HIPAA Vulnerability Assessment: Requirements, Checklist, and How to Conduct One

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Vulnerability Assessment: Requirements, Checklist, and How to Conduct One

Kevin Henry

HIPAA

May 21, 2026

8 minutes read
Share this article
HIPAA Vulnerability Assessment: Requirements, Checklist, and How to Conduct One

HIPAA Risk Assessment Requirement

A HIPAA vulnerability assessment helps you uncover technical weaknesses that could expose electronic protected health information (ePHI). Under the HIPAA Security Rule §164.308(a)(1)(ii)(A), you must perform an accurate and thorough risk analysis of potential risks and vulnerabilities to ePHI. A vulnerability assessment is a core input to that broader risk analysis and the ongoing risk management process.

HIPAA expects you to apply administrative safeguards, physical safeguards, and technical safeguards that are reasonable and appropriate for your size, complexity, and capabilities. The assessment should evaluate how well current controls protect confidentiality, integrity, and availability of ePHI across your environment and business associates.

Remember: scanning for vulnerabilities alone does not satisfy the Security Rule. You also need to analyze likelihood and impact, prioritize risks, and implement risk mitigation plans with documented decisions and timelines.

Assessment Scope Definition

Define the scope before testing. Include every place ePHI is created, received, maintained, or transmitted—people, processes, and technology. Confirm in-scope locations, third parties, and environments so nothing critical is missed.

Assets and environments to include

  • Core platforms: EHR/EMR, practice management, billing, e-prescribing, patient portals, telehealth, lab and imaging systems.
  • Infrastructure: servers, virtualization, databases, endpoints, mobile devices, medical/IoT devices, networks, firewalls, VPNs, wireless, backups, and disaster recovery sites.
  • Cloud and apps: SaaS storing ePHI, cloud storage, collaboration tools, APIs and integrations, data lakes, and analytics workspaces.
  • Work locations: clinics, data centers, remote workers, home offices, and any facility with ePHI access or storage.
  • Third parties: business associates handling ePHI, data exchange partners, and managed service providers.

Data and process mapping

  • Document data flows for ePHI from intake to archival, including transmission paths and encryption points.
  • Classify data by sensitivity and regulatory requirements to focus depth of testing.
  • Identify privileged roles, service accounts, and automated processes with ePHI access.

Identifying Threats and Vulnerabilities

Systematically identify what could go wrong and where your defenses are thin. Use interviews, configuration reviews, log sampling, and automated tools to build a defensible picture of exposure.

Common threat sources

  • Human threats: phishing, credential theft, social engineering, insider misuse, and errors like misaddressed messages.
  • Technical threats: malware and ransomware, exploitation of unpatched software, insecure APIs, and supply chain issues.
  • Physical/environmental threats: device theft, unauthorized visitors, facility outages, and disasters disrupting availability.

Frequent vulnerabilities affecting ePHI protection

  • Missing multi-factor authentication for remote access, portals, or privileged accounts.
  • Unpatched systems and unsupported software with known exploits.
  • Misconfigurations: overly permissive access, default credentials, exposed storage buckets, open ports, weak TLS, or inactive audit logging.
  • Insufficient encryption of data at rest or in transit, including backups and removable media.
  • Incomplete asset inventory, unmanaged devices, and shadow IT bypassing security controls.
  • Gaps in vendor due diligence or outdated business associate agreements.

Evaluating Security Measures

Evaluate how existing safeguards (including technical safeguards) reduce risk today and where gaps remain. Rate control effectiveness and coverage so you can prioritize improvements with measurable outcomes.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Administrative safeguards

  • Documented policies and procedures, role-based access, sanction policy, and workforce security.
  • Security awareness and phishing training, background checks where appropriate, and periodic evaluations.
  • Risk management program linking findings to risk mitigation plans, owners, budgets, and deadlines.
  • Vendor management: business associate agreements, security questionnaires, and contract security requirements.
  • Contingency planning: data backup, disaster recovery, emergency operations, and routine restoration tests.

Physical safeguards

  • Facility access controls, visitor management, and surveillance appropriate to risk.
  • Workstation and device security, screen privacy, and secure storage.
  • Device and media controls: secure disposal, re-use procedures, chain-of-custody records, and destruction logs.

Technical safeguards

  • Access controls: unique IDs, least privilege, MFA, session timeouts, and automatic logoff.
  • Encryption for data in transit and at rest, authenticated APIs, and secure key management.
  • Audit controls and centralized logging with alerting and routine review.
  • Integrity and transmission security: anti-malware, EDR, email security, and secure messaging.
  • Vulnerability management: authenticated scanning, patching SLAs, configuration baselines, and network segmentation.

Conducting Risk Analysis Steps

Translate assessment results into a formal risk analysis that drives action. The outcome should be clear risk rankings and specific, resourced treatments.

Step-by-step workflow

  1. Gather inputs: asset inventory, data flows, prior assessments, incidents, and contracts.
  2. Identify threats and vulnerabilities linked to each ePHI-bearing asset or process.
  3. Evaluate existing controls and note control gaps or exceptions.
  4. Score likelihood and impact using a consistent scale; document assumptions and evidence.
  5. Calculate inherent and residual risk; rank items in a risk register.
  6. Select treatments: mitigate, transfer, avoid, or accept with justification and expiration dates.
  7. Build risk mitigation plans with owners, milestones, budgets, and acceptance criteria.
  8. Obtain leadership approval; align priorities with compliance and business objectives.
  9. Track remediation, test implemented controls, and update scores to show risk reduction.

Vulnerability assessment checklist

  • Confirm scope of systems, users, locations, vendors, and data flows handling ePHI.
  • Run internal and external authenticated vulnerability scans; validate critical findings manually where feasible.
  • Review configurations against secure baselines; verify encryption and key management.
  • Test backups and document successful restorations; verify offsite/immutable copies.
  • Evaluate access controls, MFA coverage, and termination processes.
  • Inspect logs and alerts for anomalous access to ePHI; ensure retention meets policy.
  • Assess patch cadence and exceptions; establish SLAs for critical vulnerabilities.
  • Review business associate security and contract requirements for ePHI handling.
  • Document findings, risk ratings, and risk mitigation plans with timelines and owners.

Documentation and Retention Practices

Strong compliance documentation proves due diligence and enables consistent operations. Maintain records that show what you assessed, what you found, what you decided, and how you reduced risk.

What to document

  • Methodology: scope, assumptions, data sources, and tools used.
  • Risk analysis report tying results to HIPAA Security Rule §164.308(a)(1)(ii)(A).
  • Risk register with likelihood, impact, residual risk, and prioritization.
  • Risk mitigation plans, budgets, approvals, and completion evidence.
  • Vulnerability scan results, penetration test summaries, and remediation proofs.
  • Policies and procedures, training records, incident response artifacts, and contingency plan tests.
  • Business associate due diligence, BAAs, and security obligations.

Retention and control

  • Retain security documentation for at least six years from creation or last effective date, consistent with HIPAA requirements.
  • Store artifacts in a secure repository with role-based access, version control, timestamps, and sign-offs.
  • Maintain an audit-ready index so you can quickly produce requested evidence.

Scheduling Regular Review

Risk analysis is not a one-time event. Establish a cadence and triggers so your HIPAA vulnerability assessment and risk management stay current as your environment changes.

Cadence and triggers

  • Perform a comprehensive risk analysis at least annually and after major changes.
  • Conduct external and internal vulnerability scans at least quarterly; scan more frequently for internet-facing systems.
  • Test disaster recovery and backup restoration at least annually; verify RTO/RPO targets.
  • Review vendor risk and BAAs annually or upon onboarding, scope change, or incident.
  • Reassess promptly after security incidents, new ePHI workflows, cloud migrations, EHR upgrades, or regulatory updates.

Operationalizing improvement

  • Use metrics—time to remediate critical vulnerabilities, encryption coverage, MFA adoption, and patch SLA adherence—to drive accountability.
  • Review open risks and risk acceptance expirations monthly; escalate blockers early.
  • Keep leadership informed with concise dashboards linking risks to patient safety and service continuity.

Conclusion

A thorough HIPAA vulnerability assessment anchors your broader risk analysis, aligns safeguards (including physical safeguards) to real-world threats, and proves due diligence. By scoping completely, identifying weaknesses, evaluating safeguards, and executing risk mitigation plans with strong documentation, you build resilient ePHI protection and sustained compliance.

FAQs.

What are the mandatory requirements for a HIPAA vulnerability assessment?

You must conduct a risk analysis of potential risks and vulnerabilities to ePHI and manage those risks to reasonable and appropriate levels. A vulnerability assessment supports this by identifying technical weaknesses, but you also need likelihood/impact analysis, prioritized remediation, and documentation aligned to the HIPAA Security Rule §164.308(a)(1)(ii)(A).

How often should a HIPAA vulnerability assessment be conducted?

Run vulnerability scans at least quarterly for most environments and more frequently for internet-facing assets. Perform a comprehensive risk analysis at least annually and whenever significant changes or incidents occur. Increase cadence if your risk profile, technology stack, or regulatory obligations change.

What systems and data must be included in the assessment?

Include every system, location, and third party that creates, receives, maintains, or transmits ePHI: EHRs, portals, telehealth, databases, endpoints, mobile and medical devices, networks, cloud services, backups, and disaster recovery sites—plus associated users, processes, and data flows.

What documentation is required after completing the assessment?

Maintain a written methodology, risk analysis report, risk register, and risk mitigation plans with owners and timelines. Keep vulnerability scan and test results, remediation evidence, policies and procedures, training and incident records, contingency plan tests, and business associate documentation. Retain these artifacts for at least six years to meet HIPAA documentation requirements.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles