HIPAA Security 101 for Covered Entities: Requirements, Controls, and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Security 101 for Covered Entities: Requirements, Controls, and Best Practices

Kevin Henry

HIPAA

January 02, 2025

7 minutes read
Share this article
HIPAA Security 101 for Covered Entities: Requirements, Controls, and Best Practices

This guide explains HIPAA Security 101 for Covered Entities: Requirements, Controls, and Best Practices so you can build a program that protects electronic protected health information across your environment. You will learn what the Security Rule requires and how to translate it into actionable controls you can sustain.

HIPAA Security Rule Overview

The HIPAA Security Rule sets national standards for safeguarding the confidentiality, integrity, and availability of electronic protected health information (ePHI). It is technology-neutral and risk-based, letting you choose “reasonable and appropriate” measures for your size, complexity, and threats.

The rule organizes requirements into administrative, physical, and technical safeguards. Some implementation specifications are “required,” while “addressable” items still must be evaluated and either implemented or replaced with an alternative that achieves equivalent protection.

  • Scope: ePHI at rest, in use, and in transit across systems, networks, devices, cloud, and backups.
  • Risk-based flexibility: select controls proportionate to your risks and operational realities.
  • Documentation: maintain policies, procedures, and activity records that show what you did and why.
  • Ongoing program: evaluate, test, train, monitor, and improve your safeguards over time.

Covered Entities and Business Associates

Covered Entities include health care providers, health plans, and health care clearinghouses. Business associates are vendors and partners that create, receive, maintain, or transmit ePHI on your behalf—cloud service providers, billing firms, EHR add‑ons, and similar service organizations.

Your obligations extend into your supply chain. Business Associate Agreements (BAAs) must bind vendors to Security Rule obligations, breach reporting, and cooperation. Strong vendor oversight requirements include due diligence before onboarding, contract clauses aligned to your controls, and continuous monitoring proportional to vendor risk.

  • Inventory all vendors that touch ePHI and map data flows to each.
  • Assess security posture (questionnaires, evidence reviews, testing where appropriate).
  • Define roles and shared responsibilities (especially for cloud services).
  • Require prompt incident reporting and right-to-audit provisions in BAAs.
  • Track remediation and offboarding to ensure data return or secure destruction.

Administrative Safeguards

Administrative safeguards establish the governance foundation that makes technical and physical controls effective. They translate the Security Rule into policy, process, and accountability that your workforce can execute consistently.

  • Security management process: perform a documented risk analysis and drive risk management plans that reduce risks to reasonable and appropriate levels.
  • Assigned security responsibility: appoint a qualified security official with authority to enforce requirements.
  • Workforce security and access management: onboard/offboard promptly, validate role-based access, and enforce least privilege.
  • Security awareness and training: provide initial and periodic training, phishing education, and role-specific guidance.
  • Security incident procedures: establish clear incident response protocols for detection, triage, containment, investigation, notification, and lessons learned.
  • Contingency planning: maintain data backup, disaster recovery, and emergency-mode operations; test and update regularly.
  • Evaluation and change management: periodically evaluate your program and assess security impact before significant changes.
  • Vendor management: implement vendor oversight requirements through BAAs, monitoring, and documented corrective actions.
  • Documentation and sanctions: publish policies, keep logs and decisions, and apply sanctions for violations consistently.

Physical Safeguards

Physical safeguards control the real-world environments where systems and media reside. They reduce the chance that unauthorized persons can access facilities, workstations, or devices that handle ePHI.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Facility access control: define who may enter, verify identity, maintain visitor logs, and protect server rooms and networking closets.
  • Workstation security: place screens to limit shoulder surfing, implement automatic screen locks, and secure remote and shared workstations.
  • Device and media controls: maintain inventories; encrypt laptops and portable media; sanitize, destroy, or return devices with chain‑of‑custody procedures.
  • Environmental safeguards: protect against hazards (power, HVAC, water) and plan for alternate sites when needed.

Technical Safeguards

Technical safeguards enforce who can see ePHI, how access is tracked, and how data is protected from alteration or disclosure. They must work together with administrative and physical controls.

  • Access controls: unique user IDs, multi-factor authentication, automatic logoff, and strong key and password management.
  • Audit controls: generate, retain, and review logs for user access, administrative actions, and system changes across EHRs, apps, databases, and cloud platforms.
  • Integrity controls: prevent and detect unauthorized alteration using hashing, digital signatures, and file/database integrity monitoring.
  • Person or entity authentication: verify users and devices, aligning assurance with data sensitivity and risk.
  • Transmission security: protect data in motion with modern TLS, secure VPNs, and message-level encryption where end‑to‑end protection is required.
  • Data protection: encrypt ePHI at rest, implement secure backups with tested restores, and separate encryption keys from data stores.
  • Network and endpoint protection: segment sensitive systems, patch promptly, scan for vulnerabilities, and deploy endpoint detection and response.

Risk Assessment Requirements

A documented risk analysis is the engine of your HIPAA Security program. It identifies where ePHI exists, what could go wrong, how likely it is, and the impact—so you can choose appropriate safeguards and track remediation.

  1. Define scope: include all applications, systems, devices, integrations, and vendors that create, receive, maintain, or transmit ePHI.
  2. Inventory assets and map data flows: locate ePHI, including backups and temporary storage, and chart how it moves.
  3. Identify threats and vulnerabilities: consider human error, malicious actors, process gaps, configuration issues, and environmental risks.
  4. Assess existing controls: note strengths and gaps across administrative, physical, and technical safeguards.
  5. Evaluate likelihood and impact: rank risks with a consistent method to prioritize remediation.
  6. Select mitigations: decide on reasonable and appropriate measures and document any addressable alternatives.
  7. Create risk management plans: assign owners, budgets, and timelines; track progress to closure.
  8. Document decisions: retain analysis, rationale, and evidence of implementation; update after major changes and on a regular cadence.
  9. Sustain the cycle: test controls, run exercises, adjust to new threats, and keep training aligned to current risks.

Compliance and Enforcement

OCR enforces the Security Rule through investigations, compliance reviews, and audits. Triggers include complaints, breach reports, and patterns of noncompliance. Expect document requests, interviews, and validation of your risk analysis, training, and implemented controls.

Outcomes range from technical assistance to resolution agreements with Corrective Action Plans and, in some cases, civil monetary penalties. Factors influencing outcomes include the nature and duration of violations, harm caused, cooperation, and whether you can demonstrate mature safeguards and effective remediation.

  • Be investigation‑ready: current policies, completed risk analysis, active risk management plans, training records, logs from audit controls, and evidence of transmission security.
  • Strengthen supply chain assurance: BAAs, due diligence results, ongoing monitoring, and documented vendor remediation.
  • Improve resilience: exercised incident response protocols, tested backups and recovery, and periodic program evaluations.

In practice, the strongest posture combines governance, facility access control, layered technical defenses, and a living risk process. Keep documentation complete, keep controls operational, and keep people trained—those habits turn compliance into durable security.

FAQs

What are the key safeguards in the HIPAA Security Rule?

The Security Rule organizes protections into administrative, physical, and technical safeguards. Administrative safeguards cover governance, risk analysis, risk management plans, training, and incident response protocols. Physical safeguards address facility access control, workstation protection, and device/media handling. Technical safeguards include access controls, audit controls, integrity protections, authentication, and transmission security.

How do covered entities conduct risk assessments?

Start by defining scope and locating all ePHI. Map data flows, identify threats and vulnerabilities, and evaluate existing controls. Rate likelihood and impact to prioritize risks, then select reasonable and appropriate mitigations. Document decisions—especially for addressable specs—create risk management plans with owners and deadlines, and update the analysis after major changes and on a routine cycle.

What penalties apply for Security Rule violations?

OCR uses tiered civil monetary penalties that consider factors like the nature of the violation, duration, harm, and culpability. Outcomes may include technical assistance, Corrective Action Plans with monitoring, and monetary penalties; egregious, intentional misuse of ePHI can involve criminal enforcement. Demonstrating mature safeguards and timely remediation can reduce exposure.

How should incidents involving ePHI be managed?

Activate your incident response protocols: detect and contain, investigate scope and root cause, and preserve evidence. Evaluate whether the event is a breach under HIPAA, perform a risk assessment of compromise, and provide required notifications. Coordinate with affected business associates, remediate vulnerabilities, restore from clean backups if needed, and document lessons learned to strengthen controls and training.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles