Houston HIPAA Security Risk Assessment Guide: Steps, Examples, and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Houston HIPAA Security Risk Assessment Guide: Steps, Examples, and Checklist

Kevin Henry

HIPAA

May 16, 2024

8 minutes read
Share this article
Houston HIPAA Security Risk Assessment Guide: Steps, Examples, and Checklist

This Houston HIPAA Security Risk Assessment Guide: Steps, Examples, and Checklist helps you evaluate how your organization protects electronic protected health information (ePHI) from end to end. You’ll move from scoping and inventory to risk analysis, safeguards, documentation, and ongoing reviews tailored to Houston-area realities.

HIPAA Security Risk Assessment Requirements

What the Security Rule Expects

Under the HIPAA Security Rule, you must perform an accurate and thorough risk analysis, implement risk management, and maintain security policies and procedures. The assessment must cover administrative safeguards, technical safeguards, and physical safeguards across all systems that create, receive, maintain, or transmit ePHI.

Scope and Roles

Define covered entities and business associates, data types, and workflows. Assign a lead, identify system owners, and engage clinical, IT, compliance, and operations stakeholders. Include remote staff, telehealth, cloud services, and vendors that handle ePHI on your behalf.

Deliverables

Produce a risk analysis report, an asset and data-flow inventory, a prioritized risk register, and a risk management action plan. Keep decision rationales, approvals, and evidence ready for audits and customer due diligence.

Checklist

  • Confirm scope: entities, locations, vendors, applications, and data flows.
  • Define methodology for likelihood, impact, and risk rating.
  • Set timelines, owners, and documentation standards.
  • Plan interviews, technical tests, and evidence collection.

Inventorying ePHI Assets

Identify Where ePHI Lives and Moves

Catalog systems that store or transmit electronic protected health information, including EHRs, practice management, billing, imaging, email, secure messaging, patient portals, mobile devices, backups, and cloud storage. Map data flows between clinics, home offices, data centers, and vendors.

How to Build the Inventory

  • List assets: name, type, location, owner, custodian, and business purpose.
  • Record ePHI elements handled (e.g., names, MRNs, diagnoses) and volume.
  • Classify sensitivity and criticality for each asset and interface.
  • Note dependencies (AD, SSO, DNS, network segments, APIs).
  • Capture backup, retention, and disposal methods for media and devices.

Houston Considerations

Account for hurricane and flooding exposure, generator coverage, and multi-site operations across the metro area. Include third-party clinics and imaging centers common in Houston’s medical ecosystem.

Example Asset Entries

  • Cloud EHR: ePHI at rest and in transit; MFA enabled; vendor is a business associate.
  • Radiology PACS: on-prem server room; imaging plus demographics; nightly offsite backup.
  • Provider laptops: full-disk encryption, MDM enforced, remote wipe enabled.

Checklist

  • Complete asset list with owners and locations.
  • Data-flow diagrams that show ePHI ingress, egress, and storage.
  • Classification and retention noted for each asset.
  • Evidence of encryption, backup, and disposal practices.

Identifying Threats and Vulnerabilities

Threat and Vulnerability Analysis

Identify threats such as ransomware, phishing, insider misuse, lost devices, misconfigurations, and natural hazards like hurricanes. For each asset, list vulnerabilities: missing patches, weak access controls, unencrypted data, exposed ports, or inadequate facility controls.

Scoring Method

Rate likelihood and impact on a 1–5 scale; compute risk as Likelihood × Impact to rank priorities. Consider patient safety, regulatory penalties, service downtime, and reputational harm when scoring impact.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Examples

  • PACS server room in flood-prone area + single sump pump failure → Likelihood 3, Impact 5, Risk 15 (High).
  • Vendor SFTP without MFA + shared credentials → Likelihood 4, Impact 4, Risk 16 (High).
  • Clinic laptops with full-disk encryption but no screen-timeout → Likelihood 2, Impact 3, Risk 6 (Moderate).

Checklist

  • Threat catalog covering human, technical, and environmental risks.
  • Documented vulnerabilities with evidence (screenshots, configs).
  • Agreed scoring rubric and calibrated examples.
  • Consolidated risk register with ranked items.

Implementing Administrative and Technical Safeguards

Administrative Safeguards

  • Security policies: access control, acceptable use, mobile device, encryption, incident response, change management, vendor risk.
  • Workforce training and sanction policy; role-based access; periodic access reviews.
  • Contingency planning: backups, disaster recovery, emergency operations, and testing.
  • Vendor management: BAAs, due diligence, and ongoing monitoring.

Technical Safeguards

  • Strong authentication and multi-factor authentication (MFA) for ePHI systems and remote access.
  • Encryption in transit (TLS) and at rest where risk warrants; key management controls.
  • Least privilege, network segmentation, and zero-trust access to sensitive services.
  • Audit controls: centralized logging, immutable logs, alerting, and regular review.
  • Integrity controls, secure configuration baselines, and timely patching.

Physical Safeguards

  • Facility access controls, visitor management, and camera coverage of critical areas.
  • Workstation security: privacy screens, automatic lock, and secure workstation placement.
  • Device and media controls: inventory, encryption, secure disposal, and chain of custody.
  • Environmental protections suitable for Houston’s climate: flood mitigation and generator fuel plans.

Examples

  • Minimum baseline: MFA for portal/EHR/VPN, endpoint encryption, quarterly access reviews, tested backups, and phishing simulations.
  • Enhanced controls: privileged access management, application allow-listing, and automated DLP for email.

Checklist

  • Documented and approved security policies aligned to risks.
  • Implemented controls mapped to each high-risk item.
  • Evidence of monitoring, alerting, and periodic testing.
  • Staff training records and access review logs.

Documenting Assessment Findings

Risk Analysis Report Essentials

Write a risk analysis report that states scope, methodology, assumptions, and results. Include the asset inventory, data flows, risk register, impact analysis, selected safeguards, residual risks, and acceptance decisions with executive sign-off.

Evidence to Retain

Keep configurations, screenshots, vulnerability scan results, training rosters, incident response plans, BAAs, and vendor questionnaires. Maintain versioned security policies and change logs that show continuous improvement.

Example Risk Register Entry

  • Risk: “Ransomware on clinic workstations may encrypt ePHI and disrupt care.”
  • Score: Likelihood 4 × Impact 5 = 20 (Critical).
  • Controls: EDR, MFA, least privilege, offline backups, user training.
  • Residual Risk: 9 (Moderate) after controls; next review in 90 days.

Checklist

  • Complete, dated report with executive approval.
  • Traceability from findings to controls and residual risk.
  • Repository of evidence supporting conclusions and scores.
  • Distribution plan for stakeholders with need-to-know access.

Developing Remediation and Mitigation Plans

Risk Management Action Plan

Translate prioritized risks into a time-bound risk management action plan with owners, budgets, and milestones. Sequence quick wins to reduce exposure fast, while scheduling strategic improvements that require procurement or architecture changes.

Treatment Options and Acceptance

  • Mitigate: add or strengthen safeguards.
  • Transfer: cyber insurance or contractual allocation.
  • Accept: documented rationale, residual score, and sign-off.
  • Avoid: retire or redesign high-risk processes.

Example 30-60-90 Day Timeline

  • Days 1–30: Enable MFA everywhere, patch critical systems, enforce screen lock, back up and test restores.
  • Days 31–60: Implement centralized logging, roll out EDR, complete vendor reviews, update security policies.
  • Days 61–90: Segment networks, deploy PAM for admins, run a disaster recovery tabletop, and validate metrics.

Houston Resilience

Plan for severe weather: redundant ISPs, flood-proofing, generator maintenance, and offsite or cloud backups outside the region. Establish communications procedures for staff and patients during extended outages.

Checklist

  • Risk-to-task mapping with clear owners and due dates.
  • Defined success criteria and interim milestones.
  • Budget approvals and procurement timelines.
  • Documented acceptance for any deferred items.

Conducting Periodic Reviews and Updates

Frequency and Triggers

Review the risk assessment at least annually and whenever you add systems that handle ePHI, change vendors, undergo mergers, relocate facilities, or experience security incidents. Update scores, evidence, and the action plan accordingly.

Continuous Monitoring

Track patch cadence, backup success, phishing failure rates, audit log reviews, and incident response metrics. Run quarterly vulnerability scans, annual penetration tests, and regular tabletop exercises to validate readiness.

Governance and Reporting

Establish a security steering committee that reviews metrics and risk posture, aligns investments with the budget cycle, and approves risk acceptance. Keep an audit-ready binder with the latest report, evidence, and meeting minutes.

Conclusion

By inventorying ePHI, analyzing risks, implementing safeguards, documenting decisions, and reviewing regularly, you’ll maintain a defensible HIPAA posture. Use the checklists to turn the assessment into repeatable, measurable security improvements.

FAQs

What are the key steps in a HIPAA security risk assessment?

Define scope and methodology, inventory ePHI assets and data flows, identify threats and vulnerabilities, score and prioritize risks, implement administrative, technical, and physical safeguards, document a risk analysis report, and drive a risk management action plan with owners and timelines.

How often should a HIPAA security risk assessment be updated?

Update at least annually and whenever material changes occur—such as new ePHI systems, vendor changes, facility moves, mergers, or after incidents. Treat it as a living program with metrics, not a one-time project.

What documentation is required for HIPAA compliance?

Maintain your risk analysis report, asset inventory, risk register, security policies and procedures, training records, incident response plans, backup and recovery tests, vendor BAAs and due diligence, and evidence showing controls are implemented and monitored.

What local resources are available in Houston for HIPAA assessments?

Leverage local professional chapters (such as health IT and audit associations), university health informatics programs, county medical societies, and reputable cybersecurity and compliance consultancies. Also coordinate with regional emergency management guidance to strengthen continuity and disaster readiness.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles