How to Prepare for a HIPAA Audit: Step-by-Step Guide and Compliance Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

How to Prepare for a HIPAA Audit: Step-by-Step Guide and Compliance Checklist

Kevin Henry

HIPAA

November 26, 2025

8 minutes read
Share this article
How to Prepare for a HIPAA Audit: Step-by-Step Guide and Compliance Checklist

Preparing for a HIPAA audit is easier when you treat it like an ongoing program, not a one-time event. This guide walks you step-by-step through the essential tasks auditors expect to see and provides a practical compliance checklist you can apply immediately.

Your goal is to demonstrate that you safeguard Electronic Protected Health Information (ePHI), follow written policies, and can produce evidence on demand. The sections below align with the HIPAA Security, Privacy, and Breach Notification Rule requirements and use plain language so you can act quickly.

Conduct Security Risk Assessments

A Security Risk Assessment (SRA) is the foundation of HIPAA readiness. You identify where ePHI lives, how it moves, what could go wrong, and how you will reduce risk to acceptable levels.

Step-by-step approach

  • Define scope: systems, applications, networks, locations, devices, vendors, and data flows that create, receive, maintain, or transmit ePHI.
  • Inventory assets and map ePHI flows from capture to archival and disposal.
  • Identify threats and vulnerabilities (e.g., phishing, lost devices, misconfigurations, excessive access).
  • Evaluate likelihood and impact to calculate risk levels and prioritize remediation.
  • Create a risk register and a risk management plan with owners, budgets, and deadlines.
  • Implement administrative, physical, and technical controls; verify effectiveness.
  • Document results, approvals, and residual risk justifications.
  • Reassess at least annually and whenever major changes occur (new EHR, cloud migration, acquisitions).

Evidence to maintain

  • Completed SRA report, risk register, and remediation plan.
  • Change logs, test results, and sign-offs from leadership.
  • Metrics showing risk reduction and status tracking.

Quick checklist

  • Current SRA covers all ePHI systems and vendors.
  • Open risks have owners and target dates.
  • Risk decisions and exceptions are documented.

Review Business Associate Agreements

Any vendor that handles ePHI must have a signed Business Associate Agreement (BAA) that sets security and breach duties. Auditors frequently sample BAAs and vendor due diligence records.

Steps and checklist

  • Build a complete vendor inventory; flag who is a Business Associate.
  • Ensure executed BAAs exist for every in-scope vendor before ePHI is shared.
  • Verify BAA terms: permitted uses, required safeguards, subcontractor flow-downs, incident and breach reporting timelines, access and return/deletion of PHI, termination rights.
  • Perform vendor risk reviews (security questionnaires, SOC 2 summaries, penetration test attestations) and track remediation.
  • Limit data to the minimum necessary and enforce role-based access.
  • Calendar renewal dates and responsible owners.

Evidence to maintain

  • Signed BAAs and amendments, vendor risk assessments, and approvals.
  • Incident reporting procedures your Business Associates must follow.

Maintain HIPAA Documentation

HIPAA Compliance Documentation proves your program exists, is followed, and is updated. Keep it organized, versioned, and accessible; retain for at least six years from the date of creation or last effective date.

Core documents

  • Policies and procedures for Security, Privacy, and Breach Notification Rule requirements.
  • Designations of Privacy Officer and Security Officer, governance charters, and meeting minutes.
  • Security Risk Assessment, risk management plan, and corrective action plans.
  • Business Associate Agreements and vendor due diligence records.
  • Training curricula, rosters, attestations, and sanction records.
  • Access management: role matrices, provisioning/deprovisioning logs, periodic access reviews.
  • Technical artifacts: configuration baselines, encryption standards, logging and monitoring procedures.
  • Contingency planning: backups, disaster recovery, and emergency mode operations plans with test results.
  • Incident and breach logs, complaint logs, and resolution records.
  • Privacy Rule documents: Notice of Privacy Practices, authorization templates, and request/response logs for patient rights.

Organization tips

  • Centralize documents in a controlled repository with version history.
  • Map each document to the HIPAA requirement it satisfies for quick auditor navigation.

Implement Technical Safeguards

Technical Safeguards protect ePHI within systems and networks. Auditors expect to see controls in place and evidence that they work.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Core controls to implement

  • Access controls: unique user IDs, multi-factor authentication, automatic logoff, emergency access procedures, and least privilege roles.
  • Audit controls: centralized logging, immutable logs, regular review of anomalous activity, and alerting for high-risk events.
  • Integrity: anti-malware, file integrity monitoring, secure configurations, and change control.
  • Transmission security: TLS for data in transit; encrypted email or secure portals for PHI exchange.
  • Encryption at rest for databases, file systems, backups, and mobile media; key management procedures.
  • Endpoint and mobile device management with remote wipe and device encryption.
  • Vulnerability management: patching SLAs, routine scanning, and remediation tracking.
  • Network safeguards: segmentation, firewalls, secure VPN, and zero-trust access where feasible.

Evidence to provide

  • Configuration exports/screenshots showing MFA, encryption, and logging settings.
  • Sample audit logs, alert tickets, and incident response records.
  • Vulnerability scan reports and patch compliance metrics.

Perform Workforce Training

Training ensures people know how to handle ePHI and follow policy. Make it role-based, engaging, and well-documented.

Program checklist

  • New-hire and annual HIPAA training that covers Privacy, Security, and Breach Notification Rule basics.
  • Role-specific modules for clinicians, billing, IT, research, and front-desk staff.
  • Security awareness: phishing simulations, password hygiene, safe data handling, and incident reporting.
  • Attestations, knowledge checks, and a clear sanctions policy for violations.
  • Training rosters, completion rates, and remediation for overdue staff.

Evidence to maintain

  • Slides or curricula, completion certificates, sign-in sheets, and LMS reports.
  • Records of simulated exercises (e.g., phishing campaigns) and follow-up coaching.

Conduct Internal Compliance Audits

Internal HIPAA Audits validate whether controls operate as intended and identify gaps before regulators do. Treat them as routine, not reactive.

What to test

  • Privacy Rule: uses and disclosures, minimum necessary, Notice of Privacy Practices, and patient rights processing.
  • Security Rule: access reviews, device/media controls, encryption, logging, and contingency planning.
  • Technical spot checks: account provisioning/deprovisioning, dormant account removal, and privileged access approvals.
  • BAA compliance: vendor onboarding, reporting timelines, and subcontractor controls.
  • Sample-based chart and system access audits to detect inappropriate viewing of ePHI.

Reporting and remediation

  • Issue logs with severity, owners, due dates, and evidence of closure.
  • Executive summaries highlighting risk trends and program improvements.

Establish Breach Notification Procedures

Be ready to execute the Breach Notification Rule quickly and consistently. Clear procedures reduce harm and keep you within statutory timelines.

Recognize and triage

  • Define what constitutes a security incident versus a breach of unsecured PHI.
  • Use a standardized risk assessment: nature of PHI, unauthorized person, whether PHI was actually acquired/viewed, and mitigation actions.
  • Escalate promptly to compliance, security, and leadership; preserve evidence.

Notification timelines and thresholds

  • Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery.
  • For breaches affecting 500 or more individuals in a state or jurisdiction, notify HHS and prominent media within 60 days.
  • For fewer than 500 affected individuals, log the breach and report to HHS within 60 days after the end of the calendar year.
  • Business Associates must notify the covered entity without unreasonable delay and within the timeframe set in the BAA.

Content and method

  • Include what happened, types of PHI involved, steps you are taking, what individuals should do, and contact information.
  • Use first-class mail (or email if the individual has agreed); maintain substitute notice procedures if contact data is insufficient.

Documentation and drills

  • Maintain incident logs, risk assessments, copies of notices, and evidence of deadlines met.
  • Run tabletop exercises to practice decision-making and timing.

Conclusion

If you keep your SRA current, lock down vendors with strong BAAs, maintain thorough documentation, prove your Technical Safeguards, train your people, audit yourselves, and rehearse breach response, you will be well prepared for a HIPAA audit at any time.

FAQs.

What are the key steps to prepare for a HIPAA audit?

Follow a repeatable program: complete a comprehensive Security Risk Assessment, remediate prioritized risks, execute and track Business Associate Agreements, maintain HIPAA Compliance Documentation, implement and validate Technical Safeguards, train your workforce with records, perform Internal HIPAA Audits with corrective actions, and finalize Breach Notification Rule procedures with templates and drills.

How often should organizations conduct HIPAA risk assessments?

Conduct an SRA at least annually and whenever significant changes occur—such as EHR upgrades, cloud migrations, major staffing or facility changes, new Business Associates handling ePHI, or after security incidents. High-risk environments may reassess quarterly on targeted areas to keep risk decisions current.

What documentation is required for a HIPAA audit?

Auditors typically request: policies and procedures; designations of Privacy and Security Officers; Security Risk Assessment and risk management plan; BAAs and vendor due diligence; training materials, rosters, and attestations; access reviews and provisioning logs; technical standards (encryption, logging, backup); contingency plans and test results; incident and breach logs; and Privacy Rule artifacts like the Notice of Privacy Practices and patient rights logs.

How should breaches be reported under HIPAA?

Apply your Breach Notification Rule procedure: investigate and perform a risk assessment; notify affected individuals without unreasonable delay and no later than 60 days; notify HHS and, when 500+ residents are affected in a state or jurisdiction, the media within 60 days; for smaller breaches, report to HHS within 60 days after the calendar year ends. Keep thorough documentation of decisions, notices, and timelines.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles