Security Policy and Procedures |
PM-07-HIPAA-S Network Architecture and Dataflow Diagrams | CTRL-198 Network Segmentation |
PM-07.01-HIPAA-S Network Segmentation | CTRL-198 Network Segmentation |
PM-09-HIPAA-S Risk Management Program and Strategy | CTRL-646 Risk Assessment |
PM-15-02-HIPAA Group Health Plan | CTRL-1129 Third-Party Agreements |
PM-15-02-HIPAA-S Group Health Plan | CTRL-1129 Third-Party Agreements |
PM-15.01-HIPAA Health Care Clearinghouse | CTRL-1129 Third-Party Agreements |
PM-15.01-HIPAA-S Health Care Clearinghouse | CTRL-1129 Third-Party Agreements |
PS-01-HIPAA-S Personnel Security Policy and Procedures | CTRL-530 Personnel Screening |
PS-02.01-HIPAA-S Job Descriptions | CTRL-545 Position Descriptions |
PS-02.02-HIPAA-S Organization Chart | CTRL-545 Position Descriptions |
PS-03-HIPAA-S Personnel Screening | CTRL-530 Personnel Screening |
PS-03.01-HIPAA Personnel Screening | CTRL-530 Personnel Screening |
PS-03.01-HIPAA-S Background Checks | CTRL-530 Personnel Screening |
PS-04-HIPAA-S Personnel Termination | CTRL-535 Access Termination |
PS-06-HIPAA-S Confidentiality Agreements for Company Personnel | CTRL-539 Access Agreements |
PS-06.01-HIPAA Code of Conduct | CTRL-539 Access Agreements |
PS-06.01-HIPAA-S Confidentiality Agreements for Company Personnel | CTRL-539 Access Agreements |
PS-06.02-HIPAA-S Code of Conduct | CTRL-539 Access Agreements |
PS-08-HIPAA-S Personnel Sanctions | CTRL-544 Personnel Sanctions |
PS-08.01-HIPAA Personnel Sanctions | CTRL-544 Personnel Sanctions |
PS-08.01-HIPAA-S Personnel Sanctions | CTRL-544 Personnel Sanctions |
PT-01-HIPAA-S Privacy Policy and Procedures | CTRL-622 Privacy Policy and Procedures |
RA-01-HIPAA-S Risk Assessment Policy and Procedures | CTRL-643 Risk Assessment Policy and Procedures |
RA-02-HIPAA-S Security Categorization | CTRL-896 Information Management and Retention |
RA-03-HIPAA-S Risk Assessment | CTRL-646 Risk Assessment |
RA-03.01-HIPAA Risk Assessment | CTRL-646 Risk Assessment |
RA-03.01-HIPAA-S Risk Assessment (PHI) | CTRL-646 Risk Assessment |
RA-03.02-HIPAA Risk Strategy | CTRL-646 Risk Assessment |
RA-03.02-HIPAA-S Risk Strategy | CTRL-646 Risk Assessment |
RA-03.03-HIPAA-S Risk Assessment Policy | CTRL-643 Risk Assessment Policy and Procedures |
RA-07-HIPAA-S Risk Response and Remediation | CTRL-646 Risk Assessment |
SA-01-HIPAA-S System Development Life Cycle (SDLC) Policy and Procedures | CTRL-262 Change Management and Software Development Policy and Procedures |
SA-02-HIPAA-S Allocation of Resources | CTRL-266 Capacity Planning |
SA-09-HIPAA-S External System Services | CTRL-1109 Supplier Assessments and Reviews |
SC-01-HIPAA-S System Protection Policy and Procedures | CTRL-932 System Protection Policy and Procedures |
SC-07-HIPAA-S Boundary Protection and Firewalls | CTRL-950 Boundary Protection |
SC-07(12)-HIPAA-S Host-based Protection | CTRL-833 Logging and Monitoring |
SC-08-HIPAA-S Transmission Confidentiality and Integrity | CTRL-112 Encryption of Data at Rest and in Transit |
SC-08.01-HIPAA-S Data Transmission Protocols | CTRL-112 Encryption of Data at Rest and in Transit |
SC-08.02-HIPAA Encryption | CTRL-112 Encryption of Data at Rest and in Transit |
SC-08.02-HIPAA-S Encryption | CTRL-112 Encryption of Data at Rest and in Transit |
SC-08.03-HIPAA Security Groups (SG) | CTRL-950 Boundary Protection |
SC-08.03-HIPAA-S Security Groups (SG) | CTRL-950 Boundary Protection |
SC-13-HIPAA-S Cryptographic Protection | CTRL-194 Cryptography Management |
SC-38-HIPAA-S Operations Security | CTRL-190 Change Management and Software Development Life Cycle |
SI-01-HIPAA-S System Integrity Policy and Procedures | CTRL-896 Information Management and Retention |
SI-01-HIPAA-S System Integrity Policy and Procedures | CTRL-814 System Integrity Policy and Procedures |
SI-01.01-HIPAA-S Vulnerability Management Policies | CTRL-833 Logging and Monitoring |
SI-03-HIPAA-S Malware and Endpoint Protection | CTRL-822 Malicious Code Protection |
SI-04-HIPAA-S System Monitoring | CTRL-833 Logging and Monitoring |
SI-04.01-HIPAA Data Loss Prevention | CTRL-833 Logging and Monitoring |
SI-04.01-HIPAA-S Data Loss Prevention | CTRL-833 Logging and Monitoring |
SI-04.02-HIPAA Anti-Virus | CTRL-822 Malicious Code Protection |
SI-04.02-HIPAA-S Anti-Virus | CTRL-822 Malicious Code Protection |
SI-04.03-HIPAA-S Vulnerability Scans | CTRL-652 Vulnerability Management |
SI-04.04-HIPAA-S Vulnerability Scan Remediation | CTRL-652 Vulnerability Management |
SI-04.05-HIPAA System Monitoring | CTRL-833 Logging and Monitoring |
SI-04.05-HIPAA-S System Monitoring | CTRL-833 Logging and Monitoring |
SI-12-HIPAA-S Data Handling, Retention, and Disposal | CTRL-896 Information Management and Retention |
SI-12.01-HIPAA Data Retention & Disposal Policy | CTRL-899 Information Disposal |
SI-12.01-HIPAA-S Customer Data Deletion | CTRL-899 Information Disposal |
SI-12.02-HIPAA-S Data Classification Policy | CTRL-896 Information Management and Retention |
SI-12.03-HIPAA-S Device Re-Use | CTRL-511 Media Sanitization and Disposal |
SI-12.04-HIPAA-S Data Retention & Disposal Policy | CTRL-896 Information Management and Retention |
SR-01-HIPAA-S Third-Party Risk Management Policy and Procedures | CTRL-1094 Third-Party Risk Management Policy and Procedures |
SR-06-HIPAA-S Third-Party Risk Assessments | CTRL-1109 Supplier Assessments and Reviews |
SR-06.01-HIPAA-S Vendor Management | CTRL-1094 Third-Party Risk Management Policy and Procedures |
SR-06.02-HIPAA Third-Party Agreements | CTRL-1129 Third-Party Agreements |
SR-06.02-HIPAA-S Third-Party Agreements | CTRL-1129 Third-Party Agreements |
SR-06.03-HIPAA-S Vendor Assessments | CTRL-1109 Supplier Assessments and Reviews |
Viewing Framework Controls in Thoropass
You can view the framework requirements satisfied by a Unified Control by clicking References on the side panel when viewing the Unified Control.
The IDs and names of all framework controls satisfied by the Unified Control are listed by framework. Click a framework control to view its description.