
What Is a HIPAA Security Risk Assessment?
A HIPAA security risk assessment — formally called a risk analysis under the HIPAA Security Rule — is a mandated evaluation of every threat and vulnerability that could affect the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI) your organization creates, receives, maintains, or transmits. This is not a one-time checkbox exercise.
The HIPAA Security Rule, codified at 45 CFR Part 164, requires covered entities and business associates to conduct an accurate and thorough assessment as the foundation for every other security safeguard they put in place. The Office for Civil Rights (OCR) at the Department of Health and Human Services (HHS) has made risk analysis the centerpiece of its enforcement program. In virtually every settlement and civil monetary penalty OCR has issued, failure to conduct a thorough risk assessment is cited as a primary — and often the primary — violation.
Unlike a general IT audit or a penetration test, the HIPAA security risk assessment is a structured process that maps threats and vulnerabilities to specific ePHI assets and quantifies the probability and potential impact of harm. The result drives your entire HIPAA risk management program: what to fix, in what order, and to what standard. Organizations that skip this step do not just face regulatory exposure — they leave their patients, their reputations, and their operations exposed to preventable breaches.
Understanding what the assessment requires, how to execute one correctly, and how to document your results is essential for any healthcare organization handling patient data in 2026. For a broader look at how managed security services fit into your organization's risk posture, see our HIPAA cybersecurity requirements guide.
HIPAA Breach and Enforcement By The Numbers
IBM Cost of a Data Breach Report 2024 — highest of any industry
Risk analysis failures cited in the majority of resolved enforcement actions
Year-over-year growth in exploitation as initial access vector (Verizon DBIR 2024)
Who Must Conduct a HIPAA Security Risk Assessment?
The HIPAA Security Rule at 45 CFR §164.308(a)(1)(ii)(A) requires every covered entity and business associate to conduct a risk analysis. This applies to a wide range of organizations — not just large hospital systems.
Covered Entities
- Physician practices, dental offices, and specialty clinics of any size
- Hospitals, health systems, and ambulatory surgery centers
- Pharmacies and pharmacy benefit managers
- Health insurance plans and managed care organizations
- Nursing facilities, home health agencies, and behavioral health providers
Business Associates
Business associates — vendors, contractors, and service providers who handle ePHI on behalf of covered entities — became directly liable under the HIPAA Security Rule following the 2013 Omnibus Rule. This includes:
- Electronic Health Record (EHR) vendors and cloud hosting providers
- Medical billing and revenue cycle management companies
- IT service providers with access to systems containing ePHI
- Legal firms and accountants who access patient records in the course of their engagement
If your organization falls into either category, the risk assessment is not a matter of discretion. OCR has resolved enforcement actions against solo physician practices, small dental offices, and independent business associates — organizational size does not reduce your compliance obligations or shield you from penalties. For dental practices specifically, our HIPAA for dental offices guide covers the unique compliance considerations that affect smaller clinical environments.
Ongoing OCR Audit Activity in 2026
HHS OCR has continued its phase-based audit program targeting both covered entities and business associates. Organizations that have undergone a merger, adopted new remote work policies, deployed a new EHR system, or experienced a security incident since their last assessment should treat those events as triggers for an immediate reassessment — not just their next scheduled annual review. Waiting until OCR contacts you is not a compliance strategy.
How to Conduct a HIPAA Security Risk Assessment: 7 Steps
OCR's own risk analysis guidance and the NIST SP 800-30 Rev. 1 Guide for Conducting Risk Assessments align on a structured methodology. The following seven-step process reflects that alignment and produces documentation that holds up under OCR scrutiny.
HIPAA Security Risk Assessment: 7-Step Process
Define the Scope
Identify every system, application, device, and location where ePHI is created, received, maintained, or transmitted. This includes EHR systems, billing platforms, email, portable devices, cloud storage, and any third-party integrations. Scope gaps are the most common cause of incomplete assessments.
Collect Data
Gather documentation on existing security policies, network diagrams, system inventories, prior audit logs, Business Associate Agreements (BAAs), and any previous risk assessments. Conduct staff interviews to capture informal processes that may not appear in written documentation.
Identify Threats and Vulnerabilities
Enumerate the specific threat sources — malicious actors, natural disasters, human error, system failures — and the vulnerabilities each could exploit. Reference the MITRE ATT&CK framework for healthcare-specific threat actor techniques, particularly those targeting EHR systems and medical devices.
Assess Current Security Controls
Evaluate the administrative, physical, and technical safeguards currently in place. Determine whether each control is implemented, partially implemented, or absent, and measure its effectiveness against the threats and vulnerabilities identified in Step 3.
Determine Likelihood and Impact
Assign a likelihood rating (high, medium, low) and impact rating to each threat-vulnerability pair based on the adequacy of current controls. Use a consistent, documented methodology — qualitative or quantitative — so that ratings are defensible during an OCR audit.
Prioritize Risks
Combine likelihood and impact ratings to produce an overall risk level for each finding. Compile findings into a formal risk register that sequences remediation by risk level, assigns ownership, and sets target completion dates.
Document Everything
Produce a written risk analysis report that includes your scope statement, methodology, data sources, findings, control assessments, risk ratings, and a corresponding risk management plan. Obtain sign-off from organizational leadership and retain all documentation for a minimum of six years per 45 CFR §164.316(b)(2).
Common Vulnerabilities Uncovered During HIPAA Risk Assessments
Across healthcare security engagements, the same categories of vulnerabilities appear in nearly every organization that has not conducted a formal HIPAA security risk assessment. Knowing what to look for helps you prioritize efficiently and allocate remediation resources where they will have the greatest impact.
Unencrypted Devices and Portable Media
Laptops, smartphones, USB drives, and external hard drives containing ePHI that lack full-disk encryption are among the most frequently cited HIPAA violations. OCR has levied fines from $50,000 to over $3 million for single incidents involving unencrypted devices. The HIPAA Security Rule's addressable specification at §164.312(a)(2)(iv) requires covered entities to implement encryption where reasonable and appropriate — and OCR consistently finds it is, for virtually all modern devices.
Inadequate Access Controls
Role-based access is required under §164.312(a)(1), yet many practices still grant all staff members broad access to their EHR or billing system. Each user account should have access only to the ePHI necessary for that individual's job function. Privileged accounts — those with administrative rights — need additional controls, including multi-factor authentication (MFA) and regular access reviews. Shared login credentials, a common workaround in understaffed practices, make individual accountability impossible and render audit logs meaningless.
Missing or Incomplete Audit Logs
The audit control standard at §164.312(b) requires hardware, software, and procedural mechanisms to record and examine activity in systems containing ePHI. Practices running EHR systems with audit logging disabled — or logging enabled but never reviewed — face significant enforcement exposure. Effective audit log programs require both the technical capability to capture activity and the administrative process to review logs on a defined schedule.
Outdated Software and Unpatched Systems
End-of-life operating systems and unpatched applications are the entry point for the majority of ransomware attacks targeting healthcare. The Verizon 2024 Data Breach Investigations Report found that exploitation of vulnerabilities as an initial access vector grew 180% year-over-year. A disciplined patch management program directly reduces your HIPAA risk profile and your exposure to the ransomware groups that specifically target healthcare organizations. See our healthcare data breach prevention guide for a practical patching and vulnerability management framework.
Insufficient Workforce Training
Phishing remains the most common initial access method used against healthcare organizations. Security awareness training is an addressable implementation specification under §164.308(a)(5), but satisfying that specification requires more than an annual email reminder. Effective programs use simulated phishing exercises, role-based training modules, and documented completion records. Our overview of security awareness training covers what a defensible training program looks like for clinical and administrative staff.
Misconfigured Cloud Storage and Third-Party Integrations
The shift to cloud-based EHR systems and telehealth platforms has introduced a new category of ePHI exposure: misconfigured storage buckets, overly permissive API access, and Business Associate Agreements (BAAs) that do not adequately address the vendor's security obligations. Every cloud service that touches ePHI must be evaluated during the risk assessment — not assumed to be compliant because the vendor markets a HIPAA-friendly product.
HIPAA Security Risk Assessment: Key Components
- Written scope statement identifying all systems, locations, and data flows involving ePHI
- Complete ePHI asset inventory including cloud services, mobile devices, and third-party integrations
- Documented threat and vulnerability identification methodology
- Assessment of all current administrative, physical, and technical safeguards
- Likelihood and impact ratings for each identified risk, with documented basis
- Formal risk register with prioritized findings and assigned ownership
- Corresponding risk management plan with target remediation timelines
- Leadership sign-off and documentation retained for at least six years
- Defined triggers for interim reassessment (new systems, incidents, mergers)
- Business Associate Agreement (BAA) review included in scope
Risk Management: Turning Assessment Findings Into Action
The HIPAA Security Rule distinguishes between the risk analysis (§164.308(a)(1)(ii)(A)) and risk management (§164.308(a)(1)(ii)(B)). Too many organizations stop at the analysis — producing a risk document but failing to implement a plan that actually reduces identified risks. OCR enforcement actions frequently cite both failures together, and the absence of a risk management plan is treated as evidence that the risk analysis itself was not taken seriously.
Effective risk management begins with prioritization. Not every finding in your risk register warrants the same urgency or investment. A structured approach sequences remediation by risk level:
- High-risk findings: Address immediately. These represent threats with high likelihood and high impact — active ransomware entry points, unencrypted ePHI at rest, or missing access controls on systems with broad patient data exposure. Timelines should be measured in days to weeks, not quarters.
- Medium-risk findings: Address within 30 to 90 days with a documented plan and assigned owners. Common examples include software patch backlogs, incomplete audit log configurations, and gaps in workforce training completion.
- Low-risk findings: Address within your normal security program cycle, typically 90 to 180 days. These still require documentation demonstrating active management.
For risks your organization chooses not to fully remediate — due to cost, operational constraints, or compensating controls already in place — you must document a formal risk acceptance decision with rationale signed by organizational leadership. OCR does not require zero risk; the standard is reasonable and appropriate risk management. What it will not accept is silence. Undocumented decisions look like willful neglect during an investigation.
The NIST SP 800-30 Rev. 1 Guide for Conducting Risk Assessments provides the foundational methodology that OCR's own risk analysis guidance aligns with and frequently references. Using NIST 800-30 as your framework gives your assessment methodology recognized structure that holds up under OCR scrutiny.
Your risk management program also needs a defined trigger for reassessment — any significant change to your environment, including a new EHR system, a merger, a security incident, or new remote work policies, should prompt an interim assessment update. For organizations managing ongoing compliance obligations alongside day-to-day operations, a continuous HIPAA cybersecurity program is more sustainable than a purely annual review cycle.
Bottom Line
Completing a risk analysis is not enough. The HIPAA Security Rule requires both a documented risk analysis and an active risk management plan that demonstrably reduces identified risks. OCR treats the absence of a risk management plan as evidence the risk analysis was never taken seriously — regardless of how thorough the assessment itself was.
DIY vs. Managed vs. No Assessment: What the Options Actually Cost
Healthcare organizations face a practical choice when approaching their HIPAA security risk assessment: conduct it internally, engage a managed security provider, or — the most expensive option — do nothing and hope OCR never comes calling. Each path carries distinct cost and risk implications.
A fully internal assessment is feasible for larger health systems with dedicated security staff, a mature security program, and personnel who understand both HIPAA regulatory requirements and technical threat analysis. For most physician practices, dental offices, and small clinics, the internal approach carries hidden costs: the staff time required to conduct a thorough assessment often exceeds what leadership expects, and the resulting documentation frequently falls short of OCR's evidentiary standard because the people conducting it lack familiarity with what investigators actually look for.
Free online tools and vendor-provided questionnaires occupy a middle ground that is more dangerous than it appears. In the Doctors' Management Services settlement (2023), OCR specifically noted that the organization had used a security questionnaire but had not conducted a proper risk analysis — contributing to a $100,000 civil monetary penalty. A questionnaire produces a score, not a risk register. OCR investigators know the difference.
A managed HIPAA security risk assessment conducted by qualified specialists delivers three things an internal assessment rarely does: an objective external perspective that surfaces blind spots, documentation structured to OCR's evidentiary requirements, and a prioritized remediation roadmap that connects findings to business impact. The cost of a professionally conducted assessment is a fraction of even the lowest HIPAA penalty tier — and a fraction of the $9.77 million average healthcare breach cost documented in IBM's 2024 research.
Documentation Requirements: What OCR Expects to See
The HIPAA Security Rule requires covered entities and business associates to maintain documentation of their policies, procedures, and actions for a minimum of six years from the date of creation or the date it was last in effect, whichever is later (45 CFR §164.316(b)(2)). Your risk assessment documentation is fully subject to this retention requirement.
When OCR investigates a complaint or conducts a compliance audit, the first document request typically includes your most recent risk analysis. Specifically, investigators look for:
- A defined scope statement identifying all ePHI assets evaluated
- A documented methodology for identifying threats and vulnerabilities
- The specific threats and vulnerabilities identified for your organization's environment
- An assessment of current security controls and their measured effectiveness
- Assigned likelihood and impact ratings for each identified risk, with the basis for those ratings clearly stated
- A risk register or summary document listing all identified risks and their priority levels
- Evidence of a corresponding risk management plan with timelines and ownership assignments
- Records showing the assessment was reviewed and approved by organizational leadership
The quality and depth of your documentation matters as much as the fact that an assessment was performed. Maintain a version history of each risk assessment update, along with records of what changed and why. This demonstrates the continuous nature of your risk management program and gives OCR investigators a clear compliance narrative if your organization is ever audited.
For practices building out their compliance documentation framework, our HIPAA compliance guide for dental offices includes a practical documentation checklist applicable to small clinical environments of any specialty.
OCR Audit Risk: Mergers, New Technology, and Environmental Changes
A risk assessment conducted three years ago does not satisfy your current obligations if your environment has changed materially since then. OCR's guidance specifies that the risk analysis must be reviewed and updated in response to environmental or operational changes — not just on an annual calendar cycle. Triggering events that require reassessment include:
- Acquisition of a new practice or merger with another covered entity
- Deployment of a new EHR, telehealth platform, or cloud service
- Introduction of remote work for staff with ePHI access
- A security incident, ransomware attack, or discovered breach
- Significant changes to workforce size or structure
- Addition of new physical locations or practice sites
Organizations that experienced ransomware events without a current risk assessment faced the most severe OCR outcomes in recent enforcement history — both because the breach itself demonstrated risk management failure and because the absence of documentation removed any argument for the lower penalty tiers. Proactive reassessment is far less costly than reactive remediation under OCR oversight.
HIPAA Enforcement: Penalties for an Inadequate Risk Assessment
The HIPAA civil monetary penalty structure, updated by the HITECH Act and subsequent HHS rulemaking, applies a tiered framework based on culpability. Understanding the tiers makes clear why proactive compliance is the only financially rational position.
Violation Category
Per Violation Range
Annual Cap
Did Not Know
$100–$50,000
$25,000
Reasonable Cause
$1,000–$50,000
$100,000
Willful Neglect — Corrected
$10,000–$50,000
$250,000
Willful Neglect — Not Corrected
$50,000
$1,900,000
OCR's enforcement record demonstrates that failing to conduct a risk analysis is routinely treated as a willful neglect finding when the organization had been previously informed of the requirement — as every covered entity and business associate has been, given that the HIPAA Security Rule has been in effect since 2005.
Beyond financial penalties, OCR can require a Corrective Action Plan (CAP) — a monitored remediation program typically lasting two to three years, during which the organization must submit periodic compliance reports. CAPs consume significant management attention and expose organizations to ongoing OCR scrutiny long after the original violation is resolved. In 2023 alone, OCR resolved enforcement actions totaling over $4.1 million in penalties, with risk analysis failures cited in the majority of cases.
Healthcare organizations also face state attorney general enforcement, potential class action litigation following breaches, and lasting reputational damage with patients and referring providers. The financial case for conducting a proactive HIPAA security risk assessment is straightforward: the cost of a managed assessment is a fraction of even the lowest penalty tier.
For a deeper look at strengthening your organization's security posture beyond the risk assessment itself, review our guidance on healthcare data breach prevention and the role that advanced endpoint threats play in healthcare-targeted attacks in 2026.
Why This Matters
The IBM Cost of a Data Breach Report 2024 found that healthcare organizations face the highest average breach cost of any industry at $9.77 million — a figure that far exceeds the investment required to conduct and maintain a proper risk assessment program. The math is straightforward: a single OCR enforcement action at the willful neglect tier can cost more than a decade of managed compliance.
Is Your HIPAA Risk Assessment Current?
Bellator Cyber Guard's healthcare security specialists conduct thorough HIPAA security risk assessments aligned to OCR guidance and NIST SP 800-30 — delivering a complete risk register, prioritized remediation roadmap, and audit-ready documentation.
Integrating the Risk Assessment Into Your Broader HIPAA Security Program
The risk assessment is the foundation of HIPAA compliance, but it does not operate in isolation. The findings from your risk analysis should drive investments across your entire security program — from the technical safeguards you deploy to the administrative policies you maintain to the physical controls you put in place at each practice location.
Workforce training is one of the most direct remediation actions following a risk assessment. If your assessment surfaces phishing susceptibility, inadequate access control awareness, or gaps in incident reporting procedures, a structured security awareness training program addresses multiple findings simultaneously. The same applies to multi-factor authentication (MFA): if your assessment identifies shared credentials or weak authentication controls on EHR systems, MFA deployment is a high-return remediation that addresses §164.312(a)(1) access control requirements directly.
For organizations managing ePHI across multiple locations or relying on third-party IT providers, the risk assessment must extend to your vendor ecosystem. Every business associate with access to ePHI requires a current Business Associate Agreement (BAA), and those agreements should be reviewed as part of your risk assessment scope — not treated as a separate administrative task. Vendors who cannot demonstrate their own security controls represent inherited risk that your organization owns.
Finally, the risk assessment should inform your incident response planning. If your assessment identifies ransomware as a high-probability threat — as it should for virtually every healthcare organization in 2026 — your incident response plan needs to specifically address ransomware scenarios, including data backup verification, restoration procedures, and OCR breach notification timelines. An incident response plan that predates your current threat environment is not a plan; it is a document that will fail when you need it most.
Schedule Your HIPAA Security Risk Assessment
Bellator Cyber Guard's healthcare security specialists deliver thorough HIPAA security risk assessments aligned to OCR guidance and NIST SP 800-30 — complete risk register, prioritized remediation roadmap, and audit-ready documentation included.
Frequently Asked Questions: HIPAA Security Risk Assessment
A HIPAA security risk assessment — formally called a risk analysis under 45 CFR §164.308(a)(1)(ii)(A) — is a mandated evaluation of all threats and vulnerabilities that could affect the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI) your organization handles. It identifies what ePHI you hold, where it lives, what could go wrong, and how likely and impactful each risk is. The findings drive your entire HIPAA risk management program and must be documented in a format that satisfies OCR's evidentiary requirements.
The HIPAA Security Rule requires the risk analysis to be conducted initially and then reviewed and updated periodically and in response to environmental or operational changes. In practice, most organizations conduct a formal annual assessment and perform interim updates whenever a triggering event occurs — such as deploying a new EHR system, experiencing a security incident, adding a new location, or undergoing a merger. The standard is not a fixed calendar interval; it is currency with your actual risk environment.
The terms are used interchangeably in most healthcare compliance contexts. The HIPAA Security Rule uses the term "risk analysis" (§164.308(a)(1)(ii)(A)), while NIST and broader security frameworks use "risk assessment." Both refer to the same structured process: identifying ePHI assets, enumerating threats and vulnerabilities, assessing current controls, and assigning likelihood and impact ratings to produce a prioritized risk register. The distinction that matters is between the risk analysis (identifying risks) and risk management (§164.308(a)(1)(ii)(B), which requires implementing measures to reduce those risks).
No — not as a standalone compliance document. Free tools and vendor questionnaires can be useful starting points for gap identification, but they do not produce the documentation OCR requires. In the 2023 Doctors' Management Services settlement, OCR specifically noted that the organization had used a security questionnaire but had not conducted a proper risk analysis, contributing to a $100,000 civil monetary penalty. A defensible HIPAA security risk assessment requires a documented scope, methodology, asset inventory, threat and vulnerability enumeration, control assessment, and prioritized risk register — not a score or a checklist completion percentage.
Yes. Following the 2013 HIPAA Omnibus Rule, business associates became directly liable under the HIPAA Security Rule — including the risk analysis requirement at §164.308(a)(1)(ii)(A). IT service providers, medical billing companies, EHR vendors, and any other entity handling ePHI on behalf of a covered entity must conduct their own risk assessment covering ePHI they create, receive, maintain, or transmit. A Business Associate Agreement (BAA) does not substitute for the business associate's independent compliance obligations.
Failure to conduct a risk analysis is among the most commonly cited HIPAA violations in OCR enforcement actions. Because every covered entity and business associate has been on notice of this requirement since the HIPAA Security Rule took effect in 2005, OCR routinely treats the absence of a risk analysis as a willful neglect finding — which carries penalties of $50,000 per violation and an annual cap of $1.9 million for uncorrected violations. OCR may also require a Corrective Action Plan (CAP), placing your organization under monitored remediation for two to three years.
Duration depends on organizational size and complexity. A solo physician practice or small dental office can typically complete a thorough assessment in two to four weeks when working with an experienced security partner. Mid-size multi-location practices and health systems should plan for four to eight weeks. A significant portion of the timeline involves gathering documentation, interviewing staff, and conducting technical review of systems — not just completing a checklist. Compressed timelines that produce inadequate documentation are not worth the cost savings.
The HIPAA Security Rule requires retention of all documentation for a minimum of six years from creation or last effective date (45 CFR §164.316(b)(2)). Retain your scope statement, methodology documentation, asset inventory, threat and vulnerability analysis, control assessment, risk register, risk management plan with timelines and ownership, leadership sign-off, and a version history showing each subsequent update. When OCR opens an investigation, the risk analysis documentation is typically the first item requested — and its absence or inadequacy is treated as evidence of willful neglect.
No. A penetration test is a technical exercise in which security professionals attempt to exploit vulnerabilities in your systems to assess their resilience. It is a valuable security tool, but it is not a HIPAA security risk assessment. The risk analysis required by §164.308(a)(1)(ii)(A) is a broader process that encompasses administrative, physical, and technical safeguards; maps threats to specific ePHI assets; and produces a documented risk register with remediation priorities. A penetration test may contribute technical findings to a risk assessment, but it does not satisfy the risk analysis requirement on its own.
NIST SP 800-30 Rev. 1, "Guide for Conducting Risk Assessments," provides the foundational risk assessment methodology that HHS OCR's own risk analysis guidance aligns with and explicitly references. Using NIST 800-30 as your methodological framework gives your assessment recognized structure and makes your methodology defensible during an OCR audit. The framework covers threat source identification, vulnerability enumeration, likelihood and impact determination, and risk determination — directly corresponding to OCR's required risk analysis elements.
Schedule
Worried about HIPAA compliance?
Our healthcare cybersecurity team can assess your risks and build a protection plan.



