HIPAA Security Risk Assessment: Required Elements, Scope, and Documentation Checklist
Risk Assessment Requirement
A HIPAA Security Risk Assessment is a foundational requirement for any organization that creates, receives, maintains, or transmits electronic protected health information (ePHI). You must analyze how ePHI is handled, identify where risks exist, and determine what safeguards are needed to reduce those risks to a reasonable and appropriate level.
Covered entities and business associates are both obligated to perform a risk assessment. The assessment informs your broader security risk management program and drives budget, sequencing of controls, and compliance evidence. While small practices can use the HIPAA Security Risk Assessment Tool to structure the process, you still need to tailor findings to your unique systems and workflows.
Perform the assessment before introducing new technologies, after significant changes (such as a new EHR or cloud migration), and following incidents that may affect the confidentiality, integrity, or availability of ePHI.
Required Elements of Risk Assessment
Core steps you must complete
- Define methodology and risk criteria so results are consistent and defensible.
- Inventory assets that create, store, process, or transmit ePHI, including applications, devices, databases, and third-party services.
- Map ePHI data flows end to end—from collection to storage, transmission, backup, and disposal.
- Evaluate current safeguards against administrative, physical, and technical requirements.
- Conduct threat and vulnerability analysis to identify realistic attack paths and failure modes.
- Estimate likelihood and impact for each scenario and perform risk level determination.
- Select and justify security measures, addressing required and addressable specifications.
- Document findings, decisions, owners, and timelines in a risk register and remediation plan.
Threat and vulnerability analysis
Identify natural, human, and environmental threats; pair them with vulnerabilities in your controls and configurations. Consider phishing, credential theft, ransomware, insider misuse, lost or stolen devices, misconfigured cloud storage, unpatched systems, power outages, and facility hazards. For each threat-vulnerability pair, note affected assets, ePHI volumes, and downstream impacts on care delivery.
Addressable specifications
Addressable specifications are not optional; they require a documented decision. You must either implement the specification as written, implement an equivalent alternative, or explain why it is not reasonable and appropriate given your risks and environment. Record the rationale, compensating controls, and review cadence.
Risk level determination
Use a simple, transparent model—commonly likelihood × impact—calibrated to your business context. Define numeric scales (for example, 1–5), map results to risk categories (Low/Moderate/High/Critical), and specify escalation thresholds. Apply the model consistently so leadership can compare risks and allocate resources effectively.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentScope of Risk Assessment
Systems and data
- Applications: EHR, practice management, patient portals, billing, email, secure messaging, telehealth, imaging, laboratory systems.
- Infrastructure: servers, network gear, wireless, VPN, firewalls, SIEM/EDR tools, backups, disaster recovery sites.
- Endpoints and mobile: workstations, laptops, tablets, smartphones, medical devices, removable media, kiosks.
- Cloud and third parties: hosted EHR, SaaS platforms, storage, analytics, patient communication vendors, clearinghouses.
People and processes
- Workforce roles, least-privilege access, onboarding/offboarding, training, and sanctions.
- Operational workflows that touch ePHI, including remote work and shared devices.
- Business associate relationships and subcontractors that handle ePHI on your behalf.
Locations and transmissions
- Onsite facilities, branch clinics, home offices, data centers, and cloud regions.
- Data in transit (email, APIs, SFTP, VPNs, messaging) and data at rest (databases, file shares, backups, devices).
- Media handling and disposal, device reuse, and decommissioning procedures.
Documentation Requirements
What to capture
- Methodology, scope, assumptions, and the date range of the assessment.
- Asset inventory and ePHI data flow diagrams.
- Threat and vulnerability analysis with rationale behind ratings.
- Risk register listing risk statements, likelihood, impact, risk level determination, owners, and due dates.
- Decisions on addressable specifications, including compensating controls and justification.
- Remediation plan (security roadmap), budget notes, and acceptance approvals for residual risks.
Supporting evidence
- Policies and procedures, role-based access matrices, change and configuration records.
- Audit logs, authentication settings, encryption configurations, backup and restore test results.
- Training and awareness records, incident response tests, tabletop exercises.
- Vendor due diligence, BAAs, penetration tests, vulnerability scans, and patch reports.
Risk assessment documentation retention
Retain all risk assessment documentation, decisions, and supporting evidence for at least six years from the date of creation or the date last in effect, whichever is later. Maintain version control and an audit trail showing reviews, approvals, and updates.
Frequency of Risk Assessment
Cadence and triggers
- Establish a recurring cadence—at least annually—to reassess risks and validate prior decisions.
- Perform targeted, event-driven assessments when major changes occur: new systems, significant configuration updates, mergers, new vendors, material incidents, or regulatory changes.
- Continuously monitor key controls and update the risk register when indicators shift (for example, new threats or discovered vulnerabilities).
Practical scheduling tips
- Align the cycle with budgeting and technology roadmaps so risk insights drive investment.
- Stagger deep dives by domain (access control, network, cloud, third parties) to spread workload.
- Use the HIPAA Security Risk Assessment Tool to keep tasks organized and track progress between formal cycles.
Risk Prioritization
From findings to action
- Rank risks using defined criteria: likelihood, impact on confidentiality/integrity/availability, exposure duration, detectability, and degree of ePHI concentration.
- Map results on a heat map to highlight high and critical items that require immediate attention.
- Classify treatments: mitigate, transfer, accept, or avoid. Document acceptance with executive sign-off and a review date.
Balancing quick wins and strategic fixes
- Quick wins: enable MFA, tighten role-based access, patch critical systems, encrypt mobile devices, disable unused services.
- Strategic initiatives: network segmentation, centralized identity, data loss prevention, immutable backups, zero trust architectures, and vendor risk management maturation.
- Integrate prioritization into security risk management dashboards so leaders can track reduction of risk over time.
Security Measures Implementation
Administrative safeguards
- Governance: assign security leadership, define risk tolerance, and set review schedules.
- Policies and procedures: access control, incident response, change management, contingency planning, and media handling.
- Workforce training and sanctions to reinforce acceptable use and phishing awareness.
- Vendor oversight: due diligence, BAAs, onboarding/offboarding, and continuous monitoring.
Technical safeguards
- Access control: least privilege, MFA, privileged access management, timely deprovisioning.
- Encryption: protect ePHI at rest and in transit; manage keys securely and test restores of encrypted backups.
- Audit controls: centralized logging, alerting, and regular review of anomalous activity.
- Integrity and authentication: hashing, digital signatures, and configuration baselines.
- Endpoint and network security: EDR, patching, vulnerability management, email security, web filtering, and segmentation.
- Cloud security: hardened baselines, secure defaults, secrets management, and continuous posture assessment.
Physical safeguards
- Facility access controls, visitor management, and surveillance where appropriate.
- Workstation security: screen locks, privacy filters, and secured placement.
- Device and media controls: inventory, secure storage, chain of custody, and documented destruction.
Implementation roadmap and metrics
- Create a sequenced plan linked to prioritized risks, with owners, milestones, and budget.
- Track metrics such as patch latency, MFA coverage, backup success and restore times, phishing click rates, and incident mean time to detect/respond.
- Review progress quarterly and adjust based on new threats, audit findings, and business changes.
Conclusion
A well-scoped, well-documented HIPAA Security Risk Assessment turns compliance into a practical security risk management engine. By analyzing threats and vulnerabilities, making clear risk level determinations, documenting addressable specification decisions, and executing a prioritized roadmap, you strengthen protection of electronic protected health information and sustain compliance over time.
FAQs
What are the key elements required in a HIPAA risk assessment?
At minimum, you need a defined methodology, an inventory of ePHI assets and data flows, a thorough threat and vulnerability analysis, current safeguard evaluation, likelihood and impact ratings, risk level determination, decisions on addressable specifications, and a documented remediation plan with owners and timelines.
How often should a HIPAA risk assessment be conducted?
Perform a comprehensive assessment at least annually and whenever major changes occur—such as deploying a new system, onboarding a critical vendor, moving to the cloud, or after a significant incident. Use continuous monitoring to keep the risk register up to date between annual cycles.
What documentation is necessary for HIPAA risk assessment compliance?
You should maintain the methodology, scope, asset inventory, data flows, risk register, decisions on addressable specifications, remediation plan, and supporting evidence like policies, logs, training records, vendor due diligence, and scan/test results. Follow risk assessment documentation retention practices by keeping records for at least six years with version control and approvals.
How are addressable specifications applied in risk assessments?
During the assessment, evaluate each addressable specification against your risks. Implement it as written, implement an equivalent alternative, or document why it is not reasonable and appropriate. In all cases, record the decision, compensating controls, and a schedule to revisit the choice as your environment changes.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment