How to Conduct a HIPAA Security Risk Assessment: A Compliance Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct a HIPAA Security Risk Assessment: A Compliance Checklist

Kevin Henry

HIPAA

October 26, 2024

6 minutes read
Share this article
How to Conduct a HIPAA Security Risk Assessment: A Compliance Checklist

A HIPAA security risk assessment helps you identify where electronic protected health information (ePHI) is at risk and what to do about it. Use this compliance checklist to perform a thorough, repeatable assessment that aligns with HIPAA’s Security Rule and drives measurable risk reduction.

Risk Analysis Requirement

HIPAA Security Rule Section 164.306(a) requires you to ensure the confidentiality, integrity, and availability of ePHI; protect against reasonably anticipated threats and impermissible uses or disclosures; and ensure workforce compliance. A risk analysis is the foundation for meeting these requirements.

Your analysis must be accurate and thorough, covering all systems that create, receive, maintain, or transmit ePHI. Begin by defining scope and performing ePHI data flow mapping so you can see how information moves across people, processes, systems, and vendors.

The outcome should be a documented set of risks with likelihood and impact ratings, the current controls in place, and the residual risk that remains. This documentation informs risk management decisions and demonstrates due diligence.

Risk Management Implementation

Risk management turns analysis into action. For each identified risk, decide whether to mitigate, transfer, accept, or avoid it. Prioritize items that materially affect patient safety, service availability, or legal exposure.

Select and implement controls across administrative safeguards (policies, training, sanctions, vendor oversight), physical safeguards (facility access, device security, media handling), and technical safeguards (access controls, encryption, audit logging, integrity checks). Assign owners, deadlines, and success criteria for every remediation task.

Track progress through a living risk register, validate fixes with testing or monitoring, and escalate overdue items. Management approval of accepted risks should be explicit and time-bound.

Risk Assessment Steps

1) Define scope

Include all locations, networks, applications, endpoints, cloud services, medical devices, and business associates that handle ePHI. Don’t overlook telehealth tools, patient portals, or backup environments.

2) Build the asset inventory

List systems and data repositories with owners, locations, criticality, and whether ePHI is stored, processed, or transmitted. This inventory feeds your risk register and annual reviews.

3) Perform ePHI data flow mapping

Diagram how ePHI enters, moves through, and exits your environment, including third parties. Note transfer methods, storage points, and trust boundaries to reveal hidden exposure points.

4) Identify threats and vulnerabilities

Consider ransomware, phishing, insider misuse, lost devices, misconfigurations, unpatched software, weak authentication, and third‑party failures. Tie each to affected assets and data flows.

5) Evaluate existing controls

Document administrative safeguards (policies, workforce training, access provisioning), physical safeguards (badging, door controls, media disposal), and technical safeguards (MFA, encryption, logging, segmentation). Note control effectiveness and gaps.

6) Rate likelihood and impact

Use a consistent methodology (for example, Low/Moderate/High or a 1–5 scale) to score risks. Consider patient harm, service disruption, regulatory penalties, and reputational damage.

7) Determine risk and prioritize

Combine likelihood and impact to rank risks. Focus first on high residual risks that threaten critical services or large ePHI volumes.

8) Plan remediation

Create action plans with owners, budgets, and target dates. Define compensating controls where full fixes need more time. Record acceptance criteria for completion.

9) Implement and validate

Deploy controls, then verify with tests: access reviews, vulnerability scans, backup restores, log audits, and tabletop exercises. Capture evidence for each task.

10) Monitor and update

Review your risk posture after incidents and whenever technology, vendors, or operations change. Integrate metrics into leadership reporting to sustain momentum.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Annual Technical Inventory

Perform a comprehensive technical inventory at least annually to keep your assessment current. Inventorying ensures you didn’t miss new systems, integrations, or shadow IT handling ePHI.

  • Catalog hardware, operating systems, applications, databases, cloud services, APIs, medical devices, and network components.
  • Record owners, locations, data classifications, ePHI volumes, backup status, and dependencies on third parties.
  • Note configuration baselines, patch status, encryption, authentication methods, and logging coverage.
  • Feed updates into your ePHI data flow mapping and risk register; flag significant changes that trigger an interim assessment.

Security Risk Assessment Tool

The Office for Civil Rights SRA Tool provides a guided questionnaire and reporting framework to help small and medium organizations evaluate compliance with the Security Rule. It supports scoping, control review, and risk scoring, and produces reports you can share with leadership.

Use the tool as a starting point, not a substitute for analysis tailored to your specific environment. Validate its outputs against your asset inventory, ePHI data flow mapping, and real-world test results.

Risk Assessment Checklist Components

  • Statement of scope tied to HIPAA Security Rule Section 164.306(a) objectives (confidentiality, integrity, availability).
  • Current asset inventory covering all systems that handle ePHI, including third‑party services.
  • ePHI data flow mapping across people, processes, technologies, and vendors.
  • Threat and vulnerability register with clear linkage to affected assets and controls.
  • Control review across administrative safeguards, physical safeguards, and technical safeguards with gap analysis.
  • Risk rating methodology and a prioritized risk register with likelihood, impact, and residual risk.
  • Remediation plan with owners, timelines, budgets, success metrics, and interim compensating controls.
  • Business associate management evidence: BAAs, due diligence, and monitoring activities.
  • Workforce security evidence: training, access reviews, sanction actions, and background checks where appropriate.
  • Operational resilience artifacts: incident response plan, backup and recovery tests, downtime procedures, and audit log reviews.
  • Management approvals for risk acceptance and periodic status reporting to leadership.

Risk Assessment Documentation and Frequency

Maintain written (or electronic) policies and procedures, risk registers, remediation plans, test results, and management approvals. Retain documentation for at least six years from creation or last effective date, and ensure version control with timestamps and sign-offs.

Conduct an initial risk assessment, update it at least annually, and reassess whenever material changes occur—such as EHR migrations, new patient portals, telehealth expansions, cloud adoptions, office moves, mergers, or significant security incidents.

Keep the assessment “evergreen” by integrating it with change management, procurement reviews, and incident postmortems. This continuous loop keeps you aligned with HIPAA Security Rule Section 164.306(a) and reduces real-world risk.

Conclusion

By mapping ePHI flows, evaluating safeguards, prioritizing risks, and executing a documented remediation plan, you create a defensible HIPAA security risk assessment. Pair annual technical inventory with continuous updates to keep protection in lockstep with your evolving environment.

FAQs

What is the purpose of a HIPAA security risk assessment?

It identifies how ePHI could be compromised, evaluates existing safeguards, and guides you in implementing appropriate measures so you meet HIPAA’s requirements for confidentiality, integrity, and availability while reducing actual exposure.

How often should a HIPAA risk assessment be updated?

Update it at least annually and any time you experience significant changes—new systems or vendors, major upgrades, incidents, or operational shifts like telehealth expansions or office moves.

What are the key components of a HIPAA risk assessment checklist?

Core components include scope definition, asset inventory, ePHI data flow mapping, threat and vulnerability analysis, control review across administrative, physical, and technical safeguards, a prioritized risk register, and a documented remediation plan with owners and deadlines.

How should risk assessment documentation be maintained?

Store policies, risk registers, test evidence, and approvals in a controlled repository with versioning, timestamps, and access restrictions. Retain records for at least six years and ensure they’re readily retrievable for audits, leadership review, and continuous improvement.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles