Framework

HIPAA Security Rule
risk analysis, safeguards, and audit evidence

Run HIPAA Security Rule risk analysis end-to-end. Map vulnerability findings to Administrative, Physical, and Technical Safeguards under 45 CFR Part 164 Subpart C, track remediation against documented timelines, and produce evidence packs that hold up under an OCR investigation or a HITECH audit.

No credit card required. Free plan available forever.

The HIPAA Security Rule in practice: from risk analysis to OCR-ready evidence

The Health Insurance Portability and Accountability Act of 1996 (HIPAA), as amended by the HITECH Act of 2009 and the 2013 Omnibus Rule, sits in 45 CFR Parts 160 and 164. The Privacy Rule (Subpart E of Part 164) governs the use and disclosure of protected health information, and the Security Rule (Subpart C of Part 164) governs the confidentiality, integrity, and availability of electronic protected health information. The Breach Notification Rule (Subpart D) governs the response when ePHI is compromised. Enforcement sits with the HHS Office for Civil Rights, with civil penalties tiered by culpability up to 1.5 million USD per violation category per year (figures published by HHS are subject to annual inflation adjustments) and criminal exposure under 42 USC 1320d-6 for knowing misuse.

Most Security Rule programmes do not fail because the controls are missing. They fail because the artefacts are scattered across drives, ticket queues, and screenshots, and the risk analysis is treated as an annual document rather than the cornerstone of a continuous programme. SecPortal is built for the cornerstone view: the risk analysis, the safeguards, the scanner output, the business associate register, the incident records, and the policy library all sit on linked records so the evidence pack reflects how the programme actually runs.

Who is in scope, and where the BAA chain takes you

Scope is defined by function, not size. A solo practitioner billing electronically is a covered entity in the same way a national health plan is. A cloud hosting provider that stores ePHI on behalf of a covered entity is a business associate, and any subcontractor that touches that ePHI is also a business associate by operation of the rule. The scope boundary is the data flow, and the data flow is wider than most internal teams expect once analytics tiers, secure messaging vendors, and offshore processing are mapped.

Covered entities

Health plans (group health plans, health insurance issuers, HMOs, Medicare and Medicaid programmes), health care clearinghouses, and health care providers who transmit any health information in electronic form in connection with a covered transaction. The HIPAA Privacy Rule (45 CFR Part 164 Subpart E) and Security Rule (Subpart C) apply directly to covered entities, regardless of size or specialty.

Business associates

A person or entity that performs functions or activities on behalf of, or provides services to, a covered entity that involves access to protected health information. The HITECH Act of 2009 and the 2013 Omnibus Rule made business associates directly liable for Security Rule compliance. Business associate agreements (BAAs) are mandatory under 164.308(b) and 164.314(a) and must include the elements specified in 164.504(e).

Subcontractors of business associates

Any subcontractor that creates, receives, maintains, or transmits protected health information on behalf of a business associate is itself a business associate, and is bound by the Security Rule and the BAA chain. Maintain a register of every entity in the data flow, including the BAA on file, the categories of ePHI accessed, and the security attestations gathered during due diligence.

Hybrid entities and affiliated covered entities

Organisations performing both covered and non-covered functions can designate hybrid entity status under 164.105, isolating the health care component for HIPAA purposes. Affiliated covered entities under common ownership or control may designate themselves as a single covered entity. Both designations have to be documented and reviewed periodically; the documentation belongs in the same evidence pack as the risk analysis.

Required versus addressable: a frequently misread distinction

Each Security Rule standard has implementation specifications labelled either required or addressable. The labels carry specific obligations under 164.306(d) and they are tested in every OCR investigation that follows a breach. Treating addressable as optional is one of the most common reasons a programme that looks reasonable on paper fails an audit.

  • Required implementation specifications must be implemented as written. There is no documented work-around: the safeguard either exists, is in place, and is evidenced, or it is a finding.
  • Addressable specifications give the covered entity a reasoned choice: implement the specification, implement an equivalent alternative measure that meets the standard, or document why neither is reasonable and appropriate. Addressable does not mean optional; the documentation requirement is the heart of the assessment.
  • For every addressable specification, document the assessment, the chosen path, the rationale tied to the entity size, complexity, technical infrastructure, security capabilities, costs, and the probability and criticality of risks to ePHI.
  • Reviewers (including OCR investigators) routinely test addressable decisions. Vague or missing rationale is itself a finding even when the underlying control is in place.

Section 164.308(a)(1)(ii)(A): the risk analysis as the cornerstone

Every Security Rule programme starts with the risk analysis, because every other safeguard is selected and tailored against it. The Office for Civil Rights and NIST SP 800-66 Rev. 2 agree on the basic shape of the work, even though the rule itself is technology-neutral. Run the analysis as a structured workflow rather than a document, refresh it on a cadence and on material change, and link every finding back to the analysis entry it came from.

Define the ePHI scope and asset inventory

List every system, application, device, and storage location where electronic protected health information is created, received, maintained, or transmitted. Include EHRs, billing systems, scheduling, secure messaging, telehealth platforms, imaging archives, backup repositories, mobile devices, removable media, cloud services, and any analytics or reporting tier that touches ePHI. The inventory drives the rest of the analysis; gaps here are the most common root cause of a deficient risk analysis finding.

Identify threats and vulnerabilities

Enumerate reasonably anticipated threats per asset (insider misuse, ransomware, lost or stolen devices, unauthorised disclosure, environmental hazards, vendor compromise) and pair them with the vulnerabilities that make them exploitable (unpatched systems, weak authentication, missing encryption, gaps in access control, untested backups). The OCR Audit Protocol and the NIST SP 800-66 Rev. 2 guidance both emphasise this pairing as the basis for the risk determination.

Assess current security measures

Document the controls already in place against each threat and vulnerability. Pull configuration evidence from authenticated scans, control evidence from policies and SOPs, and operational evidence from logs and tickets. The gap between the standards in 164.308, 164.310, and 164.312 and the evidenced controls is the source of risk-treatment decisions.

Determine likelihood, impact, and risk level

Apply a documented methodology (qualitative or semi-quantitative) consistently across the inventory. Likelihood factors include threat frequency, attacker capability, control coverage, and exposure. Impact factors include the volume and sensitivity of ePHI affected, regulatory exposure, operational disruption, patient safety, and reputational harm. The risk level (often a Low/Moderate/High band) ties each item to a treatment decision.

Document risk treatment and residual risk

Treat each risk to a reasonable and appropriate level: mitigate, transfer (where contractually possible), avoid, or accept with documented rationale. Capture the safeguard chosen, the implementation owner, the target date, the evidence reference, and the residual risk acceptance signed off by senior management. The Office for Civil Rights expects the trail from finding to treatment to evidence to be navigable end-to-end.

Maintain and update continuously

Risk analysis is a continuing obligation under 164.308(a)(1)(ii)(A). Refresh after every material change (new system, new vendor, significant incident, regulatory update) and at minimum annually. Documentation must be retained for six years from creation or last effective date under 164.316(b)(2)(i).

For the operational side of risk analysis, the cybersecurity risk assessment guide and the security risk assessment template cover the methodology, asset inventory, and threat catalogue used in the workflow above. The vulnerability prioritisation framework keeps the risk register from drifting once the volume of findings climbs.

164.312 Technical Safeguards: where scanner output becomes evidence

Technical Safeguards are where the assessment generates the most volume, and where authenticated and external scan output becomes direct evidence rather than supporting material. The trick is to keep the link from the scan output to the safeguard tight, so the reviewer does not have to guess which scan report supports which control determination.

164.312(a) Access Control

Unique user identification (required), emergency access procedure (required), automatic logoff (addressable), and encryption and decryption (addressable). Authenticated scan results are direct evidence for unique IDs and automatic logoff; encryption posture sits with configuration baselines and key management records. Findings against access control map cleanly here, with linkage to the user account, the asset, and the policy.

164.312(b) Audit Controls

Hardware, software, and procedural mechanisms that record and examine activity in information systems containing or using ePHI. The standard is purposely technology-neutral; the evidence set is the audit logging coverage matrix per ePHI system, the monitoring and review procedure, and the records of those reviews. Gaps in coverage or review cadence are common findings under OCR investigations following a breach.

164.312(c) Integrity

Protect ePHI from improper alteration or destruction, with mechanism(s) to corroborate that ePHI has not been altered or destroyed in an unauthorised manner (addressable). Integrity controls include hashing, digital signatures, file integrity monitoring, database constraints, and immutable backups. Capture the implementation per ePHI store and align it with the change management and backup evidence.

164.312(d) Person or Entity Authentication

Verify that a person or entity seeking access to ePHI is the one claimed. Multi-factor authentication is widely treated as the reasonable and appropriate baseline for ePHI access by remote, privileged, or external users. Document the authentication methods per system, exceptions, and the rationale for any addressable choice that does not include MFA.

164.312(e) Transmission Security

Integrity controls (addressable) and encryption (addressable) for ePHI in transit. The HHS Guidance on Securing Electronic Protected Health Information names AES with a recognised symmetric key length and TLS configurations consistent with NIST SP 800-52 as appropriate. SSL/TLS scan output, header analysis, and configuration baselines feed this safeguard with hard evidence.

The authenticated scanning capability and the external scanning capability feed Technical Safeguards evidence on a documented cadence, and the continuous monitoring capability keeps the trend visible between formal assessments. For the methodology behind authenticated tests in particular, the authenticated versus unauthenticated scanning guide explains why the two are not interchangeable for HIPAA evidence.

164.310 Physical Safeguards: walk-throughs that produce evidence

Physical Safeguards run on a different cadence from the technical assessment, but the evidence shape is the same: documented standards, evidenced controls, dated artefacts, and traceable remediation. The walk-through is the most common evidence-gathering exercise.

  • 164.310(a) Facility Access Controls including contingency operations, facility security plan, access control and validation procedures, and maintenance records
  • 164.310(b) Workstation Use, with policies and procedures specifying the proper functions, manner of performance, and physical attributes of the surroundings of workstations that access ePHI
  • 164.310(c) Workstation Security, implementing physical safeguards for workstations to restrict access to authorised users
  • 164.310(d) Device and Media Controls, including disposal, media re-use, accountability, and data backup and storage for hardware and electronic media that contain ePHI
  • Walk-through evidence: dated photos or attestations of door controls, badge logs sampled to a date range, secure disposal certificates of destruction for media, and the asset inventory cross-referenced to the physical location

164.400-414 Breach Notification: the four-factor risk assessment

The Breach Notification Rule applies whenever there is an acquisition, access, use, or disclosure of unsecured protected health information in a manner not permitted by the Privacy Rule. The four-factor risk assessment in 164.402 decides whether the incident is notifiable. The notification clock starts at discovery, not at confirmation, and OCR has consistently treated the absence of a documented breach risk assessment as itself a violation, separate from any underlying control gap.

  • Discover the incident: log the date and time of discovery, the systems affected, the ePHI involved, and the initial classification (suspected breach, confirmed breach, or no breach pending assessment)
  • Run the four-factor risk assessment under 164.402: nature and extent of ePHI involved, the unauthorised person who used or received it, whether ePHI was actually acquired or viewed, and the extent to which the risk to ePHI has been mitigated
  • Determine notification posture: a low probability of compromise determination requires documented rationale; otherwise the incident is a breach and triggers the notification clock
  • Notify affected individuals without unreasonable delay and no later than 60 calendar days from discovery (164.404), HHS via the OCR breach portal (164.408), and prominent media for breaches affecting 500+ residents of a state or jurisdiction (164.406)
  • Maintain documentation of every breach risk assessment, the notification content, distribution lists, postage or send records, and any law enforcement delay justifications, all retained for at least six years
  • Annual roll-up: breaches affecting fewer than 500 individuals are reported to HHS no later than 60 days after the end of the calendar year per 164.408(c)

For the operational shape of incident response under HIPAA timelines, the incident response workflow keeps triage, containment, eradication, recovery, and the breach notification trail on the same record. The incident response plan guide covers the runbook structure, and the enterprise incident response guide extends it to multi-system and multi-region programmes.

Business associate management: the BAA register is the artefact, not the contract alone

The HITECH Act made business associates directly liable for Security Rule compliance, and the 2013 Omnibus Rule extended liability through the subcontractor chain. The covered entity still owns the data flow, and the BAA register is what shows the chain holds. A signed BAA is the floor; the rest of the artefact is due diligence, periodic reassessment, and the incident notification trail.

  • Maintain a business associate register: legal name, services provided, ePHI categories accessed, BAA on file (date, version, parties), data flow direction, sub-contractor chain, and risk tier
  • Run proportionate due diligence: SOC 2 Type II report, HITRUST CSF certification (e1, i1, or r2), ISO 27001 certificate, penetration test summary, or a completed security questionnaire mapped back to 164.308, 164.310, and 164.312 standards
  • Track remediation of vendor-side findings against the BAA SLAs and the risk register entry, including incident notification timelines specified in 164.314(a)(2)
  • Capture sub-contractor flow-down: the BAA must require business associates to ensure their subcontractors agree in writing to the same restrictions and conditions
  • Reassess on cadence and on event: at minimum annually, and after material change to services or after a notable incident

For the structured side of vendor risk, the third-party vendor risk assessment guide covers the due diligence cadence, the scoring model, and the inheritance evidence used in most BAA programmes. Where the BAA counterparty asks for third-party validated assurance rather than a self-attestation, the HITRUST CSF framework page covers the e1, i1, and r2 assessment options, the MyCSF submission, and the mapping back to the HIPAA Security Rule standards.

Penetration testing for HIPAA: not literally required, but expected in practice

The Security Rule does not literally require penetration testing. It requires reasonable and appropriate safeguards based on the risk analysis, periodic technical and non-technical evaluation under 164.308(a)(8), and security testing as part of evaluation. In practice, OCR settlements, NIST SP 800-66 Rev. 2 guidance, and BAA counterparty expectations have made penetration testing the de-facto baseline for ePHI-bearing systems above a low sensitivity threshold. Document the test scope, methodology (PTES, NIST SP 800-115, OWASP WSTG), findings with CVSS 3.1 severities, remediation status, and the re-test result, and link the result to the relevant 164.308 and 164.312 standards.

The penetration testing workflow and the penetration testing methodology guide cover the structure used in HIPAA-aligned engagements, and the web application penetration testing checklist is the most common starting point for patient portals and telehealth platforms. For complex or multi-tier estates, the API security testing checklist extends the same workflow to FHIR APIs and integration tiers.

Workforce training, sanction policy, and the administrative trail

Section 164.308(a)(5) requires a security awareness and training programme that covers security reminders, malicious software protection, log-in monitoring, and password management. Section 164.308(a)(1)(ii)(C) requires a workforce sanction policy and the records of its application. These are tested in nearly every OCR investigation that follows a breach, and the absence of records is treated as the absence of the programme. Capture training assignments, completions, and refresher cadence per role, and keep the sanction records linked to the underlying incident or violation entry.

HIPAA next to ISO 27001, SOC 2, and NIST 800-53

Healthcare organisations rarely run a single-framework programme. Larger covered entities and most business associates carry an ISO 27001 ISMS or a SOC 2 attestation alongside HIPAA, and federal-leaning environments add NIST 800-53 and the NIST Cybersecurity Framework. Mapping the underlying controls once, then projecting the evidence into each framework, is the only way to keep the artefact pack manageable. SecPortal's compliance tracking is built around exactly that mapping pattern, with HIPAA Security Rule standards, ISO Annex A, SOC 2 TSC, NIST 800-53 control families, and PCI DSS requirements sharing the same underlying findings. Healthcare entities processing personal data of EU or UK residents also need to align with GDPR Article 32 security obligations and the 72-hour breach notification clock under Article 33, which sits alongside the HIPAA breach notification timelines rather than replacing them.

OCR audit traps that catch otherwise-mature programmes

Recurring OCR enforcement actions and the published Resolution Agreements show a fairly consistent set of failure patterns. None of them are subtle once the evidence pack is examined; they are the gaps a structured workflow closes by construction.

  • Risk analysis covers only the EHR and treats the rest of the ePHI inventory as out of scope: OCR repeatedly cites this as a top deficiency
  • Addressable specifications marked compliant without documented rationale: addressable does not mean optional, and the documentation gap is the finding
  • No business associate inventory or expired BAAs: the data flow is wider than the BAA register, and the sub-contractor flow-down is missing
  • Encryption posture undocumented: ePHI at rest and in transit needs an explicit determination, even where the choice is to implement an alternative measure
  • Workforce training records absent or stale: 164.308(a)(5) requires a security awareness and training programme, and the records are routinely tested
  • Sanction policy not enforced: 164.308(a)(1)(ii)(C) requires a workforce sanction policy, and the absence of records under it weakens the entire administrative safeguards posture
  • Incident response without breach risk assessment trail: every potentially-reportable incident needs the four-factor assessment in writing, even where the determination is no breach

Evidence pack the OCR investigator (and your board) actually want

Build the evidence pack as the work happens, retain raw scanner output and test reports alongside the summary, and tie every artefact back to a Security Rule standard, an asset, and an owner. The 164.316(b)(2) six-year retention obligation makes the storage and retrieval pattern itself part of the programme.

  • Risk analysis report with scope, methodology, threats, vulnerabilities, likelihood, impact, risk level, and treatment per ePHI asset, with the version date and the authorising signature
  • Risk management plan tying every risk to a safeguard, an owner, a target date, and the evidence reference
  • Policies and procedures library aligned to 164.316: written, reviewed annually, version-controlled, with the workforce training records linked
  • Authenticated and external scan output retained per scan window, mapped to 164.312 technical safeguards
  • Penetration test report with scope, methodology, findings (CVSS-scored), remediation status, and the re-test result
  • Business associate register with BAA versions, due diligence artefacts, and incident history per vendor
  • Security incident response plan, runbooks, tabletop exercise records, and the breach notification log
  • Six-year retention store for all documentation per 164.316(b)(2), with retrieval procedures the OCR investigator can verify

Where SecPortal fits in the HIPAA Security Rule workflow

SecPortal is the operating layer for the HIPAA Security Rule programme, not a replacement for legal counsel, the privacy officer, or the security officer. The platform handles scope, scans, findings, control mapping, business associate records, incident timelines, and the assessor-ready output, so the work runs as a structured workflow rather than a long email thread. Compliance tracking covers HIPAA alongside the other frameworks the same entity has to satisfy.

  • Compliance tracking that maps every finding to HIPAA Security Rule standards (164.308, 164.310, 164.312, 164.314, 164.316) alongside ISO 27001 Annex A, SOC 2 Trust Services Criteria, NIST SP 800-53 control families, and PCI DSS requirements for entities operating under multiple regimes
  • Engagement management for HIPAA Security Risk Analysis (SRA), HIPAA penetration tests, vulnerability assessments, and BAA-driven vendor reviews, with scope, status, evidence, and re-test on the same record
  • Findings management with CVSS 3.1 scoring, 300+ templates, and Nessus or Burp Suite imports so existing tooling feeds the same risk analysis without rekeying
  • 17-module authenticated scanning that produces direct evidence for 164.312(a) access control, 164.312(b) audit controls, 164.312(c) integrity, and 164.312(d) authentication
  • 16-module external scanning and attack surface management for the patient-facing perimeter, telehealth endpoints, and patient portals where ePHI exposure is most consequential
  • Continuous monitoring with scheduled scans (daily, weekly, monthly) so the OCR investigator and the internal compliance owner see active management rather than a snapshot
  • AI report generation that turns the risk analysis, control assessment, and remediation status into board, OCR, and BAA-counterparty narratives without manual rewriting

HIPAA is a programme, not a project. The first cycle confirms the ePHI inventory, completes the risk analysis, closes the addressable rationale gaps, and stands up the BAA register; the second cycle tightens the safeguards, deepens the testing programme, and integrates the evidence pack with the everyday operating cadence. Running the work as a managed workflow pays off most over time, because historical findings, classified incidents, business associate records, and remediation timelines stay linked across years, so each OCR engagement, BAA refresh, or executive review is a refresh rather than a rebuild. For consultants delivering HIPAA Security Risk Analyses to multiple covered entities and business associates, the security consultants workspace bundles the workflow with branded client portals and AI report generation, so the deliverable looks as polished as the work behind it.

For the trend evidence between formal assessments, the continuous monitoring capability produces the cadence and coverage record HIPAA testing programmes are expected to keep, and the compliance tracking capability keeps the safeguard map current as new ePHI systems and business associates enter scope.

If you run a penetration testing firm whose client book is concentrated in healthcare, the SecPortal for healthcare penetration testing firms page covers the HIPAA-aligned engagement record, finding-to-safeguard tagging, and the branded portal pattern that covered entities and business associates expect for the deliverable.

Key control areas

SecPortal helps you track and manage compliance across these domains.

Administrative Safeguards (164.308)

Track the security management process, assigned security responsibility, workforce security, information access management, security awareness and training, security incident procedures, contingency plan, evaluation, and business associate contracts. Section 164.308(a)(1)(ii)(A) makes the risk analysis the cornerstone of the entire programme; document scope, methodology, threats, vulnerabilities, likelihood, impact, and residual risk decisions per ePHI system and link every finding back to the analysis it came from.

Physical Safeguards (164.310)

Capture facility access controls, workstation use, workstation security, and device and media controls including disposal, re-use, and accountability. Run walk-throughs against the standards in 164.310, log gaps as findings, and tie each gap to a remediation owner and target date so the pack reflects active management rather than a static checklist.

Technical Safeguards (164.312)

Map findings to access control, audit controls, integrity, person or entity authentication, and transmission security. Authenticated and external scan output is direct evidence for 164.312(a) access control, 164.312(b) audit controls, 164.312(c) integrity, 164.312(d) authentication, and 164.312(e) transmission security; retain the raw scan output alongside the control determination.

Organisational, Policies, and Documentation (164.314, 164.316)

Track business associate agreements, group health plan requirements, written policies and procedures, documentation, time limits, availability, and updates. Keep policy review cycles, version history, and annual updates linked to the risk analysis and the workforce training records so the documentation hierarchy is verifiable end-to-end.

Breach Notification Rule (164.400-414)

Run incident triage against the four-factor breach risk assessment, capture notification timelines (without unreasonable delay and no later than 60 calendar days for affected individuals, with media and HHS notifications based on impact), and document the rationale for any low-probability-of-compromise determination. The HHS Wall of Shame includes any breach affecting 500+ individuals, so evidence quality matters.

Risk Analysis and Risk Management (164.308(a)(1))

Risk analysis is required and continuous, not a one-off project. Maintain an ePHI inventory, threat catalogue, vulnerability list, current control posture, and risk register; update after material changes (new system, new vendor, significant incident) and at least annually. Reasonable and appropriate risk management treats every identified risk to a documented level, with evidence retained for at least six years per 164.316(b)(2).

Run a defensible HIPAA Security Rule programme

Risk analysis, safeguard mapping, scanner evidence, and remediation tracking in one workflow. Start your free trial.

No credit card required. Free plan available forever.