Security Rule
HIPAA Security Rule overview for compliance teams
TL;DR
The HIPAA Security Rule requires covered entities and business associates to implement reasonable and appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of electronic PHI (ePHI), documented through policies, risk analysis, and ongoing monitoring—not a one-time IT checklist.
A structured overview of the HIPAA Security Rule—administrative, physical, and technical safeguards—with CFR anchors and practical implementation notes.
The HIPAA Security Rule translates high-level privacy obligations into operational controls for electronic protected health information (ePHI). Where the Privacy Rule focuses on permissible uses and disclosures, the Security Rule asks a different question: how you protect ePHI while it is stored, processed, and transmitted across your enterprise and vendor ecosystem.
45 CFR §164.306 frames the standards in terms of confidentiality, integrity, and availability. Confidentiality limits unauthorized access; integrity guards against improper alteration; availability ensures ePHI remains accessible to authorized users when needed (for example during patient care or legally required disclosures).
Note
Treat the Security Rule as a risk-based control system, not a static compliance checklist. OCR investigations routinely examine whether policies match real workflows and whether leadership can explain how risks were identified and mitigated.
Administrative safeguards
Administrative safeguards are the management processes that direct workforce behavior and vendor oversight. They include security management processes (risk analysis and risk management), workforce security, information access management, security awareness training, contingency planning, evaluation, and business associate arrangements.
Risk analysis and risk management are often the first documents OCR requests. A credible risk analysis identifies where ePHI lives (systems, interfaces, backups), realistic threats (credential theft, ransomware, insider misuse), and existing controls. Risk management shows how you decided which gaps to close first and how you measured success.
Workforce training should be tied to real scenarios: phishing, workstation hygiene, remote access, and escalation paths for suspicious activity. Access management requires documented authorization and periodic review—especially for administrative accounts and broad “break-glass” roles.
Warning
If administrative policies exist only on paper while production reality allows shared credentials, unmanaged admin access, or unaudited exports, your program may be formally documented but operationally ineffective—a frequent enforcement theme.
Physical safeguards
Physical safeguards protect facilities and equipment. Facility access controls limit who can enter locations where ePHI systems are housed. Workstation security addresses how screens, laptops, and portable media are used in patient areas, open offices, or hybrid remote settings. Device and media controls govern receipt, removal, reuse, and disposal so retired hardware does not leak ePHI.
Many modern breaches still begin with stolen laptops or improperly wiped drives. Physical controls therefore intersect tightly with encryption at rest and asset inventory disciplines.
Technical safeguards
Technical safeguards are where engineering and IT operations meet HIPAA. Access control requires appropriate technical policies and often includes unique user identification, emergency access procedures, automatic logoff, and encryption where reasonable. Audit controls demand hardware, software, and procedural mechanisms to record and examine activity in systems that use or contain ePHI.
Integrity controls guard against improper alteration or destruction—important for integrations where multiple applications write to the same record. Transmission security requires technical measures to guard against unauthorized access to ePHI in transit, commonly satisfied with TLS for APIs, VPNs for administrative channels, and modern email encryption where ePHI is messaged.
Technical safeguards must be measurable. If you cannot produce logs, access reviews, or change records during an incident, it becomes difficult to demonstrate that controls were “implemented” rather than merely “intended.”
Putting the pieces together
Strong Security Rule programs align three artifacts: an accurate system inventory, a defensible risk analysis, and control evidence (configuration standards, monitoring alerts, ticket history). When these drift apart—such as shadow IT storing ePHI without BAAs or backups outside monitored environments—risk spikes quickly.
Use this overview alongside your BAA and vendor risk workflows. Business associates often operate critical security controls on your behalf, but accountability for oversight remains with the covered entity’s compliance program.
How OCR tends to evaluate Security Rule programs
While every investigation is fact-specific, OCR frequently looks for consistency between what you say you do and what your artifacts prove. That includes change tickets for firewall rules, access reviews with named approvers, training completion tied to roles, and incident runbooks that teams have actually exercised.
Investigators also test whether leadership understands residual risk. If your risk analysis concludes that ransomware is a top threat but multifactor authentication is still optional for remote administrators, expect questions about whether mitigation was reasonable and appropriately documented.
Metrics that help demonstrate maturity
Compliance teams increasingly track a small set of quantitative indicators: percentage of workforce completing security training on schedule, percentage of production systems covered by centralized logging, mean time to revoke access after termination, and percentage of vendors with executed BAAs before production connectivity.
None of these metrics alone “proves” HIPAA compliance, but together they show operational discipline—the same discipline OCR associates with good-faith efforts to comply with 45 CFR §164.308(a)(1).
Where to go next
If you are modernizing infrastructure, sequence Security Rule work alongside data governance: classify ePHI locations first, then tighten access and monitoring around those systems. If you are a SaaS vendor, map customer expectations in enterprise agreements to explicit Security Rule control owners on your side.
Sources & citations
- 45 CFR Part 164 Subpart C (Security Standards)Open
- HHS Security Rule guidance materialsOpen
- NIST Cybersecurity Framework (mapping reference)Open
All content verified against official HHS guidance and the Code of Federal Regulations.
Frequently asked questions
Who must comply with the HIPAA Security Rule?▾
Is the Security Rule prescriptive about specific technologies?▾
What is the relationship between risk analysis and the Security Rule?▾
Do small practices have the same Security Rule obligations?▾
How often should security documentation be updated?▾
Related intelligence
Not legal advice. medcomply.ai provides compliance intelligence for educational and operational planning. Consult qualified counsel for legal interpretation.