CDMP Fundamentals • 100 Questions • 90 Minutes
← Back to HIPAA Compliance

🛡 HIPAA Security Safeguards Deep Dive

The HIPAA Security Rule organizes its requirements into three categories of safeguards: Administrative, Physical, and Technical. Each category contains standards, and each standard has implementation specifications that are either 'Required' (must implement) or 'Addressable' (must implement OR document why an equivalent alternative is reasonable and appropriate). Addressable does NOT mean optional — you must address every specification, either by implementing it or by documenting a valid reason and alternative.

Administrative Safeguards

Administrative safeguards are the policies, procedures, and human actions that manage the selection, development, implementation, and maintenance of security measures to protect ePHI. These are the 'people and process' side of HIPAA security. They account for over half of the Security Rule's requirements and are often where organizations have the most gaps. Think of these as the management framework that makes the physical and technical safeguards effective.

Security Management Process

164.308(a)(1) Required

You must implement policies and procedures to prevent, detect, contain, and correct security violations. This is the foundational requirement — it says you must have a formal, documented process for managing the security of ePHI. At its core, this means conducting a Risk Analysis, implementing a Risk Management plan, having a Sanction Policy for workforce violations, and reviewing Information System Activity.

  • Conduct a comprehensive risk analysis identifying all ePHI assets, threats, vulnerabilities, current controls, and resulting risk levels
  • Develop a risk management plan that prioritizes risks and defines specific actions, responsible persons, and timelines for reducing each risk to an acceptable level
  • Create and enforce a sanction policy that defines consequences for workforce members who violate security policies (verbal warning, written warning, suspension, termination, reporting to authorities)
  • Implement regular information system activity review (audit log review) on a defined schedule (at minimum monthly)

💡 Start with the risk analysis — it is the MOST important step in all of HIPAA compliance. OCR has cited failure to conduct a risk analysis as the most common HIPAA violation in enforcement actions. Use the NIST Cybersecurity Framework or HHS's own Security Risk Assessment Tool (free download) as your starting framework.

Assigned Security Responsibility

164.308(a)(2) Required

You must designate a Security Officer who is responsible for developing and implementing the security policies and procedures required by the Security Rule. This can be the same person as the Privacy Officer, but in larger organizations it should be a separate role. The key point is that one specific person must be accountable.

  • Formally designate a Security Officer in writing with a defined job description and scope of authority
  • Ensure the Security Officer has appropriate training, resources, and organizational authority to implement the security program
  • Document the designation and communicate it to the entire workforce
  • Establish reporting relationships and escalation procedures for security issues

💡 In small practices, the Security Officer and Privacy Officer are often the same person — sometimes even the practice manager. In larger organizations, these should be separate roles because the skill sets differ: the Privacy Officer needs healthcare and legal expertise, while the Security Officer needs IT security expertise.

Workforce Security

164.308(a)(3) Addressable

You must implement policies and procedures to ensure that all workforce members have appropriate access to ePHI based on their role, and to prevent workforce members who should not have access from obtaining it. This includes authorization and supervision procedures, workforce clearance procedures (background checks), and termination procedures (revoking access when someone leaves).

  • Define role-based access levels for every position that may access ePHI
  • Implement a formal process for granting, modifying, and revoking access to ePHI systems
  • Establish workforce clearance procedures, which may include background checks for positions with access to sensitive ePHI
  • Create and enforce termination procedures that immediately revoke all ePHI access when a workforce member leaves or changes roles
  • Conduct regular access reviews (at least quarterly) to ensure current access levels match current job functions

💡 The biggest risk here is the 'departed employee' problem. When someone leaves the organization, their access to ALL systems containing ePHI must be revoked immediately — ideally within hours, not days. Create a termination checklist that IT must complete for every departure. Also watch for role changes: when a nurse moves from the ER to administration, their access should change accordingly.

Information Access Management

164.308(a)(4) Required (with Addressable specifications)

You must implement policies and procedures for authorizing access to ePHI. This is about establishing a formal process for granting access, not just letting managers email IT to 'give the new person the same access as everyone else.' It includes isolating healthcare clearinghouse functions, defining access authorization policies, and establishing procedures for granting, modifying, and terminating access.

  • Create a formal access authorization policy that requires documented approval for all ePHI access
  • Implement an access request workflow (request form, manager approval, IT provisioning, documentation)
  • Define access levels for each role using the principle of least privilege
  • Establish a process for periodic access reviews and recertification
  • Document all access grants, modifications, and terminations with dates and authorizing parties

💡 Think of this as building an access control matrix: a spreadsheet where rows are job roles and columns are systems/data types, and each cell says what level of access that role should have. This matrix becomes your reference document for granting access. Any access request that does not match the matrix requires special approval.

Security Awareness and Training

164.308(a)(5) Addressable

You must implement a security awareness and training program for ALL workforce members (including management). Training must cover security reminders, procedures for guarding against malicious software, log-in monitoring procedures, and password management practices. Training must occur at onboarding and periodically thereafter.

  • Develop a comprehensive HIPAA security training program covering all required topics
  • Deliver training to all new workforce members within a defined period of onboarding (best practice: within 30 days)
  • Conduct annual refresher training for all existing workforce members
  • Send regular security reminders (monthly email tips, quarterly phishing simulations, security newsletters)
  • Track and document all training completion with dates, attendees, and content covered
  • Test workforce knowledge through quizzes or practical exercises

💡 Training does not have to be expensive or elaborate. Many organizations use a combination of online modules, in-person sessions, and regular email reminders. The key is documentation — you must be able to PROVE that every single workforce member received training if OCR comes knocking. Keep signed acknowledgment forms or LMS completion records for at least 6 years.

Security Incident Procedures

164.308(a)(6) Required

You must implement policies and procedures to address security incidents — specifically to identify, respond to, and mitigate harmful effects of security incidents, and to document security incidents and their outcomes. A security incident is any attempted or successful unauthorized access, use, disclosure, modification, or destruction of ePHI.

  • Develop a formal incident response plan with clear roles, responsibilities, and escalation procedures
  • Define what constitutes a security incident and establish reporting mechanisms for workforce members
  • Create incident response procedures covering identification, containment, eradication, recovery, and post-incident analysis
  • Establish a security incident log/database to track all incidents from detection through resolution
  • Conduct regular incident response drills and tabletop exercises (at least annually)
  • Integrate incident response with breach notification procedures

💡 Many organizations confuse 'security incident' with 'breach.' They are different: a security incident is any attempted or successful unauthorized access. A breach is a specific type of security incident where unsecured PHI is actually compromised. Not every incident is a breach, but every breach starts as an incident. Your incident response plan should include a decision tree for determining whether an incident rises to the level of a breach.

Contingency Plan

164.308(a)(7) Required (with Addressable specifications)

You must establish policies and procedures for responding to an emergency or other occurrence that damages systems containing ePHI. This includes a data backup plan, a disaster recovery plan, an emergency mode operation plan, testing and revision procedures, and criticality analysis. Think of this as your 'what happens when everything goes wrong' plan.

  • Conduct a Business Impact Analysis (BIA) identifying critical ePHI systems and maximum tolerable downtime for each
  • Implement a data backup plan with defined backup frequency, retention, storage locations, and encryption requirements
  • Develop a disaster recovery plan with recovery time objectives (RTO) and recovery point objectives (RPO) for each critical system
  • Create an emergency mode operation plan defining how critical business processes will continue during and after an emergency
  • Test the contingency plan at least annually through tabletop exercises or full simulations
  • Update the plan based on test results, organizational changes, and lessons learned

💡 Your database backup strategy IS part of your contingency plan. Make sure backups are encrypted (ePHI at rest), stored in a separate location (offsite or cloud), tested regularly for successful restoration, and that backup media is tracked and disposed of securely. A backup that cannot be restored is not a backup.

Evaluation

164.308(a)(8) Required

You must perform periodic technical and non-technical evaluations to assess the extent to which your security policies and procedures meet the requirements of the Security Rule. This must be done initially and whenever there are environmental or operational changes that affect the security of ePHI (new systems, new threats, organizational changes, regulatory updates).

  • Establish an evaluation schedule (at minimum annually, plus after significant changes)
  • Conduct evaluations that cover both technical controls (vulnerability scans, penetration tests, configuration reviews) and non-technical controls (policy reviews, procedure audits, training effectiveness)
  • Document evaluation findings with specific deficiencies, risk ratings, and remediation plans
  • Track remediation actions to completion
  • Consider engaging an independent third party for periodic evaluations to provide objective assessment

💡 Think of evaluation as your annual HIPAA 'health check.' Just as a patient gets an annual physical, your security program needs a regular checkup. Many organizations combine this with their annual risk analysis update. Do not wait for a breach to discover that your security controls are not working.

Business Associate Contracts

164.308(b)(1) Required

You must have a written contract or arrangement with every Business Associate that will have access to ePHI, and the contract must include specific provisions required by the Security Rule. This is the BAA (Business Associate Agreement). No BAA, no access to ePHI — it is that simple.

  • Inventory all vendors and partners that access, create, receive, maintain, or transmit ePHI on your behalf
  • Execute BAAs with all identified Business Associates before sharing any ePHI
  • Ensure BAAs contain all required provisions: safeguard implementation, breach reporting, subcontractor requirements, access termination, and return/destruction of PHI
  • Review and update BAAs at least annually or when regulations change
  • Monitor Business Associate compliance (request audit reports, SOC 2 certifications, or conduct periodic assessments)

💡 Build a Business Associate inventory spreadsheet with columns for: vendor name, service provided, ePHI accessed, BAA execution date, BAA review date, and compliance verification status. This is one of the first things OCR will ask for in an investigation. Many organizations discover they have dozens of BAs they never realized — anyone from the IT support company to the janitor service (if they have access to areas where PHI is visible) may be a BA.

Physical Safeguards

Physical safeguards are the physical measures, policies, and procedures to protect electronic information systems and related buildings and equipment from natural and environmental hazards and unauthorized intrusion. Even in a cloud-first world, physical security matters — someone has to secure the workstations, the server rooms, and the devices that access ePHI.

Facility Access Controls

164.310(a)(1) Addressable

You must implement policies and procedures to limit physical access to your electronic information systems and the facilities in which they are housed, while ensuring that properly authorized access is allowed. This includes contingency operations procedures, a facility security plan, access control and validation procedures, and maintenance records.

  • Conduct a physical site assessment identifying all areas where ePHI is accessed, stored, or processed
  • Implement physical access controls appropriate to each area (badge access, key cards, biometric locks, security guards)
  • Create a facility security plan documenting all physical access controls and their locations
  • Establish visitor management procedures (sign-in, escort requirements, visitor badges)
  • Maintain access logs for sensitive areas (server rooms, medical records departments)
  • Implement contingency operations procedures for maintaining physical security during emergencies

💡 Walk through the facility and look for PHI exposure: Can you see patient information on computer screens from public areas? Are paper records left in open areas? Can anyone walk into the server room? These observations form the basis of your physical security assessment. Take photos (without capturing PHI) to document issues.

Workstation Use

164.310(b) Required

You must implement policies and procedures that specify the proper functions to be performed on workstations, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access ePHI. This is about defining HOW and WHERE workstations are used.

  • Define acceptable use policies for all workstations that access ePHI (desktops, laptops, tablets, smartphones)
  • Specify requirements for workstation placement (screen not visible to unauthorized persons, private areas for accessing sensitive data)
  • Require automatic screen lock after a period of inactivity (best practice: 2-5 minutes)
  • Prohibit accessing ePHI from public or unsecured locations without VPN and additional safeguards
  • Implement clean desk policies for workstations in shared or public areas

💡 The most common workstation use violation: a nurse's workstation in a hallway with the screen facing the waiting room, displaying patient names and room numbers. Simple fixes include privacy screen filters, repositioning monitors, and configuring automatic screen locks with short timeout periods.

Workstation Security

164.310(c) Required

You must implement physical safeguards for all workstations that access ePHI to restrict access to authorized users only. This is about physically securing the devices themselves — preventing theft, unauthorized use, and tampering.

  • Secure desktop workstations with cable locks or in locked areas
  • Implement full disk encryption on all laptops and portable devices that access ePHI
  • Use cable locks for laptops in shared spaces
  • Implement endpoint management solutions (MDM for mobile devices, endpoint protection for desktops)
  • Maintain an inventory of all workstations with their locations and assigned users
  • Establish procedures for reporting lost or stolen devices immediately

💡 Laptop theft is one of the most common causes of HIPAA breaches. The single most effective countermeasure is full disk encryption. If a laptop with encrypted ePHI is stolen, it is NOT considered a breach because the data is rendered unusable. Make encryption your first priority for all portable devices.

Device and Media Controls

164.310(d)(1) Required (with Addressable specifications)

You must implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain ePHI into and out of a facility, and the movement of these items within the facility. This includes disposal procedures, media re-use procedures, accountability logs, and data backup/storage procedures.

  • Implement media disposal procedures that ensure ePHI is destroyed before media is discarded (degaussing, physical destruction, secure wipe with certification)
  • Create media re-use procedures that ensure all ePHI is removed before media is reused for a different purpose
  • Maintain accountability logs tracking all hardware and media that contain ePHI (serial numbers, locations, custodians, movement history)
  • Establish data backup procedures before equipment is moved or serviced
  • Create procedures for returning or destroying ePHI when a Business Associate relationship ends
  • Implement chain of custody documentation for media containing ePHI

💡 Old hard drives are a ticking time bomb. When a server or computer is decommissioned, the hard drive must be securely wiped or physically destroyed — reformatting is NOT sufficient. Use a certified data destruction vendor and get a certificate of destruction. Also remember: USB drives, external hard drives, backup tapes, and even old copiers/printers with internal hard drives can contain ePHI.

Technical Safeguards

Technical safeguards are the technology and the policies and procedures for its use that protect ePHI and control access to it. This is where database professionals, system administrators, and developers have the most direct impact. These safeguards define how your systems must be configured and operated to protect patient data.

Access Control

164.312(a)(1) Required (with Addressable specifications)

You must implement technical policies and procedures for electronic information systems that maintain ePHI to allow access only to authorized persons or software programs. This includes four specifications: unique user identification (Required), emergency access procedure (Required), automatic logoff (Addressable), and encryption and decryption (Addressable).

  • Assign unique user identifiers (usernames/IDs) to every user — absolutely no shared accounts for accessing ePHI
  • Implement role-based access control (RBAC) in all ePHI databases and applications
  • Establish emergency access procedures (break-glass procedures) for accessing ePHI during emergencies when normal access methods are unavailable
  • Configure automatic logoff on all systems after a defined period of inactivity (recommended: 2-15 minutes depending on setting)
  • Implement encryption for ePHI at rest (database encryption, file system encryption) and in transit (TLS 1.2+, VPN)
  • Implement multi-factor authentication (MFA) for remote access and privileged accounts

💡 The number one technical finding in HIPAA audits: shared accounts. If two nurses use the same login to access the EHR, you cannot determine who accessed what patient records. Every single person who accesses ePHI must have their own unique login. No exceptions. Also implement MFA for any remote access — it is the single most effective control against unauthorized access.

Audit Controls

164.312(b) Required

You must implement hardware, software, and procedural mechanisms that record and examine activity in information systems that contain or use ePHI. This means logging who accessed what data, when, from where, and what they did. It also means actually REVIEWING those logs regularly — logging without review is worthless.

  • Enable audit logging on all systems that contain or access ePHI (databases, EHR applications, operating systems, network devices)
  • Define what events must be logged: login/logout, failed login attempts, record access (create/read/update/delete), permission changes, system configuration changes
  • Configure log retention for at least 6 years (HIPAA documentation retention requirement)
  • Implement centralized log management (SIEM) to aggregate and correlate logs from multiple systems
  • Establish a regular log review schedule (recommended: weekly automated alerts for anomalies, monthly manual review of access patterns)
  • Create procedures for investigating and documenting anomalous access patterns
  • Protect audit logs from tampering (write-once storage, separate permissions from system administrators)

💡 For database professionals, this means enabling SQL Server Audit or Oracle Audit Vault or PostgreSQL's pgAudit extension. At minimum, log all SELECT queries against tables containing PHI identifiers, all INSERT/UPDATE/DELETE operations, all permission changes (GRANT/REVOKE), and all login failures. Store audit logs in a separate database or system that DBAs cannot modify.

Integrity

164.312(c)(1) Addressable

You must implement policies and procedures to protect ePHI from improper alteration or destruction. This includes mechanisms to authenticate ePHI — meaning you must be able to verify that ePHI has not been altered or destroyed in an unauthorized manner.

  • Implement database integrity controls (constraints, triggers, checksums) to prevent unauthorized modification of ePHI
  • Use version control or change tracking for clinical records so that original data is never overwritten — only appended
  • Implement file integrity monitoring (FIM) for critical system files and databases containing ePHI
  • Use cryptographic hashing (SHA-256 or stronger) to verify integrity of ePHI backups and transfers
  • Establish change management procedures for ePHI database schema changes
  • Implement referential integrity constraints in all databases containing ePHI

💡 In clinical databases, you should NEVER allow hard deletes of patient records. Use soft deletes (marking records as inactive) and implement temporal tables or audit triggers that capture the before-and-after state of every modification. This protects data integrity and provides the audit trail needed for legal and compliance purposes.

Person or Entity Authentication

164.312(d) Required

You must implement procedures to verify that a person or entity seeking access to ePHI is who they claim to be. This is about authentication — making sure users prove their identity before accessing patient data. Methods include passwords, tokens, biometrics, smart cards, or combinations thereof.

  • Implement strong password policies (minimum 12 characters, complexity requirements, no password reuse for at least 12 cycles)
  • Deploy multi-factor authentication (MFA) for all remote access and administrative accounts
  • Implement certificate-based authentication for system-to-system communications involving ePHI
  • Establish procedures for issuing, managing, and revoking authentication credentials
  • Implement account lockout policies after a defined number of failed authentication attempts
  • Prohibit shared credentials and default passwords in all systems containing ePHI

💡 Modern best practice is MFA everywhere. At minimum, require MFA for remote access (VPN, patient portal admin, cloud EHR), all administrative/privileged accounts, and any access to ePHI from outside the organization's network. Passwords alone are no longer considered sufficient for sensitive systems.

Transmission Security

164.312(e)(1) Addressable

You must implement technical security measures to guard against unauthorized access to ePHI that is being transmitted over an electronic communications network. This includes integrity controls (ensuring data is not modified during transmission) and encryption of ePHI in transit.

  • Implement TLS 1.2 or higher for all web-based applications that transmit ePHI
  • Configure VPN with strong encryption for all remote access to ePHI systems
  • Encrypt all email containing ePHI using S/MIME, TLS, or a secure email gateway
  • Implement secure file transfer protocols (SFTP, FTPS) — never use plain FTP for ePHI
  • Configure database connections to use encrypted communication (SSL/TLS)
  • Implement integrity controls (digital signatures, checksums) for ePHI transmissions
  • Disable all legacy/insecure protocols (SSLv3, TLS 1.0, TLS 1.1, telnet, unencrypted SNMP)

💡 The simplest rule: ePHI should NEVER travel over a network in plaintext. Encrypt everything in transit. For databases, enable SSL/TLS on all database listener connections. For web applications, enforce HTTPS everywhere. For email, use a secure email solution. If you cannot encrypt a particular transmission channel, do not send ePHI over it.