Is Encryption Required by HIPAA? What the Security Rule Actually Requires

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Encryption Required by HIPAA? What the Security Rule Actually Requires

Kevin Henry

HIPAA

March 28, 2024

6 minutes read
Share this article
Is Encryption Required by HIPAA? What the Security Rule Actually Requires

Encryption as an Addressable Specification

Under the HIPAA Security Rule, encryption appears twice—as an addressable implementation specification for access control and for transmission security. “Addressable” does not mean optional; it means you must determine, via risk analysis, whether encryption is a reasonable and appropriate safeguard for your environment and then implement it, adopt an equivalent alternative, or document why neither is reasonable. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.312?utm_source=openai))

Practically, most environments handling electronic protected health information (ePHI) will find encryption reasonable for both data in motion and data at rest. OCR’s own FAQ confirms that encryption is addressable (not strictly required) under the current Security Rule, pointing you back to your documented analysis and chosen safeguards. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/faq/2001/is-the-use-of-encryption-mandatory-in-the-security-rule/index.html?utm_source=openai))

Risk Assessment for Encryption

The Security Rule requires you to conduct a risk analysis and manage risks to an acceptable level before deciding how to protect ePHI. That analysis drives whether, where, and how you encrypt, and it must be documented and revisited as your systems and threats evolve. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.308?utm_source=openai))

  • Inventory where ePHI is created, received, maintained, or transmitted (systems, endpoints, cloud, backups, integrations).
  • Identify threats (loss/theft of devices, malicious insiders, network eavesdropping, API exposure, ransomware) and vulnerabilities.
  • Decide where encryption reduces risk effectively, choose appropriate encryption algorithms, and define key management and monitoring.
  • Document decisions, alternatives, and compensating controls; review routinely and after material changes. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.306?utm_source=openai))

Proposed Mandatory Encryption Updates

As of November 7, 2025, encryption remains an addressable implementation specification. However, HHS proposed a major Security Rule update on January 6, 2025 that would redesignate encryption as a standard and require covered entities and business associates to encrypt all ePHI at rest and in transit, with limited exceptions. The comment period closed March 7, 2025; a final rule has not been issued yet. ([docs.regulations.justia.com](https://docs.regulations.justia.com/entries/2025-01-06/2024-30983.pdf))

The NPRM also previews compliance timing frameworks (e.g., the general 180‑day period after a final rule’s effective date unless otherwise specified), but until a final rule is published, today’s addressable model remains in force. Continue to follow the current Security Rule while preparing for a potential shift to mandatory encryption. ([regulations.justia.com](https://regulations.justia.com/regulations/fedreg/2025/01/06/2024-30983.html))

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Encryption Standards and Algorithms

HIPAA does not prescribe specific encryption algorithms. For safe harbor under the Breach Notification Rule, HHS points to NIST guidance and FIPS-validated cryptography as technologies that render data unusable, unreadable, or indecipherable to unauthorized individuals. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))

  • Data protection at rest: AES (128- or 256-bit) via full‑disk, volume, or database/file‑level encryption; ensure modules are FIPS 140‑2/140‑3 validated and keys are protected by an enterprise key management system or HSM. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))
  • Data in transit: TLS 1.2+ for web and APIs per NIST SP 800‑52; IPsec VPNs (SP 800‑77) or modern TLS VPNs (SP 800‑113) for tunnels; disable obsolete ciphers/protocols. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))
  • Key management: enforce least privilege, rotation, separation of keys from data, secure backup of keys, and auditable lifecycle controls; validate crypto modules and configurations prior to deployment. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))

Encryption in Transit and at Rest

In transit

  • Mandate TLS for all external endpoints; require mTLS for service‑to‑service traffic where feasible; secure email using S/MIME or enforced TLS with fallback workflows for unencrypted delivery only at an individual’s request. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))
  • Use IPsec/TLS tunnels for remote access and site links; segment networks to reduce lateral movement risks if traffic is intercepted. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))

At rest

  • Harden laptops and mobile devices with full‑disk encryption and rapid remote‑wipe; encrypt server volumes, databases, and object storage; encrypt backups on media and in backup services. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))
  • Apply field‑level/database encryption to especially sensitive elements (e.g., SSN, financials) in addition to storage‑layer controls; monitor for key misuse. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))

Breach Notification and Encryption

Under the Breach Notification Rule, you must notify after a breach of unsecured PHI. HHS guidance specifies that PHI encrypted in accordance with recognized NIST/FIPS methods is considered “secured,” so breaches involving properly encrypted data (and uncompromised keys) generally do not trigger notification. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html?utm_source=openai))

With ransomware, if ePHI was already encrypted consistent with HHS guidance and your implementation truly kept data unreadable to the attacker, the incident may not be reportable; you still must validate that the encryption and keys were not compromised and that no unencrypted ePHI was exfiltrated. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity/ransomware-fact-sheet/index.html?utm_source=openai))

Alternatives to Encryption

Because encryption is an addressable implementation specification today, you can adopt alternatives if your documented risk analysis shows encryption is not reasonable in a specific context and you implement an equivalent measure. Examples include hardened network segmentation, strict access controls, and data minimization—recognizing that these do not confer the breach‑notification safe harbor that encryption does. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.306?utm_source=openai))

Documentation essentials

  • State the system and ePHI flows involved, your risk analysis findings, and why encryption is not reasonable and appropriate for that use case.
  • Describe the alternative or compensating controls, how they reduce residual risk, and how you will monitor their effectiveness over time. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/security/guidance/guidance-risk-analysis/index.html?utm_source=openai))

Conclusion

Today, the HIPAA Security Rule treats encryption as addressable, driven by your risk analysis; HHS’s proposed update would make encryption a baseline requirement for ePHI at rest and in transit. Plan for that shift, align with NIST and FIPS guidance now, and document your choices so you can defend them under the Security Rule and the Breach Notification Rule. ([docs.regulations.justia.com](https://docs.regulations.justia.com/entries/2025/01/06/2024-30983.pdf))

FAQs

Is encryption mandatory for all covered entities under HIPAA?

Not under the current Security Rule; encryption is addressable. You must implement it when reasonable and appropriate (or implement an equivalent alternative and document your rationale). HHS has proposed making encryption mandatory, but that proposal is not final as of November 7, 2025. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.312?utm_source=openai))

How does HIPAA classify encryption requirements?

Encryption is an addressable implementation specification under access control and transmission security. Addressable means you are required to assess and either implement the specification, adopt an equivalent alternative, or document why neither is reasonable and appropriate based on your risk analysis. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.312?utm_source=openai))

What are the consequences of not encrypting ePHI?

If you forgo encryption without a strong, documented risk‑based rationale and equivalent safeguards, you increase the likelihood of unauthorized access and may face enforcement if controls are found unreasonable. Unencrypted PHI generally lacks safe‑harbor protection, so a compromise will typically trigger breach notification duties. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html?utm_source=openai))

How does encryption affect breach notification obligations?

When ePHI is encrypted consistent with HHS guidance (and decryption keys remain uncompromised), it is considered “secured,” and a breach of that data typically does not require notification. Validate your implementation, confirm keys are protected, and document your analysis—especially in ransomware scenarios. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html))

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles