HIPAA Encryption Requirements Explained: What’s Required vs. Addressable and How to Comply

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Encryption Requirements Explained: What’s Required vs. Addressable and How to Comply

Kevin Henry

HIPAA

February 23, 2024

8 minutes read
Share this article
HIPAA Encryption Requirements Explained: What’s Required vs. Addressable and How to Comply

Encryption as Addressable Specification

Under the HIPAA Security Rule, encryption for Electronic Protected Health Information (ePHI) is an Addressable Implementation Specification. Addressable does not mean optional; it requires you to evaluate feasibility and risk, implement encryption when reasonable and appropriate, or implement an equivalent alternative and document a defensible rationale.

In practice, encryption is the default path. It reduces exposure, supports Data Breach Notification Exemptions when keys remain uncompromised, and demonstrates due diligence to regulators and business partners. When encryption is not implemented, you must be able to show why risk can be reduced to an acceptable level by other controls—and revisit that decision as technology, threats, and workflows change.

What “required vs. addressable” means in operations

  • Required standards must be implemented as written.
  • Addressable specifications demand a documented risk-based decision: implement as stated, use a suitable alternative, or—rarely—defer with strong compensating controls and timelines.
  • For ePHI at rest and in transit, encryption is typically reasonable, affordable, and expected.

Conducting Risk Assessments

A rigorous Risk Analysis for Encryption determines where, how, and to what depth you encrypt. It also identifies circumstances where additional compensating controls are needed.

Step-by-step risk analysis

  1. Inventory ePHI: Map systems, apps, databases, backups, endpoints, and vendors that create, receive, maintain, or transmit ePHI.
  2. Trace data flows: Document where ePHI enters, moves, rests, and leaves—including APIs, email, secure messaging, and cloud services.
  3. Identify threats and vulnerabilities: Lost devices, exposed buckets, weak ciphers, misconfigured TLS, shared keys, over-broad access, and unencrypted backups.
  4. Assess likelihood and impact: Use a qualitative or quantitative model to rate each scenario, factoring legal, financial, clinical, and reputational impact.
  5. Select controls: Determine encryption scope (at rest, in transit, application-level), key management approach, and required NIST and FIPS-Validated Cryptography.
  6. Decide “addressable” outcomes: Where encryption is not used, approve compensating controls (e.g., network isolation, tokenization) and set remediation dates.
  7. Record and monitor: Document assumptions, sign-offs, and metrics; update when systems, threats, or regulations change.

Implementing Encryption Standards

Choose modern, interoperable standards and validated modules so protections are strong, maintainable, and auditable.

Data at rest

  • AES-256 Encryption for disks, volumes, object storage, databases, and backups. Prefer XTS for full-disk; use TDE or field-level encryption for databases holding ePHI.
  • Key management: Use centralized KMS or HSM, enforce separation of duties, rotate keys routinely, and protect key backups. Favor FIPS 140-3 validated modules.
  • Application-level controls: Encrypt sensitive fields (e.g., SSN, diagnoses) end-to-end; minimize plaintext exposure in logs and caches.

Data in transit

  • TLS 1.2 Compliance or newer; prefer TLS 1.3 where supported. Disable TLS 1.0/1.1 and obsolete ciphers (RC4, 3DES) and avoid SHA-1 for signatures.
  • Mutual authentication and modern suites: Use ECDHE for forward secrecy with AES-GCM or ChaCha20-Poly1305; pin certificates for high-risk interfaces when feasible.
  • Email and messaging: Enforce TLS for SMTP; use portals, S/MIME, or equivalent for PHI shared outside your trust boundary.

Algorithms and key sizes

  • Symmetric: AES-256 for long-term protection, AES-128 acceptable in constrained contexts with documented rationale.
  • Asymmetric: RSA-2048 minimum (RSA-3072 preferred) or ECC P-256/P-384 for certificates and key exchange.
  • Hashing: SHA-256 or stronger; avoid MD5 and SHA-1.

Operational safeguards

  • Run crypto in NIST and FIPS-Validated Cryptography modules (FIPS 140-3) when handling ePHI in regulated contexts.
  • Automate certificate lifecycle management; monitor expiration, revocation, and unexpected issuances.
  • Backups must be encrypted in transit and at rest, with separate keys and access paths from production.

Documenting Compliance Decisions

Documentation is how you prove your decisions were reasonable and risk-based. It also accelerates audits and incident response.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Essential records to maintain

  • Risk analysis and treatment plan: Threats, ratings, selected controls, and decision justifications for each system.
  • Encryption standards: Approved algorithms, key sizes, cipher suites, and configuration baselines.
  • Key management procedures: Generation, storage, rotation, escrow, revocation, and destruction workflows.
  • System configurations: Evidence of full-disk/database encryption, TLS settings, and FIPS mode.
  • Exceptions register: Addressable decisions not to encrypt, compensating controls, owners, and expiration dates.
  • Testing and monitoring: Pen tests, configuration scans, and continuous validation of encryption controls.
  • Incident and breach analysis: How encryption limited impact and, where applicable, supported Data Breach Notification Exemptions.

Preparing for 2025 Encryption Updates

While the HIPAA Security Rule continues to treat encryption as addressable, expectations are rising. Use 2025 to modernize crypto and close gaps that commonly drive findings and settlements.

Priorities for the year

  • Migrate to FIPS 140-3 validated cryptographic modules: Plan upgrades where you rely on legacy FIPS 140-2 implementations.
  • Standardize on TLS 1.2+ (preferably TLS 1.3): Remove legacy endpoints and weak ciphers; enforce HSTS for web apps handling ePHI.
  • Eliminate deprecated algorithms: Decommission SHA-1, 3DES, and static, non-forward-secret suites; codify this in build pipelines.
  • Post-quantum readiness: Track NIST post-quantum standards, test hybrid key exchange, and inventory where cryptography will need upgrades.
  • Strengthen key management: Centralize KMS, automate rotation, and implement least-privilege access to keys and KMS logs.
  • Align policies and training: Update procedures to reflect new baselines; verify workforce understanding through targeted exercises.

Outcomes to target

  • Consistent encryption for ePHI at rest and in transit across on-prem, cloud, and mobile.
  • Documented, repeatable processes that show why your encryption choices are reasonable and appropriate.
  • Improved eligibility for Data Breach Notification Exemptions when a lost device or stolen data is strongly encrypted and keys are protected.

Encrypting Cloud Environments

Cloud services can meet HIPAA needs when configured deliberately. Your objective is to ensure encryption is comprehensive, correctly scoped, and verifiable.

Design principles

  • Default-on encryption: Enable encryption at rest for object storage, block volumes, databases, files, and message queues; ensure snapshots and replicas inherit encryption.
  • Customer-managed keys: Use a cloud KMS or dedicated HSM with strict IAM policies, key rotation, and audit trails; consider BYOK/HYOK where risk or policy warrants.
  • FIPS endpoints and modules: Use cloud services that support FIPS-validated cryptography and verify FIPS mode where available.
  • Network encryption: Enforce TLS termination with strong suites at the edge and mTLS for service-to-service traffic handling ePHI.
  • Data minimization and tokenization: Reduce stored ePHI; replace sensitive fields with tokens where possible.
  • Continuous validation: Use configuration scanning to detect unencrypted resources, weak TLS, or public exposure.

Operational safeguards

  • Protect keys and KMS logs in separate accounts/projects; restrict break-glass procedures and monitor access in real time.
  • Encrypt infrastructure secrets (API keys, credentials) and rotate them; prefer short-lived credentials and workload identity.
  • Ensure Business Associate Agreements cover encryption responsibilities, key ownership, and incident support.

Securing Mobile Devices

Mobile endpoints are frequent sources of ePHI exposure. Treat them as high-risk and enforce strong, verifiable encryption and access controls.

Controls to implement

  • Full-disk encryption: Mandate device encryption for laptops, tablets, and phones; block enrollment of devices without hardware-backed crypto.
  • MDM enforcement: Require passcodes/biometrics, auto-lock, jailbreak/root detection, remote wipe, and disallow local backups for apps handling ePHI.
  • Containerization and DLP: Use managed work profiles to isolate ePHI; restrict copy/paste, screenshots, and data export.
  • Secure transport: Force TLS 1.2+ for all app traffic; use certificate pinning where feasible to reduce MitM risk.
  • Minimal local storage: Cache as little ePHI as possible; encrypt app data with keys bound to device and user context.

Conclusion

HIPAA’s encryption rule is addressable, but the practical expectation is clear: encrypt ePHI in transit and at rest with modern, validated cryptography, document your decisions, and continuously verify. Doing so reduces risk, supports breach notification safe harbor, and positions you to meet rising 2025 expectations without last-minute redesigns.

FAQs.

What does addressable mean for HIPAA encryption requirements?

Addressable means you must evaluate whether encryption is reasonable and appropriate for your environment. If it is, implement it. If not, you must document an equivalent alternative or a compelling, time-bound rationale with compensating controls. In nearly all modern scenarios, encrypting ePHI at rest and in transit is the most defensible choice.

How should an organization conduct a risk assessment for encryption?

Start by inventorying where ePHI is created, stored, transmitted, and backed up. Map data flows, identify threats and weaknesses (e.g., lost devices, weak TLS, exposed storage), and rate likelihood and impact. Based on that analysis, define encryption scope (at rest, in transit, and application-level), select NIST and FIPS-Validated Cryptography, set key management practices, and document any addressable exceptions with compensating controls and deadlines.

HIPAA does not prescribe specific ciphers, but regulators expect industry-standard protections. Use AES-256 Encryption for data at rest, TLS 1.2 Compliance or TLS 1.3 with forward secrecy for data in transit, modern hashes (SHA-256+), and keys managed in FIPS 140-3 validated modules. Avoid deprecated algorithms like RC4, 3DES, and SHA-1.

What are the 2025 updates to HIPAA encryption rules?

The Security Rule continues to treat encryption as an addressable implementation specification rather than a mandatory “required” control. However, 2025 priorities emphasize stronger baselines—FIPS 140-3 validated modules, TLS 1.2+ (preferably TLS 1.3), deprecation of weak algorithms, and improved key management. Plan and document upgrades accordingly, and revisit risk analyses to reflect these expectations.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles