SOC 2 to HIPAA Mapping: Crosswalk Trust Services Criteria to HIPAA Security Rule Requirements

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

SOC 2 to HIPAA Mapping: Crosswalk Trust Services Criteria to HIPAA Security Rule Requirements

Kevin Henry

HIPAA

April 29, 2025

8 minutes read
Share this article
SOC 2 to HIPAA Mapping: Crosswalk Trust Services Criteria to HIPAA Security Rule Requirements

SOC 2 Trust Services Criteria Overview

SOC 2 is an attestation framework used to evaluate how well a service organization designs and operates controls relevant to security, availability, processing integrity, confidentiality, and privacy. Auditors examine controls against the AICPA’s Trust Services Criteria (TSC) and issue an opinion, typically as a Type 1 (design at a point in time) or Type 2 (design and operating effectiveness over a period) report.

The Security category—often called the “common criteria”—forms the foundation for most mappings to HIPAA. It emphasizes risk assessment, policies, access management controls, system monitoring, change management, and vendor risk. These elements align closely with HIPAA’s Security Rule expectations for ePHI protection.

How the TSC are organized

  • CC1: Control Environment (governance, tone at the top, accountability)
  • CC2: Communication and Information (policies, awareness, information flow)
  • CC3: Risk Assessment (risk identification, analysis, response)
  • CC4: Monitoring Activities (ongoing and separate evaluations)
  • CC5: Control Activities (policies, procedures, preventive/detective controls)
  • CC6: Logical and Physical Access Controls (authentication, authorization, physical security)
  • CC7: System Operations (logging, monitoring, incident handling, vulnerability response)
  • CC8: Change Management (change approval, testing, segregation, release controls)
  • CC9: Risk Mitigation (third-party and business risk treatment)

For a crosswalk to HIPAA, CC3, CC6, CC7, CC8, and CC9 often carry the heaviest weight, while availability and confidentiality criteria deepen coverage for contingency planning and data handling expectations.

HIPAA Security Rule Safeguards

The HIPAA Security Rule focuses on the confidentiality, integrity, and availability of electronic protected health information (ePHI). It prescribes Administrative safeguards, Physical safeguards, and Technical safeguards that together establish a risk-based program for ePHI protection.

Administrative safeguards

  • Security Management Process (risk analysis, risk management, sanctions, incident response)
  • Assigned Security Responsibility and Workforce Security (roles, screening, termination)
  • Information Access Management (role-based access, minimum necessary)
  • Security Awareness and Training (education, phishing, secure behavior)
  • Contingency Planning (data backup, disaster recovery, emergency operations)
  • Evaluation (periodic compliance and effectiveness review)
  • Business Associate Agreements (contractual assurances for downstream entities)

Physical safeguards

  • Facility Access Controls (badging, visitor management, environmental protections)
  • Workstation Use and Security (secure configurations, screen privacy, session timeouts)
  • Device and Media Controls (asset inventory, secure disposal, re-use, data sanitization)

Technical safeguards

  • Access Control (unique IDs, emergency access, automatic logoff, encryption/decryption)
  • Audit Controls (audit logging requirements and monitoring of system activity)
  • Integrity (tamper detection, change control, validation)
  • Authentication (user and device assurance)
  • Transmission Security (integrity checks and encryption standards in transit)

While the Rule is technology-neutral, it expects reasonable and appropriate measures such as strong authentication, robust logging, reliable backups, and consistent encryption wherever risk demands it.

Aligning SOC 2 Controls with HIPAA Requirements

Building a defensible crosswalk means mapping control intent, not just terminology. Use HIPAA’s safeguard standards as the target and identify which TSC criteria provide equivalent or supporting coverage.

Example control alignments

  • Risk Analysis and Management (HIPAA Admin) ↔ CC3 (risk assessment), CC4 (monitoring), CC5 (control activities): establish a living risk register, treatments, and reviews.
  • Policies, Training, Awareness (HIPAA Admin) ↔ CC1/CC2: codify policies, communicate updates, and track workforce training.
  • Access management controls (HIPAA Technical) ↔ CC6: enforce least privilege, MFA, provisioning/deprovisioning, and periodic access reviews.
  • Audit logging requirements and monitoring (HIPAA Technical) ↔ CC7: centralize logs, define retention, detect anomalies, and document incident handling.
  • Change Control and Integrity (HIPAA Technical) ↔ CC8: require approvals, testing, separation of duties, and integrity checks in SDLC/CI-CD.
  • Contingency Plan and Availability (HIPAA Admin) ↔ Availability/Confidentiality TSC + CC7: backup validation, recovery objectives, and tested disaster recovery.
  • Vendor/Business Associate Oversight (HIPAA Admin) ↔ CC9: due diligence, ongoing reviews, and contract clauses; note that HIPAA specifically requires BAAs.
  • Encryption standards (HIPAA Technical) ↔ CC6/Confidentiality TSC: data-at-rest and in-transit encryption and key management aligned to policy and risk.

Practical crosswalk steps

  • Scope systems that create, receive, maintain, or transmit ePHI, including supporting infrastructure and third parties.
  • Map each HIPAA standard and implementation specification to the closest TSC criteria and existing controls.
  • Define test procedures and evidence (policies, configurations, screenshots, tickets, logs).
  • Record delta gaps where HIPAA requires additional elements (for example, BAAs or contingency plan specifics).
  • Operationalize through procedures, metrics, and a control owner matrix to sustain alignment over time.

Control Overlap Analysis

High-overlap areas

  • Identity and access management controls (least privilege, MFA, periodic reviews)
  • Logging, monitoring, and incident response aligned to audit logging requirements
  • Configuration and change management protecting data integrity
  • Encryption in transit and at rest guided by risk and policy
  • Risk assessment, governance, and vendor risk management

Partial overlap and common gaps

  • BAA specifics: SOC 2 expects vendor risk controls; HIPAA requires explicit Business Associate Agreements.
  • Contingency planning depth: SOC 2 Availability supports it, but HIPAA’s implementation details may exceed your current SOC 2 scope.
  • Physical controls: SOC 2 covers physical security (CC6); HIPAA adds device/media handling tailored to ePHI workflows.

Optimization insight

You can often satisfy both frameworks with a single, well-documented control set. Where HIPAA requires specific documentation (for example, risk analysis methodology or contingency plan components), extend SOC 2 evidence to include HIPAA-specific artifacts and decision rationales.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

SOC 2+ HIPAA Reports Explanation

A SOC 2+ HIPAA report is a SOC 2 engagement that incorporates additional criteria and mapping to HIPAA requirements. The auditor still opines on SOC 2 TSC, but the report includes a cross-reference showing how tested controls address HIPAA Security Rule expectations.

What the report typically includes

  • Clear scope identifying systems handling ePHI and in-scope services
  • Mapping tables from TSC to HIPAA safeguards, highlighting coverage and residual gaps
  • Control descriptions, tests of operating effectiveness, and results relevant to HIPAA
  • Management’s description and complementary user entity controls where customers share responsibility

When and why to choose SOC 2+ HIPAA

  • Healthcare customers request HIPAA evidence alongside SOC 2
  • Consolidates audits, reducing duplicate effort and control fatigue
  • Improves transparency by tying SOC 2 control testing to HIPAA’s risk-based expectations

Preparation tips

  • Finalize a crosswalk early; treat it as your audit script
  • Harden logging, encryption, and access pathways that protect ePHI
  • Address HIPAA-only items (for example, BAAs, contingency plan details) in your control narratives

HITRUST CSF Integration

HITRUST CSF is a harmonized control framework that draws from HIPAA, NIST, ISO, and other sources to produce a prescriptive set of requirements and maturity scoring. Many organizations use the CSF as a single control catalog that maps simultaneously to SOC 2 TSC and HIPAA.

Integration models

  • Use HITRUST as your master control set and map to SOC 2 and HIPAA from one repository
  • Leverage HITRUST assessment results to support SOC 2+ HIPAA evidence requests
  • Adopt HITRUST’s implementation levels to right-size controls by risk and environment

Benefits

  • Reduced duplication of controls and audits
  • Consistent terminology for Administrative safeguards, Technical safeguards, and Physical safeguards
  • Clear traceability from policy to procedure to testing, aiding ePHI protection

Compliance Strategies for Healthcare Organizations

A practical roadmap

  • Define scope and data flows: inventory systems, APIs, and vendors that create or touch ePHI.
  • Perform a HIPAA risk analysis and align it with SOC 2 risk assessment outputs; track treatments and due dates.
  • Consolidate into a common control framework that explicitly maps HIPAA safeguards to TSC criteria.
  • Strengthen identity and access management controls: MFA, RBAC, JIT access, and quarterly reviews.
  • Implement fit-for-purpose encryption standards for data at rest and in transit, plus key lifecycle management.
  • Design centralized logging to meet audit logging requirements; protect logs from tampering and define alert triage.
  • Embed change management in the SDLC with peer review, automated testing, and segregation of duties.
  • Harden physical security and device/media processes tailored to your facilities and remote work model.
  • Establish contingency plans: tested backups, defined RTO/RPO, and documented emergency procedures.
  • Formalize vendor oversight and BAAs; align security questionnaires and monitoring to data risk.
  • Train the workforce continuously and measure effectiveness with simulations and metrics.
  • Plan your audit cadence: SOC 2 Type 2 period selection, evidence calendars, and management review checkpoints.

Conclusion

By mapping HIPAA safeguards to SOC 2 TSC, you can operate one integrated control system that satisfies both assurance and regulatory needs. Focus on risk analysis, access, encryption, logging, change control, contingency planning, and vendor oversight. Where HIPAA has unique requirements, extend your SOC 2 controls and evidence to close the gap efficiently.

FAQs

What is the overlap between SOC 2 and HIPAA controls?

The strongest overlap covers identity and access, logging and monitoring, incident response, change management, encryption, and risk management. SOC 2’s CC6–CC8 and CC3 map well to HIPAA Technical and Administrative safeguards, while physical security aligns through CC6 and HIPAA Physical safeguards. HIPAA-specific items like BAAs require extra documentation.

How can SOC 2 reports be extended to cover HIPAA?

Request a SOC 2+ HIPAA engagement. Define a crosswalk that ties each HIPAA safeguard to your SOC 2 controls, expand testing where HIPAA expects additional depth, and include mapping tables and evidence in the report. Address HIPAA-only artifacts—such as BAAs and contingency plan details—in control narratives and attachments.

What role does HITRUST CSF play in SOC 2 and HIPAA mapping?

HITRUST CSF serves as a unified control catalog that already maps to HIPAA and aligns with SOC 2 expectations. Using it as your master set simplifies audits, improves traceability, and helps you demonstrate consistent, risk-based coverage across Administrative, Technical, and Physical safeguards.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles