HIPAA Risk Analysis Checklist for Small Employer Covered Entities: Encryption Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Risk Analysis Checklist for Small Employer Covered Entities: Encryption Best Practices

Kevin Henry

HIPAA

December 31, 2024

8 minutes read
Share this article
HIPAA Risk Analysis Checklist for Small Employer Covered Entities: Encryption Best Practices

HIPAA Security Rule Compliance Requirements

As a small employer covered entity, you handle electronic protected health information (ePHI) and must implement administrative safeguards and technical safeguards that reduce risk to a reasonable and appropriate level. Under the HIPAA Security Rule, encryption is an addressable implementation specification—meaning you must implement it when reasonable and appropriate, or document why an alternative, equivalent measure achieves the same protection.

Your encryption posture should be woven into a broader compliance program, including policies and procedures, workforce training, vendor oversight, and incident response. If you rely on third parties for storage, messaging, backups, or analytics, ensure responsibilities are captured in business associate agreements (BAAs).

  • Define where ePHI is created, received, maintained, or transmitted across systems and vendors.
  • Adopt policies for encryption at rest and in transit, access control, and key management.
  • Train staff on data handling, device security, and reporting of suspected incidents.
  • Establish monitoring and audit trails to verify controls are operating as intended.
  • Execute and maintain BAAs that clearly assign encryption and security obligations.

Conducting a Thorough Risk Analysis

A strong encryption strategy starts with a comprehensive, documented risk analysis that aligns controls to real exposure. Focus on how ePHI flows through your environment and where encryption can materially lower likelihood and impact of compromise.

Map ePHI and data flows

  • Inventory systems, applications, devices, databases, file shares, cloud services, and backups that store or process ePHI.
  • Diagram how ePHI moves between users, endpoints, networks, and vendors, including remote work and mobile scenarios.

Identify threats and vulnerabilities

  • Consider loss/theft of laptops or mobile devices, phishing, credential theft, misconfigurations, insecure email, and unencrypted backups.
  • Assess vendor-related risks, especially for messaging, storage, analytics, and telehealth platforms.

Evaluate likelihood and impact

  • Rate each scenario for likelihood and impact to confidentiality, integrity, and availability of ePHI.
  • Prioritize high-risk items where encryption can meaningfully reduce exposure.

Select and plan controls

  • Determine where to apply encryption at rest and in transit, and what compensating controls are required for gaps.
  • Assign owners, timelines, and success metrics; document residual risk and acceptance or remediation plans.

Assessing Encryption Applicability

Use your analysis to decide where encryption is required, how it should be applied, and when documented exceptions are acceptable. Treat encryption as the default for systems that touch ePHI, especially endpoints and communications channels.

Where encryption is typically required

  • Endpoints and mobile devices: laptops, tablets, and phones that may store ePHI offline.
  • Servers and databases: EHR, practice management, billing, analytics, and file repositories.
  • Cloud storage and backups: object storage, snapshots, and archival media.
  • Messaging and data exchange: patient portals, APIs, SFTP, and email transit.

When exceptions may be reasonable

  • Legacy systems that cannot support encryption without breaking operations, provided equivalent protections (segmentation, strict access control, continuous monitoring) are in place.
  • Transient data that never persists to disk and is already protected by secure transport and strict access controls.

Compensating controls if encryption is not implemented

  • Network isolation, deny-by-default firewall rules, and private connectivity.
  • Multi-factor authentication (MFA), least-privilege access, and robust audit logging.
  • Real-time monitoring, alerting, and prompt patching of exposed components.
  • Documented risk acceptance with executive approval and a time-bound remediation plan.

Vendor and BAA considerations

  • Confirm encryption responsibilities, key ownership, and incident notification commitments in BAAs.
  • Validate vendors’ encryption claims with attestations or configuration evidence during onboarding and annually thereafter.

Implementing Encryption Best Practices

Choose proven cryptographic methods, configure them correctly, and manage keys securely. Balance protection with usability so that staff can follow secure workflows without friction.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Data at rest

  • Use full-disk or volume encryption on laptops, desktops, and servers; prefer the AES-256 encryption algorithm with modern, validated implementations.
  • Enable database encryption (e.g., transparent data encryption) and encrypt application-level fields containing ePHI when practical.
  • Encrypt file shares and object storage; apply separate encryption for backups and snapshots.
  • Protect removable media by policy; if use is unavoidable, require encryption and strict check-in/out procedures.

Data in transit

  • Enforce the TLS 1.3 protocol for web applications, APIs, and portals; disable weak protocols and ciphers.
  • Use secure email transport with enforced TLS for domains that support it; for sensitive content, add message-level encryption or secure portals.
  • Harden SFTP and VPN tunnels with strong cryptography and MFA; restrict access by role and network.

Key management

  • Centralize keys in a secure key management system; segregate duties so administrators cannot both access data and manage keys.
  • Rotate keys on a defined schedule and after suspected compromise; never embed keys or secrets in code or images.
  • Limit who can use keys via role-based access controls; log and review all key usage.
  • Back up keys securely; test key recovery and data restoration procedures regularly.

Operational controls supporting encryption

  • Use mobile device management for enforcement of encryption, screen locks, remote wipe, and OS version baselines.
  • Maintain patching, vulnerability scanning, and hardening standards to reduce exploitation risk.
  • Train staff to avoid storing ePHI in unapproved locations and to report lost devices immediately.

Documenting Encryption Decisions

Documentation proves that your decisions are risk-based, deliberate, and maintained. It also ensures continuity when staff or vendors change.

Required artifacts

  • Encryption policy and system standards that specify algorithms, key lengths, and approved tools.
  • Data flow diagrams and an ePHI inventory indicating where encryption is applied.
  • Configuration baselines and evidence (screenshots, command outputs) showing encryption enabled.
  • Key management procedures covering generation, storage, rotation, and disposal.
  • BAAs outlining encryption responsibilities and incident coordination.

If encryption is not implemented

  • Written justification referencing the addressable implementation specification and your risk analysis.
  • Description of compensating controls, residual risk, and timelines to revisit or remediate.
  • Executive approval and periodic review entries in your risk register.

Operational evidence

  • Audit logs confirming TLS handshakes, encrypted sessions, and failed access attempts.
  • Device compliance reports (e.g., full-disk encryption status) and backup encryption verification.
  • Change records showing who modified cryptographic settings and when.

Reviewing Risk Analysis Periodically

Risk is dynamic. Revisit your analysis and encryption controls on a defined cadence and whenever your environment changes in ways that could affect ePHI.

  • Conduct a formal review at least annually and after significant events (new systems, major upgrades, vendor changes, mergers, remote-work shifts, or reported incidents).
  • Revalidate assumptions behind any encryption exceptions and update compensating controls as needed.
  • Test restores from encrypted backups and verify key recovery procedures during each review cycle.
  • Track remediation progress in a living risk register, noting owners, due dates, and verification steps.

Enforcing Access Control Measures

Encryption protects data, but access control determines who can decrypt it. Align both to minimize unauthorized use while keeping care delivery and operations efficient.

Role-based and least-privilege access

  • Define roles that map to job duties; grant only the minimum access required to ePHI.
  • Use unique user IDs, periodic access reviews, and rapid removal of access when roles change.

Strong authentication and session controls

  • Require MFA for systems with ePHI and for key management consoles.
  • Set session timeouts, device lock policies, and restrictions on copy/download where feasible.

Monitoring and response

  • Enable detailed audit logs for authentication, key use, data exports, and administrative changes.
  • Integrate alerts with incident response playbooks and conduct periodic exercises.

Vendor access under BAAs

  • Limit vendor accounts, require MFA, and log all third-party activity involving ePHI.
  • Periodically attest that vendor technical safeguards meet your encryption and access standards.

Conclusion

For small employer covered entities, the most defensible path is clear: perform a rigorous risk analysis, apply encryption at rest and in transit by default, manage keys securely, and document every decision. Pair these controls with robust access management, monitoring, and well-structured BAAs to keep ePHI protected and your HIPAA Security Rule obligations met.

FAQs.

What is the importance of risk analysis for small employer covered entities?

Risk analysis identifies where ePHI is exposed and quantifies the likelihood and impact of threats. It guides you to apply the right administrative safeguards, technical safeguards, and encryption controls where they matter most, ensuring resources are used effectively and compliance decisions are defensible.

How should encryption be applied according to HIPAA guidelines?

HIPAA treats encryption as an addressable implementation specification: implement it when reasonable and appropriate, or document a justified alternative that achieves equivalent protection. In practice, apply strong encryption by default—AES-256 for data at rest and TLS 1.3 for data in transit—supported by sound key management and access controls.

What documentation is required if encryption is not implemented?

You must record the risk-based justification, describe compensating controls, note residual risk, and obtain management approval. Include where ePHI resides, why encryption is impractical, how alternative safeguards protect it, who is responsible, target timelines, and how you will revisit the decision.

How often should risk analyses be reviewed under HIPAA?

Review at least annually and whenever material changes occur—such as new systems, vendor shifts, major upgrades, remote-work transitions, notable vulnerabilities, or security incidents. Each review should update your risk register, revalidate encryption decisions, and test key recovery and encrypted backup restores.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles