HIPAA MFA Requirements: Does HIPAA Require Multi‑Factor Authentication and How to Comply

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA MFA Requirements: Does HIPAA Require Multi‑Factor Authentication and How to Comply

Kevin Henry

HIPAA

September 02, 2025

6 minutes read
Share this article
HIPAA MFA Requirements: Does HIPAA Require Multi‑Factor Authentication and How to Comply

HIPAA Security Rule and Authentication

As of February 19, 2026, the HIPAA Security Rule requires you to verify the identity of any person or entity seeking access to electronic Protected Health Information (ePHI), but it does not expressly mandate multi‑factor authentication (MFA). The technical safeguards focus on access control, person or entity authentication, transmission security, and related measures that together determine how ePHI access controls are enforced.

Practically, this means you must implement reliable authentication but retain flexibility in how you accomplish it. Many organizations already use MFA because single‑factor logins are vulnerable to phishing and credential theft. However, the current baseline is that you must ensure only authorized users gain access to systems that create, receive, maintain, or transmit ePHI.

Proposed HIPAA Security Rule Amendment

The proposed HIPAA Security Rule amendment modernizes authentication by explicitly defining and requiring MFA. If finalized as drafted, you would need to deploy MFA across “relevant electronic information systems” and require it for any action that changes a user’s privileges—strongly reinforcing privileged account security. The proposal also clarifies that safeguards must be written, tested, and reviewed regularly, elevating cybersecurity practice from policy statements to operational controls.

Importantly, this is a proposal. Until a final rule is issued and takes effect, the existing Security Rule remains in force. That said, planning now for MFA adoption will reduce risk and ease the transition should the amendment become binding.

Acceptable MFA Methods

The proposal defines MFA by outcomes rather than by brand or product. To comply, your authentication must verify at least two of the following three factors for each login:

  • Something you know: a password or passphrase.
  • Something you have: a hardware token, smart card, or cryptographic key; an authenticator app generating one‑time codes; or a secure push prompt.
  • Something you are: biometrics such as fingerprint or facial recognition.

Under multi‑factor authentication standards, two instances of the same factor (e.g., password + PIN) do not constitute MFA. When feasible, favor phishing‑resistant authenticators (for example, FIDO2/WebAuthn “passkeys” or smart cards) for systems that contain or can reach ePHI. Biometric authentication in healthcare should be paired with a possession or knowledge factor and include a non‑biometric fallback for clinical realities (gloves, masks, injuries).

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Exemptions to MFA Requirement

The proposal includes narrow exemptions recognizing real‑world constraints. MFA would not be required when:

  • The technology asset cannot support MFA and you have a written, time‑bound migration plan to move ePHI to assets that do support MFA.
  • An emergency or other adverse event makes MFA temporarily infeasible and you activate emergency access procedures and compensating controls to protect ePHI.
  • Specific FDA‑authorized medical devices meet outlined conditions (for example, submissions received before March 29, 2023, or devices that are no longer supported) and you implement manufacturer‑recommended security measures. Where an exception applies, you must document it in real time and deploy compensating controls, then review those controls at least annually.

Implementation of MFA

1) Establish scope and priorities

Inventory users, applications, and “relevant electronic information systems,” then map how ePHI flows through them. Prioritize remote access, clinical systems (EHR, imaging, pharmacy), and administrative/privileged accounts. Treat identity providers, VPNs, email, and cloud services as high‑impact entry points.

2) Choose authentication patterns

Adopt a central identity platform (SSO/IdP) that enforces MFA consistently across on‑prem and cloud apps. Standardize on strong factors (hardware keys or platform passkeys) where practical, while offering authenticator apps or one‑time codes for users and workflows that cannot yet adopt cryptographic authenticators.

3) Design for clinical workflows

In shared workstation areas, use techniques like fast re‑auth with badges or short‑lived sessions to maintain speed without weakening controls. Provide offline methods (backup codes or hardware authenticators) for connectivity‑constrained environments and ensure session timeouts reflect clinical risk.

4) Protect privileged access

Require MFA for all admin actions and any privilege‑escalation event. Implement just‑in‑time elevation with step‑up MFA for high‑risk functions (e.g., modifying access rights, changing audit settings, or administering ePHI repositories).

5) Integrate emergency access procedures

Define break‑glass workflows that preserve patient safety while enforcing accountability—pre‑authorized emergency accounts, short‑term access windows, heightened logging, and post‑event review. Train staff on when and how to invoke emergency access.

6) Document exceptions and compensating controls

For systems that cannot support MFA today, record the rationale, risk, and timeline to remediate. Implement compensating measures (e.g., network segmentation, strict ePHI access controls, enhanced monitoring) and review them at least annually or after environmental changes.

7) Test, monitor, and maintain

Continuously validate factor strength, enrollment coverage, and policy drift. Monitor for MFA fatigue and push‑spam tactics; use number‑matching or phishing‑resistant authenticators to reduce bypass risk. Update procedures as software and devices evolve.

Compliance Considerations

Align your risk analysis and risk management plan to account for MFA across all relevant systems. Put policies and procedures in writing, test them, and refresh them regularly. Update workforce training to cover secure factor enrollment, device hygiene, emergency access, and reporting of lost tokens or suspected compromise.

Review business associate arrangements to ensure downstream partners that access your systems or ePHI meet your authentication expectations. Keep robust audit trails showing where MFA is enforced, how exceptions are handled, and how privileged account security is maintained. Early adoption—especially of phishing‑resistant options—helps you meet the spirit of the proposed HIPAA Security Rule amendment while reducing near‑term breach risk.

FAQs.

Does HIPAA currently require multi-factor authentication?

No. The current Security Rule requires you to authenticate users but does not explicitly require MFA. However, a proposed amendment would make MFA mandatory in specific ways once finalized. Until then, the existing requirements remain in effect.

What MFA methods are acceptable under the proposed HIPAA amendment?

Any method that verifies at least two distinct factors—something you know, something you have, and something you are—meets the proposal’s definition. Strong choices include hardware security keys or smart cards combined with a PIN or biometric, authenticator apps that generate one‑time codes, and secure push prompts. Biometrics should be paired with a possession or knowledge factor and include alternatives for clinical scenarios.

Are there exemptions to the HIPAA MFA mandate?

Yes, but they are narrow. Exceptions cover technology that cannot support MFA (with a documented migration plan), declared emergencies where MFA is infeasible (using emergency access procedures and compensating controls), and specific FDA‑authorized medical devices under defined conditions. All exceptions must be documented, protected with compensating controls, and reviewed periodically.

How should healthcare organizations prepare for the MFA requirement?

Start with an inventory of systems and ePHI access points, then prioritize MFA for remote access, clinical apps, and administrative accounts. Standardize on strong, phishing‑resistant authenticators where feasible; design for clinical workflows and break‑glass needs; update policies, training, and business associate agreements; and document exceptions with timelines and compensating safeguards. Early preparation streamlines compliance and strengthens your security posture.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles