HIPAA Security Rule Encryption Requirements: What’s Required vs. Addressable for Data at Rest and In Transit

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Security Rule Encryption Requirements: What’s Required vs. Addressable for Data at Rest and In Transit

Kevin Henry

HIPAA

March 29, 2024

7 minutes read
Share this article
HIPAA Security Rule Encryption Requirements: What’s Required vs. Addressable for Data at Rest and In Transit

Encryption Requirement Status

The HIPAA Security Rule classifies encryption of electronic protected health information (ePHI) as an addressable implementation specification for both data at rest and data in transit. Addressable does not mean optional; it means you must evaluate encryption through risk analysis and implement it when reasonable and appropriate, or use an effective alternative and document your rationale.

In practice, regulators expect encryption in nearly all modern environments because risks and costs are well understood and controls are widely available. Properly encrypted ePHI also benefits from breach “safe harbor,” reducing the likelihood of breach notification when keys remain uncompromised. As of November 7, 2025, encryption remains addressable in the text of the Security Rule, but treat it as the default unless you can justify and document a defensible alternative.

  • Required: Perform risk analysis and implement appropriate safeguards; maintain risk analysis documentation and policies.
  • Addressable: Decide, based on risk, whether to implement encryption or an equivalent measure, and record the decision and compensating controls.
  • De facto expectation: Encrypt ePHI at rest and in transit for endpoints, servers, cloud services, backups, and integrations.

Addressable Specification Definition

An addressable implementation specification is a control you must actively consider. You either implement it as written, implement a reasonable and appropriate alternative that achieves the same purpose, or document why it is not reasonable and appropriate in your environment and apply compensating safeguards.

How to decide

  • Evaluate threats, vulnerabilities, and business impact to ePHI, including misuse, theft, interception, and unauthorized access.
  • Assess feasibility, operational constraints, vendor dependencies, and costs alongside security benefits.
  • Factor in laws, contracts, and business associate agreements that may elevate encryption from addressable to mandatory for your organization.

How to document

  • Record your analysis, decision, and justification as risk analysis documentation, including scope, systems, and data flows.
  • Describe compensating controls, planned improvements, and an encryption migration plan with milestones and owners.
  • Review decisions at least annually and on significant changes (new systems, migrations, incidents, or emerging threats).

Encryption of Data at Rest

Data-at-rest encryption protects stored ePHI on laptops, servers, databases, file shares, backups, and cloud storage. Implement strong, vetted algorithms and manage keys securely to prevent offline compromise if a device or datastore is accessed by an attacker.

Core controls

  • Endpoints and mobile devices: Full-disk encryption with pre-boot authentication, plus remote wipe, MDM enforcement, and rapid revocation.
  • Servers, VMs, and cloud storage: Volume or object-level encryption enabled by default; verify configurations and encryption status reports regularly.
  • Databases: Transparent data encryption (TDE) and application-layer encryption for sensitive fields; secure key separation from data.
  • Backups and archives: Encrypt media and vault copies; protect keys away from backup sets; test recovery to confirm decryptability.
  • Key management: Use FIPS 140-validated cryptographic modules, rotate keys, enforce separation of duties, and log all key events.

Special cases and constraints

  • FDA-regulated systems: Some medical devices or validated platforms may restrict changes. When encryption cannot be added without vendor validation, implement compensating controls (segmentation, access control, physical safeguards) and maintain a documented roadmap aligned with vendor releases.
  • Legacy or third-party hosted records: If native encryption is absent, layer storage encryption, proxy encryption, or gateway tokenization while pursuing longer-term remediation through your encryption migration plan.

Encryption of Data in Transit

Transit encryption safeguards ePHI moving across networks—within facilities, between sites, to cloud services, and to patients and partners. Use current protocols and manage certificates and cipher suites to prevent interception and downgrade attacks.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Core controls

  • Web, APIs, and services: TLS 1.2 or 1.3 with strong cipher suites; prefer mutual TLS for system-to-system connections; disable legacy protocols.
  • Private connectivity: Encrypted tunnels (VPN, private link with encryption) for site-to-site and partner traffic; isolate management planes.
  • Certificates and keys: Centralize issuance, automate renewal, pin where feasible, and monitor for misconfiguration or expiration.

Email, texting, and patient communications

  • Email: Enforce TLS with trusted partners; use secure messaging portals or message-level encryption for highly sensitive content.
  • Patient communication consent: If a patient prefers unencrypted email or SMS, you may honor the request after advising of risks, documenting consent, and applying reasonable safeguards and minimal necessary information.
  • Paging/voice/chat: Use solutions that provide end-to-end encryption and access controls; avoid consumer apps without business assurances.

Proposed Rule Changes

Policy discussions and federal healthcare cybersecurity initiatives continue to trend toward more prescriptive minimum safeguards. While the Security Rule still lists encryption as addressable, proposals and guidance frequently emphasize stronger baselines, clearer expectations, and faster retirement of deprecated protocols.

  • Likely themes: clearer minimums for data-at-rest and in-transit encryption, periodic reassessment requirements, and explicit expectations for key management and monitoring.
  • Future-proofing now: adopt “encrypt-by-default,” maintain an enterprise encryption migration plan, and track third-party and vendor dependencies that could delay upgrades.
  • Status check: as of November 7, 2025, no final HIPAA amendment has converted encryption to a universal required control; continue to monitor for updates.

Exceptions to Mandatory Encryption

HIPAA allows limited scenarios where encryption may not be implemented, provided you can justify the decision and mitigate risk. These are exceptions to a strong default, not a general pass.

  • Risk-based exception: Your analysis shows encryption is not reasonable and appropriate, and you implement an equivalent measure with documented justification and review cadence.
  • Patient communication consent: A patient requests unencrypted email or SMS; you inform them of risks, obtain and retain consent, and minimize the content.
  • FDA-regulated systems or operational safety: Encryption changes would violate device validation or create patient-safety risk; apply layered compensating controls and track vendor timelines.
  • Emergency encryption exceptions: During declared emergencies or system failures, you may temporarily relax encryption to maintain continuity of care, with break-glass approvals, enhanced monitoring, and prompt restoration and documentation afterward.

Compliance Implications

Encryption decisions have direct regulatory and business impact. Strong encryption reduces breach likelihood and, when keys remain protected, can limit breach notification obligations. Weak or absent encryption increases enforcement risk, incident costs, and reputational harm.

  • Policies and governance: Define standards for algorithms, key management, and lifecycle controls; align business associate agreements to require encryption and reporting.
  • Risk management: Keep risk analysis documentation current; record exceptions, compensating controls, and your encryption migration plan with target dates.
  • Operations and assurance: Collect audit-ready evidence—config baselines, KMS/HSM logs, device compliance reports, certificate inventories, vendor attestations, and approval records for any exceptions.
  • Training and change control: Train workforce on handling ePHI, especially on mobile endpoints and communication tools; manage changes carefully on FDA-regulated systems.

Conclusion

Under HIPAA, encryption is addressable but overwhelmingly expected for ePHI at rest and in transit. Treat encryption as the default, allow narrow exceptions only with strong compensating controls, and back every decision with rigorous documentation, monitoring, and a realistic plan to close gaps over time.

FAQs.

What does addressable mean under the HIPAA Security Rule?

Addressable means you must evaluate the control (here, encryption) through risk analysis and either implement it, implement an effective alternative, or document why it is not reasonable and appropriate in your environment. It requires deliberate analysis and justification, not inaction.

When is encryption of ePHI mandatory?

Encryption becomes mandatory when your risk analysis shows it is reasonable and appropriate, when laws, contracts, or business associate agreements require it, when compensating controls cannot reduce risk to an acceptable level, or when your internal policy makes encryption the standard. In practice, this covers most endpoints, servers, databases, backups, and network connections handling ePHI.

What are exceptions to encryption requirements?

Exceptions include documented risk-based decisions with equivalent safeguards, patient communication consent for unencrypted channels, constraints on FDA-regulated systems where encryption would break validation or safety, and emergency encryption exceptions during outages or crises. Each exception must be narrowly scoped, time-bound, and thoroughly documented with compensating controls.

How should organizations document decisions about encryption?

Create formal risk analysis documentation that lists assets and data flows, evaluates threats and impacts, and records decisions, alternatives, and compensating controls. Include responsible owners, review dates, and an encryption migration plan with milestones. Keep evidence such as configurations, key-management logs, exception approvals, and training records to demonstrate ongoing compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles