How identity and access management principles can accelerate your HITRUST journey

Start adding items to your reading lists:
Save this item to:
This item has been saved to your reading list.


A strong identity and access management (IAM) is a crucial part of any cybersecurity program. Many organizations begin to strengthen their IAM programs by buying a suite of IAM technologies but fall short in realizing the full value. A successful IAM transformation requires the alignment of people, processes and technology to reduce risk and satisfy an ever-increasing number of compliance requirements.

While they may not know it, organizational leaders can both transform their IAM program and significantly improve their compliance posture at the same time. Like an IAM program, the Health Information Trust Alliance (HITRUST) common security framework (CSF) is centered on a holistic view of security maturity.

Investing in a holistic IAM program from a people, process and technology standpoint can improve security operations, and enable HITRUST compliance.

What steps should you take to first understand and then boost both your organization’s IAM program and HITRUST readiness?

A balance of people, processes and technology can help organizations tackle tough IAM problems—and adopt the HITRUST CSF and become certified. With this balanced approach, organizational leaders can:

Contact us

Todd Bialick

Todd Bialick

Digital Assurance and Transparency Leader, PwC US

Dennis Quandt

Dennis Quandt

Director, PwC US

Follow us