HIPAA Risk Assessment for Business Associates: Requirements and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Risk Assessment for Business Associates: Requirements and Best Practices

Kevin Henry

HIPAA

May 18, 2024

7 minutes read
Share this article
HIPAA Risk Assessment for Business Associates: Requirements and Best Practices

HIPAA Risk Assessment Requirement

As a business associate, you must perform a formal risk assessment to identify threats to the confidentiality, integrity, and availability of Electronic Protected Health Information (ePHI) you create, receive, maintain, or transmit. This requirement applies whether you host systems, process claims, provide analytics, or deliver support services for covered entities.

Your assessment should be organization-wide and include all environments where ePHI may reside: production platforms, development and test systems, cloud services, endpoints, and backups. Contractual obligations in your Business Associate Agreement often refine scope, reporting timelines, and evidence expectations, so align your work with those terms from the outset.

Conduct the assessment initially, review it at least annually, and repeat it whenever significant changes occur—such as new applications, cloud migrations, mergers, major workforce shifts, or security incidents. Document methods, assumptions, findings, and decisions so you can demonstrate due diligence and trace remediation progress over time.

Use a recognized Risk Management Framework to structure your approach, define risk criteria, and drive consistent scoring. Your outputs should include a current asset and data-flow inventory for ePHI, a risk register with likelihood/impact ratings, and prioritized remediation actions tied to accountable owners and deadlines.

Risk Assessment Process

1) Define context and criteria

Set objectives, scope systems that handle ePHI, and agree on risk scales for likelihood and impact. Establish how you will evaluate confidentiality, integrity, and availability, and align acceptance thresholds with leadership’s risk appetite and your contractual obligations.

2) Inventory assets and map ePHI data flows

Create an asset inventory covering applications, databases, endpoints, networks, and cloud resources. Map how ePHI enters, moves through, and leaves your environment, including transfers to covered entities and subcontractors. This prevents blind spots and ensures all storage and transmission paths are assessed.

3) Identify threats and vulnerabilities

Evaluate technical, human, and environmental threats—such as phishing, misconfigurations, unpatched software, insecure APIs, weak credentials, and loss or theft of devices. Note process and design weaknesses, including insufficient role-based access, lack of segregation of duties, or inadequate change control.

4) Analyze likelihood and impact

Estimate how probable each threat event is and the potential impact on ePHI and operations. Consider business disruption, safety implications, reputational harm, regulatory penalties, and downstream effects on covered entities and patients.

5) Evaluate existing controls

Assess the effectiveness of Administrative Safeguards, Physical Security Standards, and Technical Security Controls already in place. Validate configurations, logging coverage, alerting, backup restorations, and workforce training results rather than relying on policy statements alone.

6) Determine risk and document

Assign risk ratings, capture clear risk statements, list affected assets and data flows, and specify recommended treatments. Record dependencies, required resources, and any interim compensating controls if permanent fixes need time.

7) Report and obtain approval

Produce an executive summary, risk heat map, and a detailed risk register. Present findings to leadership for decisions on acceptance, mitigation, transfer, or avoidance. Establish Security Incident Reporting thresholds and escalation contacts as part of the deliverables.

8) Monitor and refresh

Schedule reassessments, vulnerability scanning, and penetration testing. Track remediation progress and re-score risks as controls are implemented or the environment changes.

Compliance with Security Rule

Administrative Safeguards

Implement policies and procedures for risk analysis and risk management, workforce security, role-based access, training, sanction processes, and contingency planning. Perform regular evaluations, document decisions, and ensure your Business Associate Agreement commitments are reflected in internal procedures.

Physical Security Standards

Control facility access, secure workstations, and manage device and media lifecycle (receipt, movement, reuse, and disposal). For remote and hybrid work, address screen privacy, locked storage, and secure transport of devices to reduce exposure of ePHI outside controlled offices.

Technical Security Controls

Enforce strong access control with unique user IDs, least-privilege roles, and multi-factor authentication. Protect ePHI with encryption in transit and at rest, maintain audit controls and immutable logs, verify integrity, and secure transmissions through hardened configurations and key management. Continuously patch and baseline systems, segment networks, and implement endpoint protection with centralized monitoring.

Security Incident Reporting

Define what constitutes an incident, how to detect and triage, and when to escalate internally and to covered entities. Maintain timelines, evidence handling procedures, and post-incident reviews so you can document actions taken and improvements made.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Breach Notification Obligations

When there is an impermissible use or disclosure of unsecured PHI, evaluate it using the four-factor risk assessment: the nature and extent of PHI involved, the unauthorized person who used or received it, whether the PHI was actually acquired or viewed, and the extent to which the risk has been mitigated. Document your analysis and decision.

You must notify the covered entity without unreasonable delay and no later than 60 calendar days from discovery. Your Business Associate Agreement may impose shorter timelines (for example, 5–15 days), so build processes that meet the most stringent requirement you face. Include incident details, affected data types, the number of individuals involved, steps you have taken, and recommended protective actions.

Differentiating incidents from breaches is essential; escalate immediately, investigate quickly, and preserve evidence. If law enforcement requests a delay, record the request and follow the specified timeframe while maintaining internal containment and remediation.

Subcontractor Compliance

If you engage subcontractors to create, receive, maintain, or transmit ePHI, you must ensure they follow the same restrictions and safeguards you do. Flow down obligations through a subcontractor Business Associate Agreement that covers security requirements, Security Incident Reporting timelines, right-to-audit, and data return or destruction on termination.

Perform due diligence before onboarding: review security policies, control designs, independent assessments, and relevant certifications. Validate encryption, access control, logging, and secure software development practices. Monitor performance with periodic attestations, targeted assessments, and risk-based testing, and enforce corrective actions when gaps appear.

Risk Management Plan

Prioritize and treat risks

Decide whether to mitigate, transfer, avoid, or accept each risk based on business impact and risk appetite. Use interim compensating controls when immediate remediation is not feasible, and set explicit expiration dates for any accepted risks.

Plan of Action and Milestones

Create a living plan that links each risk to tasks, owners, budgets, due dates, and success criteria. Include dependencies (for example, identity modernization before privileged access changes) and define how you will validate control effectiveness.

Control implementation focus areas

  • Identity and access: role-based access, periodic reviews, privileged access management, and MFA.
  • Data protection: encryption, key management, data loss prevention, and secure disposal.
  • Vulnerability and patching: defined SLAs, risk-based prioritization, and verification testing.
  • Resilience: backups, disaster recovery testing, and business continuity playbooks.
  • Monitoring and response: centralized logging, detection engineering, and rehearsed incident procedures.
  • Workforce readiness: targeted training, phishing simulations, and clear runbooks.

Measure and report

Track key performance and risk indicators such as critical vulnerability age, patch compliance, MTTD/MTTR for incidents, training completion, and backup restore success. Report status to leadership and covered entities as required, and update risk ratings as controls mature.

Governance and continuous improvement

Establish a cadence for risk reviews, internal audits, and management approvals. Keep evidence repositories current, align budget to risk priorities, and recalibrate plans after changes or incidents to maintain alignment with your Risk Management Framework.

Conclusion

A strong HIPAA risk assessment identifies where ePHI resides, what can go wrong, and how you will reduce risk through targeted safeguards. By aligning with the Security Rule, enforcing subcontractor obligations, and executing a measurable risk management plan, you protect patients, support covered entities, and demonstrate trustworthy stewardship of health data.

FAQs

What are the key steps in a HIPAA risk assessment for business associates?

Define scope and criteria; inventory assets and map ePHI data flows; identify threats and vulnerabilities; analyze likelihood and impact; evaluate current Administrative Safeguards, Physical Security Standards, and Technical Security Controls; document risks and treatments; obtain leadership approval; and monitor progress with scheduled reassessments.

How must business associates handle subcontractor compliance?

Flow down obligations through a subcontractor Business Associate Agreement, perform risk-based due diligence before onboarding, validate core controls and Security Incident Reporting timelines, monitor performance with periodic reviews, and ensure secure data return or destruction when the relationship ends.

When should a business associate report a breach?

Notify the covered entity without unreasonable delay and no later than 60 calendar days from discovery, or sooner if your contract requires it. Escalate incidents immediately, conduct the four-factor assessment, document decisions, and include all required details to support timely notifications and remediation.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles