How to Complete Your MIPS Security Risk Analysis: HIPAA Requirements, Steps, and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Complete Your MIPS Security Risk Analysis: HIPAA Requirements, Steps, and Checklist

Kevin Henry

Risk Management

October 01, 2025

6 minutes read
Share this article
How to Complete Your MIPS Security Risk Analysis: HIPAA Requirements, Steps, and Checklist

MIPS Security Risk Analysis Requirement

To earn credit in the Promoting Interoperability category, you must complete a security risk analysis (SRA) or review of a prior analysis and implement updates that reduce identified risks. The assessment must cover everywhere electronic protected health information (ePHI) is created, received, maintained, or transmitted.

Scope your SRA to include your EHR, network infrastructure, cloud services, telehealth platforms, backups, endpoints, medical devices, and vendors with access to ePHI. Address ePHI confidentiality, integrity, and availability throughout the environment, not just within the certified EHR.

Timing matters. Align your SRA to the performance period timeline so it is completed at least once during the performance year and updated after material changes, such as new systems, migrations, or security incidents.

  • Complete the SRA during the performance period and before compliance attestation.
  • Document findings and corrective actions you initiated or completed.
  • Retain evidence to support auditor verification.

HIPAA Security Rule Compliance

The HIPAA Security Rule requires you to conduct an accurate and thorough assessment of risks and vulnerabilities to ePHI. Your MIPS SRA should therefore evaluate administrative, physical, and technical safeguards designed to protect ePHI confidentiality, ensure data integrity, and maintain availability.

Demonstrate how you manage access (identity, authentication, and least privilege), encrypt data in transit and at rest, log and monitor activity, secure facilities and devices, train your workforce, and oversee business associates. Include security incident response procedures and testing to show you can detect, contain, and recover from events that affect ePHI.

HIPAA expects ongoing risk management, not a one-time project. Use the SRA to drive continuous improvement and to show due diligence if audited.

Risk Assessment Steps

Use a structured, repeatable process so your results are defensible and easy to update:

  1. Define scope and objectives: systems, data flows, users, sites, vendors, and processes that handle ePHI.
  2. Inventory assets: applications, databases, servers, endpoints, medical devices, cloud services, backups, and integrations.
  3. Map data flows: where ePHI is stored, transmitted, and processed, including telehealth and remote work paths.
  4. Identify threats and vulnerabilities: technical, physical, administrative, and vendor risks, plus emerging threats.
  5. Catalog existing controls: policies, encryption, MFA, patching, network segmentation, backups, and monitoring.
  6. Analyze likelihood and impact to score inherent risk for each scenario.
  7. Evaluate residual risk after controls; perform risk prioritization to focus on high-impact, high-likelihood items.
  8. Define required actions: mitigation, transference, avoidance, or documented risk acceptance with justification.
  9. Develop the risk mitigation plan with owners, milestones, and budget.
  10. Validate readiness: tabletop a security incident response scenario and close critical gaps.
  11. Obtain leadership approval and communicate responsibilities to stakeholders.
  12. Track progress and schedule re-assessment tied to the performance period timeline or major changes.
  • Checklist: scope, inventory, data flows, threats, controls, scoring, prioritization, mitigation plan, incident response test, approvals, tracking.

Documentation and Review

Maintain thorough, organized records that show how you conducted the SRA and what you did about the results. Clear documentation makes audits faster and strengthens your compliance posture.

  • Methodology summary, scope statement, and performance period timeline.
  • Asset and vendor inventory, data flow diagrams, and system boundaries.
  • Risk register with likelihood/impact scoring, risk prioritization, and rationale.
  • Evidence of controls: policies, procedures, training logs, technical settings, and screenshots.
  • Security incident response plan, test results, and after-action items.
  • Risk mitigation plan, status reports, sign-offs, and change logs.
  • Pre-attestation review notes confirming that required updates were implemented or initiated.

Schedule periodic management reviews to verify progress, approve risk acceptance where appropriate, and realign priorities when systems or threats change.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Tools and Resources

Select tools that fit your size and complexity while producing auditable outputs:

  • Risk assessment frameworks and guides (for structure and scoring consistency).
  • Security Risk Assessment applications that generate risk registers and reports.
  • Vulnerability scanners, configuration assessment tools, and patch management.
  • Identity and access management, MFA, and privileged access tools.
  • Endpoint protection, EDR, email security, and secure backup solutions.
  • Log aggregation and SIEM for monitoring, alerting, and incident investigation.
  • Simple templates: asset inventory spreadsheet, risk register, and remediation tracker.

Whichever tools you choose, ensure they help you trace findings to actions in your risk mitigation plan and export evidence for audits.

Risk Mitigation Plan

Your risk mitigation plan turns analysis into action. It should clearly connect prioritized risks to targeted safeguards, owners, and deadlines so you can demonstrate progress during compliance attestation.

  • Prioritize high-risk items that materially affect ePHI confidentiality, integrity, or availability.
  • Define quick wins (e.g., MFA rollout, critical patching, disabling unused ports) and strategic projects (e.g., network segmentation, backup modernization).
  • Assign accountable owners, target dates, success metrics, and required budget.
  • Integrate with change management and training to prevent reintroduction of risks.
  • Test security incident response procedures after key changes to validate effectiveness.
  • Document risk acceptance cases with business justification, time limits, and review cadence.

Track remediation through closure, and re-score residual risk to show measurable improvement over time.

Attestation Requirement

During submission, you make a compliance attestation that you conducted a security risk analysis (or reviewed and updated a prior one) for the performance period and took necessary steps to address findings. Your attestation should be backed by dated documentation and evidence of implemented or initiated updates.

  • Confirm the SRA completion date falls within the performance period timeline.
  • Verify remediation activities for high-priority risks have started or been completed.
  • Assemble your evidence packet: methodology, risk register, mitigation plan, incident response artifacts, and approvals.
  • Retain records according to your policy and anticipated audit timeframes.

Bottom line: scope comprehensively, analyze rigorously, prioritize smartly, execute your risk mitigation plan, and verify everything before you attest. This approach satisfies the MIPS measure and strengthens HIPAA Security Rule compliance.

FAQs

What are the HIPAA requirements for MIPS security risk analysis?

HIPAA requires an accurate and thorough assessment of risks and vulnerabilities to ePHI, plus ongoing risk management. For MIPS, you must complete that analysis for the performance period, implement necessary updates to reduce identified risks, and maintain documentation that demonstrates how you protect ePHI confidentiality, integrity, and availability.

How often must the MIPS security risk analysis be completed?

Complete the SRA at least once per performance period and update it whenever significant changes occur—such as new systems, migrations, incidents, or mergers. Many organizations perform a full annual assessment with targeted interim reviews to keep the analysis current.

What are the key steps in conducting a HIPAA security risk analysis?

Define scope; inventory assets and vendors; map ePHI data flows; identify threats and vulnerabilities; review existing controls; score likelihood and impact; perform risk prioritization; produce a risk mitigation plan with owners and timelines; test security incident response; obtain approvals; and monitor progress with scheduled re-assessments.

What happens if a MIPS security risk analysis is not completed?

Failure to complete the SRA can result in no credit for the Promoting Interoperability category and may contribute to a negative Medicare payment adjustment. It also signals potential HIPAA noncompliance, increasing enforcement and reputational risk. If you discover a gap, complete the SRA promptly, start remediation, and document your actions.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles