HIPAA Risk Assessment Requirements: What OCR Expects and How to Comply
You are required under the HIPAA Security Rule to perform a thorough, enterprise-wide risk analysis and then manage the identified risks. The Office for Civil Rights (OCR) expects a documented process that shows where electronic protected health information (ePHI) lives, what could go wrong, how strong your safeguards are, and what you will do about the gaps.
This guide explains exactly what OCR looks for and how you can comply with confidence, from scoping and data collection to analysis, documentation, and ongoing risk mitigation strategies.
Scope of Risk Analysis
What OCR Expects
- Enterprise-wide scope: every system, device, application, workflow, and location where ePHI is created, received, maintained, or transmitted.
- All environments: on-premises, cloud, hosted EHRs, telehealth platforms, mobile and BYOD, medical/IoT devices, backups, and removable media.
- All safeguard domains: administrative safeguards, physical safeguards, and technical safeguards—not just IT settings.
- Business associates: third parties and downstream vendors that handle ePHI under business associate agreements (BAAs).
- Clear boundaries: documented asset inventory, data-flow diagrams, and descriptions of facilities and networks in scope.
How to Comply
- Create an asset and data inventory that names owners, locations, and connections for systems touching ePHI.
- Map data flows from intake to archival/destruction, including interfaces, integrations, and remote access paths.
- Include paper-to-digital and imaging workflows that feed ePHI into systems.
- Define risk criteria and acceptance thresholds so ratings are consistent and defensible.
Data Collection for ePHI
What OCR Expects
- Evidence-backed discovery of where electronic protected health information (ePHI) resides, moves, and is stored or transmitted.
- Details on data types, volumes, retention, and disposal practices across systems and vendors.
- Artifacts that corroborate statements: configurations, logs, screenshots, policies, and diagrams.
How to Comply
- Use interviews, technical scans, log reviews, and facility walk-throughs to confirm ePHI locations.
- Leverage the Security Risk Assessment (SRA) Tool as a structured questionnaire, then tailor it to your unique environment.
- Capture metadata (owners, versions, last patch dates, encryption status) for each asset in a repeatable template.
- Update the dataset whenever systems, vendors, or workflows change.
Identifying Threats and Vulnerabilities
What OCR Expects
- Clear distinction between threats (events/actors) and vulnerabilities (weaknesses exploitable by threats).
- Coverage of natural, human, and environmental threats: phishing, ransomware, lost devices, insider misuse, power loss, disasters, and vendor failures.
- Attention to modern risks: misconfigurations in cloud services, unpatched medical devices, insecure APIs, telehealth exposures, and weak remote access.
How to Comply
- Build a risk register listing each asset, threat, vulnerability, affected safeguard, and potential effect on ePHI.
- Use vulnerability scanning and, where appropriate, penetration testing to validate technical weaknesses.
- Review trends from OCR enforcement actions to learn common failure patterns and strengthen controls proactively.
- Include vendor and supply-chain risks by assessing BAAs, SOC reports, and incident histories.
Assessing Current Security Measures
What OCR Expects
- Evaluation of control design and operating effectiveness—not just whether a policy exists.
- Administrative safeguards: policies, training, sanction processes, workforce clearance, incident response, and contingency planning.
- Physical safeguards: facility access controls, workstation security, device and media controls, and secure disposal.
- Technical safeguards: access controls (unique IDs, MFA), audit controls (logging/monitoring), integrity controls, and transmission security (encryption).
How to Comply
- Sample user access for least-privilege, test MFA paths, and verify encryption at rest and in transit.
- Examine audit logs, alerting thresholds, and retention to ensure you can detect, investigate, and prove activity.
- Confirm patch and vulnerability management cadence, EDR coverage, email security, network segmentation, and secure backups/DR.
- Validate physical protections and media handling; run tabletop exercises to test policies under realistic scenarios.
Determining Likelihood and Impact of Threats
What OCR Expects
- A consistent, documented methodology that rates likelihood and impact and produces a risk level for each scenario.
- Impact considerations beyond IT: patient safety, operations, financial loss, reputational harm, and legal/regulatory exposure.
- Reasoned justifications for ratings, including assumptions, predisposing conditions, and existing controls.
How to Comply
- Adopt a simple 1–5 scale for likelihood and impact with clear definitions; compute inherent and residual risk.
- Use a risk matrix to categorize risks (e.g., Low/Medium/High/Critical) and tie categories to required actions and timelines.
- Document rationale and evidence for each score, including control effectiveness and detectability.
- Define risk appetite, escalation thresholds, and criteria for risk acceptance with executive sign-off.
Documenting Risk Analysis Findings
What OCR Expects
- A written report that covers scope, methodology, assets/data flows, threats/vulnerabilities, control evaluation, and risk ratings.
- A prioritized list of recommended risk mitigation strategies with owners and timelines.
- Traceability to Security Rule standards and implementation specifications across administrative, physical, and technical safeguards.
- Retention of documentation for at least six years, with version history showing updates and reevaluations.
How to Comply
- Produce an executive summary, detailed risk register, data-flow diagrams, and a decision log explaining key judgments.
- Create a plan of action and milestones (POA&M) that translates risks into funded, scheduled work.
- Record risk acceptance with compensating controls and review dates; keep evidence (screenshots, tickets, training rosters).
- Use the Security Risk Assessment (SRA) Tool outputs as inputs—not the final report—tailored to your environment.
Implementing and Reviewing Mitigation Strategies
What OCR Expects
- A shift from analysis to ongoing risk management with prioritized, time-bound remediation and accountable owners.
- Measurement of control effectiveness, continuous monitoring, and periodic evaluations after changes or incidents.
- Regular re-assessments to keep risk ratings current as systems, vendors, and threats evolve.
How to Comply
- Implement encryption, MFA, role-based access, and strong key management; harden configurations and close exposed services.
- Strengthen email and endpoint protections, patch on a defined cadence, and segment networks housing ePHI.
- Enhance logging/monitoring with SIEM, test backups and disaster recovery, and apply data loss prevention where appropriate.
- Elevate administrative and physical safeguards: updated policies, recurring workforce training, sanctions, visitor controls, and secure media handling.
- Manage vendor risk with due diligence, BAAs, security addenda, and breach notification expectations.
Conclusion
When you scope comprehensively, collect accurate data, identify credible threats and vulnerabilities, and rate risks with defensible logic, you satisfy core HIPAA risk assessment requirements. Turning findings into action through disciplined risk mitigation strategies reduces breach likelihood and demonstrates good faith during any OCR enforcement actions review.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentFAQs
What are the key components of a HIPAA risk assessment?
The essentials are: enterprise-wide scope; an inventory of assets and data flows with ePHI; a catalog of threats and vulnerabilities; evaluation of administrative safeguards, physical safeguards, and technical safeguards; a defensible likelihood/impact method; a documented risk register; and a prioritized remediation plan with owners, timelines, and evidence.
How often should HIPAA risk assessments be updated?
Update at least annually and whenever there are material changes—new systems, vendors, locations, major upgrades, incidents, or regulatory updates. Perform interim, targeted assessments for significant changes and maintain continuous monitoring so risk ratings and documentation stay current.
What tools does OCR recommend for conducting risk assessments?
OCR and ONC make the Security Risk Assessment (SRA) Tool available to help small and mid-sized organizations structure their analysis. You may also use other methodologies or frameworks, but you must tailor the assessment to your actual environment and produce organization-specific evidence and documentation.
What are common penalties for non-compliance with HIPAA risk assessment requirements?
Consequences range from corrective action plans and multi-year monitoring to civil monetary penalties and public settlements. Aggravating factors include willful neglect, lack of documentation, repeated violations, and failure to remediate known risks—patterns frequently seen in OCR enforcement actions.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment