How to Conduct a HIPAA Risk Assessment for Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct a HIPAA Risk Assessment for Business Associates

Kevin Henry

HIPAA

May 18, 2024

8 minutes read
Share this article
How to Conduct a HIPAA Risk Assessment for Business Associates

If you handle electronic Protected Health Information (ePHI) as a business associate, a structured risk analysis is essential to support HIPAA Security Rule compliance. This guide explains how to conduct a repeatable assessment that maps your ePHI assets, analyzes threats and vulnerabilities, evaluates safeguards, and documents decisions that stand up to audits.

You will identify where ePHI lives and flows, rate likelihood and impact for realistic scenarios, and prioritize additional controls. The result is a defensible risk register and an improvement plan aligned to administrative safeguards, technical safeguards, and physical safeguards.

Identify ePHI Assets

Define scope

Start by clarifying the covered entity relationships and services you provide under your Business Associate Agreements. List the processes in which you create, receive, maintain, or transmit ePHI, including support functions like customer service, analytics, and claims handling.

Build an asset inventory

  • Information assets: databases, data lakes, file shares, backups, archives, and non-production copies containing electronic Protected Health Information.
  • Technology assets: applications, APIs, EDI gateways, email systems, mobile apps, endpoints, servers, virtual machines, and cloud services.
  • People and roles: workforce members and contractors with access, including privileged administrators and support staff.
  • Locations: data centers, offices, remote workspaces, and hosted environments where ePHI is stored or processed.

Capture key metadata for each asset: owner, purpose, data elements, data classification, location, dependencies, network exposure, and retention period. Include removable media, BYOD devices (if allowed), and third-party tools integrated into your workflows.

Map data flows

Diagram how ePHI enters, moves through, and leaves your environment. Note ingestion methods, transformations, storage points, interfaces to covered entities, and disclosures to subprocessors. Highlight transmission paths, authentication methods, and encryption coverage for every hop.

Assess Potential Threats and Vulnerabilities

Identify credible threats

  • Cyber threats: phishing, credential stuffing, ransomware, web/API exploits, insider misuse, and supply chain compromise.
  • Operational threats: misconfiguration, inadequate change control, untested backups, and weak incident response.
  • Physical and environmental threats: device loss or theft, unauthorized facility access, fire, water damage, and power failures.
  • Process and third-party threats: unclear data-handling procedures, insufficient vendor oversight, and gaps in Business Associate Agreement clauses.

Use established references, such as the structure provided in NIST SP 800-66, to standardize your threat categories and ensure coverage across confidentiality, integrity, and availability.

Surface vulnerabilities

  • Access control gaps: shared accounts, missing multifactor authentication, excessive privileges, and stale user access.
  • Platform weaknesses: unpatched systems, unsupported software, default configurations, and insecure APIs.
  • Data protection gaps: inconsistent encryption in transit or at rest, inadequate key management, and weak data loss prevention.
  • Monitoring gaps: limited audit logs, insufficient alerting, and no centralized log correlation.
  • Process gaps: incomplete onboarding/offboarding, inconsistent training, and untested incident and breach reporting procedures.

Evaluate Existing Safeguards

Administrative safeguards

  • Security management processes: risk management, sanction policies, and periodic evaluations.
  • Workforce security and training: role-based access procedures, ongoing awareness, and phishing simulations.
  • Policies and procedures: access, change, media, incident response, contingency, vendor risk management, and privacy alignment.
  • Contractual controls: BAAs with downstream vendors, minimum necessary provisions, and right-to-audit clauses.

Technical safeguards

  • Access controls: unique IDs, MFA, least privilege, privileged access management, and session timeouts.
  • Audit controls: comprehensive logging, time sync, immutable log storage, and regular review.
  • Integrity controls: hashing, code signing, and tamper detection for critical records.
  • Transmission security: TLS for data in transit, modern cipher suites, email security (DMARC/SPF/DKIM), and VPN/zero trust access.
  • Encryption and key management: encryption at rest, HSM or secure vaults, key rotation, and segregation of duties.

Physical safeguards

  • Facility access controls: badges, visitor management, cameras, and secure areas for networking gear.
  • Workstation and device security: screen locks, cable locks, device encryption, and clean desk policies.
  • Media controls: inventory, secure transport, reuse/sanitization, and verified destruction.

Assess control effectiveness

Rate each safeguard’s design and operating effectiveness using a simple scale (for example: ad hoc, developing, defined, managed, optimized). Collect evidence such as configurations, screenshots, policy versions, training records, and SOC reports to support your ratings.

Determine Likelihood and Impact

Define risk scenarios

Formulate scenarios by pairing a threat with a vulnerability and an affected asset (for example, “Phishing leads to credential theft for billing portal admins, exposing claims data”). This keeps analysis concrete and actionable.

Rate likelihood

Use qualitative or numeric scales (Low/Medium/High or 1–5). Consider historical incidents, exposure surface, control strength, attacker interest, and detection capability. Document the rationale for each score.

Rate impact

Assess potential harm to confidentiality, integrity, and availability of ePHI; regulatory and contractual penalties; operational disruption; patient trust; and costs to recover. Apply consistent criteria and include dependencies (for example, cloud service outages).

Calculate and prioritize risk

Combine likelihood and impact in a matrix to assign inherent risk, then factor in existing safeguards to estimate residual risk. Compare results to your risk appetite to determine which items require immediate mitigation versus monitoring.

Illustrative example

A legacy SFTP server lacks MFA and central logging. Likelihood is Medium due to internet exposure; impact is High because it transmits daily eligibility files. Residual risk remains Medium-High; required actions include enabling MFA on the gateway, rotating keys, enforcing modern ciphers, and forwarding logs to your SIEM.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Implement Additional Safeguards

Select a treatment strategy

For each prioritized risk, choose to mitigate, transfer, avoid, or accept with documented justification. Align decisions to business objectives, contractual obligations, and HIPAA Security Rule compliance.

High-value control enhancements

  • Identity: enforce MFA everywhere, adopt least privilege, implement privileged access management, and automate access reviews.
  • Hardening and patching: baseline configurations, rapid patch cycles, vulnerability scanning, and periodic penetration testing.
  • Data protection: full-disk and database encryption, secrets management, tokenization where feasible, and data loss prevention.
  • Network security: segmentation, secure remote access, microperimeters/zero trust, and web application firewalls.
  • Endpoint and email security: EDR, anti-phishing controls, attachment sandboxing, and mobile device management.
  • Resilience: tested, immutable backups; recovery time and point objectives; and disaster recovery runbooks.
  • Monitoring and response: centralized logging, alert tuning, playbooks, and tabletop exercises.

Plan and track execution

Create an implementation plan with owners, budgets, milestones, and success metrics. Use a Security Risk Assessment Tool to maintain your risk register, tie evidence to controls, and generate reports. Where helpful, map safeguards to the control themes described in NIST SP 800-66.

Document the Risk Assessment

What to capture

  • Scope and methodology: systems in scope, assumptions, and evaluation criteria.
  • Asset inventory and data flows: where ePHI resides and how it moves.
  • Threats and vulnerabilities: sources, findings, and supporting evidence.
  • Safeguard evaluation: administrative, technical, and physical controls with effectiveness ratings.
  • Risk analysis results: likelihood, impact, inherent and residual risk, and prioritization.
  • Risk treatment decisions: selected safeguards, timelines, risk acceptance rationale, and sign-offs.

Maintain a living risk register

Include fields for scenario description, affected assets, control gaps, owner, due date, status, and residual risk after remediation. Update it as projects complete and as your environment changes.

Produce clear summaries

Write an executive summary that highlights top risks, trends since the last assessment, material changes, and planned mitigations. Keep detailed evidence (policies, screenshots, logs, and test results) organized for swift retrieval during audits or customer reviews.

Review and Update Regularly

Cadence and triggers

Reassess at least annually and whenever significant changes occur, such as onboarding a new client, deploying a major application, engaging a new vendor, experiencing an incident, or changing hosting providers. Incorporate lessons learned from tabletop exercises and real events.

Monitor performance

Track key indicators: patch timelines, MFA coverage, failed login alerts resolved, backup restore tests, and closure rates for high-risk items. Use these metrics to validate control health and inform leadership decisions.

Strengthen vendor oversight

Periodically review downstream business associates and subprocessors for alignment with your requirements. Request attestations, reports, or targeted assessments when services or data flows change.

Conclusion

By inventorying ePHI assets, analyzing threats and vulnerabilities, evaluating safeguards, and prioritizing improvements, you create a defensible program that supports HIPAA Security Rule compliance. Keep documentation current, test your controls, and revisit risks regularly so your protections evolve with your environment.

FAQs

What is the purpose of a HIPAA risk assessment for business associates?

The purpose is to identify how your services create, receive, maintain, or transmit ePHI, evaluate threats and vulnerabilities, rate likelihood and impact, and determine safeguards that reduce risk to a reasonable and appropriate level. It enables informed decisions, documents accountability, and demonstrates due diligence to clients and regulators.

How often should business associates conduct a HIPAA risk assessment?

Conduct a comprehensive assessment at least annually and whenever material changes occur—such as new systems, major upgrades, new data flows, incidents, or vendor changes. Interim reviews keep the risk register accurate and ensure remediation stays aligned with operational realities.

What tools can assist in conducting HIPAA risk assessments?

A Security Risk Assessment Tool can help standardize methodology, store evidence, score risks, and produce reports. Many organizations also reference NIST SP 800-66 to align safeguards and ensure comprehensive coverage across administrative, technical, and physical controls.

How do business associates document their risk assessment findings?

Maintain a written report and a living risk register that include scope, assets and data flows, identified threats and vulnerabilities, safeguard evaluations, likelihood and impact ratings, residual risk, and chosen treatments with owners and timelines. Keep supporting evidence organized to substantiate conclusions during audits or customer reviews.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles