Skip to main content
Home / Services / HITRUST Penetration Testing

HITRUST Penetration Testing

Security testing for HITRUST CSF certification

2-3 weeks Starting at $11,000
HITRUST Penetration Testing ASSESSMENT
2
CRITICAL
6
HIGH
11
MEDIUM
5
LOW
External perimeter testingPASSED
Application security testingPASSED
Remediation verificationIN PROGRESS
Final report deliveryPENDING
Overview

What This Engagement Covers

A comprehensive assessment tailored to your environment.

HITRUST CSF certification requires validated security testing to demonstrate control effectiveness. Our HITRUST penetration testing aligns with the Common Security Framework and provides the technical evidence needed for r2 certification and validated assessments.

Our Process

What We Test & How

What We Test

We test systems within your HITRUST assessment scope including applications, infrastructure, cloud environments, and access controls. Testing covers the 19 HITRUST CSF control domains with focus on access control, network protection, vulnerability management, and data protection.

Our Approach

Our methodology maps to HITRUST CSF control objectives and requirement statements. We work with your HITRUST assessor to ensure testing scope alignment and provide evidence packages formatted for MyCSF portal submission. Each finding references specific HITRUST control IDs for efficient remediation tracking.

Deliverables

What You'll Receive

Everything included in your engagement report.

HITRUST CSF-aligned penetration test report

Control domain testing results

MyCSF evidence documentation

Risk factor analysis

Corrective Action Plan (CAP) input

Gap analysis against HITRUST requirements

Remediation guidance by control domain

Retest validation report

Methodology

Our Testing Methodology

A structured approach to identifying and validating vulnerabilities.

1

HITRUST scope alignment and scoping

2

Access control testing (01.x controls)

3

Network security assessment (09.x controls)

4

Application security testing (10.x controls)

5

Encryption and key management validation

6

Vulnerability management assessment

7

Incident management testing

8

HITRUST evidence documentation and packaging

Findings

Common Vulnerabilities We Find

Typical security issues discovered during this type of engagement.

Incomplete Access Control Implementation Missing Encryption at Rest or in Transit Inadequate Vulnerability Scanning Cadence Weak Session Management Insufficient Network Monitoring Third-Party Risk Management Gaps Missing Security Awareness Training Evidence Incomplete Incident Response Procedures
Who It's For

Ideal For

Healthcare Technology Companies
Health Plans and Insurers
Healthcare Business Associates
Health Information Exchanges
Life Sciences Organizations
Healthcare SaaS Vendors
Compliance

Standards We Support

HITRUST CSF v11 HIPAA NIST CSF ISO 27001

Ready to Get Started?

$11,000

Typical engagement: 2-3 weeks

Why Us

Why Lorikeet Security

Certified Experts

OSCP, OSCE, CEH, GPEN certified professionals

Auditor Ready

Reports designed for compliance audits

Free Retesting

Validate fixes at no additional cost

Expert Support

Direct access to testing team during remediation

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!