HIPAA Security Rule Compliance Checklist

A HIPAA Security Rule Compliance Checklist verifies that third-party vendors handling ePHI meet all administrative, physical, and technical safeguards required by 45 CFR §164.308-316. The checklist maps 54 implementation specifications across 18 standards to vendor controls, enabling systematic evidence collection and gap identification.

Key takeaways:

  • Covers all three safeguard categories: Administrative (§164.308), Physical (§164.310), and Technical (§164.312)
  • Differentiates between required and addressable specifications for risk-based implementation
  • Maps directly to SOC 2, ISO 27001, and NIST 800-66 controls for multi-framework assessments
  • Requires documented evidence for each control, not just attestations
  • Must be updated annually and after significant vendor changes

Get this template

All HIPAA safeguards with administrative safeguards review, physical safeguards verification, technical safeguards assessment

Your healthcare vendor just failed their SOC 2 audit. Three months later, OCR announces a $2.3M settlement for a business associate breach. The connection? Both organizations treated HIPAA compliance as a checkbox exercise rather than a control validation process.

The HIPAA Security Rule demands more than vendor promises. Each business associate requires documented proof of 54 specific security measures. Manual assessments using generic questionnaires miss critical controls, create evidence gaps, and multiply your compliance exposure with every new vendor relationship.

This checklist transforms the Security Rule's regulatory language into actionable assessment criteria. Each control includes the specific evidence types, testing procedures, and documentation standards that satisfy both OCR auditors and your risk committee. Financial services organizations use it to assess fintech partners handling health savings account data. Technology companies apply it to evaluate SaaS vendors processing employee wellness information. Healthcare providers map it against existing ISO 27001 certifications to eliminate redundant assessments.

Administrative Safeguards Assessment (45 CFR §164.308)

Administrative safeguards consume 60% of your assessment effort but prevent 80% of violations. Nine standards require 31 distinct implementation specifications, each demanding different evidence types.

Security Officer Designation (§164.308(a)(2))

Request organizational charts showing security leadership reporting structure. Verify the designated security officer has authority to implement changes, not just advisory capacity. Review three recent security decisions with documented officer involvement. Red flag: Security responsibilities distributed across multiple roles without clear accountability.

Workforce Training and Management (§164.308(a)(5))

Evidence requirements:

  • Training completion records for most ePHI-accessing personnel
  • Sanction policies with enforcement examples from past 12 months
  • Access termination procedures tested through employee departure logs
  • Background check policies meeting state-specific requirements

Most vendors provide training certificates. Demand training content summaries and quiz pass rates. Generic "security awareness" training fails HIPAA specificity requirements.

Access Management (§164.308(a)(4))

Map vendor access controls to your data classification:

Access Level Required Evidence Verification Method
System Admin Privileged access logs Quarterly access review
Data Analyst Role-based permissions Job description mapping
Support Staff Time-limited access Ticket-based approvals
Third-party Subcontractor BAAs Annual certification

Business Associate Agreements (§164.308(b)(1))

Standard BAA templates miss downstream vendor management. Require:

  • Subcontractor flow-down provisions with enforcement mechanisms
  • Breach notification procedures with 24-hour initial reporting
  • Data retention and destruction specifications by data type
  • Annual compliance attestation with evidence submission

Physical Safeguards Validation (45 CFR §164.310)

Physical security extends beyond data center tours. Four standards encompass eight implementation specifications requiring site-specific evidence.

Facility Access Controls (§164.310(a)(1))

SOC 2 Type II reports cover basic physical security. Supplement with:

  • Facility diagrams showing ePHI processing locations
  • Visitor log samples demonstrating escort procedures
  • Environmental control testing records (temperature, humidity, flood sensors)
  • Physical intrusion detection system configurations

Workstation and Device Controls (§164.310(b)&(c))

Remote work proliferated device sprawl. Validate:

  • Asset inventory reconciliation procedures
  • Mobile device management (MDM) enrollment rates
  • Encryption status verification for laptops, phones, removable media
  • Disposal certificates from certified electronics recyclers

Technical Safeguards Requirements (45 CFR §164.312)

Technical controls generate measurable evidence. Five standards require nine implementation specifications with specific testing criteria.

Access Control Technical Implementation (§164.312(a)(1))

Beyond password policies, assess:

Unique User Identification: Service accounts often share credentials. Require individual authentication for all ePHI access, including API keys and batch processes.

Automatic Logoff: Verify timeout settings by access type:

  • Clinical workstations: 10-15 minutes
  • Administrative systems: 20-30 minutes
  • Mobile devices: 5 minutes or biometric re-authentication

Encryption and Decryption: "AES-256" means nothing without key management. Validate:

  • Encryption at rest for databases, file systems, backups
  • TLS 1.2+ for all transmission with certificate pinning
  • Key rotation schedules with automated implementation
  • Recovery key escrow procedures preventing single points of failure

Audit Controls (§164.312(b))

Log collection differs from log analysis. Require evidence of:

  • Centralized logging with 12-month retention minimum
  • Automated alerting for defined suspicious activities
  • Monthly log review reports with investigated anomalies
  • Integrity controls preventing log tampering

Transmission Security (§164.312(e)(1))

Email remains the primary breach vector. Beyond encryption, verify:

  • Data loss prevention (DLP) rules for ePHI patterns
  • Secure file transfer alternatives to email attachments
  • Network segmentation isolating ePHI transmission paths
  • VPN configuration for remote access with split-tunneling disabled

Multi-Framework Alignment

HIPAA Security Rule controls map to established frameworks, reducing assessment redundancy:

SOC 2 Mapping

Trust Service Criteria coverage:

  • CC6.1-CC6.8 (Logical and Physical Access) → HIPAA Access Controls
  • CC7.1-CC7.5 (System Operations) → HIPAA Audit Controls
  • A1.1-A1.3 (Availability) → HIPAA Contingency Planning
  • C1.1-C1.2 (Confidentiality) → HIPAA Transmission Security

ISO 27001:2022 Alignment

Annex A control mapping:

  • A.5.1-5.37 (Organizational) → Administrative Safeguards
  • A.7.1-7.14 (Physical) → Physical Safeguards
  • A.8.1-8.34 (Technological) → Technical Safeguards

Request ISO certification details specifying ePHI within scope boundaries. Generic ISO 27001 certificates without healthcare-specific scope statements provide limited assurance.

NIST 800-66 Implementation

NIST provides the authoritative HIPAA implementation guide. Critical control families:

  • AC (Access Control): 22 controls mapping to HIPAA access management
  • AU (Audit and Accountability): 12 controls for logging requirements
  • IA (Identification and Authentication): 11 controls for user verification
  • SC (System and Communications): 40 controls for transmission security

Implementation Timeline

Rushed implementations guarantee gaps. Standard timeline for comprehensive vendor assessment:

Weeks 1-2: Evidence request package delivery and vendor education Weeks 3-4: Initial evidence collection and clarification questions Weeks 5-6: Evidence validation and testing procedures Week 7: Gap analysis and remediation planning Week 8: Final assessment report and risk acceptance decisions

Accelerated timelines skip evidence validation, accepting vendor attestations without verification.

Common Implementation Failures

Over-Reliance on Questionnaires

DDQs capture policies, not implementation. A "Yes" to encryption means nothing without:

  • Encryption algorithm specifications
  • Key length validation
  • Certificate management procedures
  • Incident response testing results

Accepting Outdated Evidence

SOC 2 reports expire after 12 months. Penetration tests lose relevance after significant changes. Require:

  • Evidence dated within 6 months for technical controls
  • Annual updates for administrative procedures
  • Quarterly validation for access management controls

Ignoring Addressable Specifications

"Addressable" doesn't mean optional. Document why alternative controls provide equivalent protection. Common mistakes:

  • Skipping encryption due to "network security"
  • Avoiding access reviews for "trusted vendors"
  • Delaying patch management as "addressable"

Incomplete Business Associate Chains

Your vendor's subcontractors create hidden exposure. Require:

  • Complete downstream vendor inventory
  • BAA flow-down confirmation
  • Fourth-party risk assessment results
  • Concentration risk analysis for critical subcontractors

Frequently Asked Questions

How do addressable specifications differ from required specifications in vendor assessments?

Required specifications demand implementation without exception. Addressable specifications require implementation OR documented rationale why alternative controls provide equivalent protection, including specific compensating measures.

Can SOC 2 Type II certification replace HIPAA Security Rule assessment?

No. SOC 2 evaluates controls design and operating effectiveness but doesn't verify HIPAA-specific requirements. Use SOC 2 reports to accelerate assessment by pre-validating overlapping controls, then supplement with HIPAA-specific evidence.

What evidence proves encryption compliance beyond vendor attestation?

Require encryption certificates showing algorithm type and key length, key management procedures, sample encrypted data headers, penetration test results confirming encryption implementation, and data flow diagrams marking encryption points.

How often should we reassess vendor HIPAA compliance?

Annual full assessments for critical vendors handling large ePHI volumes. Quarterly control validation for high-risk areas like access management. Triggered reassessments after breaches, audit findings, or significant infrastructure changes.

Which vendor types require full HIPAA Security Rule assessment?

Any vendor accessing, storing, processing, or transmitting ePHI requires assessment. This includes cloud providers, SaaS applications, managed service providers, billing companies, transcription services, and even law firms handling ePHI during litigation.

How do we assess vendors refusing to provide detailed evidence?

Document evidence requests and refusals. Implement compensating controls like data masking, restricted access, or enhanced monitoring. Consider contract amendments requiring specific evidence types. Ultimate option: vendor replacement for critical functions.

What constitutes sufficient evidence for workforce training compliance?

Training rosters showing the majority of completion, curriculum outlines covering HIPAA-specific content, assessment scores demonstrating comprehension, annual refresher schedules, and examples of sanctions applied for training non-compliance.

Frequently Asked Questions

How do addressable specifications differ from required specifications in vendor assessments?

Required specifications demand implementation without exception. Addressable specifications require implementation OR documented rationale why alternative controls provide equivalent protection, including specific compensating measures.

Can SOC 2 Type II certification replace HIPAA Security Rule assessment?

No. SOC 2 evaluates controls design and operating effectiveness but doesn't verify HIPAA-specific requirements. Use SOC 2 reports to accelerate assessment by pre-validating overlapping controls, then supplement with HIPAA-specific evidence.

What evidence proves encryption compliance beyond vendor attestation?

Require encryption certificates showing algorithm type and key length, key management procedures, sample encrypted data headers, penetration test results confirming encryption implementation, and data flow diagrams marking encryption points.

How often should we reassess vendor HIPAA compliance?

Annual full assessments for critical vendors handling large ePHI volumes. Quarterly control validation for high-risk areas like access management. Triggered reassessments after breaches, audit findings, or significant infrastructure changes.

Which vendor types require full HIPAA Security Rule assessment?

Any vendor accessing, storing, processing, or transmitting ePHI requires assessment. This includes cloud providers, SaaS applications, managed service providers, billing companies, transcription services, and even law firms handling ePHI during litigation.

How do we assess vendors refusing to provide detailed evidence?

Document evidence requests and refusals. Implement compensating controls like data masking, restricted access, or enhanced monitoring. Consider contract amendments requiring specific evidence types. Ultimate option: vendor replacement for critical functions.

What constitutes sufficient evidence for workforce training compliance?

Training rosters showing 100% completion, curriculum outlines covering HIPAA-specific content, assessment scores demonstrating comprehension, annual refresher schedules, and examples of sanctions applied for training non-compliance.

Automate your third-party assessments

Daydream turns these manual spreadsheets into automated, trackable workflows — with AI-prefilled questionnaires, real-time risk scoring, and continuous monitoring.

Try Daydream