How to Conduct a HIPAA Risk Assessment: Checklist, Tools, Best Practices
A HIPAA risk assessment helps you systematically identify how electronic protected health information (ePHI) is created, received, maintained, and transmitted across your environment. By following a clear, repeatable process, you reduce the likelihood of breaches, strengthen HIPAA Security Rule compliance, and focus resources on the risks that matter most.
Identify and Inventory ePHI Assets
Define scope and data flows
Start by mapping where ePHI originates, which systems touch it, and where it goes. Capture flows between clinical apps, billing platforms, labs, telehealth tools, and business associates. Include remote work, mobile use, and cloud services to avoid blind spots.
- List ePHI sources: EHR/EMR, patient portal, imaging, lab systems, email, e-fax, wearable integrations.
- Trace transmission paths: APIs, SFTP, VPN, email, secure messaging, and third-party exchanges.
- Note endpoints: laptops, smartphones, tablets, kiosks, workstations on wheels, and portable media.
Build a complete asset inventory
Create a system-of-record for all assets that create, store, process, or transmit ePHI. For each asset, record ownership, location, data sensitivity, volume of ePHI, criticality, and existing safeguards.
- Applications and databases (on‑prem and cloud), backups, logs, and disaster recovery replicas.
- Infrastructure: servers, hypervisors, network devices, Wi‑Fi, firewalls, and VPN concentrators.
- Vendor and business associate connections, contracts, and BAA status.
Validate with stakeholders
Review the inventory with clinical, IT, privacy, compliance, and key vendors. Confirm data flows, correct gaps, and establish asset owners accountable for risk decisions and remediation.
Assess Administrative Physical Technical Safeguards
Administrative safeguards
Evaluate whether governance and policy controls are designed and operating effectively. These establish expectations and ensure risks are actively managed.
- Risk management program, policy framework, and executive oversight.
- Workforce security: background checks, role-based access, sanction policy, and termination processes.
- Security awareness and phishing training tailored to job roles.
- Contingency planning: backups, disaster recovery, and emergency operations procedures.
- Incident response: detection, triage, forensics, breach notification workflow, and lessons learned.
- Vendor management: due diligence, BAAs, and ongoing monitoring of business associates.
Physical safeguards
Confirm protections for facilities, workstations, and devices that handle ePHI. Focus on preventing theft, tampering, and unauthorized viewing.
- Facility access controls, visitor logs, and environmental protections.
- Workstation placement, privacy screens, and automatic session locks.
- Device and media controls: encryption at rest, chain-of-custody, secure reuse and disposal.
Technical safeguards
Assess the technologies that enforce confidentiality, integrity, and availability. Align configurations to least privilege and modern security baselines.
- Access controls: unique IDs, multi-factor authentication, role-based access, and just‑in‑time elevation.
- Audit controls and logging: centralized log collection, alerting, and regular review.
- Integrity controls: hashing, digital signatures, and change monitoring for critical systems.
- Transmission security: TLS for data in transit, email encryption, and secure APIs.
- Endpoint hardening: patching, EDR, mobile device management, and disk encryption.
- Network protections: segmentation, zero trust, secure remote access, and least‑privilege firewall rules.
Identify Threats and Vulnerabilities
Threat scenarios to consider
Model realistic events that could compromise ePHI. Cover malicious, accidental, and environmental sources to get a balanced view of exposure.
- Adversarial: phishing, ransomware, credential theft, data exfiltration, and vendor compromise.
- Accidental: misdirected email, misconfiguration, lost devices, and improper disposal.
- Environmental: fire, flood, power loss, HVAC failures, and supply chain outages.
Vulnerability assessment inputs
Use multiple lenses to discover weaknesses early. A formal vulnerability assessment should feed your risk analysis with current technical findings.
- Automated vulnerability scans and configuration benchmarks for servers, endpoints, and cloud.
- Manual reviews of access rights, privileged accounts, and orphaned identities.
- Patch cadence and unsupported systems review; identify legacy apps holding ePHI.
- Process gaps: weak change control, insufficient training, or outdated policies.
- Third‑party risks: incomplete BAAs, inadequate vendor controls, or unclear incident duties.
Analyze Risk Likelihood and Impact
Define a scoring model
Adopt a simple, defensible approach: Risk = Likelihood × Impact. Use a 1–5 scale for each dimension so scoring is transparent and comparable across assets.
- Likelihood: exploitability, exposure, control strength, and past events.
- Impact: confidentiality, integrity, availability, patient safety, and regulatory consequences.
- Risk levels: 1–5 (Low), 6–10 (Moderate), 11–15 (High), 16–25 (Critical).
Score with evidence
Base scores on inventory data, safeguard results, incident records, and vulnerability assessment outputs. Document assumptions and references so others can reproduce your analysis.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentExample risk register entry
- Scenario: Lost, unencrypted laptop containing ePHI.
- Likelihood: 3 (several prior lost devices, MDM partial coverage).
- Impact: 4 (large record count, potential notification obligations).
- Risk: 12 (High). Proposed controls: full‑disk encryption, MDM enrollment enforcement, and rapid remote wipe.
Prioritize and Mitigate Risks
Triaging criteria
Rank items by risk score, record volume, patient care impact, dependency complexity, and implementation effort. Tackle high exposure and low‑effort fixes first for quick risk reduction.
Risk mitigation strategies
Select the appropriate strategy per scenario: remediate (implement controls), reduce (strengthen safeguards), avoid (change process), transfer (contractual or insurance), or accept with rationale and monitoring.
- Encrypt data at rest and in transit; enforce MFA and modern authentication.
- Tighten access with least privilege, periodic access reviews, and privileged access management.
- Harden endpoints and servers; accelerate patching for internet‑facing systems.
- Improve email security, phishing defense, and role‑specific training.
- Enhance backups with immutability, offline copies, and tested recovery objectives.
- Strengthen vendor oversight: security questionnaires, evidence reviews, and BAA updates.
Validate effectiveness
After mitigation, re‑score risks and test controls for operating effectiveness. Track metrics such as mean time to patch, MFA coverage, blocked phishing attempts, and unresolved high‑severity findings.
Document Risk Assessment Process
Essential artifacts
Maintain a thorough record that demonstrates due diligence and supports audits. Clear documentation also accelerates future assessments.
- Scope statement, methodology, and scoring rubric.
- ePHI asset inventory and data flow diagrams.
- Threat and vulnerability analysis with evidence sources.
- Risk register with scores, owners, decisions, and target dates.
- Plan of Action and Milestones (POA&M) and residual risk rationale.
- Management approvals and review dates.
Leverage a Security Risk Assessment Tool
Consider using a Security Risk Assessment Tool to structure questionnaires, map controls to the HIPAA Security Rule, produce reports, and track remediation. Tools help you keep consistency across years and make scoring auditable.
Retention and accessibility
Store assessment records securely and retain them for at least six years in alignment with HIPAA documentation requirements. Ensure authorized staff can retrieve the current and prior versions on request.
Review and Update Risk Assessment Regularly
Cadence and triggers
Revisit your HIPAA risk assessment on a defined schedule and whenever meaningful change occurs. Regular updates keep your analysis aligned with reality.
- At least annually, or more often for high‑risk environments.
- Upon major changes: new EHR modules, cloud migrations, telehealth expansions, mergers, or deprecating legacy systems.
- After incidents, near misses, or new regulatory guidance.
Continuous monitoring
Feed your assessment with operational signals: vulnerability scans, audit logs, access reviews, and vendor attestations. Use dashboards to track open risks, remediation velocity, and residual risk trends.
Conclusion
A disciplined HIPAA risk assessment program inventories ePHI assets, evaluates administrative safeguards, physical protections, and technical safeguards, and uses evidence to score and mitigate risk. By documenting decisions, validating outcomes, and reviewing regularly, you improve HIPAA Security Rule compliance and protect patient trust.
FAQs
What is the purpose of a HIPAA risk assessment?
The purpose is to identify how ePHI could be exposed, measure the likelihood and impact of those events, and implement appropriate safeguards. It enables informed decisions, efficient risk mitigation strategies, and demonstrable HIPAA Security Rule compliance.
How often should HIPAA risk assessments be conducted?
Perform a comprehensive assessment at least annually and whenever significant changes occur—such as new systems, major integrations, or after an incident. Ongoing monitoring and interim updates ensure your analysis stays accurate between full assessments.
What tools are recommended for HIPAA risk assessments?
A structured Security Risk Assessment Tool can guide questionnaires, map to HIPAA requirements, and produce consistent reports. Many organizations also use vulnerability scanners, configuration benchmarks, GRC platforms, and data flow diagramming tools to enrich the analysis.
What are common vulnerabilities identified in HIPAA risk assessments?
Frequent findings include weak access controls, missing MFA, unencrypted laptops or backups, excessive privileges, unsupported systems, misconfigured cloud storage, insufficient logging, slow patching, inadequate vendor oversight, and gaps in training or incident response.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment