Addressing Security when Dealing with Customers

To meet the HITRUST “Addressing Security when Dealing with Customers” requirement, you must complete and document all identified security prerequisites before any customer receives access to your systems, data, or other assets, and you must contractually define security requirements, permitted access, and shared-data protection responsibilities. This is a pre-access gate plus enforceable customer agreement terms. 1

Key takeaways:

  • Treat customer access as a controlled onboarding process with security sign-offs before access is granted. 1
  • Put security obligations, allowed access, and data-handling responsibilities into customer agreements, not informal emails. 1
  • Keep evidence: approval records, access scoping, and executed contract language mapped to the customer’s access. 1

This requirement is easy to misunderstand because it sounds like “have security in place.” HITRUST CSF v11 05.j is narrower and more operational: before a customer touches your information or assets, you must (1) identify the security requirements for that access scenario, (2) address them, and (3) document customer-facing agreement terms that define security requirements, permitted access, and mutual responsibilities for protecting shared information. 1

For a Compliance Officer, CCO, or GRC lead, the fastest way to operationalize 05.j is to implement a “customer access security gate” that blocks provisioning until required checks are complete and an approved agreement package is executed. This gate should apply whether “customer access” means a named user logging into your SaaS, an API integration pulling data, an SFTP drop, a customer connecting into a hosted environment, or a customer receiving credentials to administer part of your platform. The exam focus is typically straightforward: show the gate exists, show it is used consistently, and show your agreements cover the required topics with enough specificity that security and access expectations are enforceable. 1

Regulatory text

HITRUST CSF v11 05.j states: “All identified security requirements shall be addressed before giving customers access to the organization's information or assets. Agreements with customers shall include security requirements, permitted access, and responsibilities for protecting shared information.” 1

Operator interpretation (what the auditor expects you to prove):

  1. You have a repeatable method to identify security requirements tied to a specific customer access request (not generic security aspirations). 1
  2. You complete those requirements before granting access (a real gating control, not “we fix it later”). 1
  3. Your customer agreements (MSA, DPA, terms, order form addendum, security exhibit) explicitly document:
    • Security requirements the customer must follow (and sometimes what you commit to). 1
    • Permitted access (who, how, to what, and for what purpose). 1
    • Responsibilities for protecting shared information (who encrypts, who restricts users, who reports incidents, etc.). 1

Plain-English meaning

If a customer will access your environment or information, you must treat that like a controlled onboarding event. You decide what security conditions must be true for that access scenario (for example: least-privilege roles exist, authentication is defined, tenant boundaries are configured, logging is enabled, secure transfer method is set, and a contract requires the customer to protect credentials). Then you complete and document those conditions before the first access happens. 1

This is not limited to “big enterprise customers.” One overlooked area is “free trials,” proof-of-concept environments, and customers who access support portals or file exchange sites. If they access organizational information or assets, 05.j applies. 1

Who it applies to (entity and operational context)

Applies to: All organizations that allow customers to access organizational information or assets. 1

Common operational contexts in scope:

  • SaaS platforms: customer users authenticate into your application and view/process data. 1
  • APIs and integrations: customer systems connect to your API endpoints and retrieve or submit data. 1
  • File transfer and data exchange: SFTP, managed file transfer, customer downloads, or shared storage. 1
  • Customer-admin access: customers manage configurations, roles, or workflows with privileged capabilities. 1
  • Customer access to your assets: lab/devices, hosted environments, managed infrastructure components, or support tools where access touches org assets. 1

Not the same as “vendor security.” This is about a third party in the role of customer gaining access to your environment or information, and your obligation to set conditions and document responsibilities. 1

What you actually need to do (step-by-step)

1) Define “customer access” and trigger points

Create a short standard that defines which events trigger the 05.j gate, such as:

  • New tenant provisioning
  • First user creation or SSO activation
  • API key issuance
  • Enabling data export/reporting
  • Creating customer admin roles
  • Standing up SFTP/file exchange
    This prevents “silent access” pathways that bypass compliance. 1

2) Build a security requirements checklist per access pattern

Make the checklist modular by access type (UI users, APIs, file transfer, privileged admin). Each module should include:

  • Permitted access definition: roles, scopes, environments, allowed IPs (if used), intended use. 1
  • Access controls: authentication method, MFA/SSO requirements where applicable, least privilege role mapping. 1
  • Segregation and tenant controls: separation boundaries (logical segregation, environment isolation) appropriate to your architecture. 1
  • Logging/monitoring: what events are logged for customer access and where logs go. 1
  • Data exchange safeguards: encryption expectations in transit, allowed transfer methods, key handling if relevant. 1
  • Support/admin channel controls: how customer requests are authenticated and how changes are approved. 1

Keep it practical: the checklist must be usable by Sales Ops/Customer Success/Provisioning, with Security as approver for exceptions. 1

3) Implement a “no agreement, no access” contract gate

Align Legal, Sales, and Security on an agreement package that reliably includes:

  • A security exhibit (or equivalent) with customer obligations (credential protection, authorized users, secure endpoint practices if relevant, incident notification expectations). 1
  • Clear permitted access language tied to the product and environment. 1
  • Shared responsibility boundaries for protecting shared information (what you do vs. what the customer must do). 1

Operationalize this by requiring the executed agreement (or approved click-through terms for lower-risk models) before provisioning can proceed. 1

4) Tie provisioning to documented security completion

Make a single workflow ticket the system of record (CRM-integrated or ITSM), capturing:

  • Checklist completion
  • Approvals
  • Exceptions with compensating controls
  • Date/time access was granted
    Auditors look for evidence that this is a true pre-access control, not a policy that people ignore. 1

5) Handle exceptions explicitly

Create an exception path for urgent business cases, but require:

  • Security risk acceptance by an authorized owner
  • Temporary controls and an expiration condition
  • A plan to close the gaps
    Untracked “just this once” access is a repeat finding pattern. 1

6) Keep the agreement and access scope aligned over time

This control often fails during change. Add a lightweight review trigger when:

  • The customer adds a new integration
  • Privileged roles are requested
  • Data types expand
  • A new environment is enabled
    You are re-validating that identified security requirements remain addressed for the changed access. 1

Practical tooling note (how teams keep this from becoming spreadsheet chaos)

Most teams struggle with scattered evidence: the agreement lives in a contract repository, access approvals live in tickets, and security requirements live in wikis. A platform like Daydream can help by turning 05.j into a single workflow: intake (what access is requested), required security checks, contract clause confirmation, and an evidence packet you can export for audits.

Required evidence and artifacts to retain

Retain artifacts that prove both the gate and the contract coverage:

Process and governance

  • Customer access onboarding procedure showing the pre-access gate. 1
  • Defined security requirements checklists per access pattern. 1
  • Exception/risk acceptance procedure and delegation of authority. 1

Per-customer evidence (sample-based retention is common in audits, but keep enough to show consistency)

  • Executed agreement(s) including security requirements, permitted access, and shared responsibility language. 1
  • Provisioning/access request ticket with approvals and completion timestamps. 1
  • Access scope documentation: role mappings, API scopes, enabled features tied to the customer. 1
  • Exception approvals and compensating controls, if any. 1

Common exam/audit questions and hangups

  • “Show me how you ensure security requirements are met before customer access is granted.” Expect to walk through one customer onboarding end-to-end. 1
  • “Where in the customer agreement are the security requirements and responsibilities defined?” Auditors often reject vague marketing security statements. 1
  • “How do you define permitted access?” They want scoping language plus operational reality (roles/scopes). 1
  • “How do you handle API keys, service accounts, and integrations?” These are common bypass paths. 1
  • “What happens if Sales wants to grant access before contracting is complete?” Your control either blocks it or documents a formal exception. 1

Frequent implementation mistakes (and how to avoid them)

  1. Mistake: Treating this as a pure contract requirement.
    Fix: Prove the operational gate exists and is enforced in provisioning. Contracts alone do not show “before giving customers access.” 1

  2. Mistake: One generic “Security Addendum” that never defines permitted access.
    Fix: Add a short permitted-access schedule tied to roles, integration methods, environments, and allowed data exchange routes. 1

  3. Mistake: Allowing “temporary” access during pilot phases with no documentation.
    Fix: Route pilots through the same gate, or use a defined pilot exception with explicit expiration and constraints. 1

  4. Mistake: Losing the evidence trail across systems.
    Fix: Make one workflow record the hub, and link out to the executed agreement and access artifacts. Daydream is a natural fit if you need auditable, cross-functional evidence assembly. 1

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement. Treat the risk as audit and assurance-driven: if you cannot prove pre-access security gating and clear contractual responsibilities, you will struggle to demonstrate control effectiveness under HITRUST assessments, and you increase the chance of customer-enabled security incidents (credential misuse, unauthorized access, data mishandling) where responsibility boundaries are unclear. 1

A practical 30/60/90-day execution plan

First 30 days (Immediate)

  • Inventory all ways customers get access today (UI, API, file transfer, admin roles, support portals). 1
  • Define trigger points that must not bypass the gate. 1
  • Draft the minimum checklist for each access pattern and identify approvers. 1
  • Review customer agreement templates and identify gaps for: security requirements, permitted access, and shared responsibilities. 1

By 60 days (Near-term)

  • Implement the workflow in your ticketing/CRM process so provisioning cannot complete without required fields and approvals. 1
  • Publish updated agreement language (security exhibit + permitted access schedule) and train Sales/Legal/Customer Success. 1
  • Run a sample retrospective on recently onboarded customers to confirm you can produce a clean evidence packet. 1

By 90 days (Stabilize and scale)

  • Add exception handling with risk acceptance and expiration tracking. 1
  • Add change triggers so material access expansions re-run the security requirements check. 1
  • Centralize evidence collection. If audits are frequent or customer onboarding is high volume, implement Daydream to standardize checklists, approvals, and evidence export. 1

Frequently Asked Questions

Does this apply to customers who only receive reports or exports, not logins?

Yes if the customer receives access to your information or assets through any mechanism, including data delivery methods you control. Address the relevant security requirements for that delivery method and document responsibilities in the agreement. 1

Can we satisfy “agreements” with click-through terms for small customers?

The requirement is that agreements include the required security, access, and responsibility terms. If your click-through terms and incorporated exhibits clearly include them and you can prove acceptance, it can work operationally. 1

What counts as “identified security requirements”?

Requirements you determine are necessary for the customer’s access scenario, based on your environment and the type of access requested (UI, API, file transfer, privileged access). The key is that you identify them consistently and show they are addressed before access is granted. 1

Sales wants to start a pilot before contracting finishes. What’s a defensible approach?

Use a formal exception path with security approval, constrained access scope, and an expiration condition. Record the rationale and compensating controls in the same workflow record as provisioning. 1

How detailed does “permitted access” need to be in the agreement?

Detailed enough that a reader can understand who can access what, by what method, and for what purpose, and detailed enough that you can enforce it operationally through roles/scopes. Put the fine-grained details in a schedule or exhibit if needed. 1

What evidence is most likely to fail an audit?

Missing proof of the “before access” gate, unsigned or unlocatable agreements, and access that was provisioned outside the documented process (API keys and “temporary” accounts are common culprits). 1

Footnotes

  1. HITRUST CSF v11 Control Reference

Frequently Asked Questions

Does this apply to customers who only receive reports or exports, not logins?

Yes if the customer receives access to your information or assets through any mechanism, including data delivery methods you control. Address the relevant security requirements for that delivery method and document responsibilities in the agreement. (Source: HITRUST CSF v11 Control Reference)

Can we satisfy “agreements” with click-through terms for small customers?

The requirement is that agreements include the required security, access, and responsibility terms. If your click-through terms and incorporated exhibits clearly include them and you can prove acceptance, it can work operationally. (Source: HITRUST CSF v11 Control Reference)

What counts as “identified security requirements”?

Requirements you determine are necessary for the customer’s access scenario, based on your environment and the type of access requested (UI, API, file transfer, privileged access). The key is that you identify them consistently and show they are addressed before access is granted. (Source: HITRUST CSF v11 Control Reference)

Sales wants to start a pilot before contracting finishes. What’s a defensible approach?

Use a formal exception path with security approval, constrained access scope, and an expiration condition. Record the rationale and compensating controls in the same workflow record as provisioning. (Source: HITRUST CSF v11 Control Reference)

How detailed does “permitted access” need to be in the agreement?

Detailed enough that a reader can understand who can access what, by what method, and for what purpose, and detailed enough that you can enforce it operationally through roles/scopes. Put the fine-grained details in a schedule or exhibit if needed. (Source: HITRUST CSF v11 Control Reference)

What evidence is most likely to fail an audit?

Missing proof of the “before access” gate, unsigned or unlocatable agreements, and access that was provisioned outside the documented process (API keys and “temporary” accounts are common culprits). (Source: HITRUST CSF v11 Control Reference)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
HITRUST CSF: Addressing Security when Dealing with Customers | Daydream