How to Conduct an Information Security Risk Assessment under the HIPAA Security Rule
Overview of the HIPAA Security Rule
The HIPAA Security Rule requires covered entities and business associates to safeguard the confidentiality, integrity, and availability of electronic protected health information (ePHI). It is risk-based and scalable, meaning you must tailor controls to your size, complexity, and capabilities. A sound risk analysis methodology and ongoing risk management program sit at the core of compliance.
The Security Rule groups protections into administrative safeguards, technical safeguards, and physical safeguards. Some implementation specifications are required, while others are addressable; addressable does not mean optional—you must implement them or document a reasonable alternative. Your decisions must be supported by clear compliance documentation.
Two provisions anchor the process: risk analysis and risk management. In practice, you will identify where ePHI lives, evaluate threats and vulnerabilities, estimate likelihood and impact, and then reduce risk to a reasonable and appropriate level. You must maintain evidence of your analysis, decisions, and implemented controls.
Core objectives
- Protect ePHI by implementing appropriate administrative, technical, and physical safeguards.
- Use a repeatable risk analysis methodology to identify, quantify, and prioritize risks.
- Maintain comprehensive compliance documentation to demonstrate due diligence and accountability.
Defining Electronic Protected Health Information
Electronic protected health information is any individually identifiable health information that is created, received, maintained, or transmitted in electronic form. It includes data at rest and in transit, whether stored on servers, endpoints, removable media, or cloud platforms. If the data can identify a person and relates to health status, care, or payment, it is ePHI when held electronically.
De-identified information is not ePHI, but partial masking or pseudonymization usually does not meet de-identification standards. Assume ePHI status when in doubt and apply appropriate safeguards. Your inventory should reflect every system, workflow, and third party that touches the data.
Where ePHI typically resides
- EHR/PM systems, patient portals, billing and revenue cycle tools.
- Email, secure messaging, collaboration platforms, and voice or telehealth recordings.
- Imaging systems (PACS), lab systems (LIS), and interfaces/HL7/FHIR APIs.
- Cloud storage, backups, disaster recovery sites, and archiving solutions.
- Endpoints and portable media: laptops, tablets, smartphones, USB drives.
- Network gear, logs, audit trails, and biomedical/IoT devices that store or transmit data.
Steps to Perform Risk Analysis
A thorough risk analysis follows a structured, repeatable sequence. The goal is to understand risks to ePHI and determine reasonable and appropriate controls for your environment. Use consistent criteria so results are comparable over time.
- Define scope and context: Establish organizational boundaries, in-scope business processes, facilities, and systems. Include vendors and business associates with access to ePHI.
- Build an asset and data-flow inventory: Catalog applications, databases, devices, interfaces, and repositories. Map how ePHI is created, received, maintained, transmitted, and disposed.
- Identify threats and vulnerabilities: Consider human error, malicious actors, malware, insider misuse, outages, disasters, and third-party failures. Note control weaknesses, misconfigurations, and process gaps.
- Assess likelihood and impact: Use qualitative or semi-quantitative scales to estimate how probable a scenario is and the potential harm to confidentiality, integrity, and availability.
- Determine inherent risk: Combine likelihood and impact before additional controls. Rank risks to highlight what requires attention first.
- Evaluate existing controls: Document administrative safeguards, technical safeguards, and physical safeguards already in place. Identify gaps against policy, standards, and HHS expectations.
- Define risk mitigation strategies: Propose controls to reduce risk to a reasonable and appropriate level, considering cost, feasibility, and effectiveness.
- Assign ownership and timelines: Record control owners, due dates, and metrics for success. Add items to a living risk register.
- Document results: Produce compliance documentation that captures methodology, assumptions, findings, decisions, and residual risk acceptance.
- Review and approve: Obtain leadership sign-off. Communicate outcomes to system owners and incorporate into your security program plan.
Risk scoring and prioritization
Use a simple, transparent model (for example, a 1–5 scale for likelihood and impact) to score each scenario. Group results into tiers such as Critical, High, Moderate, and Low to drive sequencing. Revisit scores as controls are implemented and conditions change.
Utilizing the ONC Security Risk Assessment Tool
The ONC Security Risk Assessment Tool guides you through a structured questionnaire aligned to the HIPAA Security Rule. It is designed to help smaller practices and business associates evaluate processes, controls, and potential gaps related to ePHI. The output supports your risk analysis methodology and risk register.
Before starting, assemble your asset inventory, policies, workforce roles, and vendor list. Work through each module, attach notes and evidence, and capture identified risks with their likelihood, impact, and proposed risk mitigation strategies. Export the results and integrate them into your compliance documentation.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentPractical tips
- Set scope first so responses are consistent across departments and sites.
- Involve IT, compliance, privacy, clinical, and operations to validate answers.
- Use the tool’s reports as a starting point, then tailor controls to your environment.
- Map findings to administrative, technical, and physical safeguards to close gaps systematically.
- Track action items in your risk register with owners and due dates for accountability.
Documenting and Mitigating Identified Risks
Translate analysis results into a clear risk treatment plan. For each risk, specify the control objective, selected safeguards, implementation steps, testing approach, owner, and due date. Record residual risk after implementation and obtain formal acceptance when appropriate.
Administrative safeguards
- Policies and procedures: access control, acceptable use, device/media handling, change management, and incident response.
- Workforce security: background checks, onboarding/offboarding, sanctions, and role-based training.
- Vendor management: business associate agreements, security due diligence, and ongoing oversight.
- Contingency planning: risk-based backups, disaster recovery, business continuity, and periodic testing.
Technical safeguards
- Identity and access management: unique IDs, least privilege, MFA, and timely access reviews.
- Encryption: data at rest on servers and endpoints; data in transit across networks and APIs.
- System and network protection: patching, configuration baselines, EDR/AV, email security, and firewalls.
- Audit controls: centralized logging, monitoring, alerting, and regular log review.
Physical safeguards
- Facility access: badge controls, visitor management, CCTV where appropriate, and environmental protections.
- Workstation security: placement, screen privacy, auto-lock, and cable locks where needed.
- Device and media controls: inventory, secure storage, encryption, and validated destruction.
Risk treatment decisions and residual risk
Choose to mitigate, avoid, transfer, or accept each risk based on business need and feasibility. Document rationale, compensating controls, and sign-offs. Validate effectiveness through testing and include evidence in your compliance documentation.
Ensuring Compliance with HHS Guidance
HHS guidance emphasizes that risk analysis and risk management are continuous, documented processes, not one-time events. Required specifications must be implemented, and addressable specifications require a documented implementation or a reasonable and appropriate alternative. Your records should demonstrate why each decision appropriately protects ePHI.
Maintain an audit-ready package that includes the current risk analysis, risk register, policies and procedures, workforce training records, business associate agreements, incident response procedures, and contingency planning materials. Periodically evaluate your program’s effectiveness and update controls as technology and operations evolve.
Continuous Monitoring and Risk Management
Build continuous monitoring into daily operations so risks are identified and managed between formal assessments. Use metrics such as patch timeliness, failed login trends, endpoint coverage, backup success rates, and completion of access reviews. Track incidents to closure and feed lessons learned into your risk register.
Reassess when significant changes occur—new EHR modules, cloud migrations, mergers, major facility moves, or notable security incidents. Many organizations also perform an annual review to confirm assumptions, validate controls, and refresh compliance documentation. Treat monitoring as a Plan-Do-Check-Act cycle that keeps safeguards effective and proportional to current risk.
Conclusion
Effective HIPAA Security Rule compliance starts with a rigorous risk analysis methodology and continues with targeted risk mitigation strategies and strong documentation. By inventorying ePHI, closing gaps across administrative, technical, and physical safeguards, and monitoring continuously, you can reduce risk to a reasonable and appropriate level and demonstrate due diligence.
FAQs
What is the purpose of the HIPAA Security Rule risk assessment?
The purpose is to identify threats and vulnerabilities to electronic protected health information and to determine reasonable and appropriate controls to reduce risk to confidentiality, integrity, and availability. It guides investment, informs policies, and provides compliance documentation that demonstrates due diligence.
How often should an organization perform a risk analysis?
Perform an initial assessment and update it whenever significant environmental or operational changes occur, such as new systems, vendors, or facilities. Many organizations also conduct a comprehensive review annually to validate assumptions, refresh controls, and keep documentation current.
What types of risks must be identified in the assessment?
You must consider threats to confidentiality, integrity, and availability of ePHI from human error, malicious activity, technology failures, process gaps, natural events, and third-party dependencies. Evaluate both inherent risk and residual risk after existing controls are applied.
How does the ONC Security Risk Assessment Tool assist providers?
The tool structures the risk analysis through guided questions aligned to the HIPAA Security Rule. It helps you capture findings, prioritize risks, and produce reports that feed your risk register and compliance documentation, especially for small to mid-sized organizations.
Table of Contents
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment