How to Perform a HIPAA Third-Party Risk Assessment: Checklist and Templates
Overview of HIPAA Third-Party Risk Assessments
A HIPAA third-party risk assessment evaluates the security and privacy posture of vendors and subcontractors that create, receive, maintain, or transmit protected health information (PHI) on your behalf. Its purpose is to confirm that each partner has effective Protected Health Information safeguards before and throughout the relationship.
In practice, you identify which vendors are business associates, map PHI data flows, gauge the likelihood and impact of threats, and document risks with remediation actions. You also verify business associate agreement compliance and require evidence of implemented controls rather than relying on self-attestations alone.
Effective programs tier vendors by criticality, use standardized questionnaires, request artifacts (policies, audit logs, SOC 2 or HITRUST reports), and track corrective actions to closure. The outcome is a defensible view of inherent and residual risk across your third-party ecosystem.
Key Components of Risk Assessment Checklists
Build your checklist so it mirrors HIPAA’s Security Rule while remaining vendor-friendly. The following items keep reviews consistent, measurable, and auditable.
- Administrative safeguards assessment
- Risk analysis and risk management plans specific to services provided.
- Written policies, workforce training, and sanctions related to PHI handling.
- Vendor inventory, data flow diagrams, and minimum necessary access practices.
- Third-party and subprocessor oversight, including due diligence and flow-down terms.
- Contingency planning: backup, disaster recovery, and emergency mode operations.
- Technical safeguards evaluation
- Access controls: unique IDs, role-based access, multifactor authentication, and session timeouts.
- Encryption for data in transit and at rest, plus key management procedures.
- Audit controls: centralized logging, log integrity, retention, and regular review.
- Integrity controls: change management, code review, and anti-malware protections.
- Transmission security: secure APIs, TLS configuration, and email protections for ePHI.
- Physical safeguards
- Facility access authorizations, visitor controls, and media storage protections.
- Device and media controls: secure disposal, re-use procedures, and asset tracking.
- Security operations
- Vulnerability and patch management cadences with documented service-level targets.
- Penetration testing, secure SDLC practices, and third-party code risk review.
- Security incident documentation, including triage, root-cause analysis, and lessons learned.
- Breach notification readiness: contact paths, timelines, and evidence preservation.
- Compliance and assurance
- Signed business associate agreement compliance checklist, including subcontractor flow-downs.
- Independent assessments (e.g., SOC 2, ISO 27001, HITRUST) and scope relevance.
- Insurance coverage (cyber/privacy) aligned to data volume and services.
- Measurable controls mapping to NIST 800-66r2 controls for traceability.
- Risk scoring and acceptance
- Defined scoring model (likelihood × impact) with thresholds for remediation.
- Documented owner, due date, and acceptance criteria for each risk.
Utilizing Risk Assessment Templates
Templates accelerate consistency and make your reviews repeatable across dozens of vendors. Use lightweight pre-screen forms for low-risk services and comprehensive questionnaires for vendors that handle ePHI or provide critical operations.
- Pre-screening questionnaire
- Confirms whether PHI is processed, where data is stored, and key contact details.
- Captures vendor tiering inputs (criticality, data sensitivity, integration depth).
- Detailed assessment template
- Sections aligned to administrative, technical, and physical controls.
- Evidence requests: policies, architecture diagrams, encryption summaries, and test results.
- Control maturity ratings, residual risk calculations, and remediation tracking fields.
- Remediation plan template
- Risk statement, affected systems, recommended fixes, owners, timelines, and milestones.
- Verification steps and acceptance criteria for closure.
- Security incident documentation log
- Standardized fields for event date, detection method, containment steps, and notifications.
- Executive summary report
- Concise findings, vendor risk rating, aging risks, and decision recommendation (approve, conditionally approve, defer).
Keep templates versioned, mapped to HIPAA requirements, and traceable to NIST 800-66r2 controls. This ensures clear lineage from vendor responses to your compliance obligations.
Compliance with NIST SP 800-66r2 Guidelines
NIST SP 800-66r2 translates HIPAA’s Security Rule into actionable security outcomes and references. Aligning your third-party due diligence to these guidelines strengthens completeness and auditability.
- Control mapping
- For each HIPAA implementation specification, identify corresponding NIST 800-66r2 controls you expect vendors to meet.
- Ask vendors to show how their safeguards satisfy those outcomes, including any compensating controls.
- Outcome-based evidence
- Request artifacts that demonstrate effectiveness (e.g., recent access reviews, encryption key rotation logs, endpoint coverage reports).
- Favor objective measures over policy statements alone.
- Risk management integration
- Feed vendor control gaps into your enterprise risk register and risk management plans.
- Track remediation to closure and reassess residual risk after changes.
Using NIST SP 800-66r2 as a backbone helps you justify scope, prioritize controls, and maintain a verifiable link between vendor safeguards and HIPAA expectations.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentImportance of Regular Risk Assessments
Vendor risk is dynamic. New features, integrations, infrastructure shifts, and threat trends can erode yesterday’s assurances. Regular assessments detect drift and confirm continued adherence to Protected Health Information safeguards.
- When to assess
- During procurement and onboarding, after material changes, following incidents, and at least annually for high-risk vendors.
- Lower-risk vendors can be assessed on a multi-year cadence with continuous monitoring in between.
- What to review
- Control changes, penetration test results, security incident documentation, and staff turnover in privileged roles.
- Contractual obligations, including service levels and BAA terms such as breach notification timelines.
- How to measure
- Use consistent scoring, trend residual risk over time, and require evidence for assertions.
Document each cycle thoroughly. A clear audit trail demonstrates diligence and enables quick decision-making when issues arise.
Implementing Business Associate Agreements
The business associate agreement operationalizes HIPAA responsibilities with each vendor that handles PHI. Integrate its requirements directly into your assessment artifacts and evidence requests to verify business associate agreement compliance.
- Essential BAA elements to verify
- Permitted uses and disclosures, minimum necessary, and prohibition on unauthorized reuse.
- Safeguards for ePHI, including encryption, access control, and logging expectations.
- Breach and incident reporting timelines, cooperation, and documentation duties.
- Subcontractor flow-downs, right-to-audit, and termination/return-or-destroy obligations.
- Operationalizing the BAA
- Translate key clauses into checklist items and service-specific controls.
- Require evidence (e.g., access reviews, data destruction certificates) to show obligations are met.
When the BAA and assessment are harmonized, you close ambiguity gaps and ensure that legal promises map to enforceable controls.
Reviewing and Updating Risk Assessments
Establish a governance loop so findings lead to improvements. Maintain a centralized vendor risk register, track open items, and confirm that corrective actions reduce residual risk to acceptable levels.
- Program upkeep
- Refresh questionnaires and templates annually to reflect new threats and technologies.
- Re-tier vendors as services evolve; adjust evidence depth accordingly.
- Maintain a repository for security incident documentation and verification artifacts.
- Reporting and decisions
- Share meaningful metrics: time-to-remediate, aged risks, and control coverage by vendor tier.
- Escalate high-impact gaps, define risk acceptance conditions, and set revalidation dates.
In summary, you identify business associates, assess their controls with standardized checklists and templates, map results to NIST 800-66r2 controls, enforce obligations through BAAs, and re-assess regularly. This cycle creates traceable, defensible assurance that third parties protect PHI effectively.
FAQs.
What is a HIPAA third-party risk assessment?
It is a structured evaluation of a vendor’s ability to protect PHI under the HIPAA Security Rule. You review administrative, technical, and physical safeguards, verify business associate agreement compliance, examine evidence of effective controls, score risk, and define remediation steps.
How often should third-party risk assessments be conducted?
Assess during onboarding, after material changes or incidents, and at least annually for vendors that handle ePHI or support critical services. Low-risk vendors may be reviewed less frequently, supplemented with ongoing monitoring and targeted evidence requests.
What are essential components of a HIPAA risk assessment checklist?
Core elements include administrative safeguards assessment, technical safeguards evaluation, physical safeguards, contingency planning, incident response and security incident documentation, control evidence requests, risk scoring, and documented risk management plans with owners and due dates.
How do business associate agreements impact HIPAA compliance?
BAAs allocate HIPAA responsibilities between you and each vendor. They require appropriate safeguards, restrict PHI use, mandate timely breach reporting, flow obligations to subcontractors, and define termination and data return/destruction. Your assessments should test and evidence those commitments in practice.
Table of Contents
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment