HIPAA Compliance Checklist for Risk Managers: A Practical, Step-by-Step Guide

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Checklist for Risk Managers: A Practical, Step-by-Step Guide

Kevin Henry

HIPAA

October 19, 2025

7 minutes read
Share this article
HIPAA Compliance Checklist for Risk Managers: A Practical, Step-by-Step Guide

Use this HIPAA compliance checklist to build a pragmatic, defensible program that protects electronic Protected Health Information (ePHI) and reduces organizational risk. Each step translates regulatory expectations into clear, repeatable actions you can assign, track, and verify.

The guide is organized by safeguards you must operationalize—administrative, technical, and physical—plus the processes that tie them together: risk assessment, training, vendor oversight, and breach response. Integrate these activities into your risk management plan to maintain momentum and measurable results.

Conduct Comprehensive Risk Assessment

Your first priority is a current, comprehensive view of how ePHI flows through people, processes, and technology. Scope the assessment across all systems, locations, third parties, and media where ePHI is created, received, maintained, processed, or transmitted.

  • Inventory assets and data: catalog systems, applications, devices, databases, backups, and paper sources that touch ePHI; include shadow IT and remote work tools.
  • Map data flows: document how ePHI enters, moves, is stored, is shared (including with vendors), and is disposed of.
  • Identify threats and vulnerabilities: consider human error, misconfigurations, lost devices, ransomware, insider misuse, and environmental hazards.
  • Analyze likelihood and impact: use a consistent scoring method to rank risks and prioritize remediation.
  • Document results in a risk register: record owners, due dates, and dependencies for transparency and accountability.
  • Create a risk management plan: define corrective actions, required controls, budgets, and milestones to reduce risk to acceptable levels.
  • Set cadence and metrics: reassess at least annually and after significant changes or incidents; track closure rates, residual risk, and control effectiveness.

Keep evidence: methodologies, meeting notes, decisions, and approvals. This documentation demonstrates due diligence and guides audits, leadership briefings, and roadmap updates.

Implement Administrative Safeguards

Administrative safeguards translate your risk assessment into policy, governance, and day-to-day practices. They clarify who does what, by when, and how you verify outcomes.

  • Governance and accountability: designate a security official, define roles, and maintain decision logs tied to the risk management plan.
  • Policies and procedures: publish, communicate, and annually review policies that cover access management, minimum necessary, remote work, change control, and security incident procedures.
  • Access management: implement role-based provisioning, workforce clearance, periodic access reviews, and rapid termination processes.
  • Contingency plan: conduct a business impact analysis, set recovery time and point objectives, maintain backups, and test disaster recovery and emergency mode operations.
  • Security incident procedures: establish intake channels, triage criteria, escalation paths, evidence handling, and post-incident reviews.
  • Evaluation and audits: run internal reviews, control testing, and corrective action tracking; adjust controls when technology or workflows change.
  • Vendor governance: require Business Associate Agreements (BAAs), perform due diligence, and align vendor controls with your policies and risk posture.
  • Documentation management: version policies, record acknowledgments, retain logs of reviews, and capture approvals for audit readiness.

Utilize Technical Safeguards

Technical safeguards enforce access decisions, protect data, and create the forensic trail you need to detect and investigate anomalies. Build controls that are secure by default and easy to operate.

  • Access controls: use unique IDs, least privilege, role-based access controls, and multifactor authentication for all ePHI systems and remote access.
  • Encryption standards: encrypt ePHI in transit and at rest using current, industry-accepted encryption standards; manage keys securely and rotate them on a defined schedule.
  • Audit controls: centralize logs, enable tamper-evident storage, monitor for anomalies, and retain records per policy to support investigations.
  • Integrity protections: apply checksums or hashing, secure configurations, and change control to prevent and detect unauthorized alterations.
  • Transmission security: use secure protocols for email, APIs, and file transfers; segment networks and restrict inbound/external connectivity.
  • Endpoint and application security: deploy device encryption, EDR, MDM for mobile devices, secure coding practices, and timely patching/vulnerability management.
  • Data lifecycle and minimization: back up ePHI, test restores, de-identify where feasible, and limit retention to business and regulatory needs.

Establish Physical Safeguards

Physical safeguards protect facilities, workstations, and media so only authorized people can access ePHI and supporting infrastructure.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment
  • Facility access controls: badge systems, visitor logs, restricted server rooms, video monitoring, and documented escort requirements.
  • Workstation security: privacy screens, automatic logoff, secure docking areas, and clean-desk expectations to prevent shoulder surfing and mishandling.
  • Device and media controls: asset tagging, chain-of-custody for moves, secure storage, validated destruction, and documented reuse or disposal.
  • Environmental and power safeguards: fire suppression, climate controls, UPS/generators, and water-leak detection for critical spaces.
  • Remote and offsite considerations: lockable storage for laptops, transport protections for media, and verification of third-party facility controls.

Provide Workforce Training

Effective training turns policy into practice. Tie content to job duties and measure comprehension so you can prove the program works.

  • Onboarding and annual refreshers: cover HIPAA basics, ePHI handling, minimum necessary, acceptable use, and reporting obligations.
  • Role-based drills: tailor scenarios for clinicians, IT, billing, and support staff; include social engineering and phishing simulations.
  • Secure habits: passwords and passphrases, MFA, secure messaging, approved storage, and remote/BYOD expectations.
  • Incident awareness: how to recognize and escalate issues using defined security incident procedures; no-blame reporting culture.
  • Tracking and evidence: attendance logs, test scores, policy acknowledgments, and remediation plans for low performers.

Manage Business Associate Agreements

Vendors that create, receive, maintain, or transmit ePHI are Business Associates. You must execute and manage Business Associate Agreements (BAAs) that bind them to HIPAA-aligned safeguards and breach duties.

  • Identify and classify vendors: inventory services (cloud hosting, EHR, billing, transcription, shredding, analytics) and confirm BA status.
  • Due diligence: assess security posture, review independent assessments, and ensure controls match your risk profile and risk management plan.
  • BAA essentials: permitted uses/disclosures, safeguard requirements, breach reporting timelines, subcontractor flow-down, minimum necessary, and data return/secure destruction at termination.
  • Oversight: define audit/assessment rights, performance metrics, and remediation expectations; track issues to closure.
  • Lifecycle management: assign owners, set renewal reminders, capture exceptions, and update BAAs when services or regulations change.

Develop Breach Notification Procedures

Clear procedures help you act fast, limit harm, and meet notification requirements. Integrate them with your incident response plan and contingency plan to sustain care delivery during disruptions.

  • Detection and containment: encourage rapid reporting, preserve evidence, isolate affected systems, and activate your incident team.
  • Assessment and classification: differentiate security incidents from breaches and document risk-of-harm analysis for the data involved.
  • Notification workflow: prepare templates; notify affected individuals without unreasonable delay and no later than 60 days after discovery; follow BAA terms and applicable reporting thresholds.
  • Regulatory and public communications: coordinate notices to regulators, and when required, to media; provide call-center and mailbox support.
  • Remediation: fix root causes, reset credentials, enhance access controls, adjust encryption standards or configurations, and retrain staff as needed.
  • Post-incident review: record timelines, decisions, and lessons learned; update your risk register, policies, and security incident procedures.
  • Testing: run tabletop exercises, validate contact trees, and confirm backups/restore steps work under time pressure.

Bringing it all together, your HIPAA compliance checklist for risk managers aligns governance, access controls, encryption standards, physical protections, training, BAAs, and security incident procedures into a living risk management plan that you can measure, improve, and defend.

FAQs.

What are the key steps in a HIPAA risk assessment?

Define scope across all ePHI environments; inventory assets and map data flows; identify threats and vulnerabilities; rate likelihood and impact; document risks in a register; build a prioritized risk management plan with owners and deadlines; track remediation and reassess after changes or incidents.

How do Business Associate Agreements affect HIPAA compliance?

BAAs contractually require vendors that handle ePHI to implement safeguards, report incidents, flow obligations to subcontractors, and return or securely destroy data at termination. Strong BAAs, paired with due diligence and monitoring, extend your compliance controls beyond your walls and reduce third-party risk.

What technical safeguards are required under HIPAA?

The Security Rule specifies technical safeguards including access controls (unique IDs, emergency access, automatic logoff), audit controls (activity logging), integrity controls (protect against improper alteration), person or entity authentication, and transmission security. Apply current encryption standards and MFA to strengthen these controls in practice.

How should a risk manager respond to a HIPAA breach?

Activate incident response, contain the issue, and preserve evidence; assess the event to confirm breach status; notify affected individuals within required timelines, coordinate with Business Associates per BAAs, and issue regulator/media notices when applicable; remediate root causes, update policies and training, and log all actions for audit and lessons learned.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles