Risk Mitigation
HITRUST CSF v11 03.c requires you to implement risk mitigation strategies that reduce identified risks to an acceptable level, based on risk assessment results. Operationally, you must show a consistent method to prioritize risks, choose a risk treatment option (reduce, accept, transfer, avoid), execute the treatment, and retain evidence that leadership approved the residual risk. 1
Key takeaways:
- You need a repeatable “risk treatment workflow,” not ad hoc remediation.
- Every material risk must have a documented treatment decision, owner, and due date, tied back to the risk assessment.
- Auditors will look for proof that residual risk is explicitly accepted and governed, not assumed.
Footnotes
“Risk mitigation” sounds broad, but HITRUST CSF v11 03.c is specific about what a assessor expects: decisions and actions that demonstrably reduce identified risks to an acceptable level, prioritized by the results of your risk assessment, using a defined set of treatment options. 1
For a Compliance Officer, CCO, or GRC lead, the fastest path to operationalizing this requirement is to treat it like a production workflow: intake risks from assessments and ongoing monitoring, rank them using your methodology, decide treatment (reduce/accept/transfer/avoid), execute through control implementation or compensating controls, and record evidence at each gate.
This page gives requirement-level implementation guidance you can put into motion immediately. It focuses on (1) the minimum governance you need to make decisions defensible, (2) the artifacts you should expect to produce and retain for a HITRUST assessment, and (3) the most common failure modes that create audit findings, especially around “acceptance” and “transfer” decisions.
Regulatory text
HITRUST CSF v11 03.c: “Risk mitigation strategies shall be implemented to reduce identified risks to an acceptable level. The organization shall prioritize and implement controls based on risk assessment results, and shall select risk treatment options including risk reduction, risk acceptance, risk transfer, or risk avoidance.” 1
Operator interpretation (plain English)
You must do three things, consistently:
- Act on identified risks so risk is actually reduced or otherwise treated, not just documented. 1
- Prioritize what you do first based on your risk assessment results (severity, likelihood, impact, exposure, and business context, per your method). 1
- Choose and record a treatment option for each material risk:
- Reduce: implement or strengthen controls
- Accept: formally accept residual risk with approval
- Transfer: shift financial/operational exposure via contracts/insurance/outsourcing (while keeping oversight)
- Avoid: stop the risky activity 1
Who it applies to
Entity scope: All organizations pursuing alignment with HITRUST CSF v11. 1
Operational context where this shows up:
- Enterprise risk management and information security risk programs
- System/application risk registers (including high-impact systems)
- Third-party risk management (TPRM) for material third parties
- Vulnerability management and remediation governance
- Exception handling (policy exceptions, compensating controls)
- Major change initiatives (cloud migrations, new products, M&A integration)
If your risk assessment exists but doesn’t reliably drive remediation funding, backlog prioritization, or executive decisions, you are exposed on this control.
What you actually need to do (step-by-step)
1) Define “acceptable risk” in operational terms
Create a short statement that ties “acceptable” to decision authority:
- What risk levels can be accepted at the system/team level vs. require executive approval
- What factors always escalate (regulated data, critical clinical operations, external exposure, repeated control failures)
Output: Risk appetite/tolerance statement (or addendum) and approval matrix.
2) Standardize the risk record
Every risk should have a minimum data set so treatment decisions are comparable:
- Risk statement (cause → event → impact)
- Affected assets/processes/third parties
- Inherent risk rating and rationale
- Existing controls and control gaps
- Proposed treatment option (reduce/accept/transfer/avoid)
- Residual risk estimate after treatment
- Owner, approver, target date, and dependencies
Output: Risk register fields and guidance.
3) Prioritize based on risk assessment results
Build a repeatable prioritization rule so teams can’t game the queue. Common inputs:
- Inherent rating and residual rating
- Exposure (internet-facing, privileged paths, data sensitivity)
- Control deficiency severity (e.g., missing vs. weak vs. not operating)
- Business criticality and downtime impact
Practical move: Publish a single “risk ranking logic” page and apply it to the remediation backlog.
4) Select a risk treatment option using a simple decision matrix
Use a decision matrix so treatment choices are defensible:
| Treatment option | Use it when | Minimum documentation |
|---|---|---|
| Reduce | Control improvements are feasible and cost/time justified | Remediation plan, mapped controls, validation evidence |
| Accept | Residual risk aligns with tolerance and is time-bounded | Risk acceptance memo, approver, review date |
| Transfer | A third party or insurer can assume defined exposure | Contract clauses/insurance terms, oversight plan |
| Avoid | The activity can stop or be redesigned | Change record showing decommission/feature removal |
Key audit point: “Transfer” is not “ignore.” You still need oversight and evidence that the transfer mechanism is real (contractual obligation, coverage terms, or changed operating model). 1
5) Convert treatment decisions into executable work
Treat “reduce” as an engineering/project workflow, not a GRC note:
- Create remediation tickets with clear acceptance criteria
- Map remediation to control objectives (policy, technical control, monitoring)
- Assign accountable owners (not “IT”)
- Add management checkpoints for overdue high-risk items
For “avoid,” ensure there’s an actual operational change: disable the feature, remove the integration, stop the data flow, or exit the relationship.
6) Validate that mitigation happened
You need proof the risk is reduced, not just planned:
- Re-test the control (technical test, configuration validation, access review results)
- Re-score residual risk based on evidence
- Document closure criteria and who approved closure
7) Govern exceptions and re-acceptance
Accepted risks must not become permanent limbo:
- Define when accepted risks must be re-reviewed (trigger-based is acceptable: major incidents, architecture changes, new threat intel, contract renewal)
- Ensure acceptance expires or is reaffirmed with a recorded decision
8) Make it auditable with a consistent “risk treatment packet”
For each material risk, assemble a single folder (or linked record) that includes:
- The risk record
- The treatment decision and approval
- The remediation plan and evidence
- Residual risk sign-off or closure evidence
Daydream fit (where it naturally helps): If your bottleneck is chasing evidence across Jira, cloud consoles, and shared drives, Daydream can centralize the risk record, map it to controls, and track remediation evidence in one workflow so you can produce assessor-ready packets without scrambling.
Required evidence and artifacts to retain
Assessors typically want artifacts that show the full lifecycle from assessment → prioritization → treatment → validation:
Governance
- Risk management policy/standard describing treatment options and approvals 1
- Risk appetite/tolerance statement and approval matrix
- Defined risk scoring methodology and prioritization logic
Execution
- Risk register with treatment status, owners, and dates
- Remediation plans tied to specific control gaps
- Change tickets, configuration baselines, screenshots/exports, test results
- Compensating control documentation (what, who, frequency, evidence)
Approvals
- Risk acceptance forms/memos with scope, rationale, residual risk, and approver
- Evidence of leadership review for high residual risk items
Monitoring
- Reports showing open/overdue high risks and escalation actions
- Periodic management review minutes or dashboards
Common exam/audit questions and hangups
Expect these lines of questioning:
- “Show me the top risks from your last risk assessment and what you did about each.”
- “How do you define ‘acceptable level’ and who can approve acceptance?”
- “Where is the evidence that the control was implemented and is operating?”
- “How do you prevent accepted risks from staying accepted forever?”
- “How do third-party risks feed into the same treatment workflow?”
Hangups that drive findings:
- Risk acceptance decisions made by people without authority
- “Transfer” decisions with no contractual or insurance evidence
- Remediation tracked, but no validation evidence of effectiveness
- Risks scored once and never re-evaluated after changes
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating the risk register as the end product
Fix: Require a treatment decision and evidence of action for any risk above a defined threshold. -
Mistake: No consistent definition of “acceptable”
Fix: Publish an approval matrix. If a risk is high, acceptance must go to a defined role (CISO/CCO/ERM committee), not a project manager. -
Mistake: Mixing vulnerabilities, issues, and risks without translation
Fix: Allow vulnerability queues to exist, but create a rule for when an issue becomes a “risk record” with treatment and residual risk sign-off. -
Mistake: “Compensating control” with no testable mechanism
Fix: Write compensating controls like operational controls: owner, frequency, evidence type, and failure handling. -
Mistake: Closing risks based on promises
Fix: Define closure criteria (“evidence required”) and do not close without validation artifacts.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so you should treat enforcement risk as indirect: weak risk mitigation drives control failures that can surface as incidents, audit findings, customer security escalations, contract breaches, or certification delays. Your practical goal is defensibility: a clear chain from identified risk to treatment decision to proof of outcome. 1
Practical 30/60/90-day execution plan
First 30 days (stabilize the workflow)
- Publish a one-page risk treatment standard: treatment options, required fields, and approval roles. 1
- Normalize the risk register fields and require an owner, treatment option, and next action for each material risk.
- Identify your highest-priority open risks and build a remediation queue tied to owners and acceptance criteria.
- Create a risk acceptance template and require documented approvals for existing accepted risks.
By 60 days (make it measurable and testable)
- Implement a validation step for “reduce” treatments (control re-test evidence).
- Stand up reporting: open high risks, overdue mitigations, accepted risks awaiting review, transferred risks with oversight evidence.
- Add an escalation path for overdue high-risk items (committee review, leadership visibility).
By 90 days (make it durable)
- Run a management review cycle where top risks are reviewed with status, blockers, and decisions.
- Perform a sample internal audit: pick several risks and verify the full packet exists (assessment link → decision → evidence → residual acceptance/closure).
- Integrate third-party risks into the same treatment workflow so material third parties have documented risk decisions and tracked mitigations.
Frequently Asked Questions
What does “acceptable level” mean in practice?
It means you defined a risk tolerance and can show who is authorized to accept residual risk at different severities. Auditors will expect acceptance to be explicit, documented, and tied to leadership accountability. 1
Can we accept risks instead of fixing them?
Yes, risk acceptance is an allowed treatment option, but it requires a documented rationale, defined scope, and approval by the right authority. You also need a mechanism to revisit acceptance when conditions change. 1
What’s the difference between “risk transfer” and “outsourcing”?
Outsourcing can be part of transfer, but transfer requires evidence that specific exposure is shifted through contract terms or insurance. You still retain oversight obligations and should track performance and issues. 1
How do we prove mitigation actually reduced risk?
Keep validation evidence tied to the control improvement, such as configuration exports, test results, access review outputs, or monitoring alerts showing the control is operating. Update residual risk scoring based on that evidence and document closure approval.
How should third-party risks be handled under this requirement?
Treat them like any other risk: record the risk, choose reduce/accept/transfer/avoid, and retain evidence (contract updates, remediation commitments, or termination decisions). Avoid letting third-party findings sit only in procurement notes.
What if engineering refuses the remediation timeline?
Escalate through the defined risk governance path and require a documented risk acceptance (temporary or scoped) if timelines slip. The goal is a recorded decision and an accountable owner, not silent slippage.
Footnotes
Frequently Asked Questions
What does “acceptable level” mean in practice?
It means you defined a risk tolerance and can show who is authorized to accept residual risk at different severities. Auditors will expect acceptance to be explicit, documented, and tied to leadership accountability. (Source: HITRUST CSF v11 Control Reference)
Can we accept risks instead of fixing them?
Yes, risk acceptance is an allowed treatment option, but it requires a documented rationale, defined scope, and approval by the right authority. You also need a mechanism to revisit acceptance when conditions change. (Source: HITRUST CSF v11 Control Reference)
What’s the difference between “risk transfer” and “outsourcing”?
Outsourcing can be part of transfer, but transfer requires evidence that specific exposure is shifted through contract terms or insurance. You still retain oversight obligations and should track performance and issues. (Source: HITRUST CSF v11 Control Reference)
How do we prove mitigation actually reduced risk?
Keep validation evidence tied to the control improvement, such as configuration exports, test results, access review outputs, or monitoring alerts showing the control is operating. Update residual risk scoring based on that evidence and document closure approval.
How should third-party risks be handled under this requirement?
Treat them like any other risk: record the risk, choose reduce/accept/transfer/avoid, and retain evidence (contract updates, remediation commitments, or termination decisions). Avoid letting third-party findings sit only in procurement notes.
What if engineering refuses the remediation timeline?
Escalate through the defined risk governance path and require a documented risk acceptance (temporary or scoped) if timelines slip. The goal is a recorded decision and an accountable owner, not silent slippage.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream