content(what-is): expand the HITRUST explainer#19143
Conversation
|
Your site preview for commit 16eee3a is ready! 🎉 http://www-testing-pulumi-docs-origin-pr-19143-16eee3a2.s3-website.us-west-2.amazonaws.com |
|
@claude - review this pr please |
|
Claude finished @alexleventer's task in 2m 50s —— View job PR Review: content(what-is): expand the HITRUST explainerTasks
Overall this is a solid, well-researched upgrade to the page. The structure is clear, the HITRUST-specific terminology (e1/i1/r2, PRISMA maturity model, External Assessor model) is accurate, and the IaC-to-maturity-level mapping is a smart Pulumi-specific addition. Cross-links to Required fix — H2 headings ending with
|
| Line | Current heading | Suggested fix |
|---|---|---|
| 26 | ## Why does HITRUST matter? |
## Why HITRUST matters |
| 34 | ## What is the HITRUST CSF? |
## The HITRUST CSF |
| 47 | ## What does the HITRUST CSF harmonize? |
## What the HITRUST CSF harmonizes |
| 60 | ## What are the HITRUST assessment types? |
## HITRUST assessment types |
| 72 | ## How are HITRUST controls scored? |
## How HITRUST controls are scored |
| 84 | ## How is HITRUST different from HIPAA, SOC 2, and ISO 27001? |
## HITRUST vs. HIPAA, SOC 2, and ISO 27001 |
| 104 | ## What does HITRUST certification involve? |
## The HITRUST certification process |
| 118 | ## How does infrastructure as code support HITRUST controls? |
## Infrastructure as code and HITRUST controls |
Structural nit — orphaned bullet list at lines 138–139
After the five-item maturity-level list ends at line 136, two more bullets appear with no intro sentence:
* **Centralized secrets.** [Pulumi ESC](/product/esc/) keeps secrets out of code…
* **Reusable secure defaults.** Platform teams ship [Pulumi components]…These float without connection to the preceding list. A short bridge would help — e.g., add a line before them like: "Pulumi also covers adjacent HITRUST control areas:"
Content notes (non-blocking)
Breach rate claim (line 31). The statement "fewer than 1% of HITRUST-certified environments report a security breach in a given year" is HITRUST's own published figure. The hedging sentence that follows ("Whether that's selection bias...") is good, but for a reference doc it's stronger to attribute the stat directly: "HITRUST reports that fewer than 1%..."
Duplicate CTA. The "## Learn more" section at line 185 re-pitches CrossGuard and the HITRUST policy pack that were already covered in depth in the IaC section (lines 122–141). The closing paragraph is slightly redundant. This is minor but a tighter closer would just say: "For related reading:" and go straight to the link list.
r2 rebrand timeline (line 159). "Reports issued before 2022 typically use the older terminology" is approximately right — HITRUST introduced e1/i1/r2 with CSF v9.4 in late 2021, so reports from mid-2021 onward may already use the new naming. A more precise framing: "reports issued before CSF v9.4 (2021)".
Factual accuracy — no blockers found
The framework numbers (14 categories, 49 objectives, 156 references, 1,900+ requirement statements, 19 domains), the PRISMA maturity levels, the e1/i1/r2 scope and validity periods, the comparison table, and the certification lifecycle are all consistent with HITRUST's published documentation. The internal link table of contents matches the actual H2 headings.
|
@claude #new-review |
Pre-merge Review — Last updated 2026-05-19T18:53:51ZTip Summary: This PR rewrites Review confidence:
Investigation log
🔍 Verification trail49 claims extracted · 33 verified · 5 unverifiable · 9 contradicted
🚨 Outstanding in this PRNo outstanding findings.
|
|
🤖 Review regenerated on @CamSoper's request. |
|
@claude - fix all the outstanding items and then #update-review |
|
🤖 Review updated on @alexleventer's request. |
Rewrites content/what-is/what-is-hitrust.md from a high-level overview into a deeper reference matching the template used by the recent IaC, cloud-security, and HIPAA pages. New structure: - Bold quotable definition + question-driven TOC. - Why HITRUST matters (one audit for many regimes, low certified breach rate, contractual gating). - HITRUST CSF structure: 14 categories, 49 objectives, 156 control references, 1,900+ requirement statements across 19 domains. - What the CSF harmonizes (HIPAA, NIST 800-53, ISO 27001, PCI DSS, GDPR, state laws, etc.). - Modern assessment table: e1, i1, r2 — with validity, scope, and the legacy "CSF Certified" naming. - Five-level PRISMA maturity model (Policy / Procedure / Implemented / Measured / Managed) and how scoring works. - Comparison table: HITRUST vs HIPAA vs SOC 2 vs ISO 27001. - Step-by-step certification process for r2. - Pulumi section keeps the existing CrossGuard HITRUST policy pack pointer and adds the maturity-level mapping. - Ten FAQ entries covering naming, scope, cost/timeline, HITRUST + SOC 2 combined reports, MyCSF, cloud inheritance. - Learn-more cross-links to HIPAA, SOC 2, cloud security, secrets management, configuration management. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
- Fix CSF authoritative-source count (60+ per v11.5 PDF, not "over 70") - Fix i1 validity: rapid recertification in year 2, not mid-cycle interim (that's r2) - Fix ISO 27001 prescriptive-controls cell: partially risk-based, not simply "Yes" - Widen r2 timeline from 12–18 to 6–18 months to match published estimates (body + FAQ) - Align FAQ industry-list to intro (drop "retail" and "industry-agnostic") - Fix r2 rename year: 2021 not 2022 (2022 was i1 introduction) - Fix MyCSF pricing: subscriptions start ~$18,000/yr per HITRUST, not "a few thousand" Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
0108071 to
b7f4977
Compare
|
🤖 Review updated on @CamSoper's request. |
…Policies Three occurrences of the deprecated product name "CrossGuard" replaced with the current term "Pulumi Policies" (linking to /docs/insights/policy/). Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
|
🤖 Review updated on @CamSoper's request. |
Summary
Rewrites
content/what-is/what-is-hitrust.mdfrom a high-level overview into a deeper, more practical reference. Body grows from ~110 lines to ~170 well-structured lines and brings the assessment terminology up to date with HITRUST's current naming.What changed
e1/i1/r2naming with scope, validity, and ideal-use guidance. Old "CSF Validated" / "CSF Certified" naming explained where it still shows up in contracts.pulumi policy new aws-hitrust-compliance-policies-typescriptcallout; adds a mapping from Pulumi capabilities to each of the five maturity levels.Test plan
make serve; visit/what-is/what-is-hitrust/and confirm tables and headings render correctly/what-is/what-is-hipaa/,/what-is/what-is-soc-2/,/docs/insights/policy/, the AWS HITRUST policy pack template repo)🤖 Generated with Claude Code