HIPAA Compliance: The Complete Operational Guide

๐Ÿ” Tip: Use mouse wheel or pinch to zoom. Drag to explore detailed HIPAA controls.

Start: HIPAA Compliance

Is PHI handled?

HIPAA Not Applicable

Identify PHI Locations

EHR Systems

Databases

Email & Collaboration

Backups & Archives

Administrative Safeguards

Risk Assessment

Policies & Procedures

Workforce Training

Vendor / BAA Management

Vendor Risk Assessment

BAA Review & Renewal

Vendor Offboarding & PHI Destruction

Technical Safeguards

Identity & Access Management

Audit Controls

Transmission Security

Data Protection

MFA

Role-Based Access

Access Reviews

Minimum Necessary Enforcement

Emergency / Break-Glass Access Logging

Centralized Logging

SIEM Integration

Log Retention (6 Years)

Legal Hold & Evidence Preservation

TLS Encryption

VPN / ZTNA

Encryption at Rest

DLP Policies

Data Integrity Monitoring

Immutable Backups

Disaster Recovery & RTO/RPO

Physical Safeguards

Facility Access Control

Device & Media Control

Secure Disposal

Incident Response

Incident Detection

Breach Risk Assessment

Harm Probability Analysis

Breach Notification Decision

OCR / Patient / Media Notification

Forensics & Evidence Retention

Continuous Compliance

Trigger-Based Risk Assessments

Policy Reviews

Security Monitoring

Audit Readiness

Compliance Evidence Repository

HIPAA Rule Mapping (Security / Privacy / Breach)

Patient Access Requests

PHI Amendment Tracking

Disclosure Accounting

HIPAA Compliant โœ”

No

Yes

From Scope Determination to OCR Enforcement Defense

HIPAA compliance is not a security project.
It is an operating model for handling health data under regulatory scrutiny.

This page documents every required step, decision, artifact, control, and evidence trail needed to implement, operate, and defend HIPAA compliance in real environments.

This guide is written for:

  • CISOs and Heads of Security

  • Compliance & GRC leaders

  • Internal and external auditors

  • Healthcare SaaS and digital health founders

  • Organizations subject to OCR investigations

It reflects:

  • HIPAA Security Rule (45 CFR ยง164.308, ยง164.310, ยง164.312)

  • HIPAA Privacy Rule (45 CFR ยง164.500โ€“534)

  • HIPAA Breach Notification Rule (45 CFR ยง164.400โ€“414)

  • OCR audit protocols and enforcement history


PART 1 โ€” SCOPE & APPLICABILITY (WHERE HIPAA REALLY BEGINS)

1. Covered Entity vs Business Associate Determination

Before controls, before tools, before audits โ€” you must legally classify the organization.

You are a Covered Entity if you are:

  • A healthcare provider transmitting health information electronically

  • A health plan

  • A healthcare clearinghouse

You are a Business Associate if you:

  • Create, receive, maintain, or transmit PHI on behalf of a covered entity

๐Ÿ“Œ Evidence Required

  • Written scope determination

  • Legal classification memo

  • List of covered services and exclusions

โŒ Common Failure

  • SaaS companies assuming they are โ€œjust vendorsโ€

  • MSPs assuming HIPAA doesnโ€™t apply because they โ€œdonโ€™t look at dataโ€


2. Definition of PHI and ePHI (NO ASSUMPTIONS ALLOWED)

HIPAA protects PHI, not just medical records.

PHI includes:

  • Identifiers (name, email, phone, IP, device ID)

  • Health information

  • Any linkage between identity and health context

ePHI exists if PHI is:

  • Stored electronically

  • Transmitted electronically

  • Processed electronically

๐Ÿ“Œ Evidence Required

  • Formal PHI definition adopted internally

  • PHI inclusion/exclusion criteria

  • Training material showing workforce understanding

โŒ Common Failure

  • Excluding metadata, logs, analytics, or support data


PART 2 โ€” DATA DISCOVERY & PHI INVENTORY (THE MOST FAILED STEP)

3. PHI Data Mapping (SYSTEMS, FLOWS, STATES)

HIPAA compliance fails instantly without documented PHI mapping.

You must identify:

  • Where PHI is created

  • Where it is processed

  • Where it is stored

  • Where it is transmitted

  • Where it is backed up

  • Where it is archived

  • Where it is destroyed

Mandatory PHI Locations to Assess

  • Production applications

  • Test / staging environments

  • Databases

  • Object storage

  • Email systems

  • Collaboration tools

  • Logging & monitoring systems

  • Backups (online + offline)

  • Disaster recovery environments

  • End-user devices

  • Third-party SaaS

๐Ÿ“Œ Evidence Required

  • PHI inventory register

  • Data flow diagrams

  • System ownership mapping

โŒ Common Failure

  • Mapping only โ€œprimary databasesโ€

  • Ignoring non-production and backups


PART 3 โ€” ADMINISTRATIVE SAFEGUARDS (GOVERNANCE & ACCOUNTABILITY)

4. Security Management Process (45 CFR ยง164.308(a)(1))

4.1 Risk Analysis (NOT A TEMPLATE EXERCISE)

HIPAA requires a formal, documented, and repeatable risk analysis.

It must include:

  • Asset identification

  • Threat enumeration

  • Vulnerability analysis

  • Likelihood determination

  • Impact determination

  • Risk scoring

  • Risk treatment decisions

๐Ÿ“Œ Evidence Required

  • Risk assessment report

  • Methodology description

  • Management sign-off

  • Risk register with owners and timelines

โŒ Common Failure

  • One-time assessments

  • No reassessment after changes or incidents


4.2 Risk Management

Risk analysis without management is non-compliance.

You must:

  • Mitigate, accept, transfer, or avoid each risk

  • Track remediation

  • Re-evaluate residual risk

๐Ÿ“Œ Evidence Required

  • Risk treatment plans

  • Mitigation tracking

  • Acceptance approvals


5. Assigned Security Responsibility

HIPAA requires named accountability.

๐Ÿ“Œ Evidence Required

  • Designated HIPAA Security Officer

  • Defined responsibilities

  • Authority to enforce controls

โŒ Common Failure

  • โ€œShared responsibilityโ€ with no owner


6. Workforce Security & Training

Every workforce member must:

  • Understand PHI

  • Understand acceptable use

  • Know how to report incidents

๐Ÿ“Œ Evidence Required

  • Training records

  • Attendance logs

  • Role-based training content

  • Disciplinary procedures

โŒ Common Failure

  • Generic annual training only

  • No training evidence


7. Vendor & Business Associate Lifecycle (END-TO-END)

HIPAA extends through vendors.

Required lifecycle:

  1. Vendor identification

  2. Vendor risk assessment

  3. BAA execution

  4. Ongoing monitoring

  5. Annual BAA review

  6. Termination handling

  7. PHI return or destruction

๐Ÿ“Œ Evidence Required

  • Signed BAAs

  • Vendor risk reports

  • Offboarding attestations

โŒ Common Failure

  • Missing BAAs

  • No offboarding controls


PART 4 โ€” TECHNICAL SAFEGUARDS (CONTROL ENFORCEMENT)

8. Access Control (45 CFR ยง164.312(a))

Mandatory Components

  • Unique user identification

  • MFA

  • Role-based access

  • Minimum Necessary enforcement

  • Emergency access procedures

๐Ÿ“Œ Evidence Required

  • Access matrices

  • Review logs

  • Emergency access audit logs

โŒ Common Failure

  • Over-privileged users

  • Shared credentials


9. Audit Controls (45 CFR ยง164.312(b))

You must be able to reconstruct events.

Required:

  • Centralized logging

  • User attribution

  • Time synchronization

  • Log retention (minimum 6 years)

  • Legal hold capability

๐Ÿ“Œ Evidence Required

  • Log samples

  • Retention policy

  • SIEM dashboards

โŒ Common Failure

  • Logs overwritten

  • Logs without identity context


10. Integrity Controls (45 CFR ยง164.312(c))

HIPAA requires protection against:

  • Unauthorized alteration

  • Data corruption

  • Silent manipulation

๐Ÿ“Œ Evidence Required

  • Integrity monitoring

  • Change tracking

  • Alerting evidence


11. Transmission Security (45 CFR ยง164.312(e))

PHI must be protected in transit.

Required:

  • Strong encryption

  • Secure channels

  • Protection against downgrade attacks

๐Ÿ“Œ Evidence Required

  • Encryption configurations

  • Network diagrams


12. Availability & Resilience (OFTEN FAILED)

HIPAA requires PHI availability.

Required:

  • Backups

  • Immutable backups

  • Disaster recovery plans

  • Defined RTO / RPO

  • Regular DR testing

๐Ÿ“Œ Evidence Required

  • Backup reports

  • DR test results

โŒ Common Failure

  • Untested backups

  • No ransomware resilience


PART 5 โ€” PHYSICAL SAFEGUARDS

13. Facility & Device Controls

Required:

  • Facility access restrictions

  • Device inventory

  • Secure disposal

  • Media sanitization

๐Ÿ“Œ Evidence Required

  • Asset registers

  • Disposal certificates


PART 6 โ€” INCIDENT RESPONSE & BREACH MANAGEMENT

14. Incident Handling (MANDATORY PROCESS)

Every incident must go through:

  1. Detection

  2. Triage

  3. Containment

  4. Investigation

  5. Documentation


15. Breach Risk Assessment (NOT OPTIONAL)

HIPAA requires evaluating:

  • Nature of PHI

  • Unauthorized person

  • Whether PHI was viewed

  • Mitigation actions

๐Ÿ“Œ Evidence Required

  • Risk assessment worksheet

  • Decision rationale


16. Breach Notification Rule

Notification timelines:

  • Individuals: without unreasonable delay

  • OCR: within 60 days

  • Media: if >500 individuals affected

๐Ÿ“Œ Evidence Required

  • Notification letters

  • Submission confirmations

โŒ Common Failure

  • Missing deadlines

  • Incomplete notifications


PART 7 โ€” PRIVACY RULE & PATIENT RIGHTS

17. Patient Rights Management

Patients have rights to:

  • Access

  • Amend

  • Receive accounting of disclosures

๐Ÿ“Œ Evidence Required

  • Request logs

  • Response timelines

  • Decision documentation


PART 8 โ€” CONTINUOUS COMPLIANCE & DEFENSIBILITY

18. Evidence Management (THE DIFFERENCE MAKER)

If you cannot produce evidence, you are not compliant.

Required:

  • Central evidence repository

  • Control-to-rule mapping

  • Audit trail preservation


19. Continuous Monitoring & Reassessment

HIPAA requires reassessment after:

  • System changes

  • Vendor changes

  • Incidents

  • New threats

๐Ÿ“Œ Evidence Required

  • Trigger-based reassessment records


WHERE HIPAA COMPLIANCE ACTUALLY ENDS

HIPAA compliance ends only when:

  • You can withstand an OCR investigation

  • You can explain every decision

  • You can produce evidence on demand

  • You can show consistency over time


Why This Page Exists

Most HIPAA guidance is:

  • Superficial

  • Tool-centric

  • Non-defensible

This framework is:

  • Operational

  • Evidence-driven

  • Enforcement-aligned

  • Built from real investigations


Final Note for CISOs & Auditors

If your current HIPAA posture cannot be explained step-by-step, system-by-system, and decision-by-decision, it will not survive scrutiny.