HIPAA Security 101 for Covered Entities: Step-by-Step Compliance Guide
If you handle electronic Protected Health Information (ePHI), HIPAA’s Security Rule sets clear expectations for how you protect it. This guide translates the regulation into concrete steps you can implement, helping you build a defensible, risk-based program without guesswork.
Use this as a blueprint to align policies, technology, and daily operations. You will establish access control policies, meet audit controls requirements, and apply a pragmatic risk management framework that scales with your organization.
Administrative Safeguards Overview
Security management process
Start by documenting how you identify and reduce risk. Perform a risk analysis, decide on reasonable and appropriate safeguards, implement them, and track progress. Review system activity (logs, access reports, and security alerts) on a defined cadence and record the results.
- Conduct an enterprisewide risk analysis covering systems that create, receive, maintain, or transmit ePHI.
- Implement risk management actions with owners, deadlines, and evidence of completion.
- Define audit review procedures: frequency, scope, and escalation paths.
Assigned security responsibility
Designate a Security Official with authority to enforce policies and coordinate compliance. Clarify decision rights and reporting lines so security directives translate into operational change.
Workforce security and access
Authorize, supervise, and terminate access based on role. Require least-privilege provisioning and rapid deprovisioning on job change or separation. Link approvals to identity lifecycle workflows to prevent privilege creep.
Information access management
Define role-based access control policies that map job functions to ePHI access. Approve exceptions formally, time-limit them, and record who granted and who holds the exception.
Security awareness and training
Deliver initial and periodic training on phishing, password hygiene, device security, and incident reporting. Reinforce learning with short refreshers tied to observed risks (for example, after a phishing surge).
Security incident procedures
Establish how staff report suspected incidents, how you triage, and when you escalate. Predefine thresholds for invoking containment steps and for evaluating breach notification obligations.
Contingency planning
Create and test data backup, disaster recovery, and emergency mode operation plans. Prioritize applications via a criticality analysis and set recovery time and recovery point objectives that match clinical and business needs.
Business associates and vendors
Execute Business Associate Agreements with vendors that handle ePHI. Evaluate third-party security during onboarding and at renewal, and track remediation of findings to closure.
Evaluation
Periodically evaluate your program—after major changes, incidents, or annually—to verify that safeguards continue to be reasonable and effective.
Physical Safeguards Implementation
Facility access controls
Limit physical entry to areas where ePHI is stored or processed. Use badges or keys with change control, visitor sign-in, escorts, and camera coverage aligned to risk. Document procedures for maintenance, emergencies, and alternate sites.
- Maintain an up-to-date access list and review it regularly.
- Harden server rooms and wiring closets; restrict and log contractor access.
- Plan for contingency operations to reach facilities during disasters.
Workstation security
Standardize workstation configurations: automatic screen lock, minimal local storage, and privacy screens where appropriate. Place workstations to prevent shoulder-surfing in patient areas.
Device and media controls
Track laptops, removable media, and medical devices that store ePHI. Require encryption at rest, chain-of-custody records, secure disposal, and verified wipes before reuse. Document exceptions and compensating controls.
Technical Safeguards Requirements
Access control policies
Implement role-based access with unique user IDs, strong authentication, and just-in-time elevation for administrators. Configure automatic logoff and emergency access procedures, and encrypt ePHI at rest wherever feasible.
- Adopt multifactor authentication for remote and privileged access.
- Segment networks so ePHI systems are isolated from general user networks.
- Use least privilege by default and time-bound temporary access.
Audit controls requirements
Enable logging on systems housing ePHI and on the services that protect them (EHR, databases, email, firewalls, EDR, cloud platforms). Centralize logs, define retention, and monitor for anomalous behavior.
- Log access, creation, modification, deletion, export, print, and administrative actions.
- Correlate logs in a SIEM, tune alerts, and document reviews and responses.
Integrity controls
Protect ePHI from improper alteration or destruction. Use checksums, file integrity monitoring, immutable backups, and change control for application and database updates.
Person or entity authentication
Verify that users, devices, and services are who they claim to be. Combine strong passwords, MFA, managed devices, and certificate-based trust for service-to-service connections.
Transmission security protocols
Encrypt ePHI in transit using modern protocols. Standardize on current TLS for web and APIs, secure email options for sensitive messages, and VPN or zero-trust access for remote connections. Disable weak ciphers and legacy versions.
Encryption and key management
Manage keys centrally with separation of duties and rotation schedules. Protect keys with hardware-backed storage where possible and monitor for misuse or exposure.
Risk Analysis and Management
Establish a risk management framework
Adopt a structured, repeatable approach that rates likelihood and impact, prioritizes risks, and tracks mitigation to completion. Calibrate ratings so different teams score risks consistently.
Conduct the risk analysis
- Define scope: all locations, systems, workflows, and vendors that touch ePHI.
- Inventory assets and data flows, including cloud services and integrated devices.
- Identify threats and vulnerabilities (technical, physical, administrative).
- Assess likelihood and impact to derive risk levels and rank by priority.
Manage and monitor risks
Create a risk register with owners, actions, and target dates. Choose to mitigate, transfer, or accept risks with documented rationale. Verify completion and measure control effectiveness over time.
Update continuously
Reassess after major changes, new threats, incidents, mergers, or deployments. Schedule an annual refresh to keep results current and useful for planning and budgeting.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentWorkforce Security Policies
Role-based practices
Map job roles to permissions, and review access at least quarterly. Require manager attestation for continued elevated privileges and enforce separation of duties for sensitive tasks.
Onboarding, training, and awareness
Deliver orientation before access is granted, followed by periodic refreshers and targeted microlearning. Include reporting expectations and hands-on phishing simulations to build practical skills.
Workforce sanction policies
Define progressive sanctions for policy violations, from coaching to termination, and apply them consistently. Document decisions and remediation to demonstrate fair enforcement.
Acceptable use and remote work
Publish clear rules for device use, data handling, and storage. For BYOD or telehealth workflows, require device encryption, screen locks, patching, and the ability to wipe ePHI if a device is lost.
Offboarding and transfers
Disable accounts immediately at separation and remove or adjust access on role changes. Recover badges and equipment, and reconcile access across all systems and vendors.
Documentation and Recordkeeping
Policies, procedures, and decision records
Write policies that state what you require and procedures that show how you do it. For addressable specifications, record why a control is reasonable as implemented—or what compensating controls you chose.
Evidence of execution
Maintain training logs, risk analyses, access reviews, incident tickets, audit log reviews, change approvals, and vendor assessments. Capture screenshots or reports that prove controls are active.
Retention and version control
Retain documentation for at least six years from creation or last effective date. Use versioning with approval history so you can show what changed, why, and when.
Incident Response Preparation
Plan, roles, and playbooks
Define your incident response team, contact methods, and decision thresholds. Build playbooks for common scenarios like phishing, lost devices, ransomware, and unauthorized access to ePHI.
Detection and analysis
Enable alerting from EDR, email security, identity platforms, and audit logs. Triage quickly, validate indicators, and determine systems, accounts, and data affected.
Containment, eradication, and recovery
Isolate impacted systems, reset credentials, remove persistence, and restore from known-good backups. Validate integrity, monitor closely, and return systems to service in phases.
Breach risk assessment and notifications
Use the four-factor analysis: the nature and extent of ePHI involved, the unauthorized person who used or received it, whether the ePHI was actually acquired or viewed, and the extent of mitigation. If a breach of unsecured PHI is presumed, notify affected individuals without unreasonable delay and no later than 60 days after discovery, and follow required reporting thresholds.
Exercises and continual improvement
Run tabletop exercises at least annually. After real events and exercises, document lessons learned and update policies, technical controls, and training accordingly.
Key takeaways
- Know your ePHI, where it lives, and how it moves.
- Anchor your program in a living risk management framework.
- Prove compliance with strong documentation and measurable controls.
- Prepare for incidents before they happen, then practice the plan.
FAQs.
What are the core components of the HIPAA Security Rule?
The core components are administrative, physical, and technical safeguards. Administrative safeguards cover risk analysis, risk management, workforce training, sanctions, contingency planning, and evaluations. Physical safeguards include facility access controls, workstation security, and device/media controls. Technical safeguards require access control policies, audit controls, integrity protections, authentication, and transmission security for ePHI.
How do covered entities conduct a HIPAA risk analysis?
Define scope across all systems and vendors that handle ePHI, inventory assets and data flows, identify threats and vulnerabilities, and rate likelihood and impact. Document risks in a register, prioritize remediation, assign owners and timelines, and reassess after changes or at least annually as part of your risk management framework.
What technical safeguards are required to protect ePHI?
Required technical safeguards include unique user identification, emergency access, automatic logoff, and mechanisms to encrypt or otherwise protect ePHI. You must implement audit controls requirements, integrity protections, and person or entity authentication, and use strong transmission security protocols (for example, modern TLS) for ePHI in transit.
How often should HIPAA security policies be reviewed and updated?
Review policies periodically and whenever material changes occur—new systems, significant workflow changes, new threats, or after incidents. Many covered entities adopt an annual review cycle with interim updates to ensure policies, procedures, and controls remain effective and reflect current operations.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment