HIPAA Encryption: Requirements, Best Practices, and Compliance Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Encryption: Requirements, Best Practices, and Compliance Checklist

Kevin Henry

HIPAA

July 16, 2025

8 minutes read
Share this article
HIPAA Encryption: Requirements, Best Practices, and Compliance Checklist

HIPAA Encryption Requirements

What the Security Rule requires

Under the HIPAA Security Rule, encryption is an Addressable safeguard. That means you must evaluate whether encrypting Electronic Protected Health Information (ePHI) is reasonable and appropriate for your environment. If it is, you implement it; if not, you must adopt equivalent measures and document why encryption was not used.

Because ePHI routinely traverses networks and resides on mobile and cloud systems, encryption is typically the most effective control for preventing unauthorized access and limiting breach impact. Regulators also expect decisions to be informed by NIST Encryption Guidance and implemented with FIPS-Validated Cryptography wherever feasible.

Risk-based decision-making

Your determination hinges on formal Risk Assessment Procedures. Assess threats, vulnerabilities, and the likelihood and impact of exposure across data in transit, at rest, and in use. Align chosen controls with the Security Rule Addressable Specification, ensure they meaningfully reduce risk, and record the rationale, scope, and residual risk for auditors.

Compliance checklist

  • Perform documented Risk Assessment Procedures covering all systems that create, receive, maintain, or transmit ePHI.
  • Decide whether encryption is reasonable and appropriate for each data flow and repository.
  • If not encrypting, document compensating controls, justification, and approval.
  • Adopt written policies defining when and how encryption is required.
  • Train workforce on handling ePHI and encryption-enabled workflows.

Encryption Standards and Technologies

Data in transit

Use the TLS 1.2 Protocol or TLS 1.3 with strong cipher suites and Perfect Forward Secrecy to protect ePHI across web, API, and application traffic. For email, use secure portals, S/MIME, or properly configured TLS between gateways; for networks, consider IPsec or authenticated VPNs to protect site-to-site and remote access sessions.

Data at rest

Apply storage and database encryption using AES-256 Encryption or equivalent strength. Use full-disk encryption (e.g., XTS mode) on laptops and workstations; use volume, file, or transparent database encryption for servers and cloud storage. Ensure libraries and devices rely on FIPS-Validated Cryptography wherever supported.

Algorithms and key sizes

  • Symmetric: AES-256 (GCM for files/objects, XTS for disks).
  • Asymmetric: RSA 2048+ or elliptic-curve suites such as P-256/P-384 for key exchange and signatures.
  • Hashes/MACs: SHA-256+ and AEAD modes (e.g., AES-GCM) to provide integrity and authenticity.

Technology checklist

  • Standardize on TLS 1.2 Protocol or higher for all external and internal services.
  • Encrypt all portable and endpoint storage with full-disk encryption.
  • Enable database, file share, and object storage encryption by default.
  • Verify cryptographic modules are FIPS-validated on regulated systems.
  • Disable deprecated protocols and ciphers; continuously scan for misconfigurations.

Implementing Strong Encryption Methods

Plan and classify

Map data flows and classify where ePHI is created, received, maintained, and transmitted. Define trust boundaries, identify integration points (EHRs, billing, clearinghouses), and select controls that minimize plaintext exposure across those paths.

At-rest encryption patterns

  • Adopt envelope encryption: data encryption keys (DEKs) protect ePHI; key-encryption keys (KEKs) are managed in a KMS or HSM.
  • Use field-level encryption for especially sensitive attributes (e.g., SSNs), in addition to storage-level encryption.
  • Encrypt backups and replicas; test restores to confirm keys and processes function end-to-end.

In-transit encryption patterns

  • Enforce HTTPS with HSTS, modern cipher suites, certificate pinning where appropriate, and automated certificate management.
  • Secure internal service-to-service calls with mutual TLS and short-lived certificates.
  • Use authenticated VPNs or private connectivity when traversing untrusted networks.

Email and file exchange

  • Use secure messaging portals or S/MIME for ePHI-containing messages.
  • Require encryption for file transfers (SFTP, HTTPS) and apply access controls with expiring links and minimal scopes.

Implementation checklist

  • Define encryption baselines for apps, databases, storage, and messaging.
  • Implement envelope encryption with centralized KMS/HSM.
  • Automate certificate issuance, renewal, and revocation.
  • Encrypt all backups and verify restores regularly.
  • Document and test exception handling for systems that cannot be encrypted.

Key Management Best Practices

Governance and architecture

Create a key management policy aligned to NIST Encryption Guidance. Define roles, ownership, and separation of duties for key generation, distribution, rotation, escrow, and destruction. Prefer hardware-backed storage (HSM) or a cloud KMS with strong controls.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Generation, storage, and use

  • Generate keys using approved random sources and FIPS-Validated Cryptography.
  • Store keys only in secure key vaults; never embed keys or passphrases in code or images.
  • Use least-privilege access and short-lived, auditable grants for cryptographic operations.

Rotation, revocation, and recovery

  • Rotate DEKs frequently and KEKs on a defined cadence or after personnel or environment changes.
  • Support rapid revocation and re-encryption for compromised keys.
  • Back up keys securely, test recovery, and protect escrow procedures from misuse.

Key management checklist

  • Document key hierarchies, custody, and lifecycle states.
  • Apply strict access controls, MFA, and strong approval workflows for key use.
  • Automate rotation and revocation; log every key event.
  • Securely destroy keys and ciphertext when retention periods end.

Device and Data Security Measures

Endpoints and mobile

Encrypt all laptops, tablets, and smartphones. Enforce MDM policies for device encryption, screen locks, patching, remote wipe, and app controls. Prohibit local ePHI downloads unless business-justified and protected with storage encryption and DLP rules.

Servers and cloud

Apply disk, volume, and object encryption across data centers and cloud services. Restrict administrative access, require bastion hosts with MFA, and log all access. For containers and serverless, secure secrets with a vault and limit plaintext exposure in environment variables.

Removable media and peripherals

Either ban removable media or require hardware-encrypted devices with centralized key control. Sanitize printers, copiers, and medical devices that store data; ensure decommissioning includes cryptographic erasure.

Device and data checklist

  • Mandate full-disk encryption and MDM controls on all endpoints.
  • Encrypt storage for servers, containers, and cloud services by default.
  • Control and monitor removable media; enforce encryption or disable ports.
  • Implement DLP policies to prevent unapproved ePHI movement.

Documentation and Retention Policies

What to document

Maintain policies that define encryption requirements, key management, and exception handling. Record system-level decisions, configurations, and validation results. Keep architecture diagrams showing where ePHI resides and how it is protected.

Retention timeframes

Retain policies, procedures, risk analyses, and implementation specifications for at least six years from creation or last effective date. Extend retention if other laws, contracts, or investigations require longer periods, and ensure key retention aligns with data retention.

Vendors and workforce

Update Business Associate Agreements to reflect encryption expectations, breach reporting, and security obligations. Train staff on encryption-enabled workflows, secure file exchange, and incident reporting pathways.

Documentation checklist

  • Written policies for encryption, key management, and exceptions.
  • System inventories, data-flow maps, and configuration baselines.
  • Records of Risk Assessment Procedures and mitigation plans.
  • Training logs and Business Associate Agreements referencing encryption controls.
  • Retention schedules for data, logs, and keys.

Monitoring and Auditing Procedures

Operational monitoring

Centralize logs in a SIEM to monitor key events, certificate changes, cipher usage, and access to encrypted stores. Alert on weak ciphers, failed decryptions, abnormal key calls, and plaintext policy violations.

Vulnerability and configuration management

Continuously scan for outdated TLS, exposed services, and missing encryption at rest. Track cryptographic library versions and apply patches promptly. Periodically validate that modules remain FIPS-validated and configurations still meet policy.

Testing and exercises

Perform tabletop exercises for lost devices, key compromise, or certificate failures. Test disaster recovery by restoring encrypted backups and verifying that keys are available and access-controlled.

Metrics and reporting

  • Coverage: percentage of in-scope systems with encryption enabled and verified.
  • Strength: proportion using FIPS-Validated Cryptography and modern ciphers.
  • Health: certificate expiration windows, rotation age, and failed validations.
  • Response: mean time to detect and revoke compromised keys.

Auditing checklist

  • Maintain evidence of TLS scans, cipher inventories, and certificate lifecycles.
  • Log and review key generation, rotation, and destruction events.
  • Verify encrypted backups and demonstrate tested restores.
  • Re-run Risk Assessment Procedures at least annually and after major changes.

Conclusion

Effective HIPAA encryption hinges on a risk-driven program: adopt strong, FIPS-validated algorithms; protect data in transit and at rest; manage keys rigorously; secure devices; document decisions and retention; and continuously monitor. Executed this way, encryption measurably reduces risk to ePHI and strengthens overall compliance posture.

FAQs

Does HIPAA require encryption for all ePHI?

No. Encryption is an Addressable safeguard under the Security Rule, not universally Required. You must assess risk; if encryption is reasonable and appropriate, implement it. If not, you may use equivalent compensating controls—but you must document the decision and residual risk.

What encryption methods comply with HIPAA standards?

HIPAA does not mandate specific algorithms, but regulators expect alignment with NIST Encryption Guidance and use of FIPS-Validated Cryptography where available. Common choices include AES-256 Encryption for data at rest and the TLS 1.2 Protocol or higher with strong ciphers for data in transit.

How should encryption keys be managed for HIPAA compliance?

Use a centralized KMS or HSM; generate keys with approved randomness; restrict and audit access; rotate keys routinely and after changes or incidents; back up and escrow keys securely; and document the full lifecycle from creation through destruction.

What are the steps in a HIPAA encryption compliance checklist?

Run Risk Assessment Procedures; define encryption baselines for transit and at rest; implement TLS and storage/database encryption; deploy centralized key management; secure endpoints and backups; document policies, configurations, and exceptions; monitor with logs and scans; and periodically test restores and incident response.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles