How to Conduct a HIPAA Risk Assessment for Healthcare Billing Companies: Step-by-Step Guide and Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct a HIPAA Risk Assessment for Healthcare Billing Companies: Step-by-Step Guide and Checklist

Kevin Henry

HIPAA

September 07, 2025

8 minutes read
Share this article
How to Conduct a HIPAA Risk Assessment for Healthcare Billing Companies: Step-by-Step Guide and Checklist

Use this step-by-step guide and checklist to conduct a HIPAA risk assessment tailored to healthcare billing operations. You will scope systems, identify threats, evaluate safeguards, analyze and prioritize risk, document compliance, plan reviews, and prepare for incidents affecting electronic protected health information (ePHI).

The approach below applies to billing companies, revenue cycle management teams, and clearinghouse-connected workflows, with practical actions you can implement immediately.

Scope Definition

Begin by defining exactly where ePHI is created, received, maintained, or transmitted within your billing environment. Clarify organizational boundaries, facilities, and any remote or hybrid work arrangements. Designate a Privacy and Security Officer to own the assessment, decisions, and reporting.

In-scope assets and processes

  • Billing platforms, coding tools, practice management systems, and any EHR interfaces used for charge capture or eligibility.
  • Data repositories: databases, file shares, cloud storage, backups, logs, and call recordings containing payment or patient identifiers.
  • Communication and transfer channels: email, SFTP/EDI connections, secure portals, fax servers, VoIP, and ticketing systems.
  • Endpoints and infrastructure: workstations, laptops, mobile devices, virtual desktops, servers, network gear, and authentication services.
  • People and roles: billers, coders, payment posters, client support, IT administrators, contractors, and vendors.

Third parties and Business Associate Agreements (BAAs)

  • List all vendors handling or accessing ePHI and confirm active BAAs, responsibilities, and breach notice clauses.
  • Map data flows to and from clearinghouses, mailing/statement providers, analytics firms, and cloud platforms.
  • Note inherited controls and any shared responsibility details relevant to each BAA.

Scope checklist

  • Compile a system inventory and current data flow diagram for ePHI.
  • Define trust boundaries, environments (production, test), and locations (office, home, cloud).
  • Document assessment objectives, assumptions, and risk appetite.
  • Assign roles, including the Privacy and Security Officer and business owners for each system.

Threat and Vulnerability Identification

Identify events that could harm confidentiality, integrity, or availability of ePHI and the weaknesses that would allow them to occur. Use recent incidents, logs, vendor advisories, and staff input to build a realistic picture.

Common threats to billing operations

  • Phishing and business email compromise targeting billing inboxes and client communications.
  • Ransomware and data exfiltration via vulnerable endpoints or misconfigured remote access.
  • Credential stuffing and weak authentication for portals, VPNs, or SFTP accounts.
  • Misdirected communications (wrong patient, wrong payer) and unencrypted transfers.
  • Cloud and SaaS misconfigurations (public buckets, lax sharing, excessive privileges).
  • Vendor outages, insider misuse, theft of devices, environmental events, and power loss.

How to uncover vulnerabilities

  • Review configurations, access permissions, logs, and change history for each critical system.
  • Run vulnerability scans and patch reviews; confirm MFA coverage and conditional access.
  • Assess email security, DLP, endpoint protections, and backup recoverability.
  • Evaluate vendor security questionnaires, attestations, and BAA obligations.
  • Interview process owners to locate workarounds, shadow IT, and manual handling of ePHI.

Security Measures Evaluation

Evaluate your safeguards against HIPAA’s categories: Administrative Safeguards, Technical Safeguards, and Physical Safeguards. Record effectiveness, evidence, and gaps for each control.

Administrative Safeguards

  • Documented risk management program, policies, and procedures with annual reviews.
  • Role-based access, onboarding/offboarding, sanctions, and workforce security training.
  • Vendor management, BAA oversight, and due diligence processes.
  • Contingency planning: data backup, disaster recovery, emergency mode operations.
  • Incident response plan with defined roles, escalation paths, and testing.

Technical Safeguards

  • MFA for email, VPN, privileged access, and portals; unique user IDs; automatic logoff.
  • Encryption in transit and at rest for databases, endpoints, and file transfers.
  • Endpoint protection/EDR, email filtering, DLP, and web isolation as appropriate.
  • Logging, alerting, and centralized monitoring; periodic access and audit reviews.
  • Secure SFTP/EDI, network segmentation, patch and vulnerability management, tested backups.

Physical Safeguards

  • Facility access controls, visitor logs, and secure server/telecom rooms.
  • Workstation placement, privacy screens, clean desk, and secure disposal/shredding.
  • Badge controls, cameras where appropriate, and remote-work physical safeguards.

Evaluation approach

  • Gather artifacts (configs, screenshots, logs) and sample-test control operation.
  • Rate control maturity/effectiveness; note compensating controls and residual gaps.
  • Tie each safeguard to specific threats and vulnerabilities discovered earlier.

Risk Analysis and Prioritization

Translate findings into business risk statements and record them in a living Risk Register. For each risk, identify affected assets, threat/vulnerability pair, existing controls, and potential impact on ePHI and operations.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Scoring model

  • Likelihood: 1 (rare) to 5 (very likely); Impact: 1 (low) to 5 (severe).
  • Risk score = Likelihood × Impact. Example thresholds: 15–25 high, 8–14 medium, 1–7 low.
  • Consider patient impact, regulatory exposure, financial loss, and service disruption.

Treatment and ownership

  • Choose actions: mitigate, transfer, accept (with justification), or avoid.
  • Assign an owner, due date, budget, and success criteria for each mitigation task.
  • Define interim compensating controls and expected residual risk after remediation.

Example risk statements

  • Phishing may lead to mailbox takeover and ePHI exfiltration due to incomplete MFA.
  • Unencrypted laptops used by remote billers could expose ePHI if lost or stolen.
  • Shared SFTP credentials increase unauthorized access risk to client files.

Documentation and Compliance

Maintain complete, dated documentation that demonstrates your methodology, decisions, and outcomes. Ensure artifacts align with BAAs and your internal policy framework, and keep records available for audits.

Key artifacts to produce

  • Written methodology, system inventory, and ePHI data flow diagrams.
  • Risk Register with scoring, treatment plans, owners, and status.
  • Policies and procedures covering Administrative, Technical, and Physical Safeguards.
  • BAA repository and vendor due diligence evidence.
  • Training, sanctions, access reviews, incident/breach logs, and recovery test results.
  • Management approval and periodic review sign-offs; retain required records for at least six years.

Regular Review and Updates

Treat the risk assessment as an ongoing program. Reassess at least annually and whenever material changes occur to systems, vendors, processes, or threat landscape.

Update triggers

  • New billing platform, EHR integration, client onboarding, or major configuration change.
  • Vendor additions or changes to BAAs, cloud migrations, or data residency shifts.
  • Security incidents, audit findings, or new regulatory guidance.

Operationalizing the cycle

  • Establish a risk committee led by the Privacy and Security Officer for quarterly reviews.
  • Track KPIs: MFA coverage, patch SLAs, phishing fail rate, backup restore times, training completion.
  • Schedule tabletop exercises and control testing to validate readiness.

Incident Response and Breach Notification

Prepare for rapid detection, containment, and recovery from security events. Coordinate closely between technical responders and the Privacy and Security Officer to determine if an incident constitutes a reportable breach of ePHI.

Response playbook

  • Preparation: contacts, tools, forensics procedures, and communication templates.
  • Detection and triage: verify scope, preserve evidence, and escalate per criteria.
  • Containment and eradication: isolate systems, revoke access, patch, and clean endpoints.
  • Recovery: validate integrity, restore from backups, and monitor for reoccurrence.
  • Post-incident review: root cause, control improvements, and Risk Register updates.

Breach notification basics

  • Notify affected individuals without unreasonable delay and no later than 60 days after discovery when a breach of unsecured ePHI is confirmed.
  • Report to HHS and, for breaches affecting 500 or more individuals in a state or jurisdiction, provide additional required notifications.
  • Follow BAA terms for vendor-to-covered-entity notices and coordinated communications.
  • Document your risk-of-compromise assessment and all actions taken.

Conclusion

By scoping your environment, identifying realistic threats, evaluating safeguards, and prioritizing risks in a formal Risk Register, you create a defensible HIPAA risk assessment for healthcare billing. Maintain clear documentation, review regularly, and rehearse incident response to keep ePHI protected and operations resilient.

FAQs.

What systems should be included in a HIPAA risk assessment for healthcare billing?

Include billing and coding applications, practice management and EHR interfaces, data warehouses, file shares, cloud storage, backups, email, SFTP/EDI connections, call recording systems, ticketing tools, authentication services, and all endpoints and network components that create, receive, maintain, or transmit ePHI. Don’t forget vendor-hosted portals and any remote work setups.

How often must a HIPAA risk assessment be updated?

Update it at least annually and whenever significant changes occur—such as new systems, vendors, integrations, major configuration shifts, or after an incident. Treat it as a continuous process with quarterly reviews to validate progress and adjust priorities.

What are common threats to healthcare billing ePHI?

Top threats include phishing and business email compromise, ransomware, credential attacks against portals or VPNs, misdirected communications, unsecured file transfers, cloud misconfigurations, insider misuse, vendor outages, and theft or loss of devices containing ePHI.

How is risk prioritized during the assessment?

Pair each asset and vulnerability with a credible threat, score Likelihood and Impact on a 1–5 scale, and calculate a risk score (L × I). Use thresholds to classify high, medium, and low risks, then assign owners and timelines in a Risk Register to drive remediation and track residual risk.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles