Protection from Malicious Software
HIPAA’s protection from malicious software requirement means you must have written procedures to prevent, detect, and report malware across systems that create, receive, maintain, or transmit ePHI. Operationalize it by standardizing endpoint protection, email/web filtering, patching, logging/alerting, and an incident workflow that explicitly covers malware events. (45 CFR Parts 160, 162, 164)
Key takeaways:
- You need documented procedures that cover guarding against, detecting, and reporting malicious software, not just an antivirus tool. (45 CFR Parts 160, 162, 164)
- Auditors look for proof of operation: coverage, alerts, response tickets, and exception handling for assets that can’t run agents. (45 CFR Parts 160, 162, 164)
- Third parties that handle ePHI must align to your malware controls through contracting, technical requirements, and evidence collection. (45 CFR Parts 160, 162, 164)
“Protection from malicious software” is one of the most operational HIPAA Security Rule requirements because it sits at the intersection of security tooling, user behavior, and incident response. The regulation is short, but expectations are not: you need procedures that address how you prevent malware, how you know it’s happening, and what you do once you suspect or confirm it. (45 CFR Parts 160, 162, 164)
For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat this as a control family with clear owners: IT/SecOps runs the tools, HR/Training supports user behavior controls, and Compliance defines the minimum procedural outcomes and evidence. Then you map your environment: endpoints, servers, email, browsers, mobile devices, and any cloud services used for ePHI. Where security agents don’t fit (legacy medical devices, imaging systems, lab equipment), your procedure must define compensating controls and a risk acceptance path. (45 CFR Parts 160, 162, 164)
This page gives requirement-level guidance you can implement immediately: scope, step-by-step actions, audit artifacts, common hangups, and a practical execution plan.
Regulatory text
45 CFR § 164.308(a)(5)(ii)(B) requires: “Procedures for guarding against, detecting, and reporting malicious software.” (45 CFR Parts 160, 162, 164)
Operator interpretation (what you must be able to show):
- Guarding against: You have defined, implemented measures to reduce the likelihood of malware execution or spread (for example: endpoint protection standards, filtering, hardening, patching, least privilege).
- Detecting: You have monitoring/alerting that will surface malware or malware-like behavior in time for response (for example: endpoint alerts, email security detections, log monitoring, suspicious process detection).
- Reporting: You have a documented path to escalate, triage, and record malware events (helpdesk flow, incident response steps, internal/external notifications as appropriate, post-incident documentation).
All three must be in procedures, and those procedures must be in use. (45 CFR Parts 160, 162, 164)
Plain-English requirement (what it really asks for)
You need a repeatable way to keep malware out, catch it when it appears, and make sure the right people are told quickly enough to contain it and document what happened. Tools help, but the requirement is broader: it’s also about coverage, configuration, monitoring, and response discipline. (45 CFR Parts 160, 162, 164)
Who it applies to (entity + operational context)
Applies to:
- HIPAA Covered Entities (providers, health plans, clearinghouses)
- Business Associates that create, receive, maintain, or transmit ePHI
This includes workforce members and systems that touch ePHI directly, plus supporting systems that could provide a path to ePHI (identity systems, email, endpoint fleets, remote access, shared file services). (45 CFR Parts 160, 162, 164)
Operational contexts to explicitly include in scope:
- Corporate endpoints (Windows/macOS/Linux)
- Servers (on-prem and cloud)
- Email and collaboration tools used for ePHI workflows
- Remote access pathways (VPN, VDI, RDP alternatives)
- Mobile devices if used for ePHI
- Medical or IoT-like devices in the ePHI environment (where feasible, or via compensating controls) (45 CFR Parts 160, 162, 164)
What you actually need to do (step-by-step)
Treat this as a procedure pack plus a minimum technical baseline. The goal is consistent outcomes across teams.
1) Define scope and ownership (policy-to-procedure alignment)
- Name a control owner for malware protection (often Security or IT) and a compliance owner for evidence readiness.
- Write the procedure set (or update existing ones) so it explicitly covers: prevent, detect, report malware.
- Declare the in-scope asset categories (endpoints, servers, email) and how you handle outliers (legacy devices). (45 CFR Parts 160, 162, 164)
2) Establish a minimum malware protection standard per asset type
Create a one-page standard that says what “protected” means, by asset class:
- Endpoints: approved endpoint protection/EDR, real-time protection on, tamper protection, automatic definition updates, local admin restricted.
- Servers: same principle, tuned for server workloads; change control for exclusions.
- Email/web: attachment and link scanning, phishing and malware detection, blocked file types as needed.
- Cloud/SaaS: enable native malware scanning where available and log security events into your monitoring workflow. (45 CFR Parts 160, 162, 164)
Practical tip: auditors respond well to a clear standard that can be tested (coverage and configuration), not a narrative. (45 CFR Parts 160, 162, 164)
3) Deploy controls and prove coverage
- Build or export an authoritative asset inventory list for in-scope systems.
- For each asset category, produce a coverage report from your endpoint/email tooling showing which assets are protected and which are not.
- Create an exception register for anything that cannot run an agent (medical devices, vendor-managed appliances). Require compensating controls such as network segmentation, strict ingress/egress rules, and enhanced monitoring. Document approvals. (45 CFR Parts 160, 162, 164)
4) Detection and monitoring: define what triggers action
Your procedure should define:
- What alerts are “actionable” (malware detected, quarantine failed, suspicious execution, repeated blocked events, unusual outbound connections reported by the security stack).
- Who receives the alerts (SOC/IT on-call, helpdesk triage queue).
- Expected actions: isolate host, preserve evidence, reimage, reset credentials if needed, verify no lateral movement, confirm restoration integrity. (45 CFR Parts 160, 162, 164)
If you don’t have a SOC, define a pragmatic monitoring method: a designated mailbox/queue, daily review cadence, and escalation criteria. The key is that someone is responsible for seeing and acting on detections. (45 CFR Parts 160, 162, 164)
5) Reporting workflow: make it ticketable and auditable
“Reporting” should not mean “someone tells someone.” Make it a recorded workflow:
- Create a helpdesk/IR ticket category for “Malicious Software.”
- Require minimum fields: system, user, time detected, detection source, containment action, eradication action, recovery action, and closure notes.
- Define who must be notified internally (Security, Privacy, Compliance, IT leadership) based on severity.
- Link to your incident response process for any suspected ePHI impact, even if the investigation later shows no compromise. (45 CFR Parts 160, 162, 164)
6) Integrate third parties that touch ePHI
You can’t install agents on every third party system, but you can require outcomes:
- Contract language or security addendum that requires malware protection controls appropriate to their environment.
- Evidence request list (see next section).
- Onboarding check: confirm how they detect and report malware events that could affect your ePHI.
- Offboarding: confirm removal of access and secure disposition of ePHI-bearing assets. (45 CFR Parts 160, 162, 164)
Daydream note (where it fits naturally): if you struggle to track third party malware-control attestations, evidence requests, and renewal follow-ups, Daydream can centralize requests, reminders, and artifact storage by third party and system scope.
Required evidence and artifacts to retain
Keep artifacts that prove both design (procedures) and operation (records).
Core documentation
- Malware protection procedure(s) covering guarding against, detecting, and reporting. (45 CFR Parts 160, 162, 164)
- Endpoint/server/email security standards (minimum configurations, required features, exception rules). (45 CFR Parts 160, 162, 164)
- Asset inventory or in-scope system list for ePHI environments. (45 CFR Parts 160, 162, 164)
- Exception register with compensating controls and approvals. (45 CFR Parts 160, 162, 164)
Operational proof
- Tooling dashboards/exports showing endpoint protection coverage and update status. (45 CFR Parts 160, 162, 164)
- Monitoring evidence: alert queue screenshots/exports, SIEM or console logs, daily/weekly review sign-offs if used. (45 CFR Parts 160, 162, 164)
- Incident/ticket records for malware detections (including false positives and near-misses). (45 CFR Parts 160, 162, 164)
- Change records for security exclusions and tuning (especially for servers and specialty systems). (45 CFR Parts 160, 162, 164)
Third party artifacts (as applicable)
- Contract/security addendum clauses requiring malware controls and reporting obligations. (45 CFR Parts 160, 162, 164)
- Third party security responses, attestations, or policy excerpts describing their malware protection and incident reporting. (45 CFR Parts 160, 162, 164)
Common exam/audit questions and hangups
Expect examiners and auditors to test for control coverage, not just “we have antivirus.”
Common questions:
- “Show me your documented procedures for guarding against, detecting, and reporting malware.” (45 CFR Parts 160, 162, 164)
- “Which systems that touch ePHI do not have endpoint protection installed, and why?” (45 CFR Parts 160, 162, 164)
- “Show alerts and tickets from the last malware event. Who responded and what did they do?” (45 CFR Parts 160, 162, 164)
- “How do you handle medical devices or vendor-managed systems?” (45 CFR Parts 160, 162, 164)
- “How do third parties report malware incidents that could affect your ePHI?” (45 CFR Parts 160, 162, 164)
Hangups that stall audits:
- No exception process for devices that can’t run agents.
- No evidence of alert review (tools exist, but nobody can prove they look).
- Tickets exist, but don’t include containment/eradication/recovery notes. (45 CFR Parts 160, 162, 164)
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Calling a tool a procedure.
Fix: write a short SOP that describes what you do with the tool: deployment, monitoring, response, documentation. (45 CFR Parts 160, 162, 164) -
Mistake: Endpoint coverage gaps you can’t explain.
Fix: reconcile asset inventory vs. security console weekly, and maintain an exception register with compensating controls. (45 CFR Parts 160, 162, 164) -
Mistake: “Reporting” is informal and undocumented.
Fix: require malware events to be recorded as tickets/incidents with minimum required fields. (45 CFR Parts 160, 162, 164) -
Mistake: Third parties are out of sight, out of scope.
Fix: make malware controls and incident reporting part of third party onboarding and periodic due diligence for ePHI-handling relationships. (45 CFR Parts 160, 162, 164)
Enforcement context and risk implications
The Security Rule text is explicit that you must be able to guard against, detect, and report malicious software. If malware causes system unavailability, data integrity issues, or suspected unauthorized access to ePHI, you will be asked to prove that your program was operating as written and that you responded in a controlled way. Strong procedures plus clean evidence reduce both operational impact and the compliance burden during an investigation. (45 CFR Parts 160, 162, 164)
Practical execution plan (30/60/90-day)
You asked for speed; this is sequenced to produce audit-ready evidence early without inventing unrealistic timelines.
First 30 days (stabilize and document)
- Confirm in-scope systems and owners (endpoints, servers, email, medical devices). (45 CFR Parts 160, 162, 164)
- Publish the malware protection procedures and minimum standards. (45 CFR Parts 160, 162, 164)
- Start the exception register and force everything unprotected into either remediation or approved exception. (45 CFR Parts 160, 162, 164)
- Create the malware ticket category and required fields; train helpdesk/SecOps on documentation expectations. (45 CFR Parts 160, 162, 164)
By 60 days (prove coverage and detection)
- Produce coverage reports and reconcile against asset inventory; close gaps or document exceptions. (45 CFR Parts 160, 162, 164)
- Stand up an alert review workflow with clear escalation points and evidence of review. (45 CFR Parts 160, 162, 164)
- Run a tabletop focused on a malware detection escalating to an incident, and verify your reporting path works. Capture notes and action items. (45 CFR Parts 160, 162, 164)
By 90 days (operational maturity and third party alignment)
- Validate server and specialty system exclusions through change control; remove stale exclusions. (45 CFR Parts 160, 162, 164)
- Add third party malware-control and incident-reporting requirements to onboarding and contract templates for ePHI relationships. (45 CFR Parts 160, 162, 164)
- Build a quarterly evidence packet: procedures, coverage exports, exception register, and a sample of tickets showing response documentation. (45 CFR Parts 160, 162, 164)
Frequently Asked Questions
Does HIPAA require a specific antivirus or EDR product?
No product is named in the requirement. HIPAA requires procedures to guard against, detect, and report malicious software, and you must be able to show they operate in your environment. (45 CFR Parts 160, 162, 164)
Are legacy medical devices in scope if they touch ePHI but can’t run an agent?
Yes, they are still in scope from a risk perspective. Document the exception, implement compensating controls (segmentation, restricted access, monitoring), and retain approval evidence. (45 CFR Parts 160, 162, 164)
What counts as “reporting” malicious software?
Reporting means a defined, followed process to escalate and record malware events. A ticket or incident record with containment and closure notes is the simplest auditable form. (45 CFR Parts 160, 162, 164)
Do we need to keep evidence of every alert, even false positives?
Keep enough to prove the monitoring process works and that responders triage alerts consistently. A sample set plus metrics or queue history from your tools is often more practical than archiving every alert. (45 CFR Parts 160, 162, 164)
How should we handle third parties that process ePHI in their own systems?
Require malware protections and incident reporting obligations in the contract/security addendum, then collect evidence during onboarding and periodic reviews. Track gaps and exceptions the same way you do internally. (45 CFR Parts 160, 162, 164)
Can IT “own” this control, or does Compliance need to run it?
IT/Security should run the tools and response. Compliance should own the requirement mapping, ensure procedures exist, and confirm evidence is retained and reviewable. (45 CFR Parts 160, 162, 164)
Frequently Asked Questions
Does HIPAA require a specific antivirus or EDR product?
No product is named in the requirement. HIPAA requires procedures to guard against, detect, and report malicious software, and you must be able to show they operate in your environment. (45 CFR Parts 160, 162, 164)
Are legacy medical devices in scope if they touch ePHI but can’t run an agent?
Yes, they are still in scope from a risk perspective. Document the exception, implement compensating controls (segmentation, restricted access, monitoring), and retain approval evidence. (45 CFR Parts 160, 162, 164)
What counts as “reporting” malicious software?
Reporting means a defined, followed process to escalate and record malware events. A ticket or incident record with containment and closure notes is the simplest auditable form. (45 CFR Parts 160, 162, 164)
Do we need to keep evidence of every alert, even false positives?
Keep enough to prove the monitoring process works and that responders triage alerts consistently. A sample set plus metrics or queue history from your tools is often more practical than archiving every alert. (45 CFR Parts 160, 162, 164)
How should we handle third parties that process ePHI in their own systems?
Require malware protections and incident reporting obligations in the contract/security addendum, then collect evidence during onboarding and periodic reviews. Track gaps and exceptions the same way you do internally. (45 CFR Parts 160, 162, 164)
Can IT “own” this control, or does Compliance need to run it?
IT/Security should run the tools and response. Compliance should own the requirement mapping, ensure procedures exist, and confirm evidence is retained and reviewable. (45 CFR Parts 160, 162, 164)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream