HIPAA Compliance for Software Vendors: Requirements, Checklist & Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Software Vendors: Requirements, Checklist & Best Practices

Kevin Henry

HIPAA

August 15, 2025

8 minutes read
Share this article
HIPAA Compliance for Software Vendors: Requirements, Checklist & Best Practices

As a software vendor that creates, receives, maintains, or transmits Protected Health Information (PHI), you must operationalize HIPAA compliance across people, process, and technology. This guide translates the Security, Privacy, and Breach Notification Rules into practical steps you can implement now.

You will see how Business Associate Agreement (BAA) terms map to Administrative Safeguards, how Technical Safeguards like encryption and access control work in practice, and how Physical Safeguards and disaster recovery keep systems resilient. Use the embedded checklists to validate your program.

Business Associate Agreement Requirements

What the BAA must cover

A Business Associate Agreement (BAA) documents your responsibilities when you handle a covered entity’s PHI. It authorizes permitted uses and disclosures, requires appropriate safeguards, and obligates you to report incidents involving unsecured PHI under the Breach Notification Rule. It also ensures your subcontractors that create or receive PHI sign downstream BAAs.

Key provisions typically include minimum necessary use, breach and security incident reporting timelines, restrictions on marketing or sale of PHI, access to PHI to support patient requests, amendment and accounting of disclosures, return or destruction of PHI at termination, and cooperation with regulatory inquiries.

Practical implementation notes

  • Map each BAA clause to specific controls in your policies, procedures, and product features.
  • Apply the same or stronger safeguards to all subcontractors; verify with due diligence and a signed BAA.
  • Define an internal process to respond to patient access, amendment, and accounting requests within required timeframes.
  • Document breach triage and notification steps, including who assesses “unsecured PHI.”

Checklist

  • Executed BAA with every covered entity and PHI-handling subcontractor.
  • Control-to-clause matrix linking BAA terms to Administrative, Technical, and Physical Safeguards.
  • Documented breach/incident reporting workflow and contact list.
  • Termination procedure to return or securely destroy PHI and revoke access.

Data Encryption Standards

Encryption in transit

Enforce TLS 1.2+ (prefer TLS 1.3) for all external and internal services that carry PHI. Disable weak ciphers, require perfect forward secrecy, and pin certificates where appropriate. For APIs, use HTTPS-only endpoints and reject plaintext or outdated protocols.

Encryption at rest

Use AES-256 or equivalent for databases, file stores, and backups. Prefer envelope encryption with a dedicated KMS or HSM so data keys are distinct from master keys. On mobile and endpoint devices that can access PHI, enable full-disk encryption and secure key storage.

Key management

  • Generate and store keys in a managed KMS/HSM; segregate duties so key admins cannot read data.
  • Rotate keys regularly and after personnel or environment changes; automate revocation and rollover.
  • Use FIPS 140-2/140-3 validated crypto modules where available.

Why it matters for the Breach Notification Rule

Correctly implemented strong encryption can render PHI “unusable, unreadable, or indecipherable,” reducing breach exposure if a device or database is lost. Validate that backups and replicas are encrypted end-to-end, not just primary storage.

Checklist

  • TLS 1.2/1.3 enforced; weak suites disabled; HSTS enabled.
  • AES-256 at rest for databases, files, and snapshots.
  • Centralized KMS/HSM with auditable key lifecycle, rotation, and access controls.
  • Encrypted mobile/endpoint storage and secure secret management for apps and services.

Access Controls and User Authentication

Account provisioning and least privilege

Provision unique user IDs and grant the minimum necessary access to perform job duties. Implement role-based (RBAC) or attribute-based (ABAC) access models and review entitlements on a defined schedule, including just-in-time elevation for admin tasks.

Strong authentication and session security

  • Require MFA for all workforce users with PHI access; prefer phishing-resistant methods (e.g., FIDO2/WebAuthn).
  • Use SSO via SAML or OIDC with automated provisioning (e.g., SCIM) and immediate deprovisioning on termination.
  • Set session timeouts, automatic logoff, device trust checks, and IP/risk-based controls for sensitive actions.

Service-to-service and API access

For microservices and external clients, use OAuth 2.1, mTLS, or signed short-lived tokens. Rotate secrets frequently and store them in a hardened secrets manager, not in code or configs.

Emergency and offboarding controls

Define “break-glass” emergency access with enhanced logging and post-event review. Ensure immediate revocation of access when roles change, contracts end, or devices are reported lost.

Checklist

  • RBAC/ABAC with documented access reviews and approval trails.
  • MFA required; SSO integrated; rapid provisioning/deprovisioning in place.
  • Hardened session management and API authentication with short-lived credentials.
  • Emergency access procedure and offboarding runbook.

Audit Logs and Monitoring Practices

Audit Trail Requirements

Log who accessed PHI, what was viewed or changed, when, from where, and how. Capture read, create, update, delete, export, printing, and disclosure events, plus authentication successes/failures and privilege changes. Include patient record identifiers to support investigations and accounting of disclosures.

Log integrity and retention

Centralize logs in tamper-evident storage with write-once or immutability controls. Synchronize time sources so events correlate accurately. Retain security documentation and related audit trails for at least six years to demonstrate compliance history and control effectiveness.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Monitoring and alerting

  • Feed logs to a SIEM for detection of anomalous access, excessive queries, data exfiltration, and privilege misuse.
  • Define alert severities, on-call rotations, and escalation paths; test them regularly.
  • Mask or tokenize PHI within logs; log metadata about PHI access, not the PHI itself.

Checklist

  • Comprehensive, immutable audit trail for application, database, OS, and network layers.
  • Documented review cadence (e.g., daily for critical events, weekly for broader trends).
  • SIEM rules for suspicious access and data movement; regular tuning to reduce noise.
  • Retention plan aligned with organizational documentation requirements.

Regular Security Audits

Risk analysis and management

Conduct a formal risk analysis to identify threats, vulnerabilities, and likelihood/impact across assets that store or process PHI. Track findings to closure with risk owners, timelines, and verification of implemented Administrative, Technical, and Physical Safeguards.

Testing and assurance

  • Run continuous vulnerability scanning; patch critical issues quickly with defined SLAs.
  • Perform annual penetration testing and targeted tests after major releases or architecture changes.
  • Embed security into the SDLC using threat modeling, SAST/DAST, SCA/SBOM, and secure code reviews.

Governance and third parties

Review policies and procedures at least annually and upon significant changes. Assess vendors that touch PHI for equivalent controls and ensure BAAs are in place. Maintain an audit-ready repository of evidence, decisions, and improvement actions.

Checklist

  • Documented risk analysis with prioritized remediation plan.
  • Vulnerability management, pen testing, and SDLC security activities with evidence.
  • Annual policy review and vendor risk assessments tied to BAAs.

Data Backup and Disaster Recovery Procedures

Resilience objectives

Define recovery time objective (RTO) and recovery point objective (RPO) for every PHI system. Architect to meet those targets with high availability, replication, and tested restoration procedures.

Backup strategy

  • Follow the 3-2-1 rule: three copies, two media types, one offsite/immutable.
  • Encrypt backups with separate keys and protect the backup platform with strong access controls.
  • Automatically verify backup integrity and completeness; monitor for failures.

Disaster recovery execution

Maintain step-by-step runbooks for regional outages, ransomware, and data corruption. Conduct restore tests and DR exercises at least annually, documenting results and improvements. Include communications plans for customers and partners.

Checklist

  • Documented RTO/RPO for PHI systems with aligned architecture.
  • Encrypted, immutable, and regularly tested backups.
  • DR runbooks and exercise reports with action items tracked to closure.

Employee Training and Incident Management

Training program

Provide HIPAA onboarding and periodic refreshers tailored to roles. Cover minimum necessary access, secure data handling, phishing awareness, device security, and incident reporting. For engineers, add secure coding and data protection patterns specific to your stack.

Incident response

  • Define triage, containment, eradication, recovery, and post-incident review with RACI owners.
  • For breaches of unsecured PHI, follow the Breach Notification Rule: notify affected individuals without unreasonable delay and no later than 60 days from discovery; notify regulators and, when applicable, the media.
  • Preserve evidence, maintain an audit trail of response actions, and update controls to prevent recurrence.

Administrative and Physical Safeguards

Back your program with clear policies, workforce sanctions for violations, and facility/device protections (badge access, device locking, secure disposal). Verify that physical measures align with your cloud and on-prem footprint.

Conclusion

HIPAA compliance for software vendors centers on enforceable BAAs, robust Technical Safeguards, disciplined Administrative processes, and sound Physical Safeguards. By encrypting PHI, controlling and auditing access, testing security, and training your workforce, you build a defensible, resilient program that protects patients and your business.

FAQs

What is a Business Associate Agreement in HIPAA compliance?

A Business Associate Agreement (BAA) is a contract that defines how you, as a vendor, may use and protect a covered entity’s PHI. It requires appropriate safeguards, limits use to the minimum necessary, mandates breach reporting, flows obligations to subcontractors, and describes what happens to PHI when the relationship ends.

How should software vendors implement data encryption for PHI?

Use TLS 1.2+ (ideally TLS 1.3) for all data in transit and AES‑256 for data at rest, including databases, files, and backups. Manage keys in a KMS/HSM with rotation, strict access, and audit logging. Ensure mobile and endpoint storage is encrypted and verify that replicas and backups are protected with separate encryption keys.

What are the key elements of an effective HIPAA security audit?

Start with a formal risk analysis, then validate Administrative, Technical, and Physical Safeguards through policy reviews, vulnerability scanning, penetration testing, and control sampling. Confirm Audit Trail Requirements, access reviews, encryption coverage, vendor oversight, incident response readiness, and evidence collection for every finding.

How often must employees receive HIPAA training?

Provide training at hire and periodically thereafter. Most organizations deliver role-based refreshers at least annually and whenever policies, roles, systems, or regulations change. Document attendance and comprehension, and reinforce with targeted micro-trainings and phishing simulations throughout the year.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles