Purpose (Use Case) |
Threat-adaptive assessment needed for moderate assurance requirements across many internal and
external stakeholders |
Coverage of Standards and Authoritative Sources |
Includes HITRUST Basics, Technically-focused components from GLBA, NAIC, NIST, DOL EBSA, and
HIPAA, and the latest Threat Intelligence Data |
Turn-around Time |
45 Business Days to complete post-submission QA on validated i1 assessments (not escalated due
to quality concerns). |
Number of Control Requirement Statements |
219 Static |
Flexibility of Control Selection |
Pre-Set Controls that Leverage Security Best Practices and Threat Intelligence |
Evaluation Approach |
1x5: Control Implementation Only |
Level of Effort / Level of Assurance Conveyed |
Moderate |
Certifiable Assessment |
Yes, 1-year |