HIPAA Risk Assessment & Audit: What’s Required, How to Prepare, and Step-by-Step Checklist
HIPAA Risk Assessment Requirement
A HIPAA risk assessment is a foundational obligation under the HIPAA Security Rule §164.308(a)(1)(ii)(A). You must conduct an accurate and thorough assessment of risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (ePHI). This is not optional, and it applies to covered entities and business associates that create, receive, maintain, or transmit ePHI.
The requirement spans all three safeguard categories: administrative safeguards (governance, policies, workforce practices), physical safeguards (facility and device protections), and technical safeguards (access controls, encryption, monitoring). An effective assessment examines how each safeguard mitigates threats and where gaps remain.
What the law expects
- Define scope that includes all ePHI systems, data flows, and storage locations.
- Identify threats, vulnerabilities, and existing controls across administrative, physical, and technical safeguards.
- Analyze likelihood and impact to determine risk levels and prioritize remediation.
- Document findings and implement a risk management plan; update it as your environment changes.
Business associate oversight
Business associate oversight is integral to compliance. You must evaluate vendors’ security posture before and during the relationship, execute appropriate business associate agreements, and include vendor-related risks in your risk register and remediation plan.
Risk Assessment Scope and Frequency
Scope should track where ePHI is created, received, maintained, or transmitted. Include EHR platforms, cloud services, backup systems, medical devices, messaging tools, email, mobile/BYOD, data warehouses, integration engines, and any third parties handling ePHI. Map data flows end-to-end so no pathway is overlooked.
The Security Rule does not prescribe a fixed cadence, but it requires ongoing, periodic risk analysis. In practice, conduct a full assessment annually or whenever material changes occur—such as new systems, mergers, telehealth rollouts, major configuration changes, or security incidents. Between full cycles, perform targeted mini-assessments for significant changes and update your risk register to reflect residual risk.
Right-sizing frequency
- High-change or high-risk environments: continuous monitoring plus semiannual focused reviews.
- Lower-change environments: annual enterprise-wide assessment with quarterly refresh of top risks.
- Always reassess after incidents, audits, or major technology/vendor changes.
Key Steps in Risk Assessment
1) Define scope and method
Establish governance, roles, and a documented methodology (for example, aligned to NIST risk analysis practices). Clarify objectives, risk criteria, rating scales, and evidence requirements. Set the inventory baseline for assets, users, data flows, and third parties handling ePHI.
2) Inventory ePHI and map data flows
List systems and repositories containing ePHI and chart how data moves across networks, applications, interfaces, and vendors. Include storage, transmission, and disposal points. This prevents scope blind spots and surfaces hidden dependencies.
3) Identify threats and vulnerabilities
Enumerate credible threats (malware, phishing, insider misuse, device loss/theft, service outages, natural hazards) and map vulnerabilities (missing patches, weak authentication, poor logging, inadequate physical access controls, policy gaps, insufficient training). Consider administrative, physical, and technical safeguards when evaluating exposure.
4) Evaluate existing controls
Document implemented controls and their operating effectiveness: policies and procedures, workforce security, facility protections, device/media controls, identity and access management, encryption, network segmentation, auditing and monitoring, incident response, and backup/DR capabilities. Note gaps and compensating controls.
5) Analyze likelihood and impact
Score each risk using defined scales (for example, 1–5) for likelihood and impact on confidentiality, integrity, and availability of ePHI. Derive an overall risk rating, and note assumptions, evidence, and uncertainty. Prioritize high and critical risks first.
6) Record in a risk register
Log each risk in a risk register with a clear description, affected assets/data flows, inherent risk, existing controls, residual risk, owner, due date, and planned treatment. Tag vendor-related items for business associate oversight and track dependencies across safeguards.
7) Report and validate
Consolidate results into an executive report and a technical appendix. Validate findings with system owners and leadership, finalize ratings, and obtain formal approval to proceed with remediation.
Step-by-Step Checklist
- Establish governance, scope, and method aligned to HIPAA Security Rule §164.308(a)(1)(ii)(A).
- Inventory ePHI assets and map data flows (create/update diagrams).
- Identify threats and vulnerabilities across administrative, physical, and technical safeguards.
- Assess control effectiveness; collect evidence and note gaps.
- Rate likelihood and impact; calculate risk levels.
- Populate and approve the risk register with owners and deadlines.
- Deliver a report with prioritized remediation actions and next steps.
Documentation and Reporting Practices
Maintain comprehensive, version-controlled documentation. At minimum, keep your methodology, scope statement, asset inventory, data flow diagrams, threat/vulnerability catalog, control evaluation notes, risk rating rationale, finalized risk register, and the approved risk management plan.
Preserve supporting evidence: screenshots, configurations, policy excerpts, training records, system logs, backup/restore tests, and vendor due diligence artifacts. Include business associate oversight records—BAAs, security questionnaires, certifications/attestations, and remediation commitments.
Reporting structure
- Executive summary: top risks to ePHI, trend lines, and required decisions.
- Method and scope: how you assessed, what you included/excluded, and why.
- Findings: risks grouped by safeguard category and severity.
- Risk register: sortable table with owners, target dates, and status.
- Appendices: evidence index and system-by-system details.
Retain risk assessment documentation and related decisions for at least six years. Record approval dates, review cycles, and exceptions to ensure traceability during audits.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentDeveloping an Effective Remediation Plan
Translate prioritized risks into a time-bound remediation plan. For each item, define the treatment strategy—mitigate, transfer, avoid, or accept—along with the required administrative, physical, and technical safeguards. Assign accountable owners, budget, milestones, and success metrics.
Prioritization logic
- Address high residual risk items that materially affect ePHI first (for example, weak access controls or missing backups).
- Sequence “quick wins” that reduce broad attack surface (MFA, least privilege, patching) while planning long-lead initiatives (network segmentation, EDR, DR site hardening).
- Bundle related fixes to reduce operational disruption and validate improvements through testing.
Embedding vendor actions
Fold business associate oversight into the plan: remediation deadlines in contracts, evidence requirements (e.g., encryption at rest/in transit), periodic attestations, and triggers for re-evaluation. Reflect vendor progress in the risk register and escalate if commitments slip.
Conducting Risk Assessment Reviews
Hold structured reviews to verify progress, update ratings, and confirm control effectiveness. Reassess high-risk areas after remediation to measure residual risk and close items only with evidence. Keep leadership informed with concise dashboards tied to the risk register.
When to revisit
- After significant changes to systems, networks, or vendors handling ePHI.
- After incidents, vulnerabilities, or newly discovered threats.
- On a scheduled cadence aligned to your policy (for example, quarterly reviews, annual full reassessment).
Use tabletop exercises and control testing to validate administrative safeguards (training, sanctions, procedures), physical safeguards (facility access, device/media controls), and technical safeguards (authentication, encryption, logging, alerting).
Preparing for a HIPAA Risk Audit
Auditors look for a current, enterprise-wide risk assessment, a living risk register, and a risk management plan that drives tangible action. They also expect evidence of business associate oversight, workforce training, incident response capability, and backup/DR testing that protects ePHI.
Audit prep playbook
- Build an evidence “data room” mapped to Security Rule standards, including §164.308(a)(1)(ii)(A).
- Confirm the assessment’s scope, dates, approval, and version history; highlight changes since the last cycle.
- Stage the risk register with status, owners, and proof of completed remediation.
- Compile vendor artifacts (BAAs, assessments, certifications) to demonstrate business associate oversight.
- Brief SMEs, rehearse walkthroughs, and assign a single audit coordinator to manage requests.
Common pitfalls to avoid
- Narrow scope that omits cloud apps, interfaces, or mobile workflows containing ePHI.
- Static documents with no linkage to remediation or measurable outcomes.
- Missing evidence for controls or vendor assurances.
Conclusion
A compliant HIPAA risk assessment aligns to §164.308(a)(1)(ii)(A), covers all ePHI pathways, and feeds a prioritized remediation plan tracked in a risk register. Routine reviews, documented business associate oversight, and disciplined audit preparation turn analysis into sustained protection for confidentiality, integrity, and availability.
FAQs
What is mandatory under the HIPAA Security Rule for risk assessments?
You must perform an accurate and thorough assessment of risks and vulnerabilities to ePHI and manage identified risks. Practically, that means scoping all ePHI, evaluating threats and safeguards, rating risk, documenting results, and executing a risk management plan under HIPAA Security Rule §164.308(a)(1)(ii)(A).
How often should HIPAA risk assessments be conducted?
Conduct a full enterprise-wide assessment at least annually and whenever significant changes occur—new systems, major configurations, vendor changes, or security incidents. Supplement with interim reviews to keep your risk register and residual risk ratings current.
What components must be included in risk assessment documentation?
Include your methodology and scope, asset and ePHI inventories, data flow diagrams, threats and vulnerabilities, control evaluations, risk ratings, the approved risk register, remediation plan, and evidence (policies, logs, training, vendor due diligence). Maintain records for at least six years.
How should remediation plans be prioritized after an assessment?
Prioritize by residual risk and potential impact on confidentiality, integrity, and availability of ePHI. Tackle high-risk gaps first, sequence quick wins and long-lead efforts, assign accountable owners and timelines, incorporate business associate oversight tasks, and measure progress until risks are reduced or formally accepted.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment