HIPAA Security 101 for Covered Entities: Step-by-Step Compliance Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Security 101 for Covered Entities: Step-by-Step Compliance Guide

Kevin Henry

HIPAA

January 03, 2025

8 minutes read
Share this article
HIPAA Security 101 for Covered Entities: Step-by-Step Compliance Guide

If you handle electronic Protected Health Information (ePHI), HIPAA’s Security Rule sets clear expectations for how you protect it. This guide translates the regulation into concrete steps you can implement, helping you build a defensible, risk-based program without guesswork.

Use this as a blueprint to align policies, technology, and daily operations. You will establish access control policies, meet audit controls requirements, and apply a pragmatic risk management framework that scales with your organization.

Administrative Safeguards Overview

Security management process

Start by documenting how you identify and reduce risk. Perform a risk analysis, decide on reasonable and appropriate safeguards, implement them, and track progress. Review system activity (logs, access reports, and security alerts) on a defined cadence and record the results.

  • Conduct an enterprisewide risk analysis covering systems that create, receive, maintain, or transmit ePHI.
  • Implement risk management actions with owners, deadlines, and evidence of completion.
  • Define audit review procedures: frequency, scope, and escalation paths.

Assigned security responsibility

Designate a Security Official with authority to enforce policies and coordinate compliance. Clarify decision rights and reporting lines so security directives translate into operational change.

Workforce security and access

Authorize, supervise, and terminate access based on role. Require least-privilege provisioning and rapid deprovisioning on job change or separation. Link approvals to identity lifecycle workflows to prevent privilege creep.

Information access management

Define role-based access control policies that map job functions to ePHI access. Approve exceptions formally, time-limit them, and record who granted and who holds the exception.

Security awareness and training

Deliver initial and periodic training on phishing, password hygiene, device security, and incident reporting. Reinforce learning with short refreshers tied to observed risks (for example, after a phishing surge).

Security incident procedures

Establish how staff report suspected incidents, how you triage, and when you escalate. Predefine thresholds for invoking containment steps and for evaluating breach notification obligations.

Contingency planning

Create and test data backup, disaster recovery, and emergency mode operation plans. Prioritize applications via a criticality analysis and set recovery time and recovery point objectives that match clinical and business needs.

Business associates and vendors

Execute Business Associate Agreements with vendors that handle ePHI. Evaluate third-party security during onboarding and at renewal, and track remediation of findings to closure.

Evaluation

Periodically evaluate your program—after major changes, incidents, or annually—to verify that safeguards continue to be reasonable and effective.

Physical Safeguards Implementation

Facility access controls

Limit physical entry to areas where ePHI is stored or processed. Use badges or keys with change control, visitor sign-in, escorts, and camera coverage aligned to risk. Document procedures for maintenance, emergencies, and alternate sites.

  • Maintain an up-to-date access list and review it regularly.
  • Harden server rooms and wiring closets; restrict and log contractor access.
  • Plan for contingency operations to reach facilities during disasters.

Workstation security

Standardize workstation configurations: automatic screen lock, minimal local storage, and privacy screens where appropriate. Place workstations to prevent shoulder-surfing in patient areas.

Device and media controls

Track laptops, removable media, and medical devices that store ePHI. Require encryption at rest, chain-of-custody records, secure disposal, and verified wipes before reuse. Document exceptions and compensating controls.

Technical Safeguards Requirements

Access control policies

Implement role-based access with unique user IDs, strong authentication, and just-in-time elevation for administrators. Configure automatic logoff and emergency access procedures, and encrypt ePHI at rest wherever feasible.

  • Adopt multifactor authentication for remote and privileged access.
  • Segment networks so ePHI systems are isolated from general user networks.
  • Use least privilege by default and time-bound temporary access.

Audit controls requirements

Enable logging on systems housing ePHI and on the services that protect them (EHR, databases, email, firewalls, EDR, cloud platforms). Centralize logs, define retention, and monitor for anomalous behavior.

  • Log access, creation, modification, deletion, export, print, and administrative actions.
  • Correlate logs in a SIEM, tune alerts, and document reviews and responses.

Integrity controls

Protect ePHI from improper alteration or destruction. Use checksums, file integrity monitoring, immutable backups, and change control for application and database updates.

Person or entity authentication

Verify that users, devices, and services are who they claim to be. Combine strong passwords, MFA, managed devices, and certificate-based trust for service-to-service connections.

Transmission security protocols

Encrypt ePHI in transit using modern protocols. Standardize on current TLS for web and APIs, secure email options for sensitive messages, and VPN or zero-trust access for remote connections. Disable weak ciphers and legacy versions.

Encryption and key management

Manage keys centrally with separation of duties and rotation schedules. Protect keys with hardware-backed storage where possible and monitor for misuse or exposure.

Risk Analysis and Management

Establish a risk management framework

Adopt a structured, repeatable approach that rates likelihood and impact, prioritizes risks, and tracks mitigation to completion. Calibrate ratings so different teams score risks consistently.

Conduct the risk analysis

  • Define scope: all locations, systems, workflows, and vendors that touch ePHI.
  • Inventory assets and data flows, including cloud services and integrated devices.
  • Identify threats and vulnerabilities (technical, physical, administrative).
  • Assess likelihood and impact to derive risk levels and rank by priority.

Manage and monitor risks

Create a risk register with owners, actions, and target dates. Choose to mitigate, transfer, or accept risks with documented rationale. Verify completion and measure control effectiveness over time.

Update continuously

Reassess after major changes, new threats, incidents, mergers, or deployments. Schedule an annual refresh to keep results current and useful for planning and budgeting.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Workforce Security Policies

Role-based practices

Map job roles to permissions, and review access at least quarterly. Require manager attestation for continued elevated privileges and enforce separation of duties for sensitive tasks.

Onboarding, training, and awareness

Deliver orientation before access is granted, followed by periodic refreshers and targeted microlearning. Include reporting expectations and hands-on phishing simulations to build practical skills.

Workforce sanction policies

Define progressive sanctions for policy violations, from coaching to termination, and apply them consistently. Document decisions and remediation to demonstrate fair enforcement.

Acceptable use and remote work

Publish clear rules for device use, data handling, and storage. For BYOD or telehealth workflows, require device encryption, screen locks, patching, and the ability to wipe ePHI if a device is lost.

Offboarding and transfers

Disable accounts immediately at separation and remove or adjust access on role changes. Recover badges and equipment, and reconcile access across all systems and vendors.

Documentation and Recordkeeping

Policies, procedures, and decision records

Write policies that state what you require and procedures that show how you do it. For addressable specifications, record why a control is reasonable as implemented—or what compensating controls you chose.

Evidence of execution

Maintain training logs, risk analyses, access reviews, incident tickets, audit log reviews, change approvals, and vendor assessments. Capture screenshots or reports that prove controls are active.

Retention and version control

Retain documentation for at least six years from creation or last effective date. Use versioning with approval history so you can show what changed, why, and when.

Incident Response Preparation

Plan, roles, and playbooks

Define your incident response team, contact methods, and decision thresholds. Build playbooks for common scenarios like phishing, lost devices, ransomware, and unauthorized access to ePHI.

Detection and analysis

Enable alerting from EDR, email security, identity platforms, and audit logs. Triage quickly, validate indicators, and determine systems, accounts, and data affected.

Containment, eradication, and recovery

Isolate impacted systems, reset credentials, remove persistence, and restore from known-good backups. Validate integrity, monitor closely, and return systems to service in phases.

Breach risk assessment and notifications

Use the four-factor analysis: the nature and extent of ePHI involved, the unauthorized person who used or received it, whether the ePHI was actually acquired or viewed, and the extent of mitigation. If a breach of unsecured PHI is presumed, notify affected individuals without unreasonable delay and no later than 60 days after discovery, and follow required reporting thresholds.

Exercises and continual improvement

Run tabletop exercises at least annually. After real events and exercises, document lessons learned and update policies, technical controls, and training accordingly.

Key takeaways

  • Know your ePHI, where it lives, and how it moves.
  • Anchor your program in a living risk management framework.
  • Prove compliance with strong documentation and measurable controls.
  • Prepare for incidents before they happen, then practice the plan.

FAQs.

What are the core components of the HIPAA Security Rule?

The core components are administrative, physical, and technical safeguards. Administrative safeguards cover risk analysis, risk management, workforce training, sanctions, contingency planning, and evaluations. Physical safeguards include facility access controls, workstation security, and device/media controls. Technical safeguards require access control policies, audit controls, integrity protections, authentication, and transmission security for ePHI.

How do covered entities conduct a HIPAA risk analysis?

Define scope across all systems and vendors that handle ePHI, inventory assets and data flows, identify threats and vulnerabilities, and rate likelihood and impact. Document risks in a register, prioritize remediation, assign owners and timelines, and reassess after changes or at least annually as part of your risk management framework.

What technical safeguards are required to protect ePHI?

Required technical safeguards include unique user identification, emergency access, automatic logoff, and mechanisms to encrypt or otherwise protect ePHI. You must implement audit controls requirements, integrity protections, and person or entity authentication, and use strong transmission security protocols (for example, modern TLS) for ePHI in transit.

How often should HIPAA security policies be reviewed and updated?

Review policies periodically and whenever material changes occur—new systems, significant workflow changes, new threats, or after incidents. Many covered entities adopt an annual review cycle with interim updates to ensure policies, procedures, and controls remain effective and reflect current operations.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles