How to Conduct a Physical Security Risk Assessment for HIPAA Compliance

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct a Physical Security Risk Assessment for HIPAA Compliance

Kevin Henry

Risk Management

November 04, 2024

6 minutes read
Share this article
How to Conduct a Physical Security Risk Assessment for HIPAA Compliance

A thorough physical security risk assessment helps you safeguard electronic protected health information (ePHI) and satisfy the HIPAA Security Rule’s physical safeguards. The steps below guide you from defining scope to compliance documentation, using a practical, risk-based approach.

Scope the Assessment

Start by defining what the assessment covers and why. Tie objectives to the HIPAA Security Rule’s physical safeguards so your work stays aligned with regulatory expectations and operational realities.

  • Facilities and spaces: data centers, server closets, clinics, reception, imaging rooms, pharmacies, storage, loading docks, and offsite locations.
  • Assets: servers, workstations, laptops, mobile devices, badge systems, network gear, media, backups, and environmental systems supporting ePHI.
  • People and roles: workforce members, contractors, visitors, and third-party service providers with physical access.
  • Activities and data flows: where ePHI is created, received, maintained, transmitted, or stored in physical form factors and locations.

Set assumptions and boundaries up front. Define risk criteria, tolerance, acceptance thresholds, and any exclusions so your risk analysis remains consistent and defensible.

Gather Information

Collect evidence that shows how your environment actually works. Aim for multiple data sources to validate claims and reveal gaps.

  • Documentation: floor plans, site maps, asset inventories, access control lists, visitor logs, maintenance records, and prior incident reports.
  • Policies and procedures: facility access, workstation use, device and media controls, key and badge management, and emergency operations.
  • Operational data: badge swipes, camera coverage maps, alarm histories, shipping/receiving logs, and destruction certificates for media.

Perform walkthroughs and interviews with facilities, security, clinical staff, IT, and HR. Map ePHI touchpoints to physical locations to verify where exposure could occur and to prepare for the threat assessment.

Identify Threats and Vulnerabilities

Distinguish the drivers of risk. A threat is a potential cause of harm; a vulnerability is a weakness that a threat could exploit. Your vulnerability evaluation should cover people, processes, and controls.

Common threats

  • Unauthorized access, tailgating, theft, tampering, insider misuse, and social engineering.
  • Fire, water leaks, severe weather, utility failures, and HVAC outages impacting availability of ePHI systems.
  • Vandalism, civil unrest, nearby construction, and equipment failure.

Typical vulnerabilities

  • Propped or unsecured doors, missing door contacts, or broken locks.
  • Blind camera spots, poor lighting, or inadequate monitoring and retention.
  • Weak visitor management, shared or unmanaged keys, and slow badge revocation.
  • Unanchored workstations, screens visible to the public, and unattended media awaiting disposal.

Validate findings with tests such as tailgating checks, badge audits, and after-hours walkthroughs. This strengthens your threat assessment and prevents assumptions from driving conclusions.

Assess Current Security Measures

Evaluate the design and operating effectiveness of controls mapped to HIPAA’s physical safeguards. Confirm that procedures exist, are followed, and produce reliable evidence.

  • Facility Access Controls: defined security plans, access validation, escort procedures, maintenance records, and contingency operations for emergencies.
  • Workstation Use and Security: location and placement, privacy screens, automatic screen locks, and physical anchoring where appropriate.
  • Device and Media Controls: receipt, movement, accountability, secure storage, re-use sanitation, and verifiable destruction.

Review supporting measures such as alarms, CCTV coverage and retention, door contact monitoring, visitor badges, incident response, and environmental protections like UPS, generators, fire detection, and water sensors. Note both strengths and control gaps.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Determine Likelihood and Impact

Perform risk analysis by estimating how likely a threat is to exploit a vulnerability and the impact if it does. Consider existing controls to avoid overstating risk and use consistent scales to rank items.

  • Likelihood: rare, unlikely, possible, likely, or frequent—calibrated by evidence such as logs and incidents.
  • Impact: effects on ePHI confidentiality, integrity, and availability; patient care disruption; financial loss; and regulatory exposure.
  • Risk rating: combine likelihood and impact to prioritize remediation. Document rationale for each score to ensure repeatability.

Capture results in a risk register that ties each risk to a specific asset or location, related threats and vulnerabilities, owners, and treatment decisions.

Implement Security Measures

Prioritize fixes that reduce the greatest risk at the lowest effort and cost. Sequence quick wins first, then plan strategic improvements that require budget or projects.

Quick wins

  • Remove door props, adjust door closers, and fix broken locks or contacts.
  • Add privacy screens, relocate exposed workstations, and deploy cable locks.
  • Tighten visitor workflows, escort rules, and badge deprovisioning timelines.
  • Label and lock media storage; place secure shred bins near generation points.

Strategic upgrades

  • Modernize access control systems, implement anti-tailgating (turnstiles or mantraps), and improve CCTV coverage and retention.
  • Harden server rooms with dedicated fire suppression, environmental monitoring, and redundant power.
  • Establish chain-of-custody for devices and media, including vetted vendors and audit trails.

For each action, assign an owner, due date, budget, and success metric. Train staff on revised procedures so the new controls operate consistently and demonstrably.

Document the Process

Strong compliance documentation shows what you did, why you did it, and how you will keep doing it. Record methods, findings, and decisions so an auditor can trace each conclusion back to evidence.

  • Core record set: scope statement, methodology, asset and location lists, threat and vulnerability evaluation, risk register, and treatment plan.
  • Evidence: photos, diagrams, logs, sample reports, maintenance records, destruction certificates, and approval sign-offs.
  • Policies and procedures: facility access, workstation use, device and media controls, incident response, and training artifacts.
  • Maintenance: review cadence, triggers for reassessment after changes or incidents, and version control for living documents.

Conclusion

By scoping carefully, collecting reliable evidence, analyzing threats and vulnerabilities, and documenting outcomes, you create a defensible physical security risk assessment for HIPAA compliance. The result is a prioritized, measurable plan that protects ePHI and demonstrates ongoing due diligence.

FAQs.

What is a physical security risk assessment under HIPAA?

It is a structured evaluation of how physical conditions, controls, and procedures protect ePHI against unauthorized access, damage, or loss. The assessment maps threats and vulnerabilities to the HIPAA Security Rule’s physical safeguards and produces a risk-based treatment plan.

How often should physical security risk assessments be conducted?

HIPAA requires periodic review rather than a fixed interval. In practice, conduct an assessment at least annually and whenever significant changes occur—such as moves, renovations, new systems handling ePHI, or after security incidents.

What are common physical threats to ePHI?

Typical threats include theft, tailgating, unauthorized access, insider misuse, fire, water damage, power and HVAC failures, vandalism, and equipment malfunction. These can compromise the confidentiality, integrity, or availability of ePHI if vulnerabilities are present.

How should findings from a risk assessment be documented?

Use clear compliance documentation: a defined scope and method, a risk register linking threats and vulnerabilities to assets, evidence supporting each finding, and an action plan with owners and timelines. Keep versions, approvals, and review dates to show continuous improvement.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles