Encryption and Decryption

To meet the HIPAA Security Rule’s encryption and decryption requirement, you must implement a workable technical mechanism to encrypt and decrypt electronic protected health information (ePHI) in the systems you control, and be able to show how it is configured, used, and governed. Your goal is operational: ensure ePHI is encrypted where appropriate, keys are controlled, and authorized workflows can reliably decrypt for care, billing, and operations. (45 CFR Parts 160, 162, 164)

Key takeaways:

  • Encrypting ePHI is not enough; you must also control decryption paths, access, and key management. (45 CFR Parts 160, 162, 164)
  • Scope the requirement by mapping where ePHI is stored, processed, and transmitted, including third-party services. (45 CFR Parts 160, 162, 164)
  • Auditors look for “mechanism + proof”: configurations, key ownership, logging, and exceptions tied to risk decisions. (45 CFR Parts 160, 162, 164)

“Encryption and decryption” under HIPAA is a technical safeguard requirement aimed at reducing the likelihood that ePHI is readable if systems, media, or accounts are compromised. The text is short, but operationalizing it is not. You need to know where ePHI lives, which encryption methods are in place across endpoints, servers, databases, backups, and cloud services, and who can decrypt under what conditions.

For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat this as an implementation-and-evidence problem. Build an inventory of ePHI data stores and flows, select standard encryption patterns for each (full-disk, database, object storage, transport), decide how keys are generated and protected, and document exceptions. Then make it auditable: system settings, diagrams, access controls, and logs that prove encryption is active and that decryption is limited to approved roles and workflows.

This page translates the requirement into concrete steps, the artifacts you should retain, and the exam questions that commonly stall teams. It assumes you will coordinate across Security, IT, Engineering, and third parties that touch ePHI. (45 CFR Parts 160, 162, 164)

Regulatory text

Requirement (excerpt): “Implement a mechanism to encrypt and decrypt electronic protected health information.” (45 CFR Parts 160, 162, 164)

What this means for an operator

  • “Mechanism” means a real, implemented technical capability, not a policy statement. Auditors will expect to see enabled encryption settings, key handling, and proof that authorized users/systems can decrypt as needed. (45 CFR Parts 160, 162, 164)
  • “Encrypt and decrypt” is two-sided:
    • Encryption must render ePHI unreadable without the key.
    • Decryption must be possible for legitimate workflows (clinical operations, support, legal holds, data exports) and must be access-controlled and logged. (45 CFR Parts 160, 162, 164)
  • Scope is ePHI across storage, processing, and transmission in systems you operate or outsource. If a third party stores or processes ePHI for you, you still need assurance and evidence that encryption and key controls exist. (45 CFR Parts 160, 162, 164)

Plain-English interpretation of the encryption and decryption requirement

You must (1) encrypt ePHI in the places it could be exposed and (2) control how it gets decrypted so only authorized people and systems can read it. The practical test is simple: if a laptop is stolen, a backup is copied, a cloud bucket is misconfigured, or an admin account is compromised, is ePHI still readable? If the answer is “yes,” you need stronger encryption coverage, stronger key management, or both. (45 CFR Parts 160, 162, 164)

Who it applies to

Entity scope

  • Covered Entities and Business Associates handling ePHI. (45 CFR Parts 160, 162, 164)

Operational scope (where it shows up in real programs)

You should assume this applies anywhere ePHI might exist, including:

  • Endpoints: clinician workstations, call center desktops, laptops used for claims or billing.
  • Servers and VMs: app servers, file servers, terminal servers.
  • Databases: relational databases, data warehouses containing ePHI, analytics platforms with identified patient data.
  • Object/file storage: cloud buckets, network shares, document management systems.
  • Backups and archives: snapshots, offsite backups, tape (if used).
  • Data in motion: APIs, HL7/FHIR interfaces, SFTP transfers, VPN tunnels, email workflows that carry ePHI.
  • Third parties: EHR hosting, claims clearinghouses, billing platforms, managed IT, cloud service providers, support tooling where ePHI may be pasted or attached. (45 CFR Parts 160, 162, 164)

What you actually need to do (step-by-step)

1) Define encryption scope by mapping ePHI locations and flows

Create a simple, defensible inventory:

  • List systems that store ePHI (source of truth + replicas).
  • List systems that process ePHI (apps, integration engines, ETL).
  • List transmission paths (API-to-API, batch transfers, user downloads, partner interfaces).
  • Tag each item with: owner, environment, data type, and whether ePHI is present. (45 CFR Parts 160, 162, 164)

Output: “ePHI Encryption Coverage Map” (table is fine) that becomes your control scope document.

2) Standardize encryption patterns by data state (at rest / in transit / backups)

Create standards that teams can apply consistently:

  • At rest: full-disk encryption for endpoints and servers; storage-layer encryption for volumes and object storage; database encryption where feasible.
  • In transit: enforce encrypted transport for internal and external connections (for example, TLS-based connections for web/API traffic), and disable weak protocols.
  • Backups: ensure backup media and backup repositories are encrypted; treat exported snapshots as ePHI. (45 CFR Parts 160, 162, 164)

Operator tip: Write these as “must/should” statements in a technical standard, then link them to specific platforms (Windows, macOS, Linux, major cloud storage/database services). That makes audits faster because you can point to a standard and the config evidence.

3) Implement key management and decryption controls (where most programs fail)

Encryption without key governance creates audit risk. Put guardrails around:

  • Key ownership: assign a clear service owner for each key domain (cloud KMS, database keys, backup encryption keys).
  • Key access: restrict who can request, rotate, or export keys; limit break-glass access; require approvals for key-retrieval actions.
  • Key storage: keep keys in managed key services or hardware-backed stores where available; avoid embedding keys in code or config files.
  • Decryption pathways: document which systems/users can decrypt and under what circumstances (app runtime, DBA task, support workflow). (45 CFR Parts 160, 162, 164)

Practical control: require a ticket or change record for any event that expands key access or enables a new decryption capability.

4) Control exceptions with a risk-based decision record

You will find systems where encryption is hard (legacy apps, vendor-managed appliances, constrained devices). Treat exceptions as controlled risk:

  • Document why encryption is not implemented (technical limitation, vendor constraint).
  • Define compensating controls (strict access controls, network segmentation, monitoring, reduced data retention, tokenization/redaction where possible).
  • Assign an owner and review cadence.
  • Track a remediation plan (upgrade, migrate, retire). (45 CFR Parts 160, 162, 164)

5) Extend requirements to third parties that handle ePHI

For each third party that stores/processes/transmits ePHI:

  • Confirm contract language covers security safeguards and aligns to your encryption expectations.
  • Collect evidence of encryption for the service components in scope (storage, backups, transmission).
  • Clarify key responsibility: vendor-managed keys vs customer-managed keys, and what logs you can access. (45 CFR Parts 160, 162, 164)

Where Daydream fits: Use Daydream to manage third-party due diligence requests, track encryption evidence (SOC reports, architecture notes, encryption attestations), and keep exception decisions tied to each third party record so renewals do not restart from scratch.

6) Make it auditable: logging, monitoring, and configuration evidence

Auditors typically want proof that encryption is actually enabled and that decryption is controlled:

  • Centralize evidence of encryption settings (screenshots, config exports, policy objects).
  • Keep logs for key events (key access, rotation, failed decrypt attempts where logged, privileged actions tied to key control systems).
  • Ensure access reviews cover roles that can decrypt or manage keys. (45 CFR Parts 160, 162, 164)

Required evidence and artifacts to retain

Maintain an “encryption evidence binder” that includes:

  • Encryption standard (at rest/in transit/backups) approved by security/compliance. (45 CFR Parts 160, 162, 164)
  • ePHI system and data-flow inventory with encryption status fields. (45 CFR Parts 160, 162, 164)
  • Configuration evidence per platform: endpoint encryption policies, server disk encryption settings, database/storage encryption settings, backup encryption settings. (45 CFR Parts 160, 162, 164)
  • Key management documentation: key ownership matrix, access control lists, break-glass procedure, rotation/change records. (45 CFR Parts 160, 162, 164)
  • Access review records for roles with decrypt/key privileges. (45 CFR Parts 160, 162, 164)
  • Exception register with compensating controls and approvals. (45 CFR Parts 160, 162, 164)
  • Third-party encryption evidence and contract/security exhibits relevant to ePHI handling. (45 CFR Parts 160, 162, 164)

Common exam/audit questions and hangups

Expect these questions, and prepare direct evidence:

  1. “Show me where ePHI is stored and whether it is encrypted.” Provide the inventory and a sample of system-level evidence across each major environment. (45 CFR Parts 160, 162, 164)
  2. “Who can decrypt ePHI?” Auditors want role-based answers, not names only. Provide a role-to-system matrix and access review records. (45 CFR Parts 160, 162, 164)
  3. “How are keys protected and who administers them?” Provide KMS/HSM documentation, admin group membership, and break-glass controls. (45 CFR Parts 160, 162, 164)
  4. “What about backups, exports, and downloaded files?” Have a clear story: encrypted backups, controlled exports, endpoint encryption, DLP where used. (45 CFR Parts 160, 162, 164)
  5. “Do third parties encrypt ePHI, and can they prove it?” Provide due diligence artifacts and any shared responsibility details. (45 CFR Parts 160, 162, 164)

Frequent implementation mistakes and how to avoid them

  • Mistake: treating “encryption enabled” as the end state.
    Fix: document decryption paths and key admin privileges; enforce access reviews and change control for key permissions. (45 CFR Parts 160, 162, 164)

  • Mistake: encrypting databases but leaving backups or exports unencrypted.
    Fix: include backups, snapshots, and exports in the ePHI inventory and validate encryption settings on those repositories. (45 CFR Parts 160, 162, 164)

  • Mistake: keys stored in application code, CI variables, or shared folders.
    Fix: require keys in managed key services; treat any key material exposure as an incident risk and a control failure. (45 CFR Parts 160, 162, 164)

  • Mistake: incomplete third-party scoping.
    Fix: build a third-party list by scanning integration points (SFTP, APIs, support tools, ticket attachments) and require encryption evidence during onboarding and renewal. (45 CFR Parts 160, 162, 164)

  • Mistake: no exception discipline for legacy systems.
    Fix: create an exception register with owner, compensating controls, and a retirement plan. Auditors accept constraints more readily when governance is tight. (45 CFR Parts 160, 162, 164)

Execution plan (30/60/90)

First 30 days: establish scope and minimum defensibility

  • Build the ePHI inventory and data-flow map with encryption status.
  • Publish the encryption standard (at rest/in transit/backups) and define evidence requirements per platform.
  • Identify top gaps: unencrypted endpoints, shared drives, cloud storage buckets, backup repositories, and unmanaged third-party transfers.
  • Stand up an exception register and require documented approvals for any known gaps. (45 CFR Parts 160, 162, 164)

Days 31–60: implement controls where risk concentrates

  • Roll out endpoint and server encryption configurations through centralized management.
  • Enable encryption in major storage and database platforms; document the exact settings and who administers them.
  • Implement or tighten key management access controls and break-glass procedures.
  • Start third-party evidence collection for any third party with ePHI access; record findings and remediation asks in Daydream. (45 CFR Parts 160, 162, 164)

Days 61–90: audit readiness and operational hardening

  • Run an internal “encryption audit”: sample systems from each category and verify evidence is current and reproducible.
  • Formalize access reviews for decrypt/key admin roles; document approvals and removals.
  • Test restores and decryption workflows for critical systems (prove you can decrypt when needed, without broad access).
  • Close or formally accept remaining exceptions with compensating controls and a migration/retirement plan. (45 CFR Parts 160, 162, 164)

Frequently Asked Questions

Does HIPAA require encryption everywhere ePHI exists?

The requirement is to implement a mechanism to encrypt and decrypt ePHI, which drives you toward encryption coverage across systems that store or transmit ePHI. Your defensibility depends on scoping, implementing encryption where feasible, and documenting controlled exceptions. (45 CFR Parts 160, 162, 164)

What’s the fastest way to prove compliance in an audit?

Produce (1) an ePHI inventory with encryption status, (2) screenshots or config exports showing encryption enabled on representative systems, and (3) key management/access review records showing decryption is restricted. (45 CFR Parts 160, 162, 164)

How should we handle third parties that claim they encrypt but won’t share details?

Ask for the specific evidence they can provide (security documentation, attestations, or independent reports) and document the shared responsibility model and any limitations as a risk decision. Track follow-ups and renewal conditions in your third-party due diligence workflow. (45 CFR Parts 160, 162, 164)

Is encrypting data in transit enough if data at rest is unencrypted?

No. Encrypting in transit reduces interception risk, but unencrypted storage still exposes ePHI if the system, media, or credentials are compromised. Your program needs coverage across both states, based on where ePHI resides. (45 CFR Parts 160, 162, 164)

Who should have access to decrypt ePHI?

Limit decryption to system accounts and roles that require it for defined workflows, and restrict key administration to a small set of trained administrators with change control and logging. Document roles and conduct periodic access reviews. (45 CFR Parts 160, 162, 164)

What artifact do teams most often forget?

The exception register. If any system handling ePHI is not encrypted (or encryption is partially implemented), keep a dated approval, compensating controls, and a remediation plan tied to a named owner. (45 CFR Parts 160, 162, 164)

Frequently Asked Questions

Does HIPAA require encryption everywhere ePHI exists?

The requirement is to implement a mechanism to encrypt and decrypt ePHI, which drives you toward encryption coverage across systems that store or transmit ePHI. Your defensibility depends on scoping, implementing encryption where feasible, and documenting controlled exceptions. (45 CFR Parts 160, 162, 164)

What’s the fastest way to prove compliance in an audit?

Produce (1) an ePHI inventory with encryption status, (2) screenshots or config exports showing encryption enabled on representative systems, and (3) key management/access review records showing decryption is restricted. (45 CFR Parts 160, 162, 164)

How should we handle third parties that claim they encrypt but won’t share details?

Ask for the specific evidence they can provide (security documentation, attestations, or independent reports) and document the shared responsibility model and any limitations as a risk decision. Track follow-ups and renewal conditions in your third-party due diligence workflow. (45 CFR Parts 160, 162, 164)

Is encrypting data in transit enough if data at rest is unencrypted?

No. Encrypting in transit reduces interception risk, but unencrypted storage still exposes ePHI if the system, media, or credentials are compromised. Your program needs coverage across both states, based on where ePHI resides. (45 CFR Parts 160, 162, 164)

Who should have access to decrypt ePHI?

Limit decryption to system accounts and roles that require it for defined workflows, and restrict key administration to a small set of trained administrators with change control and logging. Document roles and conduct periodic access reviews. (45 CFR Parts 160, 162, 164)

What artifact do teams most often forget?

The exception register. If any system handling ePHI is not encrypted (or encryption is partially implemented), keep a dated approval, compensating controls, and a remediation plan tied to a named owner. (45 CFR Parts 160, 162, 164)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
HIPAA Encryption and Decryption: Implementation Guide | Daydream