HIPAA Compliance Checklist: Essential Requirements, Controls, and Documentation Practices Explained

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Checklist: Essential Requirements, Controls, and Documentation Practices Explained

Kevin Henry

HIPAA

April 17, 2024

8 minutes read
Share this article
HIPAA Compliance Checklist: Essential Requirements, Controls, and Documentation Practices Explained

Conduct Risk Assessments

You start HIPAA compliance with a security risk analysis that accounts for all systems, processes, and vendors that create, receive, maintain, or transmit ePHI. Map data flows, identify where ePHI resides, and list threats, vulnerabilities, and existing controls for complete ePHI protection.

Evaluate likelihood and impact to score risks, then prioritize remediation through a written risk management plan. Assign owners, timelines, and measurable outcomes for each corrective action so the plan drives real change rather than sitting on a shelf.

Repeat assessments at least annually and whenever you deploy new technology, change workflows, onboard vendors, or experience a security event. Keep a defensible record of scope, methods, findings, and decisions to show continuous improvement in security risk analysis.

  • Define scope: systems, data stores, cloud services, medical devices.
  • Inventory ePHI and map data flows end to end.
  • Identify threats and vulnerabilities; score risk by likelihood and impact.
  • Document decisions: accept, mitigate, transfer, or avoid each risk.
  • Track remediation through to closure and re-test residual risk.

Implement Administrative Safeguards

Administrative safeguards set the governance foundation for HIPAA. Establish a security management program with policies, procedures, and a designated security officer who can make decisions and allocate resources.

  • Risk management and sanction policy: define expectations, consequences, and escalation paths.
  • Workforce security and access management: authorize minimum necessary access, use role-based access control, and remove access promptly at termination.
  • Security awareness and training: deliver onboarding and periodic refreshers aligned to roles and current threats.
  • Security incident procedures: define intake, triage, investigation, and reporting for security incident handling.
  • Contingency program oversight: approve and test backup, disaster recovery, and emergency-mode operations.
  • Periodic evaluations: review your program’s effectiveness against changes in technology, operations, and risk.
  • Vendor management: ensure Business Associate Agreements are executed and monitored.

Apply Physical Safeguards

Physical safeguards protect facilities, workspaces, and devices that store or access ePHI. Standardize controls across corporate offices, clinics, data centers, and remote work locations.

  • Facility access controls: badge-based entry, visitor verification and logging, camera coverage, and procedures for contingency operations during outages or emergencies.
  • Workstation use and security: position screens away from public view, use privacy filters, enable automatic screen locking, and enforce clean-desk practices.
  • Device and media controls: maintain asset inventories; encrypt laptops and portable media; sanitize, wipe, or destroy media before reuse or disposal; document chain of custody.
  • Environmental protections: secure server rooms, monitor temperature and humidity, and maintain uninterruptible power supplies where needed.

Enforce Technical Safeguards

Technical safeguards implement strong, consistent control over systems that handle ePHI. Build layered defenses that make unauthorized access unlikely and detectable.

  • Access control mechanisms: unique user IDs, role-based entitlements, emergency access procedures, automatic logoff, and strong authentication (preferably MFA).
  • Encryption: protect ePHI at rest and in transit; where encryption is not feasible, document compensating controls and rationale.
  • Audit control mechanisms: collect, retain, and review logs for authentication events, access to patient records, privilege changes, configuration changes, and data exports.
  • Integrity protections: use hashing, digital signatures, and change monitoring to prevent and detect unauthorized alteration of ePHI.
  • Transmission security: implement TLS for network traffic and secure VPNs for remote access; restrict insecure protocols.
  • Endpoint and application security: keep systems patched, limit administrative privileges, and validate input to reduce application-level risk.

Provide Workforce Training

Train people before they access ePHI and refresh them regularly so good security becomes routine. Tailor content for clinicians, billing staff, IT, and executives, focusing on the minimum necessary standard.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment
  • Core topics: phishing defense, secure passwords and MFA, data handling, mobile device use, and reporting procedures for suspected incidents.
  • Role-based modules: privacy vs. security responsibilities, system-specific safe use, and breach notification requirements awareness.
  • Evaluation: short quizzes, simulated phishing, and competency checks to confirm retention and improve future training.
  • Documentation: keep rosters, dates, curricula, scores, and remediation steps to demonstrate due diligence.

Maintain Documentation Practices

Good documentation proves compliance and accelerates investigations. Maintain policies, procedures, and records for at least six years from the date of creation or last effective date, whichever is later.

  • Program records: risk assessments, risk management plans, system inventories, data flow diagrams, and security architectures.
  • Operational evidence: access reviews, audit log reviews, vulnerability scans, penetration tests, and remediation tracking.
  • Incident artifacts: intake tickets, timelines, forensic notes, risk assessments, decisions, and notifications.
  • Contingency documentation: data backup plans, disaster recovery plans, emergency-mode operations, test results, and after-action reports.
  • Vendor files: due diligence, Business Associate Agreements, security questionnaires, and monitoring results.
  • Version control: use clear owners, revision histories, and approval dates to avoid ambiguity.

Establish Business Associate Agreements

Execute Business Associate Agreements with any vendor or subcontractor that creates, receives, maintains, or transmits PHI on your behalf. BAAs set expectations for safeguards, reporting, and termination, and they extend HIPAA obligations downstream.

  • Required elements: permitted uses/disclosures, required safeguards, breach and incident reporting timelines, subcontractor flow-down, access to PHI, and return or destruction of PHI at termination.
  • Notification clarity: specify how quickly a business associate must report incidents so you can meet breach notification requirements.
  • Due diligence: assess the vendor’s security controls before signing and at reasonable intervals; monitor performance and address findings.

Develop Incident Response Plan

Create a practical playbook for security incident handling that your team can execute under pressure. Define roles, contact paths, evidence handling, decision criteria, and communications for internal and external stakeholders.

  • Lifecycle: prepare, detect, analyze, contain, eradicate, recover, and conduct lessons learned with tracked corrective actions.
  • Breach assessments: evaluate impermissible uses or disclosures of unsecured PHI using standardized risk factors; document rationale and decisions.
  • Notification workflow: when a breach is confirmed, notify affected individuals without unreasonable delay and no later than 60 days, and notify HHS (and, if 500+ individuals are affected, the local media as applicable).
  • Exercise the plan: run tabletop scenarios and technical drills; fix gaps discovered during exercises or real incidents.

Create Contingency Planning

Plan, test, and maintain continuity capabilities so patient care and business operations can continue during disruptions. Integrate contingency operations planning into enterprise risk management.

  • Data backup plan: schedule verified, encrypted backups with offsite or cloud redundancy; routinely test restores.
  • Disaster recovery plan: define recovery time objectives (RTO) and recovery point objectives (RPO), failover steps, and responsible roles.
  • Emergency-mode operations: establish minimal processes and access to support care during outages, including downtime procedures and paper workflows.
  • Criticality analysis: rank systems and data by business impact to prioritize recovery sequencing.
  • Testing: conduct tabletop, functional, and full-scale exercises; document results and improvements.

Perform Regular Audits and Monitoring

Auditing proves your controls work and reveals drift before it becomes a breach. Use audit control mechanisms to collect evidence, review behavior, and act on findings.

  • System activity reviews: monitor logins, failed access, privilege changes, unusual queries, mass exports, and after-hours access.
  • Access recertification: regularly verify that users still need each permission; remove excess rights promptly.
  • Configuration and vulnerability management: track patching, hardening baselines, and scan results; verify timely remediation.
  • Program evaluations: perform internal audits against HIPAA standards and policies; close gaps with dated corrective action plans.
  • Metrics and reporting: publish trends to leadership and the compliance committee to sustain momentum and funding.

By following this HIPAA compliance checklist—risk assessment, layered safeguards, disciplined documentation, strong vendor oversight, practiced incident response, resilient contingency planning, and continuous auditing—you build a defensible program that protects patients, supports care delivery, and reduces organizational risk.

FAQs

What are the key administrative safeguards for HIPAA compliance?

Core administrative safeguards include a documented security management process (risk analysis and mitigation), assigned security responsibility, workforce security and information access management, ongoing security awareness and training, incident procedures, contingency planning oversight, periodic evaluations, and vendor oversight with executed Business Associate Agreements.

How often should risk assessments be conducted?

Conduct a comprehensive risk assessment at least annually and whenever significant changes occur—such as new systems, major workflow shifts, mergers, or notable incidents—and update the remediation plan to reflect new findings and residual risk.

What documentation is required for HIPAA audits?

You should be prepared to provide policies and procedures; security risk analysis reports and risk management plans; system inventories and data flow maps; training records; evidence of audit log reviews and access recertifications; incident and breach documentation; contingency plans and test results; and vendor due diligence files and Business Associate Agreements, retained for at least six years.

When is breach notification mandatory?

Notification is required when there is an impermissible use or disclosure of unsecured PHI and your risk assessment does not demonstrate a low probability that the PHI was compromised. In that case, notify affected individuals without unreasonable delay and no later than 60 days; report to HHS (and to local media if 500 or more individuals are affected); for fewer than 500 individuals, report to HHS no later than 60 days after the end of the calendar year.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles