Workforce Identity Verification
Workforce identity verification requires you to confirm who a workforce member is before granting any system access, using background checks, credential verification, and identity proofing. Operationally, you must hard-wire these checks into onboarding and access provisioning for systems that contain or connect to PHI, with tighter re-verification for high-risk roles 1.
Key takeaways:
- Gate system access on completed identity checks, not on offer acceptance or start date 1.
- Treat “identity verification” as three controls: background check, credential validation, and identity proofing 1.
- Retain evidence that ties the verified person to the provisioned account, role, and approval trail 1.
- Add periodic re-verification for high-risk roles to reduce insider and account takeover exposure 1.
“Workforce identity verification” is easy to misread as an HR checkbox. HICP Practice 6.6 treats it as an access control prerequisite: you verify the person’s identity and qualifications before you allow them into systems that store, process, or transmit PHI 1. That means your IAM workflow (requests, approvals, provisioning, and auditing) has to depend on verification outputs, not just manager attestation.
This requirement often fails in the seams: contractors onboarded through procurement, remote hires with rushed start dates, interns provisioned by local admins, third-party support given “temporary” accounts that become permanent. The control is also frequently under-scoped; teams run background checks but don’t validate clinical credentials, or they validate credentials but don’t do identity proofing strong enough to prevent synthetic identity and impersonation risks.
This page translates HICP Practice 6.6 into an implementation blueprint: who is in scope, what “done” looks like, how to wire it into joiner/mover/leaver processes, what evidence auditors ask for, and how to avoid common failure modes.
Regulatory text
HICP Practice 6.6 excerpt: “Verify workforce member identities through background checks, credential verification, and identity proofing before granting system access.” 1
Operator interpretation (what you must do):
- Define “workforce member” and “system access” for your environment so the control triggers consistently across employees, contractors, students, volunteers, and third-party personnel who receive accounts or logical access.
- Implement three verification activities:
- Background checks (risk-based, role-sensitive).
- Credential verification (licenses, certifications, education, or job-required qualifications where applicable).
- Identity proofing (confirm the person is who they claim to be, with an assurance level aligned to risk).
- Make verification a hard gate for access provisioning. If checks are incomplete, access does not get created, enabled, or elevated.
- Add periodic re-verification for high-risk roles (for example, privileged admins and roles with broad PHI access) as part of your ongoing access governance 1.
Plain-English requirement (what it means in practice)
Before any person gets a login, badge-based access that drives logins, VPN access, EHR access, admin rights, or access to systems that can reach PHI, you must be able to prove:
- They are a real, verified individual (identity proofing).
- Their history meets your hiring/access risk threshold (background check).
- They hold any required professional qualifications for the role (credential verification).
If you cannot prove those three things, the account should not exist, should not be enabled, or should not have the requested role.
Who it applies to (scope)
Entity types: Healthcare organizations and health IT vendors 1.
Operational scope (who counts as “workforce”):
- Employees (full-time/part-time)
- Temporary staff and agency personnel
- Contractors/consultants, including third-party implementation teams
- Students, interns, residents, and volunteers where you provision accounts
- Third-party support personnel with named accounts, federated access, VPN, or privileged sessions
Systems in scope (what counts as “before granting system access”):
- EHR/EMR, billing, scheduling, revenue cycle platforms
- Identity providers (IdP), SSO, MFA, directory services
- VPN/ZTNA, VDI, endpoint management, remote support tooling
- Cloud consoles, SIEM, backup consoles, ticketing systems if they provide pathways to PHI or privileged access
- Any application environment that stores or can query PHI
What you actually need to do (step-by-step)
1) Set a policy rule you can enforce
Write a control statement your teams can execute:
- “No workforce account is created or enabled until background check + credential verification (if role requires) + identity proofing are complete and recorded.” 1
Define exceptions narrowly (for example, emergency patient care) and require compensating controls (limited access, time-bound accounts, enhanced monitoring). Keep exception handling auditable.
2) Build a role-based verification matrix
Create a simple table that ties role risk to verification depth:
| Role type | Typical access | Background check | Credential verification | Identity proofing | Re-verification |
|---|---|---|---|---|---|
| Standard workforce | Limited PHI | Required | If job requires | Required | For high-risk roles only 1 |
| Clinical licensed roles | Broad PHI | Required | Required | Required | For high-risk roles only 1 |
| Privileged IT/admin | Broad PHI + admin | Required | As applicable | Required | Required for high-risk roles 1 |
| Third-party support | Elevated/troubleshooting | Required or contractually assured | As applicable | Required | For high-risk roles only 1 |
Keep the table short. Auditors care that you made risk-based decisions and you apply them consistently.
3) Make identity verification an IAM dependency (the control “teeth”)
Identity verification fails when it lives outside provisioning. Fix that with workflow gates:
- HR/ATS → IAM trigger: onboarding request opens, but provisioning stays pending.
- Verification vendors → case completion: background check, credential check, and identity proofing results recorded.
- IAM → access provisioning: only proceeds when verification status is “complete” and mapped to the correct identity record.
If your provisioning is ticket-based, require the ticket to include verification identifiers (case ID, completion date, adjudication result) before fulfillment.
4) Implement identity proofing that matches remote and third-party reality
Document how you confirm identity in these scenarios:
- In-person hires: government ID check and HR attestation, tied to the identity record.
- Remote hires: identity proofing that binds the person to their account creation event (for example, validated identity proofing workflow and controlled credential issuance).
What matters for HICP Practice 6.6 is that identity proofing is explicit and recorded, not assumed 1.
5) Validate credentials where role requirements exist
Credential verification should be role-triggered:
- Licensed clinical roles: verify required licenses/registrations before access to clinical systems.
- Specialized roles: verify certifications where access scope depends on skill (for example, security administrators).
- Students/trainees: confirm program affiliation and supervision model if it affects access.
Avoid “we verify credentials” as a generic statement. Tie it to a role list and evidence type.
6) Add periodic re-verification for high-risk roles
HICP’s summary calls out periodic re-verification for high-risk roles 1. Operationalize that as:
- A defined set of high-risk roles (privileged admin, broad PHI exports, identity system admins).
- A recurring review event that re-confirms identity status and continued credential validity where applicable.
- A forced access re-approval tied to the re-verification outcome.
7) Make offboarding part of the same control family
Identity verification is undermined if terminated workers retain access. Connect leaver workflows to:
- HR termination triggers
- Immediate access disablement for all accounts
- Retrieval of devices and tokens
- Confirmation evidence (disablement logs, IdP status)
Required evidence and artifacts to retain
Keep evidence that connects person → proof → account → access decision:
- Workforce identity verification policy and role-based verification matrix 1
- Background check case record: vendor result, adjudication, completion date, decision owner
- Credential verification record (if applicable): credential type, validation date, result
- Identity proofing record: method used, completion date, identity attributes verified
- Provisioning artifacts: access request, approvals, role assignment, provisioning logs
- Exception records: business justification, compensating controls, time bounds, approval
- Re-verification evidence for high-risk roles: roster, completion status, outcomes, remediations
Retention length should follow your internal policy and any contractual or regulatory recordkeeping obligations. HICP Practice 6.6 requires the activity and proof; it does not prescribe a retention period 1.
Common exam/audit questions and hangups
Auditors usually test consistency and gating:
- “Show me three new hires and prove identity verification occurred before access.”
- “How do you handle contractors engaged by a third party?”
- “What is your identity proofing method for remote workers?”
- “Which roles are ‘high-risk’ and how do you re-verify them?” 1
- “Do you have any shared accounts? If so, how do you verify the individual user?”
Hangups:
- Verifications completed, but not linked to the identity record or ticket.
- Access granted via local admin workflows outside IAM governance.
- Credential checks performed informally (email screenshots) without traceability.
Frequent implementation mistakes (and how to avoid them)
- Background checks only, no identity proofing. Fix: add a specific identity proofing step and store its output with the identity record 1.
- “Day 1 access” pressure breaks the gate. Fix: create pre-start workflows that complete verification earlier; use time-bound, least-privilege emergency access with documented approvals if truly needed.
- Contractors bypass HR. Fix: require sponsor-led onboarding in the same workflow, with contract language requiring verification completion before account issuance.
- Credential verification treated as optional for clinical roles. Fix: map roles to required credentials and make the access request form enforce it.
- No periodic re-verification for privileged roles. Fix: include re-verification in your access review cadence for high-risk roles 1.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for HICP Practice 6.6. Treat this requirement as a defensible baseline: failures here commonly manifest as preventable unauthorized access, insider misuse, and compromised accounts tied to weak onboarding controls 1.
Practical execution plan (30/60/90)
First 30 days (stabilize and stop the bleeding)
- Inventory all workforce onboarding paths (HR, procurement, IT tickets, third-party sponsor flows).
- Define “no verification, no access” gating points for your IdP, EHR, VPN/ZTNA, and privileged access.
- Publish a role-based verification matrix and exception process 1.
- Start capturing verification case IDs in access requests.
Days 31–60 (wire into systems and prove it works)
- Integrate verification outcomes into IAM provisioning or your ticket workflow.
- Standardize identity proofing for remote onboarding and third-party personnel.
- Build an evidence packet template: hire record, verification completion, provisioning approvals, access logs.
- Pilot re-verification workflow for your high-risk role set 1.
Days 61–90 (operationalize and audit-harden)
- Expand gating to all in-scope systems and remove local “side door” provisioning.
- Formalize metrics that are evidence-friendly (for example, exceptions count and closure proof) without adding unsupported performance claims.
- Run an internal sample test: pick recent onboardings and validate sequence (verification precedes access).
- If you use Daydream for third-party risk and compliance workflows, map third-party workforce onboarding requirements into your third-party controls library and evidence collection so contractor identity verification is tracked alongside contract and security requirements.
Frequently Asked Questions
Does “workforce” include contractors from a third party?
Yes if they receive system access under your control, including named accounts, federated access, VPN, or privileged sessions. Treat them as in scope for background checks, credential verification where applicable, and identity proofing before access 1.
Can we grant access while background checks are pending if a manager approves?
HICP Practice 6.6 sets verification “before granting system access” as the expectation 1. If you allow exceptions, document them, time-bound the access, restrict privileges, and retain the approval and compensating control evidence.
What counts as acceptable “identity proofing”?
Use a repeatable method that confirms the individual’s identity and ties that identity to account issuance. Document the method, completion date, and the identity attributes verified 1.
Do we need credential verification for every role?
No. Credential verification should be role-based and triggered where qualifications are required for the job or drive access scope. Keep a role-to-credential mapping and enforce it in the access request process 1.
How should we handle shared accounts or generic logins?
Shared accounts break the ability to prove a verified individual is the one using the access. Replace them with named accounts tied to verified identities, or document a strict exception with compensating controls and an accountable owner 1.
What evidence do auditors want to see first?
They usually start with the onboarding trail for a sample of users: verification completion records and the provisioning record showing access was granted after verification. Keep the linkage clear across HR/ticketing, verification vendor outputs, and IAM logs 1.
Footnotes
Frequently Asked Questions
Does “workforce” include contractors from a third party?
Yes if they receive system access under your control, including named accounts, federated access, VPN, or privileged sessions. Treat them as in scope for background checks, credential verification where applicable, and identity proofing before access (Source: HICP 2023 - 405(d) Health Industry Cybersecurity Practices).
Can we grant access while background checks are pending if a manager approves?
HICP Practice 6.6 sets verification “before granting system access” as the expectation (Source: HICP 2023 - 405(d) Health Industry Cybersecurity Practices). If you allow exceptions, document them, time-bound the access, restrict privileges, and retain the approval and compensating control evidence.
What counts as acceptable “identity proofing”?
Use a repeatable method that confirms the individual’s identity and ties that identity to account issuance. Document the method, completion date, and the identity attributes verified (Source: HICP 2023 - 405(d) Health Industry Cybersecurity Practices).
Do we need credential verification for every role?
No. Credential verification should be role-based and triggered where qualifications are required for the job or drive access scope. Keep a role-to-credential mapping and enforce it in the access request process (Source: HICP 2023 - 405(d) Health Industry Cybersecurity Practices).
How should we handle shared accounts or generic logins?
Shared accounts break the ability to prove a verified individual is the one using the access. Replace them with named accounts tied to verified identities, or document a strict exception with compensating controls and an accountable owner (Source: HICP 2023 - 405(d) Health Industry Cybersecurity Practices).
What evidence do auditors want to see first?
They usually start with the onboarding trail for a sample of users: verification completion records and the provisioning record showing access was granted after verification. Keep the linkage clear across HR/ticketing, verification vendor outputs, and IAM logs (Source: HICP 2023 - 405(d) Health Industry Cybersecurity Practices).
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream