HIPAA Risk Analysis and Encryption for Small Employers: Requirements Explained
HIPAA Risk Analysis Requirements
If you sponsor a group health plan or handle plan administration, you likely create, receive, maintain, or transmit electronic protected health information (ePHI). In that case, a HIPAA risk analysis is mandatory and must cover how your organization safeguards ePHI across people, processes, and technology.
The Security Rule expects you to identify risks to confidentiality, integrity, and availability of ePHI and to implement administrative safeguards, physical safeguards, and technical safeguards that reduce those risks to a reasonable and appropriate level. For small employers, “right-sized” does not mean “minimal”; it means proportional to your actual risk profile.
Typical small-employer scenarios include enrollment files, eligibility reports, claim appeals, HRAs/FSAs, and email exchanges with TPAs, brokers, or insurers. Each touchpoint where ePHI flows must be in scope for HIPAA Security Rule compliance.
Risk Analysis Process and Scope
Define scope and inventory
Start by listing systems, vendors, and workflows that create or touch ePHI: email, file shares, HR systems, laptops, mobile devices, cloud storage, backup services, and TPA or broker portals. Map how ePHI moves between users, devices, applications, and third parties.
Identify threats and vulnerabilities
For each asset and data flow, pair realistic threats (lost laptop, phishing, misdirected email, ransomware, misconfigured cloud) with vulnerabilities (no encryption, weak access control, lack of MFA, unpatched systems). Note existing controls that already mitigate risk.
Evaluate, prioritize, and treat risk
Rate likelihood and impact, then prioritize remediation. Common treatments include enabling encryption, enforcing MFA, tightening access, improving logging, and eliminating unnecessary ePHI storage. Where you accept residual risk, record the rationale and monitoring plan.
Risk assessment documentation
Your risk assessment documentation should show scope, methodology, findings, chosen controls, owners, timelines, and verification steps. Review it at least annually and upon major change (new vendor, system, location, or process) to keep it defensible.
Encryption as a Safeguard
Encryption is one of the strongest technical safeguards for reducing breach risk. Properly implemented encryption at rest and in transit protects ePHI if a device is lost, a file is misdirected, or network traffic is intercepted, and it can qualify you for breach “safe harbor” when encrypted data is compromised.
High-value use cases include laptops and phones, removable media, on-prem and cloud file stores, databases, backups, and email. When encryption is impractical, you must use compensating controls that provide equivalent protection and document why they are reasonable and appropriate.
Encryption Standards and Guidelines
Follow NIST encryption guidance
Use algorithms and configurations consistent with NIST encryption guidance: AES-GCM for data at rest and transport, TLS 1.2 or higher for data in transit, strong key lengths (for example, AES-256, RSA-2048/ECC), and secure cipher suites. Disable obsolete protocols and ciphers.
Use FIPS-validated cryptography
Select products that rely on FIPS-validated cryptography (FIPS 140-2/140-3) wherever feasible, especially for storage, VPN, and key management. Prefer platform-native options like BitLocker and FileVault, mobile OS device encryption with strong passcodes, and reputable cloud KMS/HSM services.
Key management and operations
Protect encryption keys with separation of duties, restricted access, rotation, and secure storage. Enforce MFA for administrators, back up keys securely, document recovery procedures, and log key use. Test restores so encrypted backups remain usable during an incident.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentAddressable vs Required Specifications
Under the Security Rule, encryption is an “addressable” implementation specification. Addressable does not mean optional. You must implement it if reasonable and appropriate—or implement an alternative that achieves the same purpose—and document your analysis and decision.
In practice, for portable devices, remote work, cloud services, and email, encryption is typically the most reasonable and appropriate control. Many contracts and some state laws also expect encryption, making it the prudent default for HIPAA Security Rule compliance.
Documentation and Compliance
What to document
- Risk analysis scope, findings, and decisions, including why encryption was enabled or any justified alternative.
- Risk management plan with owners, timelines, and verification steps.
- Policies and procedures covering administrative safeguards and technical safeguards, including encryption standards and key management.
- Workforce training records, device and system inventories, configuration baselines, and change logs.
- Business associate agreements, data flow diagrams, incident response plans, and periodic evaluation results.
Keep it current
Update documentation after significant changes and at least annually. Verify that controls are working: sample devices for full-disk encryption, review email TLS reports, validate backup encryption, and test key recovery. Retain records to demonstrate consistent compliance over time.
Considerations for Small Employers
Right-size your program by minimizing where ePHI lives, favoring secure portals over email attachments, and standardizing on platform-native encryption. Require MFA, least-privilege access, and automatic device lock with remote wipe for mobile users.
Leverage vendors that provide FIPS-validated cryptography and are prepared to sign a business associate agreement. Build a short, prioritized roadmap: enable full-disk encryption, enforce TLS, secure cloud storage with KMS, harden admin access, and train staff on handling ePHI.
Finally, verify what HIPAA applies to in your role as plan sponsor. Fully insured plans may limit the ePHI you receive; self-funded arrangements usually expand your obligations. Tailor controls and documentation accordingly.
FAQs
What is required in a HIPAA risk analysis?
You must identify where ePHI resides and flows, catalog threats and vulnerabilities, assess likelihood and impact, and select controls that reduce risk to a reasonable and appropriate level. The output is formal documentation—scope, findings, decisions, timelines, and evidence—that you review at least annually and after major changes.
When is encryption mandatory under HIPAA?
Encryption is an addressable specification, which means you must implement it when reasonable and appropriate or implement an equally effective alternative and document your rationale. For laptops, mobile devices, backups, cloud storage, and routine email, encryption is typically the most appropriate control and should be treated as mandatory in practice.
How should small employers document HIPAA compliance?
Maintain risk assessment documentation, a risk management plan, policies and procedures for administrative safeguards and technical safeguards, training logs, device and system inventories, encryption configurations and key management records, BAAs, incident response plans, and periodic evaluations showing controls work as intended.
What are the changes in proposed HIPAA encryption rules?
Proposals and policy initiatives have emphasized stronger alignment with NIST encryption guidance and broader use of FIPS-validated cryptography. As of November 26, 2025, no final rule has changed encryption’s “addressable” status under the Security Rule; the direction of travel is toward making encryption the expected baseline for data at rest and in transit, with documented exceptions only in narrowly justified cases.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment