How to Conduct an Annual HIPAA Risk Assessment and Prove Compliance

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct an Annual HIPAA Risk Assessment and Prove Compliance

Kevin Henry

HIPAA

May 15, 2024

7 minutes read
Share this article
How to Conduct an Annual HIPAA Risk Assessment and Prove Compliance

HIPAA Risk Assessment Requirements

A HIPAA risk analysis is a formal, organization-wide security risk assessment that identifies threats and vulnerabilities to electronic protected health information (ePHI), evaluates the likelihood and impact of harm, and guides mitigation measures. It is foundational to Security Rule compliance and applies to covered entities and business associates across all locations, systems, and workflows that create, receive, maintain, or transmit ePHI.

Scope and depth

Include people, processes, technology, and third parties. Assess administrative, physical, and technical safeguards, from access management and workforce training to facility controls and cybersecurity protections like encryption and multi-factor authentication. Cloud services, telehealth tools, mobile devices, backups, and interfaces moving ePHI must be in scope.

Risk analysis vs. gap analysis

A gap analysis compares your current controls to requirements or best practices; a risk analysis quantifies the likelihood and impact of threats exploiting vulnerabilities in your environment. You need both: use the gap analysis to spot missing controls and the risk analysis to prioritize remediation.

Required outcomes

Produce a documented risk register, risk ratings and rationale, a prioritized remediation plan, and evidence that you manage risks over time. This audit documentation demonstrates that you do more than a one-time check—you continuously reduce risk to a reasonable and appropriate level.

Frequency and Timing of Assessments

HIPAA requires routine, ongoing evaluation of risks. In practice, you should perform a comprehensive assessment at least annually and whenever significant changes occur, such as deploying new systems, integrating with a new vendor, merging with another entity, adopting remote work models, or after a security incident.

Use event-driven mini-assessments between annual cycles to evaluate specific changes. Revisit risk ratings after control changes, technology upgrades, or policy updates to keep your results accurate and defensible.

Steps to Conduct a Risk Assessment

  1. Establish governance. Define roles, approval paths, and decision criteria. Confirm leadership sponsorship and document scope boundaries for ePHI systems and data flows.
  2. Catalog assets and data. Build an inventory of systems, applications, devices, databases, integrations, and third parties that store or transmit ePHI. Note data elements, locations, and owners.
  3. Map data flows. Diagram how ePHI moves through intake, processing, storage, backup, and disclosure. Map data flows to include inbound/outbound interfaces, mobile and remote access, and paper-to-digital transitions.
  4. Identify threats and vulnerabilities. Consider human error, phishing, ransomware, misconfiguration, lost devices, insider misuse, supply-chain risk, and facility hazards. Record known weaknesses and control gaps.
  5. Assess existing safeguards. Evaluate administrative, physical, and technical controls—policies, training, access management, encryption, logging, patching, network segmentation, and incident response readiness.
  6. Rate likelihood and impact. Use defined scales to score each risk scenario. Consider the sensitivity and volume of ePHI, potential patient harm, service disruption, and legal exposure.
  7. Calculate and prioritize risk. Combine likelihood and impact to rank risks. Document risk acceptance thresholds and justify any accepted risks.
  8. Perform a gap analysis. Compare your controls to Security Rule requirements and leading practices. Translate gaps into actionable tasks tied to specific systems and owners.
  9. Plan mitigation measures. Build a risk management plan with timelines, resources, and milestones. Emphasize high-value cybersecurity protections like strong authentication, least privilege, encryption, continuous vulnerability management, and reliable backups.
  10. Document, implement, and monitor. Capture results, approvals, and evidence of remediation. Track progress, retest, and update the risk register. Prepare summary materials for leadership and auditors.

Documentation and Recordkeeping

Maintain a complete, version-controlled package that proves your analysis and follow-through. At minimum, include the methodology, scope, asset inventory, data-flow diagrams, threat/vulnerability list, risk ratings with rationale, the risk register, and your mitigation plan with status.

Evidence to keep

  • Policies and procedures, training rosters, role-based access reviews, and sanction records.
  • Technical evidence: encryption settings, authentication configurations, patch reports, vulnerability scan results, logging and monitoring samples, and backup/restore tests.
  • Vendor due diligence and business associate agreements tied to ePHI workflows.
  • Incident response playbooks, tabletop results, post-incident reviews, and change records.
  • Leadership approvals, exceptions, and risk acceptance justifications.

Retention and readiness

Retain compliance documentation for at least six years or longer if required by policy or state law. Organize audit documentation so you can quickly show how risks were identified, prioritized, and reduced, including dates, responsible parties, and evidence of completion.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Tools for Risk Assessment

Use tools that accelerate accuracy without replacing professional judgment. Templates and risk registers help standardize scoring and reporting. Asset discovery and data-mapping tools reveal where ePHI actually resides and flows.

Security scanners, configuration assessment, and endpoint detection provide current-state evidence. Ticketing systems and dashboards track mitigation measures, while policy and training platforms document administrative safeguards. Combine automated results with stakeholder interviews to capture process risks that tools cannot see.

Addressing Non-Compliance Consequences

Failing to conduct or act on a risk assessment can lead to investigations, corrective action plans, mandated monitoring, contract and reputational damage, breach notification costs, and substantial civil penalties that escalate with the level of negligence. In egregious cases, criminal exposure may apply for intentional misuse.

If you discover non-compliance, act immediately: contain the issue, implement interim safeguards, document decisions, assign owners and deadlines, and track remediation through closure. Update your risk register and revalidate controls to confirm the risk has been reduced to an acceptable level.

Regulatory guidance evolves, especially around cybersecurity expectations, telehealth, third-party risk, and breach reporting thresholds. Treat regulatory monitoring as a standing control: review updates, adjust your risk criteria, and incorporate new expectations into policies, training, and technical standards.

Demonstrate proactive security by adopting recognized security practices, evidencing continuous improvement, and showing sustained operation of key controls such as multi-factor authentication, encryption, timely patching, and least-privilege access. Document how each update influenced risk ratings and mitigation measures.

Action plan

  • Track regulatory and industry guidance and summarize changes for leadership.
  • Update your threat model and risk scoring to reflect new attack patterns.
  • Revise policies, technical baselines, and vendor requirements; retrain the workforce.
  • Test changes through tabletop exercises and control validations; keep audit-ready records.

Conclusion

An annual HIPAA risk assessment proves Security Rule compliance when it is comprehensive, evidence-based, and followed by prioritized mitigation measures. Keep the scope broad, the documentation precise, and the improvements continuous so you can show, at any time, how you protect ePHI and reduce risk.

FAQs.

What are the key steps in a HIPAA risk assessment?

Define scope and governance; inventory assets and map ePHI flows; identify threats and vulnerabilities; evaluate current controls; rate likelihood and impact; calculate and prioritize risk; perform a gap analysis; plan and implement mitigation measures; document evidence; and monitor progress with periodic revalidation.

How often must HIPAA risk assessments be conducted?

Complete a comprehensive assessment at least annually and repeat whenever significant changes occur—such as new systems, vendors, major process shifts, or after incidents—to keep risk ratings and mitigation measures accurate.

What documentation is required to prove HIPAA compliance?

A written methodology, scope, asset and data-flow inventories, risk register with ratings and rationale, remediation plan and status, policies and procedures, training and access records, technical evidence (e.g., encryption and patching), vendor due diligence and agreements, incident response documentation, and leadership approvals.

What are the penalties for failing to perform a risk assessment?

Organizations face investigations, corrective action plans, and substantial civil monetary penalties that scale with negligence, plus reputational harm, contractual consequences, breach notification costs, and potential criminal exposure for intentional misconduct.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles