HIPAA Risk Assessment Checklist for Business Associates: What to Include
Conduct Annual Risk Assessments
Start with a formal, documented risk analysis that identifies how your organization creates, receives, maintains, or transmits Protected Health Information (PHI) and Electronic Protected Health Information (ePHI). The HIPAA Security Rule expects an ongoing, risk-based approach—not a one-time exercise.
Perform assessments at least annually and whenever you introduce new systems, integrations, vendors, or workflows. Include all locations where ePHI could exist: cloud services, endpoints, backups, messaging tools, and subcontractors.
- Inventory assets and data: systems, applications, databases, devices, and repositories that store or process ePHI.
- Map data flows end-to-end to understand access points, transmission paths, and storage locations.
- Identify threats and vulnerabilities, then evaluate likelihood and impact to produce risk ratings.
- Prioritize and plan remediation with clear owners, timelines, and acceptance criteria.
- Document results, leadership approvals, and residual risk decisions for audit readiness.
- Re-test controls and track closure of corrective actions over time.
Develop Policies and Procedures
Translate risk analysis findings into actionable policies and procedures aligned to the Administrative Safeguards, as well as physical and technical safeguards under the HIPAA Security Rule. Keep the “minimum necessary” standard central to every policy.
- Access management: role-based access, authorization workflows, provisioning/deprovisioning, and periodic access reviews.
- Authentication and session security: strong passwords, multi-factor authentication, session timeouts, and device lock rules.
- Encryption and key management: approved algorithms for data in transit and at rest, and secure key handling.
- Change, patch, and vulnerability management: risk-based patch SLAs, scanning cadence, and remediation tracking.
- Device and media controls: portable media restrictions, secure transfer, reuse, and disposal procedures.
- Remote work and mobile use: BYOD standards, endpoint protection, and secure connectivity.
- Vendor and subcontractor oversight, including Business Associate Agreement management and due diligence.
- Incident response and breach handling aligned to the Breach Notification Rule and contractual obligations.
- Sanction policy, acceptable use, data retention, and secure destruction.
Make procedures specific and repeatable with step-by-step instructions and required forms. Use version control, assign owners, and review at least annually or after significant changes.
Maintain Compliance Documentation
Maintain a centralized, organized repository that demonstrates how you meet HIPAA requirements. Retain compliance records for the required period and ensure they are readily retrievable for audits and client inquiries.
- Current and prior risk analysis reports, risk registers, and risk treatment plans.
- Approved policies and procedures with revision history and leadership sign-off.
- Training materials, attendance logs, and role-based curricula.
- Executed Business Associate Agreements and subcontractor agreements with flow-down terms.
- System inventories, data flow diagrams, and architecture overviews.
- Audit logs, access reviews, and evidence of monitoring and alert response.
- Incident and breach reports, investigation notes, containment actions, and lessons learned.
- Contingency plans, backup/restore tests, and business continuity documentation.
- Vulnerability scan results, penetration test summaries, and remediation evidence.
Implement Security Measures
Deploy layered safeguards that reduce identified risks to reasonable and appropriate levels. Align control selection with your environment, data sensitivity, and contractual obligations.
- Technical safeguards: encryption in transit and at rest, multi-factor authentication, least-privilege access, network segmentation, endpoint protection, secure configurations, and automated patching.
- Monitoring and response: centralized logging, alerting, anomaly detection, audit trails, and timely investigation workflows.
- Data protection: backups with periodic restore testing, immutable or offline copies, and secure key/secret management.
- Secure development: code reviews, dependency scanning, secret scanning, and secure SDLC practices.
- Physical safeguards: facility access controls, visitor management, workstation security, and secure media disposal.
- Administrative safeguards: governance, risk management, vendor oversight, change control, and contingency planning.
If you use cloud services, define shared responsibilities clearly, ensure coverage under a Business Associate Agreement, and verify configurations through continuous assessment.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentProvide Staff Training
Educate your workforce so they understand their responsibilities for protecting ePHI and fulfilling client and regulatory requirements. Training supports the Administrative Safeguards and reduces human-driven risk.
- Deliver onboarding and recurring training tailored to roles (e.g., developers, support, sales, and leadership).
- Address privacy principles, acceptable use, minimum necessary, and secure handling of PHI/ePHI.
- Include phishing awareness, secure remote work practices, and procedures for reporting incidents quickly.
- Test comprehension, track completion, and remediate gaps with targeted refreshers.
Keep detailed records of training dates, attendees, materials, and assessments to demonstrate effectiveness and consistency.
Ensure Business Associate Agreements
Execute a Business Associate Agreement with every covered entity client and with any subcontractor that handles ePHI on your behalf. The BAA clarifies permitted uses and disclosures and codifies safeguards and reporting duties.
- Define permitted uses/disclosures, minimum necessary, and prohibitions on unauthorized access.
- Require appropriate safeguards aligned to the HIPAA Security Rule and document evidence upon request.
- Flow down obligations to subcontractors and maintain proof of their compliance.
- Specify security incident and breach reporting expectations consistent with the Breach Notification Rule.
- Address audit rights, cooperation duties, data return/destruction, and termination provisions.
- Review and update BAAs when services, data types, or regulatory expectations change.
Maintain an up-to-date BAA inventory, including service scope, contacts, and notification procedures, so you can respond quickly when incidents occur.
Establish Incident Response Procedures
Prepare to detect, triage, contain, investigate, and report security incidents that could impact ePHI. A rehearsed plan reduces impact and supports timely coordination with clients and regulators.
- Define roles and responsibilities, escalation paths, and 24/7 reporting channels for suspected incidents.
- Standardize triage, containment, forensic preservation, root-cause analysis, eradication, and recovery steps.
- Assess whether an event constitutes a breach and follow contractual and regulatory reporting requirements.
- Coordinate with covered entities per BAA terms, including status updates, impact assessments, and remediation actions.
- Maintain incident logs, communications templates, and evidence handling guidelines.
- Conduct post-incident reviews and implement improvements to prevent recurrence.
In summary, a thorough HIPAA risk assessment program for business associates combines disciplined risk analysis, clear policies, strong safeguards, rigorous documentation, trained staff, enforceable BAAs, and a tested response plan. Together, these elements demonstrate due diligence and protect PHI and ePHI throughout their lifecycle.
FAQs
What are the key components of a HIPAA risk assessment for business associates?
Key components include a defined scope covering all systems and vendors that handle ePHI, an asset and data flow inventory, threat and vulnerability identification, likelihood and impact scoring, a prioritized remediation plan with owners and timelines, documentation of decisions and residual risk, and a cadence for validation and continuous improvement.
How often should business associates conduct HIPAA risk assessments?
Conduct a comprehensive assessment at least annually and whenever you introduce significant changes—such as new platforms, integrations, locations, or subcontractors. Complement the annual cycle with continuous monitoring, periodic access reviews, and targeted mini-assessments after notable incidents or findings.
What security measures are required to protect ePHI?
Required safeguards span administrative, technical, and physical controls: role-based access and least privilege, multi-factor authentication, encryption for data in transit and at rest, secure configurations and patching, endpoint protection, centralized logging and monitoring, backup and recovery testing, vendor oversight with BAAs, facility access controls, and secure media handling and disposal.
How should incidents and breaches be reported and managed?
Report suspected incidents immediately through your defined channels, initiate triage and containment, preserve evidence, and evaluate impact on ePHI. Coordinate promptly with covered entities per your Business Associate Agreement, follow the Breach Notification Rule as applicable, document all actions, and complete a lessons-learned review to strengthen controls.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment