Blog

  • HIPAA Security Risk Assessment – What you Need to Know

    HIPAA Security Risk Assessment – What you Need to Know

    If your business operates in healthcare, or even supports the industry indirectly, you may be required to meet the HIPAA Security Risk standards outlined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA).

    Enforced by the U.S. Department of Health and Human Services (HHS), HIPAA is designed to protect the sensitive health data processed, stored, or transmitted across healthcare systems.

    A critical part of HIPAA compliance is conducting a HIPAA security risk assessment, which helps identify vulnerabilities and ensure that electronic protected health information (ePHI) remains secure. Read on to learn exactly what this assessment involves and how to comply in 2025 and beyond.

    How to Conduct a HIPAA Security Risk Analysis

    The risk assessment protocols are among the most stringent and challenging elements of HIPAA compliance, especially for smaller businesses newer to the framework. Beyond controlling access to sensitive data, companies also need to scan for and mitigate all threats.

    This blog will break down everything you need to know about HIPAA risk analysis, including:

    • The general requirements of the Security Rule, of which risk analysis is a part
    • The specific definitions, protocol, and provided tools for a HIPAA security risk analysis
    • The remaining rules that need to be followed for full HIPAA compliance

    By the end of this blog, you’ll have all the knowledge and resources necessary to implement the Security Rule and all of HIPAA to the fullest. But first, let’s cover whether it even applies to you.


    Do You Need to Conduct a HIPAA Risk Analysis?

    It’s easy to assume that a regulatory framework like HIPAA applies to only a select few kinds of business, such as doctors’ private practices and hospitals.

    However, the list of covered entities to which HIPAA applies includes all providers, including private practices, group care facilities, and even pharmacies of all types.

    It also extends to administrators of healthcare plans and what the HHS calls “health clearinghouses,” which translate health data into or out of standard forms.

    Even if you’re just a vendor or contractor for one of these entities, HIPAA may still apply to you. In 2009, the Health Information Technology for Economic and Clinical Health Act (HITECH) was passed, extending HIPAA protections to business associates of covered entities.

    Now, there are special contracts for business associates that guarantee that all parties in the relationship help uphold compliance.

    Security

    Understanding the HIPAA Security Rule

    To fully understand the HIPAA risk assessment requirements, you’ll need to grasp the Security Rule, which contains risk analysis. The Security Rule itself builds upon the Privacy Rule, which we’ll detail below.

    Its primary function is to extend the protections for all medical and financial records of clients beyond access and disclosure to all reasonable vectors of misuse. It intensifies and expands the scope of all HIPAA protections for this class of data.

    This information, defined in the Privacy Rule as “protected health information” (PHI), is what all HIPAA rules and protocols strive to protect.

    Another major impact of HITECH is the extension of Privacy and Security Rule protections to all electronic PHI (ePHI), beyond just hard copies of files. To that effect, the Security Rule general requirements, safeguards, and risk analysis protocols all apply unilaterally to all PHI and ePHI. Let’s take a closer look at them.

    HIPAA Security Rule General Requirements

    The HIPAA security risk assessment protocols fit squarely into the “general rules,” or sub-rules, of HIPAA Security. And, per the HHS’s Security Rule Summary, these break down as follows:

    • Ensure the confidentiality, integrity, and availability of all PHI and ePHI that covered entities or business associates create, store, transmit, process, or otherwise contact.
    • Identify and protect against all reasonably anticipated threats to the security of PHI, instances in which its confidentiality, integrity, or availability would be compromised.
    • Identify and protect against all reasonably anticipated threats to the privacy of PHI, defined in the Privacy Rule (see below) as any impermissible uses or disclosures.
    • Ensure full compliance with Privacy and Security Rules across the entire workforce.

    HIPAA security assessment refers to the second and third of these sub-rules, as it is the primary way in which “reasonably anticipated threats” are identified and prevented.

    HIPAA Security Rule Required Safeguards

    The other primary controls dictated by the Security Rule, besides the risk assessment protocols, are the categories of safeguards. Per the Security Rule Summary, these break down as follows:

    • Administrative safeguards – Five top-level managerial controls for governance:
        • Establish security management processes to optimize risk mitigation
        • Designate security personnel to oversee security procedures/practices
        • Control information access management to monitor and restrict access
        • Implement workforce training management to ensure staff awareness
        • Evaluate the workforce’s security awareness and practices regularly
    • Physical safeguards – Two more tactile controls restricting physical PHI access: 
        • Control entrance to and access within all facilities containing PHI
        • Monitor proximity of all workstations and devices containing PHI
    • Technical safeguards – Four advanced controls focusing on technology and software: 
      • Implement access controls to prevent improper use and disclosure of PHI
      • Establish regular audit protocols to gauge HIPAA compliance periodically
      • Monitor for the integrity of PHI, ensuring it is not altered or deleted
      • Engage in transmission security to guard PHI in transit over networks

    These controls set the stage for HIPAA security assessment by reducing the overall potential for risks or vulnerabilities while establishing how the system is supposed to function at a baseline.

    Implementing HIPAA Security Risk Analysis

    As noted above, security risk analysis or assessment is another critical part of the Security Rule more broadly. Per the Security Rule Summary, its primary objectives are straightforward:

    • Evaluating likelihood and potential impact of all threats that could impact PHI
    • Implementing appropriate measures to mitigate and eliminate threats to PHI
    • Documenting the measures chosen for risk mitigation, along with the rationale
    • Maintaining full continuity of all safeguards before, during, and after resolution

    The HHS has collaborated with other security experts to develop tools and resources facilitating HIPAA compliant risk assessment. One example is the NIST Security Toolkit, with the National Institute for Standards and Technology (NIST). Another is the Security Risk Assessment Tool (SRA), from The Office of the National Coordinator for Health Information Technology (ONC) and the HHS Office for Civil Rights (OCR). Let’s take a look at what these tools can facilitate.

    Vulnerabilities, Threats, and Risks, Per HIPAA

    Another critical resource devoted to HIPAA risk assessment is the HHS’s own guidance on risk analysis, which synthesizes and simplifies the specifications from the HIPAA base text and NIST resources. The most essential components to understand are definitions for objects of analysis:

    • Vulnerability – Adapted from NIST Special Publication 800-30, vulnerabilities for HIPAA purposes are defined as all flaws within system architecture that can be exploited, either intentionally or accidentally, resulting in a breach of Privacy or Security Rule requirements.
    • Threat – Again adapted from SP 800-30, threats for HIPAA purposes are defined as the potential for natural, human, or environmental to exploit or trigger a given vulnerability.
    • Risk – Once more adapted from SP 800-30, a risk for HIPAA purposes is defined as a relationship between a threat and vulnerability that determines likelihood and impact.

    Vulnerabilities and threats are variables in and of themselves, whereas risk measures the dynamic relationship between them and other factors. Accounting for all three indicators of a breach, companies should take heed and code each separately to address it accordingly.

    Seven Steps for HIPAA Security Risk Analysis

    The HHS does not require any particular methodology to assess risk, but it provides an easily adaptable template. Per the risk assessment guidance, its steps break down as follows:

    • Collection of relevant data – The covered entity begins by amassing data on all PHI stored, used, transmitted, processed, and otherwise in contact with company resources.
    • Identification of vulnerabilities – Next, the covered entity should identify all potential weaknesses at the sites of PHI, including vectors for accidental and malicious misuse.
    • Assessment of security measures – Then, companies should identify and analyze the methods being used to mitigate and minimize all these and all potential vulnerabilities.
    • Determination of threat likelihood – In the first determination stage, the covered entity should establish a probability scale and assign relative ratings to all possible threats.
    • Determination of threat impact – In the second determination stage, the covered entity should also assign a corresponding scale for the severity of threats, once activated.
    • Determination of risk level – Based on the findings in the prior two conclusions, the covered entity can assign a risk rating (likelihood and impact) to all vulnerabilities and threats.
    • Final documentation – Finally, the covered entity must produce a report on its findings. The HHS doesn’t prescribe a specific format, but HIPAA requires a detailed report.

    While the last step above suggests closure, the HHS is also careful to note that risk assessment should continue. Rather than closing the loop after one sweep, companies should periodically review assessments and update findings with new threats, vulnerabilities, and risks.

    Following the Rest of the HIPAA Framework

    As comprehensive as the protocols for HIPAA risk analysis and the broader Security Rule are, there is still more companies need to do to maintain full compliance.

    To avoid the penalties that the Enforcement Rule specifies, companies also need to abide by the Privacy Rule, as noted above, and the Breach Notification Rule. Before taking a look at those, it can be helpful to appreciate what the costs of non-compliance are and how the enforcement process works.

    Overall, HIPAA Enforcement begins with an intake and review by the OCR. If violations of the Privacy or Security Rules (or failure to report on them) includes criminal activity, HHS may involve the US Department of Justice (DOJ).

    After a thorough investigation, HHS OCR may assess civil money penalties of up to $59 thousand dollars per occurrence (about $1.7 million dollars max, per year). The DOJ may bring criminal charges up to 10 years’ imprisonment.

    HIPAA Privacy Rule: Overview and Requirements

    The Privacy Rule is the original basis for all of HIPAA. Its definition of PHI determines Security protections, including the risk analysis protocols detailed above. Per the Privacy Rule Summary, its primary focuses are on restricting use and disclosure of PHI, per the following parameters:

    • Permitted uses and disclosures – Covered entities may only use or disclose PHI in one of the following cases unless requested by the subject thereof of or legally required:
        • When the use is by, or the disclosure is to the subject of the PHI.
        • For operations directly related to treatment, payment, and healthcare.
        • When the subject is given a reasonable opportunity to object or consent.
        • When one given instance of use is incidental to other (permitted) uses.
        • When the use or disclosure is for a public benefit project or public interest.
        • When the use or disclosure is of a limited data set for approved research.
    • Minimum necessary disclosure – Covered entities must also limit even authorized uses and disclosures to the minimum necessary extent except in the case of required uses.

    Certain use or disclosure cases are required rather than just permitted. These include disclosure to the subjects and to select government agencies.

    HIPAA Breach Notification Rule: Requirements

    Finally, the Breach Notification Rule differs from both the Privacy and Security Rules in that it does not factor in any controls to prevent attacks or leaks from happening. Instead, it specifies special protocols for reporting on breaches when they do occur. A breach is defined as any instance in which the Privacy or Security Rule has been broken and PHI is exposed to (possible) misuse.

    Should that breakage occur, there are several levels of breach reporting a covered entity must set in motion. Firstly, companies need to address all stakeholders impacted by the breach in question no later than 60 days after the breach’s discovery.

    If the violation affects 500 or more people within a given location, notice must be provided to media outlets within the area. Finally, all breaches must also be reported to the HHS Secretary immediately if they impact 500 or more people or within 60 days of the end of the calendar year for breaches that affected fewer.

    Professional HIPAA Compliance and Security

    Implementing all required elements of the Privacy, Security, and Breach Notification Rules to avoid the penalties of non-compliance can be challenging for all companies.

    The HIPAA risk assessment requirements, in particular, can be especially burdensome for smaller companies with fewer dedicated IT and cybersecurity resources. RSI Security is happy to help with robust HIPAA compliance advisory services. To see just how easy HIPAA can be, get in touch today!

    Protect your organization from costly HIPAA violations, download our   HIPAA Checklist today to ensure you’re fully compliant

    Download Our HIPAA Checklist



  • HIPAA Compliance Checklist: What You Need to Know

    HIPAA Compliance Checklist: What You Need to Know

    From major hospitals to solo practitioners, nearly every organization in the healthcare industry, or anyone handling protected health information (PHI), must comply with the Health Insurance Portability and Accountability Act (HIPAA). This federal law establishes national standards for the privacy and security of patient data. Violations can result in significant penalties, both financial and reputational. However, achieving and maintaining HIPAA compliance is often overwhelming. The HIPAA Privacy and Security Rules are complex, lengthy, and frequently updated, leaving many covered entities unsure of how to begin. Even when requirements are understood, building a complete, actionable HIPAA compliance checklist can be a daunting task.

    To reduce risk and avoid costly non-compliance, both covered entities and business associates should proactively implement clear compliance strategies and safeguard patient data from the start. (more…)

  • Conducting a Thorough HIPAA Data Breach Analysis: A Step-by-Step Guide

    Conducting a Thorough HIPAA Data Breach Analysis: A Step-by-Step Guide

    The Health Insurance Portability and Accountability Act (HIPAA) mandates strict standards to protect the privacy and security of patients’ health information. A critical aspect of maintaining HIPAA compliance is conducting a thorough data breach analysis.

    This process involves identifying, documenting, and mitigating breaches of protected health information (PHI). Here’s a step-by-step guide on how to conduct an effective HIPAA data breach analysis. (more…)

  • What Is the Role of a C3PAO in CMMC 2.0 Compliance?

    What Is the Role of a C3PAO in CMMC 2.0 Compliance?

    Understanding the role of a Certified Third-Party Assessment Organization (C3PAO) is essential for achieving CMMC 2.0 compliance. As part of the Department of Defense (DoD) framework, C3PAOs are authorized to assess whether organizations meet the security requirements needed to protect Controlled Unclassified Information (CUI).

    In this guide, we’ll break down what a C3PAO does, why their role is critical, and how they support your journey to CMMC 2.0 compliance. By the end, you’ll have a clear understanding of how working with a C3PAO helps your organization achieve and maintain certification. (more…)

  • Weekly Threat Report: CMMC Risks, HIPAA Reporting Deadlines, AI Compliance Challenges, and PCI DSS 4.0 Changes

    Weekly Threat Report: CMMC Risks, HIPAA Reporting Deadlines, AI Compliance Challenges, and PCI DSS 4.0 Changes

    Cybersecurity compliance continues to evolve as governments, regulators, and industry frameworks adapt to a rapidly changing threat landscape. Over the past week, several developments across defense contracting, healthcare, AI governance, and payment security have highlighted the growing importance of proactive cybersecurity and compliance programs.

    (more…)

  • Common Examples of Protected Health Information Under HIPAA

    Common Examples of Protected Health Information Under HIPAA

    If your organization needs to comply with HIPAA, you’ll need to safeguard protected health information (PHI) and keep an eye out for:

    • Identifiable records related to patients’ health conditions
    • Identifiable records related to the provision of healthcare services
    • Identifiable records related to payments for healthcare provided
    • Methods for de-identifying PHI to lessen the scope of compliance
    • Approaches to comprehensive HIPAA compliance implementation

    (more…)

  • Who Needs CMMC Certification? Do You Need It?

    Who Needs CMMC Certification? Do You Need It?

    In November 2021, the U.S. Department of Defense (DoD) introduced major updates to the Cybersecurity Maturity Model Certification (CMMC) program, reshaping how contractors approach compliance. These changes left many organizations across the Defense Industrial Base (DIB) asking a critical question: Who needs CMMC certification—and does it apply to us?

    The short answer is yes. If your organization works with the DoD or plans to bid on contracts, CMMC certification is required. However, the more important question is which level of CMMC certification your organization needs.

    Your required level depends on the type of sensitive information you handle, such as Federal Contract Information (FCI) or Controlled Unclassified Information (CUI). Each level comes with its own set of cybersecurity requirements, timelines, and assessment expectations. Understanding where your organization falls is essential—not only for compliance, but for maintaining eligibility for DoD contracts. (more…)

  • A Beginner’s Guide to Complying with HIPAA Regulations

    A Beginner’s Guide to Complying with HIPAA Regulations

     Complying with HIPAA regulations doesn’t have to be overwhelming. By following these four essential steps, organizations can meet HIPAA regulations, satisfy federal requirements, and protect sensitive patient data:

    1. Identify if Your Organization is a Covered Entity

    Determine whether your organization qualifies as a covered entity under HIPAA regulations. This includes healthcare providers, health plans, and healthcare clearinghouses.

    2. Implement Required HIPAA Controls

    Apply administrative, physical, and technical safeguards required by HIPAA regulations to protect patient health information (PHI) and maintain compliance.

    3. Establish a Breach Notification Infrastructure

    Put processes and systems in place to detect, respond to, and report data breaches in accordance with HIPAA regulations and required timelines.

    4. Streamline Compliance with a Unified Approach

    Integrate HIPAA complianceefforts across your organization to reduce duplication, improve accountability, and simplify audits. (more…)

  • Cybersecurity Maturity Model Certification Accreditation Body Certifications, Explained

    Cybersecurity Maturity Model Certification Accreditation Body Certifications, Explained

    If your company currently works closely with the Department of Defense (DoD) or plans to begin a lucrative partnership with the military, you will soon need to acquaint yourself with a managed security service provider (MSSP) that’s been vetted by the Cybersecurity Maturity Model Certification Accreditation Body (CMMC AB). There are many such organizations and many different kinds you’ll find on the CMMC AB Marketplace. (more…)

  • What’s the Difference Between CMMC Level 4 and Level 3?

    What’s the Difference Between CMMC Level 4 and Level 3?

     CMMC Level requirements are structured across five progressive stages within the Cybersecurity Maturity Model Certification (CMMC), a framework developed by the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD A&S). Unlike many cybersecurity frameworks, the CMMC enables organizations to gradually implement controls as they advance through each level. As contractors move toward full certification, understanding the differences between CMMC Level 3 and Level 4 becomes critical. (more…)