Password Management

HIPAA’s password management requirement means you must have written, implemented procedures that define how passwords are created, changed, and safeguarded across all systems that create, receive, maintain, or transmit ePHI. Operationalize it by standardizing password rules, enforcing them technically where possible, and retaining evidence that the procedures are followed in day-to-day access management. (45 CFR Parts 160, 162, 164)

Key takeaways:

  • Document procedures for password creation, change, and protection, then align them to how access actually works in your environment. (45 CFR Parts 160, 162, 164)
  • Prefer technical enforcement (SSO, MFA, policy baselines) over “policy-only” controls, and prove it with configuration evidence and access records.
  • Extend requirements to workforce, administrators, and third parties that access systems with ePHI.

“Password management” in HIPAA is a deceptively small line item that becomes a frequent audit friction point because it touches identity, IT operations, HR onboarding/offboarding, incident response, and third-party access. The Security Rule does not give you a prescriptive password length or rotation schedule; it requires that you implement procedures for creating, changing, and safeguarding passwords, and that those procedures are appropriate for your risks and systems. (45 CFR Parts 160, 162, 164)

For a Compliance Officer, CCO, or GRC lead, the fastest path to compliance is to translate the requirement into three operational outcomes: (1) consistent password standards for all accounts that can access ePHI, including privileged and service accounts, (2) reliable mechanisms to change passwords (planned changes, resets, and emergency rotation) that don’t break clinical or revenue operations, and (3) controls that prevent passwords from being exposed, reused improperly, or shared. Your evidence should show both “paper” (the procedures) and “practice” (system configurations, logs, and tickets). If you use a platform like Daydream to track controls and evidence, treat password management as a control family with mapped artifacts by system and owner, not a single policy PDF.

Regulatory text

Requirement: “Procedures for creating, changing, and safeguarding passwords.” (45 CFR Parts 160, 162, 164)

What the operator must do: Implement and maintain documented procedures that specify:

  • How passwords are created (standards, who issues credentials, and how initial passwords are delivered).
  • How passwords are changed (routine changes, reset workflows, and how privileged and service account credentials are rotated).
  • How passwords are safeguarded (storage, transmission, sharing prohibitions, MFA where applicable, and controls to reduce compromise risk). (45 CFR Parts 160, 162, 164)

This is an “addressable” implementation specification under the HIPAA Security Rule. Practically, that means you still must address it, but your implementation can vary based on your environment and risk analysis. Your job is to make the procedures real, measurable, and enforceable.

Plain-English interpretation

You need a repeatable way to issue passwords, update them, and keep them from being exposed or misused, everywhere ePHI can be accessed. “Procedures” means more than a general policy statement. An auditor will expect to see defined workflows, assigned owners, tools or configurations that enforce the rules, and records that show the workflows happen as designed. (45 CFR Parts 160, 162, 164)

Who it applies to

Entities: Covered Entities and Business Associates. (45 CFR Parts 160, 162, 164)

Operational scope: Any workforce member, system administrator, contractor, or third party with credentials that can access systems that create, receive, maintain, or transmit ePHI. Include:

  • Human user accounts (employees, clinicians, billing staff, IT, call center).
  • Privileged accounts (domain admins, EHR admins, cloud admins).
  • Non-human accounts (service accounts, API keys where treated as “password-like” secrets, shared integration accounts).
  • Remote access pathways (VPN, VDI, remote EHR access portals).
  • Third-party access to your tenant, EHR, or hosting environment.

What you actually need to do (step-by-step)

1) Define the password management standard (write it so IT can implement it)

Create a “Password Management Procedure” that includes, at minimum:

  • Account types covered (standard, privileged, service/shared accounts).
  • Password creation rules (length/complexity rules you choose, prohibited patterns, password manager requirements if adopted).
  • Credential issuance and initial password delivery method (how you avoid emailing passwords or leaving them on sticky notes).
  • Change/reset process (identity verification, approvals, helpdesk steps, self-service reset rules).
  • Safeguarding rules (no sharing, no storing in plain text, no entering credentials into unapproved forms, secure storage expectations).
  • Exceptions process (who can approve, how exceptions are time-bound, compensating controls). (45 CFR Parts 160, 162, 164)

Write this in operational language with system owners, not just “users must…”.

2) Inventory where passwords exist in your ePHI environment

Build (or update) a simple inventory:

  • Systems with local accounts vs centralized identity (AD/Entra/IdP).
  • Locations of privileged credentials (firewalls, EHR admin consoles, databases, cloud consoles).
  • Any shared accounts and why they exist (many orgs discover these in imaging systems, lab interfaces, or legacy apps).

This inventory becomes your implementation map and your audit scoping proof.

3) Implement technical enforcement where feasible

Auditors trust system enforcement more than training slides. Prioritize:

  • Centralized identity where possible (SSO/IdP) to reduce scattered password rules.
  • Administrative controls for password policy settings on directories and endpoints.
  • MFA for remote access and privileged access where available in your stack (this supports “safeguarding” even though the excerpt is password-focused). (45 CFR Parts 160, 162, 164)

If a legacy system cannot meet your standard, document the exception and add compensating controls (restricted network access, jump box, monitoring, reduced privileges).

4) Operationalize password changes and resets (make it work at 2 a.m.)

Define how password changes happen in reality:

  • Self-service reset vs helpdesk reset flows.
  • Identity proofing requirements for resets (what the helpdesk verifies).
  • Emergency access for downtime procedures (especially for clinical operations).
  • Privileged credential rotation process with an owner, triggers, and validation steps so you don’t lock out critical systems. (45 CFR Parts 160, 162, 164)

5) Control and monitor privileged and shared credentials

If privileged access exists, you need stronger handling:

  • Restrict who can create privileged accounts.
  • Require named admin accounts (avoid “shared admin” unless truly unavoidable).
  • Maintain a register of service accounts with owners and purpose.
  • Review privileged group membership and shared account access on a regular cadence you can support operationally.

6) Train and enforce “safeguarding” behaviors

Safeguarding fails in predictable ways: shared passwords, storing credentials in notes, or entering credentials into phishing sites.

  • Provide role-based guidance (front desk vs IT admin).
  • Align HR and IT: onboarding includes secure credential delivery; offboarding includes immediate access removal and rotation where needed.
  • Add consequences and reporting paths (how to report suspected credential compromise). (45 CFR Parts 160, 162, 164)

7) Prove it with evidence (design your audit package)

Set up an evidence folder (or a Daydream control record) per major system category:

  • Policy/procedure + version history
  • Configuration screenshots/exports
  • Samples of tickets/logs
  • Exception register
  • Review/attestation records

Aim for “show me” evidence over narratives.

Required evidence and artifacts to retain

Keep artifacts that prove both procedure and execution:

  • Password Management Procedure approved and current. (45 CFR Parts 160, 162, 164)
  • System configuration evidence showing password rules on directory/IdP and key systems (exports, screenshots, configuration baselines).
  • Access management records: onboarding/offboarding tickets, account request approvals, reset tickets, privileged access approvals.
  • Service account register with owner, purpose, and credential handling method.
  • Exception register with rationale, approver, compensating controls, and expiry criteria.
  • Training/acknowledgment evidence for workforce password handling rules.
  • Incident records where compromised credentials were suspected, showing reset/rotation actions taken.

Common exam/audit questions and hangups

Expect questions like:

  • “Show me your written procedures for creating, changing, and safeguarding passwords.” (45 CFR Parts 160, 162, 164)
  • “Where are password rules enforced technically, and where are they policy-only?”
  • “How do you reset passwords, and how do you verify identity?”
  • “Do you have shared accounts? Who knows the password? How is it changed when someone leaves?”
  • “How do third parties authenticate to systems with ePHI, and do they follow your requirements?”
  • “Show evidence of periodic review of privileged access and service accounts.”

Common hangup: teams provide an Acceptable Use Policy but cannot show the operational procedure, configuration, or records of actual password changes/resets.

Frequent implementation mistakes and how to avoid them

  • Mistake: one generic policy for everything. Fix: separate standards for standard users, privileged users, and service/shared accounts.
  • Mistake: relying on password rotation alone. Fix: focus on safeguarding controls (secure delivery, secure storage, MFA where available, phishing resilience) and prove enforcement. (45 CFR Parts 160, 162, 164)
  • Mistake: ignoring third-party access. Fix: contractually require aligned credential practices and implement technical controls (named accounts, MFA, scoped access).
  • Mistake: undocumented exceptions for legacy systems. Fix: maintain an exception register with compensating controls and an end-state plan.
  • Mistake: no evidence package. Fix: pre-build an audit bundle by system; Daydream can track owners, due dates, and evidence freshness.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this page, so don’t anchor your program to specific penalty narratives. The practical risk is straightforward: weak password practices are a common entry point for unauthorized access, and credential failures also create availability risk (lockouts, downtime, delayed care). Under HIPAA, your exposure increases if you cannot demonstrate documented procedures and consistent execution across systems that touch ePHI. (45 CFR Parts 160, 162, 164)

Practical 30/60/90-day execution plan

First 30 days (Immediate stabilization)

  • Assign an owner for password management (typically IAM/IT Security) and a compliance counterpart.
  • Publish or refresh the Password Management Procedure with clear scope (workforce, privileged, service accounts). (45 CFR Parts 160, 162, 164)
  • Identify systems that access ePHI and note where passwords are managed (IdP vs local).
  • Stand up an exception register and start logging legacy constraints.

Days 31–60 (Enforcement and workflow hardening)

  • Implement or tighten directory/IdP password policies where possible; document configs.
  • Standardize helpdesk reset workflow and identity verification steps; train the helpdesk.
  • Create a service account register and assign owners.
  • Implement controls for third-party credentials (named accounts, MFA where supported, disable shared accounts where feasible).

Days 61–90 (Audit readiness and continuous control)

  • Collect evidence samples: reset tickets, approvals, privileged access changes, exception approvals.
  • Perform a targeted access review for privileged groups and shared/service accounts; document remediation.
  • Run a tabletop for credential compromise: detection, reset/rotation, communication, and documentation. (45 CFR Parts 160, 162, 164)
  • In Daydream, map each system to the password management control and attach “current state” evidence so audit requests don’t become a scramble.

Frequently Asked Questions

Do we have to follow a specific password length or rotation schedule to meet HIPAA?

The cited HIPAA text requires procedures for creating, changing, and safeguarding passwords, but it does not specify exact length or rotation values. Define standards that match your environment, enforce them where feasible, and retain proof that the procedures operate in practice. (45 CFR Parts 160, 162, 164)

Are service accounts and integration accounts in scope for password management?

Yes, if they can access systems that create, receive, maintain, or transmit ePHI. Treat them as first-class identities with documented ownership, controlled storage, and a defined change/rotation process. (45 CFR Parts 160, 162, 164)

What’s the minimum evidence an auditor will accept?

A written procedure plus proof it is implemented: system configuration evidence and real operational records (tickets/logs) for password issuance and resets. If you only provide a policy, expect follow-up requests. (45 CFR Parts 160, 162, 164)

How should we handle shared accounts that a legacy application requires?

Document the exception, restrict access as tightly as possible, and add compensating controls like network restrictions and monitoring. Track who has access, and define how the password changes when staff roles change. (45 CFR Parts 160, 162, 164)

Do third parties need to follow our password procedures?

If a third party accesses your systems with ePHI, you need controls that ensure their authentication practices don’t weaken your environment. Put requirements in access terms (named accounts, MFA where supported, prompt deprovisioning) and retain evidence of enforcement. (45 CFR Parts 160, 162, 164)

We use SSO—does that “solve” the password management requirement?

SSO reduces password sprawl, but you still need documented procedures and controls for account provisioning, password resets (for the IdP), privileged access, and any systems that still use local credentials. Keep configuration exports and operational records. (45 CFR Parts 160, 162, 164)

Frequently Asked Questions

Do we have to follow a specific password length or rotation schedule to meet HIPAA?

The cited HIPAA text requires procedures for creating, changing, and safeguarding passwords, but it does not specify exact length or rotation values. Define standards that match your environment, enforce them where feasible, and retain proof that the procedures operate in practice. (45 CFR Parts 160, 162, 164)

Are service accounts and integration accounts in scope for password management?

Yes, if they can access systems that create, receive, maintain, or transmit ePHI. Treat them as first-class identities with documented ownership, controlled storage, and a defined change/rotation process. (45 CFR Parts 160, 162, 164)

What’s the minimum evidence an auditor will accept?

A written procedure plus proof it is implemented: system configuration evidence and real operational records (tickets/logs) for password issuance and resets. If you only provide a policy, expect follow-up requests. (45 CFR Parts 160, 162, 164)

How should we handle shared accounts that a legacy application requires?

Document the exception, restrict access as tightly as possible, and add compensating controls like network restrictions and monitoring. Track who has access, and define how the password changes when staff roles change. (45 CFR Parts 160, 162, 164)

Do third parties need to follow our password procedures?

If a third party accesses your systems with ePHI, you need controls that ensure their authentication practices don’t weaken your environment. Put requirements in access terms (named accounts, MFA where supported, prompt deprovisioning) and retain evidence of enforcement. (45 CFR Parts 160, 162, 164)

We use SSO—does that “solve” the password management requirement?

SSO reduces password sprawl, but you still need documented procedures and controls for account provisioning, password resets (for the IdP), privileged access, and any systems that still use local credentials. Keep configuration exports and operational records. (45 CFR Parts 160, 162, 164)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
HIPAA Password Management: Implementation Guide | Daydream