Disaster Recovery Plan

HIPAA’s Disaster Recovery Plan requirement means you must have written, tested procedures to restore lost electronic protected health information (ePHI) after an incident, and you must be able to execute them when needed. Your plan has to cover how you recover data (not just systems), including roles, backups, restoration steps, and evidence that restoration works. (45 CFR Parts 160, 162, 164)

Key takeaways:

  • You need procedures that restore lost ePHI data, not a generic “business continuity” document. (45 CFR Parts 160, 162, 164)
  • The plan must be implementable: defined owners, runbooks, access paths, and testing evidence.
  • Auditors look for proof of restore capability: successful restores, logs, tickets, and post-test findings.

“Disaster recovery plan requirement” often gets misunderstood as “we have backups” or “IT has a DR slide deck.” Under HIPAA, the requirement is narrower and more operational: you must “establish (and implement as needed) procedures to restore any loss of data.” (45 CFR Parts 160, 162, 164) For a Compliance Officer, CCO, or GRC lead, the job is to convert that sentence into controlled, repeatable practice that survives real incidents and audits.

This page focuses on requirement-level implementation for covered entities and business associates handling ePHI. You’ll translate the requirement into concrete controls: restoration objectives, system prioritization based on ePHI impact, documented recovery runbooks, backup and restore validation, and governance that proves the plan is current. You’ll also align third parties (cloud hosts, EHR platforms, MSPs, backups-as-a-service) so your restore procedures don’t depend on “calling the vendor and hoping.”

If you need a fast operational path: inventory ePHI data stores, map them to backups, write restore runbooks for the highest-risk platforms, then run restore tests and retain evidence. That evidence is what converts “we think we can restore” into “we can demonstrate we restored.” (45 CFR Parts 160, 162, 164)

Regulatory text

Requirement (verbatim excerpt): “Establish (and implement as needed) procedures to restore any loss of data.” (45 CFR Parts 160, 162, 164)

Operator interpretation:
You must maintain documented procedures that let you restore lost ePHI data after events like ransomware, accidental deletion, corruption, infrastructure failure, or cloud misconfiguration. The procedures must be executable under stress: clear roles, prerequisites (accounts, keys, access), step-by-step restoration actions, validation steps, and defined triggers for when to invoke disaster recovery. (45 CFR Parts 160, 162, 164)

Plain-English interpretation (what this means in practice)

  • This is a data restoration requirement. Availability of systems matters, but HIPAA’s text here is explicitly about restoring data after loss. Your DR plan should prove you can recover ePHI records, images, documents, messages, and audit-relevant data stores. (45 CFR Parts 160, 162, 164)
  • “Establish” means documented and approved. A plan in someone’s head fails audits and fails incidents.
  • “Implement as needed” means you must be ready to execute. Readiness comes from tested runbooks, trained responders, and working access paths.
  • Scope includes third parties. If a third party stores or processes ePHI, your restore capability may depend on their backups, export mechanisms, or recovery commitments. You still need procedures that work end-to-end.

Who it applies to

Entities

  • Covered Entities that create, receive, maintain, or transmit ePHI. (45 CFR Parts 160, 162, 164)
  • Business Associates that create, receive, maintain, or transmit ePHI on behalf of a covered entity. (45 CFR Parts 160, 162, 164)

Operational context (where DR planning is required)

  • EHR/EMR platforms and their underlying databases
  • Imaging systems (PACS), lab systems, pharmacy systems
  • Identity systems that gate access to ePHI
  • File stores, collaboration tools, and email archives containing ePHI
  • Integration engines, APIs, and message queues moving ePHI
  • Backups, archives, and log platforms needed for investigation and integrity checks
  • Cloud services and managed hosting where ePHI is stored or processed by a third party

What you actually need to do (step-by-step)

1) Define the ePHI restoration scope

Create a list of ePHI data stores and the systems that host them:

  • Primary databases, file shares, object storage buckets
  • SaaS systems holding ePHI (tickets, portals, EHR, telehealth)
  • On-prem systems and endpoints where ePHI may persist

Practical tip: If you already have an asset inventory, add two fields: “Contains ePHI?” and “Restore method”.

2) Classify restoration priority based on patient care and regulatory impact

Document a simple prioritization:

  • Tier 1: ePHI systems needed for near-real-time clinical operations or critical workflows
  • Tier 2: ePHI systems needed for ongoing operations, billing, documentation
  • Tier 3: archives and lower-sensitivity ePHI repositories

This is less about perfection and more about making sure your restore plan starts with the data sets that matter most.

3) Map each ePHI data store to a backup and recovery method

For each data store, document:

  • Backup type (snapshot, database backup, SaaS export, immutable backup, offline copy)
  • Backup location(s) and account ownership
  • Encryption/key access dependencies (who can decrypt during an incident)
  • Restore path (tools, consoles, credentials, network access)
  • Known constraints (restore window, export limits, data consistency caveats)

If a third party controls backups, your procedure should specify how you request recovery, required information, and how you validate the returned data.

4) Write restoration runbooks that someone can execute at 2 a.m.

A DR plan that passes audit reads like a set of runbooks. Minimum components:

  • Trigger conditions: what counts as “data loss” and who declares a DR event
  • Roles and decision rights: incident commander, restoration lead, app owner, security lead, compliance/privacy contact
  • Prerequisites checklist: privileged access, MFA recovery codes, break-glass accounts, key management access, vendor support contacts
  • Restoration steps: ordered, system-specific instructions
  • Validation steps: record counts, checksums where feasible, application-level checks, user acceptance steps
  • Post-restore controls: heightened monitoring, evidence collection, and rollback criteria if restored data is suspect

5) Test restores and retain proof

Testing is where most programs fail. You need evidence that restores work for the ePHI systems you claimed you can restore:

  • Perform restore tests for representative systems in each tier.
  • Validate both data integrity and application usability.
  • Track defects and remediation actions to closure.

6) Integrate the DR plan with incident response and change management

Your restore procedure should connect to:

  • Incident response triage (ransomware vs. corruption vs. accidental deletion)
  • Security approvals (avoid restoring malware or reintroducing compromised credentials)
  • Change management (infrastructure changes can silently break restores)
  • Third-party management (ensure contracts and contacts support timely restoration)

7) Operationalize governance (make it stay current)

Assign:

  • A DR plan owner (GRC or IT, but with named accountability)
  • System-level runbook owners (application/infra owners)
  • A review cadence tied to major changes (new EHR module, cloud migration, backup tool change)

Daydream can help here by centralizing system inventories, third-party dependencies, control owners, and evidence collection so you can show a clean chain from requirement to runbook to restore test artifacts without chasing screenshots across teams.

Required evidence and artifacts to retain

Auditors typically want to see that the plan exists, is actionable, and has been exercised. Retain:

  • Disaster Recovery Plan document covering ePHI restoration procedures (45 CFR Parts 160, 162, 164)
  • System inventory with ePHI scoping and restoration methods
  • Runbooks for key ePHI systems (EHR database, file/object storage, SaaS exports)
  • Backup configuration evidence (policies, schedules, retention settings, immutability settings where used)
  • Restore test records: tickets, logs, screenshots, command outputs, meeting notes, sign-offs
  • Validation results: integrity checks, sampling approach, user acceptance results
  • Issue tracking and remediation for failed tests or gaps
  • Third-party documentation: support procedures, escalation paths, contract terms related to data recovery (keep what you actually rely on operationally)

Common exam/audit questions and hangups

Expect questions like:

  • “Show me how you restore lost ePHI for your highest-risk systems.” (45 CFR Parts 160, 162, 164)
  • “When was the last successful restore test for your EHR database?”
  • “Who can access backup consoles and encryption keys during an outage?”
  • “How do you verify restored data is complete and not corrupted?”
  • “What happens if your cloud/SaaS provider has an outage? How do you recover the data?”
  • “Do you have a runbook, or is this dependent on a specific engineer?”

Hangups that slow audits:

  • Backups exist, but no one can prove they can restore.
  • Restores require credentials stored in a password vault that is itself unavailable during DR.
  • The only restore testing is a screenshot of a job that “completed,” with no data validation.

Frequent implementation mistakes (and how to avoid them)

  1. Mistake: Confusing DR with general business continuity.
    Avoidance: Make the first section of the DR plan explicitly about restoring ePHI data stores, with system-by-system procedures. (45 CFR Parts 160, 162, 164)

  2. Mistake: No ownership.
    Avoidance: Name an accountable DR owner and system runbook owners. Add escalation contacts that stay current.

  3. Mistake: Testing that doesn’t prove anything.
    Avoidance: Require restore tests to include validation (record counts, application checks, and evidence retention). A “backup job succeeded” report is not a restoration test.

  4. Mistake: Third-party dependency is undocumented.
    Avoidance: For each third party that touches ePHI, document whether you can self-restore, whether the third party restores, and what artifacts you receive after recovery.

  5. Mistake: Restoring into an unsafe environment after a security incident.
    Avoidance: Add a security gate in the runbook (credential rotation, malware scanning, confirmation of clean images) before and after restore.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement. Operationally, weak restoration procedures increase the likelihood of extended downtime, permanent ePHI loss, incomplete medical records, delayed patient care workflows, and inability to meet contractual obligations to covered entity customers. From a HIPAA program perspective, the risk is failing to demonstrate that you established and can implement procedures to restore lost data. (45 CFR Parts 160, 162, 164)

Practical 30/60/90-day execution plan

First 30 days (stabilize the basics)

  • Assign DR plan ownership and define restoration roles for incidents.
  • Inventory ePHI data stores and rank them by restoration priority.
  • Confirm where backups exist for each Tier 1 system and who has access.
  • Draft Tier 1 runbooks with prerequisites, restoration steps, and validation steps.

By 60 days (prove you can restore)

  • Execute restore tests for Tier 1 systems in a controlled environment.
  • Fix blockers found in testing (missing permissions, broken scripts, undocumented dependencies).
  • Document third-party recovery procedures and verify escalation contacts.
  • Create an evidence pack template for every restore test (what screenshots/logs/tickets to keep).

By 90 days (expand coverage and operationalize)

  • Extend runbooks and restore tests to Tier 2 systems.
  • Integrate DR invocation into incident response procedures (who declares DR, how decisions are recorded).
  • Tie DR updates to change management so migrations and backup-tool changes trigger runbook updates.
  • Run a tabletop that includes compliance/privacy, IT, and key third parties, then track actions to closure.

Frequently Asked Questions

Does HIPAA require a written Disaster Recovery Plan, or is having backups enough?

The requirement is to establish procedures to restore any loss of data, which you should document and be able to execute. Backups without documented restoration procedures and validation evidence usually fail audits. (45 CFR Parts 160, 162, 164)

What’s the difference between a backup policy and a disaster recovery plan for this requirement?

A backup policy describes how backups are created and retained. A disaster recovery plan provides step-by-step procedures to restore lost ePHI data, including roles, prerequisites, and validation steps. (45 CFR Parts 160, 162, 164)

How far does this extend into SaaS and cloud systems?

If ePHI is in a SaaS or cloud platform, your procedures must still explain how you restore the data, whether by self-service restore, export/import, or provider-supported recovery. Document the dependency and the validation steps. (45 CFR Parts 160, 162, 164)

What evidence should I show an auditor to prove restores work?

Provide restore test records, logs or tickets that show the restore occurred, and validation results that demonstrate restored ePHI is complete and usable. Pair that with the runbook used during the test. (45 CFR Parts 160, 162, 164)

Who should own the Disaster Recovery Plan, IT or Compliance?

IT typically owns the technical runbooks, but Compliance/GRC should own the control oversight: scope, evidence standards, review cadence, and audit readiness. Name owners either way so responsibility is unambiguous.

How do I handle third parties that claim they “handle DR” for us?

Require written recovery procedures, escalation paths, and proof you can get your ePHI back in practice (test exports/restores where feasible). Your internal plan should document exactly what you do and what the third party does. (45 CFR Parts 160, 162, 164)

Frequently Asked Questions

Does HIPAA require a written Disaster Recovery Plan, or is having backups enough?

The requirement is to establish procedures to restore any loss of data, which you should document and be able to execute. Backups without documented restoration procedures and validation evidence usually fail audits. (45 CFR Parts 160, 162, 164)

What’s the difference between a backup policy and a disaster recovery plan for this requirement?

A backup policy describes how backups are created and retained. A disaster recovery plan provides step-by-step procedures to restore lost ePHI data, including roles, prerequisites, and validation steps. (45 CFR Parts 160, 162, 164)

How far does this extend into SaaS and cloud systems?

If ePHI is in a SaaS or cloud platform, your procedures must still explain how you restore the data, whether by self-service restore, export/import, or provider-supported recovery. Document the dependency and the validation steps. (45 CFR Parts 160, 162, 164)

What evidence should I show an auditor to prove restores work?

Provide restore test records, logs or tickets that show the restore occurred, and validation results that demonstrate restored ePHI is complete and usable. Pair that with the runbook used during the test. (45 CFR Parts 160, 162, 164)

Who should own the Disaster Recovery Plan, IT or Compliance?

IT typically owns the technical runbooks, but Compliance/GRC should own the control oversight: scope, evidence standards, review cadence, and audit readiness. Name owners either way so responsibility is unambiguous.

How do I handle third parties that claim they “handle DR” for us?

Require written recovery procedures, escalation paths, and proof you can get your ePHI back in practice (test exports/restores where feasible). Your internal plan should document exactly what you do and what the third party does. (45 CFR Parts 160, 162, 164)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
HIPAA Disaster Recovery Plan: Implementation Guide | Daydream