HIPAA Compliance Attestation: What It Is, Requirements, and a Template You Can Use

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Attestation: What It Is, Requirements, and a Template You Can Use

Kevin Henry

HIPAA

August 25, 2025

7 minutes read
Share this article
HIPAA Compliance Attestation: What It Is, Requirements, and a Template You Can Use

HIPAA compliance attestation is a formal statement that you have implemented and maintain controls aligning with the HIPAA Privacy Rule, HIPAA Security Rule, and Breach Notification Rule. It helps you demonstrate due diligence to customers, partners, and insurers by summarizing how you protect Protected Health Information. This guide explains the core requirements, shows how to manage evidence, and provides a practical template you can adapt.

Security Risk Assessment

A Security Risk Assessment (SRA) is the backbone of your attestation. It documents how you identify where Protected Health Information resides, analyze threats and vulnerabilities, and prioritize remediation. Under the HIPAA Security Rule, you must conduct an accurate and thorough Risk Analysis and manage risks to a reasonable and appropriate level.

  • Define scope: systems, applications, devices, vendors, and workflows that create, receive, maintain, or transmit PHI.
  • Map data flows: trace how PHI enters, moves through, and exits your environment, including remote work and mobile use.
  • Identify threats and vulnerabilities: operational, technical, human, and environmental factors.
  • Estimate likelihood and impact to rank risks and set a remediation timeline.
  • Select safeguards: administrative, physical, and technical controls (e.g., access controls, encryption, audit logging, backups).
  • Document a risk management plan with owners, deadlines, and acceptance criteria.
  • Reassess at least annually and after significant changes (new systems, mergers, major incidents).

Evidence to keep

  • Risk Analysis report and methodology.
  • Risk register with status and owners.
  • Validation artifacts (vulnerability scans, penetration testing summaries, audit log reviews).
  • Approvals for accepted risks and compensating controls.

Policies and Procedures Development

Your attestation must reflect documented, operational policies that implement the HIPAA Privacy Rule, HIPAA Security Rule, and Breach Notification Rule. Write concise, role-based procedures that tell people exactly how to comply and how to prove it.

  • Access control and user provisioning, role-based access, and termination procedures.
  • Minimum necessary use and disclosure of PHI; uses/disclosures tracking and patient rights handling.
  • Encryption and device/media controls (laptops, removable media, disposal and reuse).
  • Incident response and breach notification, including investigation and decision criteria.
  • Contingency planning: backups, disaster recovery, emergency mode operations, and testing.
  • Workforce sanction policy and acceptable use standards.
  • Change management and secure development lifecycle for systems handling PHI.

Documentation practices

  • Assign an owner, effective date, and review cadence for each document.
  • Track versions and approvals; keep retired versions for at least six years.
  • Include control mapping to the relevant HIPAA requirements for quick evidence retrieval.

Staff Training and Documentation

Workforce training converts policy into daily behavior. Provide onboarding and periodic refreshers tailored to job roles, and keep detailed training records as Compliance Documentation.

  • Teach PHI handling, minimum necessary, secure messaging, and safe remote work.
  • Cover phishing, social engineering, password hygiene, and incident reporting.
  • Provide role-based modules for clinical, billing, IT, and customer support teams.
  • Reinforce breach identification and the immediate reporting process.

How to document training

  • Maintain rosters with trainee name, role, date, course title, and delivery method.
  • Record completion scores, acknowledgments of policy receipt, and attestations.
  • Store slides, curricula, and updates to show content coverage over time.
  • Retain records for at least six years to support audits and due diligence.

Business Associate Agreements

Any vendor that creates, receives, maintains, or transmits PHI for you is a Business Associate. A Business Associate Agreement (BAA) contractually requires HIPAA-aligned safeguards, breach reporting, and flow-down obligations to subcontractors. Your attestation should confirm that BAAs exist, are current, and are monitored.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Define permitted uses/disclosures of PHI and prohibit unauthorized uses.
  • Require administrative, physical, and technical safeguards consistent with the HIPAA Security Rule.
  • Mandate prompt incident and breach reporting with cooperation on investigations.
  • Flow down requirements to subcontractors handling PHI.
  • Address access, amendment, accounting of disclosures, and return or destruction of PHI.
  • Include audit rights and termination provisions for material breach.

Vendor due diligence

  • Inventory all vendors; classify PHI exposure and criticality.
  • Collect security questionnaires and evidence (e.g., SOC reports where applicable).
  • Track BAA status, renewal dates, and exceptions with remediation plans.

Compliance Documentation Management

Strong Compliance Documentation makes your attestation credible and repeatable. Centralize evidence, control access, and maintain a clear audit trail from requirement to control to proof.

  • Create a repository structure that mirrors your control framework (Privacy, Security, Breach Notification).
  • Tag documents with owner, version, effective date, and related controls.
  • Restrict access to need-to-know and log administrative actions on evidence.
  • Retain all required records for a minimum of six years from creation or last effective date.

What to keep on file

  • Risk Analysis reports, risk registers, and remediation evidence.
  • Current and archived policies and procedures.
  • Training rosters, attestations, and course materials.
  • Incident and breach logs, investigation notes, and notification records.
  • BA inventory and executed Business Associate Agreements.
  • Access logs, audit logs, change records, and contingency plan test results.

Using a HIPAA Compliance Attestation Template

Use a consistent template to attest to your program’s status and point requestors to supporting evidence. Customize it to your services and keep it synchronized with your repository so every statement is verifiable.

Template you can use

  • Title: HIPAA Compliance Attestation
  • Organization: [Legal name]; Type: [Covered Entity/Business Associate]
  • Point of Contact: [Name, Title, Email, Phone]
  • Scope of Attestation: [Systems/services, locations, and types of Protected Health Information processed]
  • Attestation Statement:
    • We attest that as of [Date], we have implemented and maintain policies, procedures, and controls aligned with the HIPAA Privacy Rule, HIPAA Security Rule, and Breach Notification Rule.
    • We conduct and document an ongoing Risk Analysis and risk management program.
    • We train our workforce and enforce sanctions for violations.
    • We execute and manage each applicable Business Associate Agreement.
  • Evidence Summary (document IDs or locations):
    • Risk Analysis report and remediation plan: [Reference].
    • Key policies and procedures: [References].
    • Training records and acknowledgments: [References].
    • BA inventory and executed agreements: [References].
    • Incident response plan and breach documentation: [References].
    • Contingency plan tests and backup verification: [References].
  • Exceptions and Compensating Controls: [If any, describe risk, temporary controls, and timeline.]
  • Attestation Period: Effective [Start Date] through [End Date] or until materially changed.
  • Signatures:
    • [Executive or Compliance Officer Name, Title, Date]
    • [Security Officer Name, Title, Date]
  • Contact for Inquiries: [Contact details]

How to make it actionable

  • Complete every field and cross-reference each claim to specific evidence in your repository.
  • Review quarterly or after significant changes; update dates, scope, and references.
  • Share on a need-to-know basis; do not include raw PHI within the template.

Maintaining Ongoing Compliance

Treat HIPAA as a living program, not a one-time project. Establish governance, measure performance, and keep your attestation aligned with current controls and risks.

  • Assign privacy and security officers with clear accountability and authority.
  • Schedule periodic SRAs, control testing, and tabletop exercises for incidents and disasters.
  • Monitor key indicators: access review completion, patch cadence, backup success, and training rates.
  • Test breach notification workflows and verify vendor reporting obligations.
  • Integrate change management so new systems and vendors trigger review, BAAs, and controls.

Conclusion

A credible HIPAA compliance attestation rests on a current Risk Analysis, operational policies and procedures, trained staff, executed Business Associate Agreements, and organized Compliance Documentation. Build these elements into routine operations, and your attestation will be accurate, defensible, and easy to refresh.

FAQs

What is a HIPAA compliance attestation?

It is a signed statement confirming that your organization has implemented and maintains controls aligned with HIPAA requirements for protecting Protected Health Information. It summarizes your program and points to evidence but is not a government-issued certification.

What are the key requirements for HIPAA compliance attestation?

At minimum, you need a documented Risk Analysis and risk management plan, current policies and procedures mapped to the HIPAA Privacy Rule, HIPAA Security Rule, and Breach Notification Rule, workforce training with records, executed Business Associate Agreements, and organized Compliance Documentation supporting each claim.

How do you document staff training for HIPAA compliance?

Keep rosters with names, roles, dates, and courses; store completion certificates or quiz results; record acknowledgments of policy receipt; and retain curricula. Maintain these records for at least six years to demonstrate ongoing compliance.

What should be included in a HIPAA compliance attestation template?

Include your organization’s identity and contact, scope of services and PHI handled, an attestation statement referencing the HIPAA Privacy Rule, HIPAA Security Rule, and Breach Notification Rule, a summary of evidence (Risk Analysis, policies, training, BAAs, incident and contingency records), any exceptions, the attestation period, and signatures from accountable leaders.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles