How to Conduct a HIPAA Security Risk Assessment: Checklist and Examples

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct a HIPAA Security Risk Assessment: Checklist and Examples

Kevin Henry

HIPAA

May 13, 2024

8 minutes read
Share this article
How to Conduct a HIPAA Security Risk Assessment: Checklist and Examples

Protecting electronic protected health information (ePHI) starts with a disciplined HIPAA Security Risk Assessment. This guide shows you how to execute the assessment end to end, align controls with the Security Rule, and produce audit-ready documentation—complete with a practical checklist and real-world examples.

Understanding HIPAA Security Risk Assessment

A HIPAA Security Risk Assessment evaluates how threats could affect the confidentiality, integrity, and availability of ePHI across your people, processes, and technology. It is required for security rule compliance and applies to covered entities and business associates of all sizes.

Scope and key concepts

  • Scope: All locations where ePHI is created, received, maintained, or transmitted (EHRs, patient portals, cloud systems, endpoints, backups, and vendors).
  • Safeguards: Administrative safeguards (policies and governance), physical safeguards (facilities and devices), and technical safeguards (access, encryption, and monitoring).
  • Risk model: Identify threats and vulnerabilities, estimate likelihood and impact, and determine risk levels to guide mitigation.
  • Ownership: Assign accountable risk owners who approve actions, timelines, and residual risk acceptance.

Examples of common risks

  • Lost laptop with unencrypted ePHI → Potential unauthorized disclosure; mitigate with full‑disk encryption, mobile device management, and rapid remote wipe.
  • Phishing leading to credential theft → Compromised portal accounts; mitigate with multi‑factor authentication, phishing-resistant training, and email security controls.
  • Unpatched legacy server hosting ePHI → Ransomware risk; mitigate with patch management, endpoint detection and response, network segmentation, and tested backups.
  • Misconfigured cloud storage by a vendor → Public exposure of ePHI; mitigate with strong IAM, encryption at rest/in transit, logging, and enforceable BAAs.

Implementing the Risk Assessment Process

1) Plan and define scope

Set objectives, roles, and timelines. Confirm in-scope systems, facilities, vendors, and workflows that touch ePHI. Establish your risk methodology, rating scales, and evidence requirements up front.

2) Inventory assets and map ePHI data flows

Catalog applications, databases, devices, media, interfaces, and users. Diagram how ePHI moves between intake, storage, processing, transmission, and archiving, including backups and disaster recovery sites.

3) Identify threats and vulnerabilities

Use incident history, alerts, and expert input to list realistic threats (e.g., ransomware, insider misuse, device theft, misconfiguration) and vulnerabilities (e.g., missing patches, weak access controls, shadow IT).

4) Evaluate existing controls

Assess administrative safeguards (policies, training, sanctions), physical safeguards (facility access, workstation security), and technical safeguards (MFA, encryption, logging) for design and operating effectiveness.

5) Analyze and rate risks

Estimate likelihood and impact for each threat–asset pair, compute risk scores, and classify results (e.g., high/medium/low). Document rationale so results are consistent and defensible.

6) Prioritize and plan remediation

Define concrete mitigations, owners, budgets, and timelines. Balance quick wins (configuration fixes) with strategic investments (network segmentation, identity modernization).

7) Produce risk mitigation documentation

Record the selected treatments (avoid, mitigate, transfer, accept), expected residual risk, and acceptance rationale. This documentation demonstrates security rule compliance during audits.

8) Report and obtain approvals

Deliver an executive summary, detailed findings, and an actionable roadmap. Secure leadership sign‑off and communicate responsibilities to all risk owners and supporting teams.

9) Monitor and track closure

Establish metrics and dashboards. Validate control implementation, test effectiveness, and update the risk register as systems, vendors, and workflows change.

Utilizing Risk Assessment Tools

The OCR SRA Tool helps small and mid‑size organizations structure assessments, organize evidence, and generate reports aligned to HIPAA’s administrative, physical, and technical safeguards. Use it to jump‑start your analysis and standardize documentation.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Complementary methods and tooling

  • Asset discovery and configuration assessment to locate unmanaged devices and insecure settings.
  • Vulnerability scanning and penetration testing to validate exposure and prioritize patching.
  • Log management/SIEM and EDR to detect anomalies and verify control effectiveness.
  • Cloud security posture management to enforce encryption, IAM, and network controls.
  • GRC platforms to maintain the risk register, workflow, and evidence library.

Practical tips

  • Calibrate likelihood/impact with real incident data to avoid over‑ or under‑scoring.
  • Automate evidence collection where possible (policy versions, training rosters, patch status).
  • Maintain a single source of truth for findings, decisions, and residual risk.

Developing a Risk Assessment Checklist

Administrative safeguards

  • Security management process in place (risk analysis, risk management, and ongoing evaluation).
  • Assigned security responsibility and clear governance (committees, charters, RACI).
  • Workforce security: onboarding/offboarding, role‑based access, and sanction policy.
  • Security awareness and training program, including phishing simulations and reminders.
  • Information access management with least privilege and periodic access reviews.
  • Business associate agreements (BAAs) executed, current, and enforced.
  • Incident response plan with roles, playbooks, and breach notification procedures.
  • Contingency planning: backups, disaster recovery, emergency operations, and testing.
  • Policy management: version control, approvals, and scheduled reviews.

Physical safeguards

  • Facility access controls: visitor logs, badges, escorts, and maintenance records.
  • Workstation security: placement, auto‑lock, privacy screens, and clean desk practices.
  • Device/media controls: inventory, encryption, secure transfer, reuse, and disposal.
  • Environmental protections: power, HVAC, fire suppression, and water leak detection where applicable.

Technical safeguards

  • Access controls: unique IDs, MFA, emergency access, and automatic logoff.
  • Audit controls: centralized logging, retention, and regular review with documented follow‑up.
  • Integrity controls: anti‑malware/EDR, allow‑listing, and file integrity monitoring.
  • Transmission security: TLS for data in transit, email encryption, and secure APIs.
  • Encryption at rest for servers, databases, backups, and portable devices with key management.
  • Patch and vulnerability management with defined SLAs and exception tracking.
  • Network segmentation, least privilege networking, and secure remote access.
  • Mobile device management and remote wipe for smartphones, tablets, and laptops.

Documenting Risk Assessment Findings

Strong documentation is essential evidence of due diligence. Capture scope, methods, inventories, findings, decisions, and residual risk in clear language that connects to business impact.

What to include

  • Assessment scope, methodology, and rating criteria.
  • Asset/ePHI inventory and data flow diagrams.
  • Findings with likelihood, impact, risk rating, and affected safeguards.
  • Selected treatments and timelines plus risk mitigation documentation.
  • Residual risk, acceptance rationale, and accountable owners.

Risk register example entries

  • Laptop theft; vulnerability: no full‑disk encryption; risk: high. Controls: FDE, MDM, remote wipe, training. Action: encrypt all laptops; Owner: IT; Due: 30 days.
  • EHR server ransomware; vulnerability: delayed patching; risk: high. Controls: patch SLAs, EDR, network segmentation, immutable backups. Action: remediate critical CVEs in 7 days; Owner: Infrastructure; Due: 14 days.
  • Cloud storage exposure; vulnerability: permissive access; risk: medium. Controls: hardened IAM, encryption, logging, BAA enforcement. Action: apply least‑privilege policies; Owner: Cloud Ops; Due: 21 days.

Reporting tips

  • Write for both executives and auditors: one-page summary plus detailed appendix.
  • Use consistent IDs for findings so remediation progress is easy to track.
  • Version and archive reports to show year‑over‑year security rule compliance.

Scheduling Regular Risk Assessments

Conduct an enterprise‑wide assessment at least annually and whenever material changes occur (new EHR, cloud migration, major vendor, merger, or significant incident). Adjust cadence by risk profile and resource capacity.

Cadence and triggers

  • Annual baseline SRA; targeted mini‑assessments for new systems and workflows.
  • Quarterly vulnerability scans and monthly patch reviews feeding the risk register.
  • Post‑incident reassessments to validate lessons learned and control improvements.

Ownership and accountability

  • Assign risk owners and sponsors; track KPIs (closure rate, time to remediate) and KRIs (open high risks).
  • Schedule tabletop exercises for incident response and disaster recovery.
  • Refresh training and policies after each significant change.

Applying Best Practices for Risk Mitigation

Reduce risk by strengthening controls that matter most to ePHI. Focus on identity, endpoint security, data protection, resilience, and vendor assurance, and tie each action to an identified risk.

High‑impact practices

  • Enforce MFA everywhere, especially for remote access, admin accounts, and clinical apps.
  • Encrypt data at rest and in transit; manage keys securely and test recovery of encrypted backups.
  • Harden configurations using benchmarks; automate drift detection and remediation.
  • Segment networks and restrict east‑west traffic to contain attacks.
  • Deploy EDR and 24/7 monitoring for rapid detection and response.
  • Institutionalize patch SLAs and emergency procedures for critical vulnerabilities.
  • Strengthen vendor risk management: BAAs, security questionnaires, and right‑to‑audit clauses.

Actionable examples

  • Lost device risk → Full‑disk encryption, MDM enrollment, and automatic remote wipe on non‑compliance.
  • Phishing risk → MFA, conditional access, email authentication controls, and quarterly targeted training.
  • Ransomware risk → Offline immutable backups, EDR isolation playbooks, and restoration drills.
  • Cloud misconfiguration → Enforce least‑privilege IAM roles, encryption defaults, and continuous posture checks.

Conclusion

By scoping thoroughly, analyzing risks with discipline, documenting decisions, and executing a prioritized roadmap, you can conduct a HIPAA Security Risk Assessment that measurably reduces exposure and demonstrates credible, ongoing compliance with the Security Rule.

FAQs.

What is the purpose of a HIPAA Security Risk Assessment?

The assessment identifies how threats could compromise the confidentiality, integrity, and availability of ePHI, and it guides the safeguards and investments needed for security rule compliance and sustained risk reduction.

How often should a HIPAA Security Risk Assessment be conducted?

Perform a comprehensive assessment at least annually and whenever material changes occur, such as new systems, major vendors, migrations, or significant security incidents.

The OCR SRA Tool is a strong starting point for structuring an assessment and generating reports. Complement it with asset discovery, vulnerability scanning, cloud posture tools, SIEM/EDR, and a GRC platform for tracking the risk register and remediation.

What are common challenges in conducting a HIPAA Security Risk Assessment?

Typical hurdles include incomplete asset inventories, unclear scope, gaps in ePHI data flow mapping, weak documentation, underestimated third‑party risk, and treating compliance checklists as substitutes for true risk analysis and mitigation planning.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles