How to Conduct a HIPAA Physical Safeguard Audit: Checklist, Requirements, and Best Practices

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct a HIPAA Physical Safeguard Audit: Checklist, Requirements, and Best Practices

Kevin Henry

HIPAA

February 24, 2026

7 minutes read
Share this article
How to Conduct a HIPAA Physical Safeguard Audit: Checklist, Requirements, and Best Practices

A HIPAA physical safeguard audit verifies that your facilities, workstations, and devices prevent unauthorized exposure of electronic protected health information (ePHI). You confirm ePHI access restrictions are enforced, validate physical access controls, and capture evidence that meets audit documentation standards.

Use the sections below as a structured, repeatable approach. For each area, define scope, test controls, record findings, and assign remediation with due dates you can track to completion.

Facility Access Controls

Objectives

Limit physical entry to locations where ePHI is created, received, maintained, or transmitted. Ensure only authorized personnel can access data centers, network closets, imaging rooms, and records areas.

Checklist

  • Maintain a current facility security plan that maps all ePHI areas, entry points, cameras, and alarms.
  • Use role-based badges/keys; review access lists at least quarterly and at employment changes.
  • Implement visitor management: sign-in, government ID verification, visitor badges, written acknowledgment, and escort until exit.
  • Control keys and credentials: issuance logs, dual authorization for master keys, immediate revocation on termination.
  • Harden doors and spaces: self-closing doors, strike plates, door-prop alerts, tamper-evident seals for network racks.
  • Provide emergency access procedures and break-glass controls with event logging and post-incident review.
  • Monitor and retain CCTV where appropriate; document retention times and access rights to footage.

Evidence to collect

  • Access control matrix, last two access reviews with approvals, and badge/keys issuance logs.
  • Visitor logs with timestamps and escorts; floor plans highlighting restricted zones.
  • Alarm and CCTV coverage diagrams; sample event logs. Retain records per audit documentation standards (at least six years).

Common gaps and quick wins

  • Tailgating at staff entrances: add anti-passback and awareness posters near doors.
  • Propped doors during deliveries: require timed door-prop alarms and supervisor approvals.

Workstation Security

Objectives

Protect ePHI on desktops, laptops, and kiosks by securing physical placement, access, and use. Align workstation positioning requirements to minimize shoulder surfing in reception, triage, and hallways.

Checklist

  • Auto-lock/screen timeout with strong authentication; disable generic shared logins.
  • Anchor equipment: cable locks, locked docking stations, bolted kiosks, tamper seals on ports where needed.
  • Fit privacy screens on displays in public or semi-public areas; orient monitors away from high-traffic paths.
  • Apply a clean desk/clear screen practice; prohibit writing ePHI on notes visible to others.
  • Separate public-use kiosks from clinical workstations; restrict boot devices and external ports as policy dictates.
  • Document remote and home-office rules: dedicated space, lockable storage, prohibition on printing ePHI unless authorized.

Evidence to collect

  • Workstation inventory with locations, ownership, and physical security measures.
  • Site walkthrough photos, kiosk checklists, and exception approvals for special placements.
  • User acknowledgment of acceptable use and workstation security procedures.

Device and Media Controls

Objectives

Control the full lifecycle of hardware and removable media that may store ePHI. Prevent data leakage during use, transit, reuse, or disposal through documented media disposal procedures and chain-of-custody.

Checklist

  • Maintain an asset register for servers, laptops, drives, backup tapes, and removable media including serial numbers and custody.
  • Authorize and log any offsite movement; use locked containers and tamper-evident packaging for transit.
  • Secure spares and retired equipment in locked storage pending sanitization or destruction.
  • Sanitize before reuse with approved methods; verify and record results prior to redeployment.
  • Dispose using certified destruction (e.g., shredding, pulverizing) with witnessed chain-of-custody and certificates of destruction.
  • Define lost/stolen device procedures with immediate containment, remote disablement, and security breach response steps.

Evidence to collect

  • Asset lists, checkout logs, shipping receipts, and custody records.
  • Sanitization and destruction logs with serials and signatures; vendor certificates where used.
  • Incident tickets for any lost media with timelines and outcomes.

Physical Security Policies

Requirements

Publish clear, enforceable policies and procedures governing physical protection of ePHI. Validate physical security policy compliance through audits, attestations, and corrective actions.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Core policies to maintain

  • Facility access controls, visitor management, and escort rules.
  • Workstation use and placement, including privacy screen and timeout standards.
  • Device and media controls: assignment, transport, reuse, and disposal.
  • Badge, key, and credential issuance and revocation.
  • Emergency access and alternate site procedures.
  • Contractor/vendor access and oversight for on-site work.

Evidence to collect

  • Current policies with version history, approvals, and review cadence.
  • Compliance attestations, monitoring reports, and disciplinary records for violations.
  • Mappings from policy requirements to implemented controls and tests.

Regular Training and Awareness

Program elements

Train everyone who can affect physical security—from clinicians and reception to facilities and IT. Reinforce behaviors that protect ePHI and uphold ePHI access restrictions in day-to-day operations.

  • Onboarding and annual refreshers; role-based modules for front desk, clinical, and maintenance staff.
  • Micro-reminders: posters near entrances, tailgating tips, workstation privacy cues.
  • Hands-on drills: visitor challenge exercises, door-prop scenarios, lost device reporting practice.
  • Measure and improve: completion tracking, knowledge checks, and spot checks during walkthroughs.

Evidence to collect

  • Training rosters, completion reports, and curricula.
  • Drill schedules and after-action notes with assigned improvements.

Incident Response Planning

Plan structure

Prepare for rapid, coordinated action when physical incidents threaten ePHI. Your plan should define triggers, roles, and a security breach response workflow that captures facts and timelines.

  • Define incident types: forced entry, lost/stolen device, unauthorized visitor, environmental events (fire/flood).
  • Escalation tree: on-call contacts, privacy/security officer, facilities, legal, and communications.
  • Containment steps: secure area, revoke access, preserve logs/CCTV, and initiate forensic hold.
  • Notification rules and documentation requirements, including decision records and corrective actions.
  • Post-incident review to identify root causes and preventive measures.

Evidence to collect

  • Approved incident response plan, call lists, and tabletop exercise reports.
  • Recent incident tickets with timelines, impact analysis, and remediation status.

Continuous Improvement Strategies

Governance and metrics

Use data to target risk and prove progress. Track KPIs, prioritize fixes, and integrate lessons from audits and incidents into your roadmap.

  • Metrics: door-prop alerts, tailgating reports, visitor exceptions, workstation privacy screen coverage, lost device rate, time-to-decommission media.
  • Quarterly security committee to review findings, approve budgets, and assign owners.
  • Audit calendar: annual comprehensive audit, quarterly spot checks, and unannounced walkthroughs of high-risk zones.
  • Change management: reassess controls after moves, expansions, new equipment, or vendor onboarding.
  • Technology enhancements: door analytics, badge anomaly detection, and improved camera coverage where justified by risk.

Conclusion

A disciplined HIPAA physical safeguard audit confirms that your physical access, workstation practices, and device/media handling work together to protect ePHI. By documenting evidence, training your people, rehearsing response, and tuning controls over time, you meet requirements and embed best practices that stand up to scrutiny.

FAQs.

What are the key components of a HIPAA physical safeguard audit?

The core components are facility access controls, workstation security, and device and media controls, supported by clear policies, training, and incident response. You assess control design, test effectiveness on-site, review logs and records against audit documentation standards, and assign remediation with due dates and owners.

How do you secure workstations to protect ePHI?

Orient screens to meet workstation positioning requirements, fit privacy filters, enforce short auto-lock timers, and restrict generic logins. Anchor devices with cable locks or locked docks, separate public kiosks from clinical stations, and apply a clean desk rule. Document exceptions and verify during walkthroughs.

What policies are required for physical security under HIPAA?

Maintain policies for physical access controls and visitor management, workstation use and placement, device and media controls including media disposal procedures, credential and key management, emergency access, contractor access, and incident response. Monitor physical security policy compliance with audits and attestations.

How often should physical safeguard audits be conducted?

Conduct a comprehensive audit at least annually, with quarterly spot checks and additional reviews after major changes such as renovations, relocations, or new clinical services. High-risk areas may warrant monthly walkthroughs. Retain audit records and evidence for at least six years to satisfy audit documentation standards.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles