HIPAA Security Rule Proposal: Key Changes, Timeline, and How to Prepare

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Security Rule Proposal: Key Changes, Timeline, and How to Prepare

Kevin Henry

HIPAA

May 31, 2025

6 minutes read
Share this article
HIPAA Security Rule Proposal: Key Changes, Timeline, and How to Prepare

The HIPAA Security Rule Proposal outlines tighter expectations for safeguarding electronic Protected Health Information (ePHI). This guide distills the key changes, clarifies the likely timeline, and shows how you can prepare with practical steps, governance, and measurable outcomes.

Mandatory Safeguards Implementation

The proposal strengthens core administrative, physical, and technical safeguards by shifting more “addressable” items toward explicit requirements. You should expect clearer mandates around written policies, assigned accountability, workforce training, and continuous oversight tied to risk analysis and management.

Administrative safeguards

  • Designate a security official, define roles, and enforce a sanction policy.
  • Maintain updated policies for access, minimum necessary, and change management.
  • Institutionalize security incident response plans with defined triage, containment, notification, and post-incident review.

Physical safeguards

  • Control facility access, visitor management, and device/media handling end to end.
  • Track asset custody and ensure secure disposal of media storing ePHI.

Technical safeguards

  • Enforce unique IDs, role-based access, audit logging, and automatic log retention.
  • Standardize secure configuration baselines and continuous monitoring across endpoints, servers, and cloud services.

Encryption Requirements for ePHI

Encryption moves from strong recommendation to a de facto expectation for ePHI in transit and at rest. The rule emphasizes using recognized encryption standards and disciplined key management to reduce breach risk and demonstrate due diligence.

What to encrypt

  • Data in transit: APIs, patient portals, EHR interfaces, remote access, and email gateways.
  • Data at rest: databases, file shares, backups, endpoints, and removable media.

How to implement

  • Adopt centrally managed keys, rotation schedules, and secure storage (e.g., HSM or cloud KMS).
  • Document exceptions with compensating controls and time-bound remediation plans.
  • Continuously validate cipher suites, certificates, and coverage through automated scans.

Multi-Factor Authentication Enforcement

The proposal codifies multi-factor authentication (MFA) for high-risk access, closing long-standing breach pathways. Expect MFA requirements for administrators, remote users, third-party support, and any system exposing ePHI.

Scope and methods

  • Prioritize phishing-resistant methods (e.g., hardware keys, platform authenticators) over SMS codes.
  • Integrate MFA with SSO to minimize friction and maximize adoption.

Operational readiness

  • Establish break-glass access with robust monitoring and rapid expiry.
  • Track coverage metrics, failed enrollments, and exception aging to drive completion.

Enhanced Risk Analysis Procedures

Risk analysis and management expand from periodic reviews to a living process. You will need more granular asset inventories, threat-led testing, and evidence that risks are treated on defined timelines and revalidated after change events.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Core expectations

  • Maintain a current ePHI data map spanning applications, integrations, and vendors.
  • Use scenario-based assessment (e.g., ransomware, insider misuse, lost device) to test controls.
  • Operate a risk register with owners, treatments, due dates, and residual-risk signoff.

Continuous improvement

  • Update assessments after incidents, system changes, or new threats.
  • Measure control effectiveness with KPIs (patch timeliness, MFA coverage, encryption saturation, log completeness).

Business Associate Agreement Updates

Business associate agreements (BAAs) will align with the strengthened safeguards and accountability. The proposal clarifies responsibilities for downstream entities and accelerates notification and cooperation after security events.

Key BAA elements to revise

  • Explicit obligations for encryption standards, MFA, logging, and vulnerability remediation timelines.
  • Breach and incident notification windows with defined content and escalation paths.
  • Subcontractor flow-downs, audit and assessment rights, and data return or destruction procedures.
  • Minimum necessary access, segregation of environments, and restrictions on analytics or secondary use.

Compliance Timeline Overview

Federal rulemaking typically follows publication of a Notice of Proposed Rulemaking, a public comment period, and a final rule with an effective date. HIPAA compliance deadlines often provide a phase-in period, commonly at least 180 days, with extended time for complex provisions.

Planning assumptions

  • Comment period: plan for 60 days or more after proposal publication.
  • Effective date: generally begins a set period after the final rule is published.
  • Grace period: anticipate 6–18 months to reach full operational compliance depending on control complexity.

Internal milestones

  • 0–30 days: gap analysis, risk register updates, and prioritized roadmap.
  • 30–90 days: policy revisions, BAA updates, and tooling selection for encryption, MFA, and logging.
  • 90–180 days: technical rollouts, workforce training, and early audits of high-risk areas.
  • 180+ days: remediation of exceptions, vendor attestations, and executive certification.

Preparation and Training Strategies

Preparation hinges on governance, disciplined execution, and measurable outcomes. Treat the proposal as a catalyst to uplift security maturity while reducing breach exposure and operational risk.

Governance and ownership

  • Empower a security steering group with legal, compliance, IT, privacy, and clinical stakeholders.
  • Define owners for encryption, MFA, logging, incident response, and vendor risk.

Technical enablement

  • Complete asset and data inventories to guide control coverage and exceptions.
  • Standardize endpoint hardening, centralized logging, and backup/restore validation.
  • Automate compliance evidence collection to simplify audits.

Training and exercises

  • Deliver role-based training with simulations for phishing, credential theft, and ransomware.
  • Run tabletop exercises for security incident response plans, including vendor coordination and patient-impact communications.

Documentation to satisfy auditors

  • Current policies and procedures, risk analysis, risk treatment plans, and proof of management approval.
  • Control maps showing encryption, MFA, and logging coverage across systems storing ePHI.
  • BAAs reflecting updated obligations and subcontractor flow-downs.

Conclusion

The HIPAA Security Rule Proposal elevates baseline safeguards, formalizes encryption and multi-factor authentication (MFA), deepens risk analysis, and tightens business associate agreements (BAAs). By mobilizing now—clarifying ownership, closing control gaps, and rehearsing response—you position your organization to meet HIPAA compliance deadlines while materially reducing risk.

FAQs.

What are the major changes proposed in the HIPAA Security Rule?

The proposal emphasizes mandatory safeguards, broader encryption requirements for ePHI, enforced MFA for high-risk access, more rigorous risk analysis and management, and clearer accountability for vendors via updated BAAs. It also expects stronger logging, monitoring, and mature security incident response plans.

How does the proposed rule affect business associate agreements?

BAAs should explicitly require encryption standards, MFA, logging, timely vulnerability remediation, rapid incident notification, subcontractor flow-downs, and defined audit rights. The goal is to align vendor obligations with your security posture and ensure rapid, coordinated response to incidents.

When will the new HIPAA Security Rule requirements become effective?

After the proposal is finalized, the final rule will specify the effective date and compliance windows. Historically, HIPAA changes include an effective date followed by a phase-in period—often at least 180 days—so plan for roughly 6–18 months to achieve full compliance, depending on control complexity.

How should covered entities prepare for the updated HIPAA Security Rule?

Start now: complete a gap analysis, refresh your risk register, prioritize encryption and MFA rollouts, update BAAs, and exercise incident response. Build evidence early—policies, control maps, and training records—so you can demonstrate compliance promptly when deadlines are finalized.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles