Compliance & Regulations

What Is the HIPAA Security Rule?

The HIPAA Security Rule is a set of national standards mandated by the U.S. Department of Health and Human Services (HHS) that establish minimum security requirements for electronic protected health information (ePHI).

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

The HIPAA Security Rule is a set of national standards mandated by the U.S. Department of Health and Human Services (HHS) that establish minimum security requirements for electronic protected health information (ePHI). Established under the Health Insurance Portability and Accountability Act of 1996, the Security Rule applies to covered entities including healthcare providers, health plans, and healthcare clearinghouses, as well as their business associates. The rule requires implementation of administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of ePHI.

How Does the HIPAA Security Rule Work?

The HIPAA Security Rule operates through three interconnected categories of safeguards that organizations must implement to protect ePHI.

Administrative Safeguards

Administrative safeguards manage the selection, development, implementation, and maintenance of security measures to protect ePHI. These requirements include security management processes, personnel management, workforce training and evaluations, and security incident procedures to identify, respond to, mitigate, and document security incidents.

Organizations must establish contingency plans that encompass data backup, disaster recovery, and emergency mode operations according to HHS Office for Civil Rights guidance from the HIPAA Series #4 - Technical Safeguards, 2022.

Physical Safeguards

Physical safeguards comprise measures, policies, and procedures that protect facilities and equipment from physical and environmental hazards. These controls cover access to data centers and work facilities, workstation encryption, mobile device protection, and secure media transportation and disposal procedures.

Technical Safeguards

Technical safeguards use technology and policies to protect ePHI and control access to electronic systems. These include firewalls, encryption, data backup systems, access control mechanisms, and authentication procedures. The rule specifically requires audit controls to record and examine activity in information systems containing ePHI, implementing audit logs to capture specific actions related to protected health information according to HHS documentation from 2022.

Encryption Requirements Under the Security Rule

Covered entities must implement mechanisms to encrypt and decrypt ePHI as specified in 45 CFR §164.312(a)(1). Organizations must also encrypt ePHI during transmission over electronic communications networks when deemed appropriate after conducting a risk assessment, as outlined in 45 CFR §164.312(e)(2).

According to Censinet Inc. guidance from 2023 on HIPAA Encryption Standards for Cloud PHI, key management practices should include regular rotation of encryption keys and certificates, use of hardware security modules (HSMs) or cloud-based key management services, central management of certificates with monitoring for expiration and mismatches, and logging and alerting on failed handshakes.

Risk Assessment Requirements

Covered entities must conduct accurate and thorough assessments of potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI. Risk analysis outcomes are critical in determining whether safeguards are reasonable and appropriate, according to HHS Office for Civil Rights guidance on risk analysis from 2023. Organizations must identify security gaps and establish compliance baselines that align with organizational risk tolerance and regulatory requirements.

How Does the HIPAA Security Rule Differ from Other Security Frameworks?

The HIPAA Security Rule has evolved significantly from its original implementation to proposed 2025 updates, as shown in the following comparison:

Aspect

Before 2025

Proposed 2025+

Safeguard Status

"Required" vs. "Addressable" distinction

All specifications required (with limited exceptions)

Audit Requirements

Case-by-case basis

Mandatory annual audits minimum

Policies & Procedures

Flexible implementation

Must be written, tested, reviewed regularly

Estimated Implementation Cost (Year 1)

Baseline

$9 billion industry-wide

Five-Year Cost Estimate

Baseline

$33 billion

Source: Federal Register, HIPAA Security Rule to Strengthen Cybersecurity, January 6, 2025

The proposed changes would eliminate the distinction between required and addressable specifications, significantly increasing the compliance burden on covered entities and business associates. The Notice of Proposed Rulemaking (NPRM) published December 27, 2024 removes much of the flexibility organizations previously had when implementing addressable controls.

Why Does the HIPAA Security Rule Matter?

The HIPAA Security Rule has become increasingly important as enforcement activity escalates and regulatory requirements evolve.

Enforcement Trends

Twenty-two HIPAA enforcement actions resulted in settlements or civil monetary penalties in 2024, making it one of the most active enforcement years to date according to HIPAA Journal's analysis of new HIPAA regulations, 2025. This represents a marked increase in regulatory scrutiny compared to previous years.

Over 25,000 HIPAA-covered entities and business associates currently operate under the Security Rule requirements. The HHS Office for Civil Rights proposed rule issued in December 2024 is scheduled for finalization in May 2026, following a comment period that closed March 7, 2025.

Industry Impact

The proposed NPRM removes the distinction between required and addressable specifications, creating substantially increased compliance burden across the healthcare industry. First-year implementation costs are estimated at $9 billion industry-wide, with a five-year total cost estimate of $33 billion according to Federal Register documentation from January 2025.

These financial impacts will affect healthcare organizations of all sizes, though smaller providers and rural healthcare systems may face disproportionate challenges due to resource constraints.

What Are the Limitations of the HIPAA Security Rule?

The HIPAA Security Rule faces several challenges in addressing modern cybersecurity threats and implementation realities.

Addressable Weakness

The previous distinction between "required" and "addressable" specifications created significant ambiguity in compliance interpretation. Organizations frequently minimally implemented addressable items, resulting in inconsistent security postures across the healthcare industry according to HIPAA Journal analysis of HIPAA updates and changes, 2025. The proposed 2025 changes aim to address this weakness by making virtually all controls mandatory.

Risk Assessment Gap

The rule's reliance on each entity's risk assessment for determining some controls can lead to inconsistent security postures across the healthcare sector. Organizations may interpret "reasonable and appropriate" differently based on resources, expertise, or risk tolerance, creating potential security vulnerabilities.

Legacy Technology Challenges

The Security Rule requires backward compatibility with older healthcare systems that may not support modern encryption or advanced security protocols. This constraint creates implementation challenges for organizations attempting to upgrade security while maintaining operational continuity with existing infrastructure.

Cost Barriers

The significant implementation costs estimated at $9 billion in the first year alone may disproportionately impact smaller providers and rural healthcare systems that lack the financial resources of larger health systems. This cost disparity creates equity concerns across the healthcare delivery ecosystem.

Compliance Complexity

The multiple control categories and specifications create compliance challenges for organizations with limited security expertise. Healthcare organizations without dedicated security teams may struggle to interpret requirements and implement appropriate controls effectively.

How Does the HIPAA Security Rule Relate to Compliance Requirements?

The HIPAA Security Rule operates within a comprehensive regulatory framework with specific enforcement mechanisms.

Regulatory Framework

The statutory authority for the Security Rule derives from the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as amended. The regulatory code implementing these requirements appears in 45 CFR Parts 160 and 164, Subpart C, with enforcement authority vested in the HHS Office for Civil Rights (OCR).

Key Regulatory Requirements

Organizations must comply with several specific regulatory requirements:

45 CFR §164.308: Administrative safeguards standards governing security management, workforce security, and information access management.

45 CFR §164.310: Physical safeguards standards covering facility access controls, workstation security, and device and media controls.

45 CFR §164.312: Technical safeguards standards including access control, audit controls, integrity controls, authentication, and transmission security.

45 CFR §164.314: Organizational requirements for business associates and other entities handling ePHI.

45 CFR §164.316: Policies and procedures and documentation requirements for all aspects of the security program.

Proposed Rule Changes (January 2025)

The proposed changes include elimination of the "required vs. addressable" distinction, mandatory documentation of security measures, minimum annual compliance audits, enhanced business associate oversight requirements, and written verification that business associates have deployed technical safeguards according to Federal Register documentation from the HIPAA Security Rule to Strengthen Cybersecurity proposal, January 6, 2025.

FAQs

What is the difference between the three types of HIPAA Security Rule safeguards?

Administrative safeguards are policies and procedures for managing security programs and personnel. Physical safeguards protect facilities and equipment containing ePHI from unauthorized physical access and environmental hazards. Technical safeguards use technology to protect ePHI and control access to electronic systems. All three safeguard categories are mandatory and interdependent—effective security requires implementation across all three areas.

Who must comply with the HIPAA Security Rule?

Covered entities including healthcare providers, health plans, and clearinghouses must comply with the Security Rule. Their business associates—organizations that handle ePHI on behalf of or under contract with covered entities—must also comply. The rule applies whenever ePHI is stored, processed, or transmitted, regardless of whether the entity directly provides healthcare services.

What is the significance of the 2025 proposed changes to the Security Rule?

The proposed changes eliminate the distinction between "required" and "addressable" implementation specifications, making virtually all safeguards mandatory with limited exceptions. The changes require annual audits, increase overall compliance burden and costs, and establish written verification requirements for business associate security controls. These changes represent the most significant update to the Security Rule since its original implementation.

How are encryption requirements determined under the Security Rule?

Entities must conduct risk assessments to determine where encryption is reasonable and appropriate. If risk assessment determines encryption is necessary to protect ePHI, it becomes mandatory for that specific use case. At minimum, encryption is required for ePHI transmitted over public networks. Organizations must document their encryption decisions and risk assessment rationale.

What documentation must organizations maintain for HIPAA Security Rule compliance?

Organizations must maintain written policies and procedures for all administrative, physical, and technical safeguards. Required documentation includes risk assessments and risk management plans, audit logs demonstrating security control operation, workforce training records showing completion of security training, incident response documentation of all security incidents and responses, and business associate agreements with all entities handling ePHI on the organization's behalf.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.