HIPAA Risk Assessment Requirements for Covered Entities and Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Risk Assessment Requirements for Covered Entities and Business Associates

Kevin Henry

Risk Management

May 12, 2024

5 minutes read
Share this article
HIPAA Risk Assessment Requirements for Covered Entities and Business Associates

Overview of HIPAA Risk Assessment

A HIPAA risk assessment is the systematic process you use to identify, evaluate, and prioritize threats to the confidentiality, integrity, and availability of electronic protected health information (ePHI). Both covered entities and business associates must complete an accurate, thorough assessment as a core part of security rule compliance.

The assessment has two parts: risk analysis (understanding your risks) and risk management (treating them). The outcome should be a prioritized risk register, clear remediation plans, and documented evidence that your administrative safeguards and technical safeguards are appropriate to your environment.

Identifying Risks to ePHI

Define scope and assets

Start by inventorying where ePHI is created, received, maintained, or transmitted. Include EHR platforms, patient portals, email, cloud storage, mobile devices, medical IoT, imaging systems, APIs, backups, and third-party services.

Threats and vulnerability identification

Map realistic threat scenarios and perform vulnerability identification. Consider misconfigurations, weak access controls, unpatched software, insecure integrations, ransomware, phishing, insider misuse, lost or stolen devices, and improper data disposal.

Third-party and vendor risk

Trace ePHI data flows to vendors and subcontractors. Evaluate their controls, breach history, and contractual obligations under business associate agreements, including incident notification and downstream oversight.

Conducting Risk Analysis for Covered Entities

Preparation

Establish governance, roles, and risk criteria. Classify data, define acceptable risk, and select a repeatable risk analysis methodology that fits your size, complexity, and technology stack.

Risk analysis methodology

  • Identify assets, threats, and vulnerabilities affecting ePHI.
  • Assess existing controls and any gaps.
  • Estimate likelihood and impact using defined scales.
  • Calculate inherent and residual risk, then prioritize findings.
  • Record results in a risk register with owners and due dates.

Validation and documentation

Corroborate results through interviews, log reviews, configuration sampling, and testing. Keep version-controlled documentation showing methods used, evidence collected, decisions made, and leadership approval.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Business Associate Risk Assessment Responsibilities

Core obligations

Business associates must assess and manage risks to ePHI they handle, implement appropriate administrative and technical safeguards, and ensure subcontractors do the same. They must maintain breach detection and reporting processes aligned to business associate agreements.

Coordination with covered entities

Align security controls with contractual requirements, minimum necessary standards, and data flow expectations. Upon request, provide evidence of assessments, corrective actions, and incident response capabilities to support the covered entity’s due diligence.

Common pitfalls to avoid

  • Overlooking cloud configurations or shared-responsibility gaps.
  • Failing to assess subcontractors that access ePHI.
  • Not updating risk analysis after system changes or acquisitions.

Documenting and Reporting Findings

What to document

  • Scope, asset inventory, and data flow diagrams for ePHI.
  • Risk analysis methodology, criteria, and evidence sources.
  • Risk ratings, rationale, and a prioritized risk register.
  • Remediation plans, timelines, owners, and residual risk acceptance.

Reporting and communication

Deliver an executive summary for leadership, a detailed findings report for security teams, and remediation trackers for project owners. Where applicable, share required summaries with partners per business associate agreements.

Record retention and audit readiness

Maintain version history, approvals, and proof of action completion. Ensure reports remain accessible for audits and demonstrate continuous security rule compliance.

Implementing Security Measures

Administrative safeguards

  • Governance, policies, workforce training, and sanctions.
  • Risk management plans with milestones and metrics.
  • Vendor risk management and contract controls in business associate agreements.
  • Contingency planning, incident response, and periodic evaluations.

Technical safeguards

  • Access management with unique IDs, role-based access, and MFA.
  • Encryption in transit and at rest; key management.
  • Secure configuration, patching, and vulnerability management.
  • Network segmentation, endpoint protection, and anti-malware.
  • Audit logging, monitoring, and alerting with regular review.
  • Resilient backups, rapid restoration testing, and immutable storage.

Physical safeguards

  • Facility access controls, visitor management, and environmental protections.
  • Device and media controls, secure disposal, and screen privacy.

Ongoing Risk Assessment and Compliance

Cadence and triggers

Reassess at defined intervals and whenever meaningful changes occur—new systems, integrations, locations, vendors, or after incidents. Validate risks before go-live and after major upgrades.

Continuous monitoring and metrics

Use automated scanning, configuration baselines, log analytics, and tabletop exercises to track control effectiveness. Measure closure rates, mean time to remediate, residual risk trends, and training completion.

Governance and accountability

Embed oversight through a security or compliance committee, documented risk acceptance, and management sign-off. Keep policies current, align budgets to risk, and update business associate agreements as environments evolve.

Conclusion

Effective HIPAA risk assessments reveal where ePHI is exposed and drive targeted safeguards. By documenting a defensible process, implementing proportionate controls, and monitoring continuously, you maintain security rule compliance and reduce real-world risk.

FAQs.

What are the key components of a HIPAA risk assessment?

Core components include scoping where ePHI resides, vulnerability identification, evaluating existing controls, estimating likelihood and impact, prioritizing risks, and producing a remediation plan. Documentation, ownership, and leadership approval complete the process.

How often should a HIPAA risk assessment be conducted?

Perform a comprehensive assessment on a defined cadence and whenever significant changes occur. Triggers include new systems, major configuration changes, new business associate agreements, mergers, or security incidents.

What responsibilities do business associates have in HIPAA risk assessments?

Business associates must analyze and manage risks to any ePHI they create, receive, maintain, or transmit, implement appropriate administrative safeguards and technical safeguards, oversee subcontractors, and meet reporting obligations defined in business associate agreements.

What documentation is required for HIPAA risk assessments?

Maintain scope, inventory, data flows, the risk analysis methodology, evidence, ratings, and a risk register with remediation actions. Include approvals, timelines, status tracking, and records of residual risk acceptance to demonstrate security rule compliance.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles