Intel
HIPAA Security Rule Overhaul — Final Rule Expected May 2026. Is Your Organization Ready? · Rule Update2026 HIPAA Penalty Amounts — Updated Figures Every Compliance Officer Needs · OCR EnforcementOCR Fines Employer-Sponsored Health Plan $245,000 — A Warning Every HR Department Needs to Read · OCR EnforcementAssured Imaging Fined for Never Conducting a Risk Analysis — 244,813 Patients Affected · OCR EnforcementOCR Begins Enforcing Part 2 — What Behavioral Health Providers Must Know Now · Rule Update15 Million Records Exposed — MMG Fusion Settlement Shows Business Associates Are Squarely in OCR's Crosshairs · OCR EnforcementOCR Expands Enforcement to Risk Management — What Changed in 2026 and What You Must Do Now · Rule UpdateOCR Issues $1.165 Million in Ransomware Penalties — Four Settlements in One Day · OCR EnforcementThe HIPAA Security Rule — A Complete Guide for 2026 · Security RuleUnderstanding the HIPAA Breach Notification Rule · Data BreachHIPAA breach notification overview · Data BreachHow to respond to a HIPAA breach · Data BreachHIPAA compliance checklist for covered entities · AnalysisOCR audit preparation checklist and evidence map · OCR EnforcementPatient rights under HIPAA: practical guide · Rule UpdateHIPAA staff training requirements and cadence · AnalysisHIPAA for SaaS and technology vendors · SaaS & TechnologyHIPAA Security Rule overview for compliance teams · Security RuleHIPAA Security Rule Overhaul — Final Rule Expected May 2026. Is Your Organization Ready? · Rule Update2026 HIPAA Penalty Amounts — Updated Figures Every Compliance Officer Needs · OCR EnforcementOCR Fines Employer-Sponsored Health Plan $245,000 — A Warning Every HR Department Needs to Read · OCR EnforcementAssured Imaging Fined for Never Conducting a Risk Analysis — 244,813 Patients Affected · OCR EnforcementOCR Begins Enforcing Part 2 — What Behavioral Health Providers Must Know Now · Rule Update15 Million Records Exposed — MMG Fusion Settlement Shows Business Associates Are Squarely in OCR's Crosshairs · OCR EnforcementOCR Expands Enforcement to Risk Management — What Changed in 2026 and What You Must Do Now · Rule UpdateOCR Issues $1.165 Million in Ransomware Penalties — Four Settlements in One Day · OCR EnforcementThe HIPAA Security Rule — A Complete Guide for 2026 · Security RuleUnderstanding the HIPAA Breach Notification Rule · Data BreachHIPAA breach notification overview · Data BreachHow to respond to a HIPAA breach · Data BreachHIPAA compliance checklist for covered entities · AnalysisOCR audit preparation checklist and evidence map · OCR EnforcementPatient rights under HIPAA: practical guide · Rule UpdateHIPAA staff training requirements and cadence · AnalysisHIPAA for SaaS and technology vendors · SaaS & TechnologyHIPAA Security Rule overview for compliance teams · Security Rule

Rule Update

HIPAA Security Rule Overhaul — Final Rule Expected May 2026. Is Your Organization Ready?

TL;DR

OCR has kept the proposed HIPAA Security Rule overhaul on its official regulatory agenda for May 2026 — meaning a final rule could be published imminently. The proposed changes are the most sweeping Security Rule update since the original rule took effect in 2005, including mandatory encryption of ePHI at rest and in transit, required multi-factor authentication, annual penetration testing, and 72-hour system restoration objectives. Organizations that begin preparing now will be significantly ahead of those that wait for the final rule.

OCR has kept the proposed HIPAA Security Rule overhaul on its official regulatory agenda for May 2026 — meaning a final rule could be published imminently. The proposed changes are the most sweeping Security Rule update since the original rule took effect in 2005, including mandatory encryption of ePHI at rest and in transit, required multi-factor authentication, annual penetration testing, and 72-hour system restoration objectives. Organizations that begin preparing now will be significantly ahead of those that wait for the final rule.

The most significant update to the HIPAA Security Rule since 2013 is on the verge of finalization. Here is what the proposed changes require and what every covered entity and business associate must do to prepare.

medcomply.ai editorial teamPublished May 8, 2026Updated May 8, 20267 min read

For the past several months, compliance officers across the country have been watching the HHS regulatory calendar with a mix of anticipation and anxiety. The proposed overhaul of the HIPAA Security Rule — the most sweeping proposed update since the original rule took effect in 2005 — has been moving toward finalization. And it is almost here.

Where things stand

Despite sharp criticisms and industry pushback, recent developments confirm that OCR has kept the Security Rule overhaul on its official regulatory agenda for May 2026.

This is significant. Proposed rules frequently slip from regulatory agendas, particularly after administration changes. The fact that OCR has maintained its May 2026 target — through a change in administration and significant industry opposition — signals genuine institutional commitment to finalizing this rule.

OCR has stated that the final rule is due in May 2026, although it could well be delayed. If issued, it will likely be 2027 before compliance is enforced.

The practical implication: organizations that begin preparing now will be significantly ahead. The compliance window after a final rule publishes may be as short as 180 days for some provisions.

What the proposed rule requires

HHS proposed substantial Security Rule changes on December 27, 2024, including mandatory encryption of ePHI at rest and in transit, MFA, asset inventories and network maps, routine vulnerability scanning and annual penetration tests, segmentation, 24-hour access-change notifications, 72-hour restoration objectives, and annual compliance audits.

Here is what each major proposed change means in practice:

Mandatory encryption — the end of the addressable standard

Under the current Security Rule, encryption of ePHI at rest and in transit is an addressable implementation specification. Organizations can choose not to encrypt if they document a reasonable alternative. In practice many organizations — particularly small practices — have used this flexibility to defer encryption indefinitely.

The proposed rule eliminates this flexibility entirely. Encryption of ePHI at rest and in transit would become a required specification. There are no alternatives, no documentation workarounds, and no exceptions based on organization size. Every system storing or transmitting ePHI must encrypt it.

45 CFR §164.312(a)(2)(iv)

Multi-factor authentication — required for all ePHI access

The proposed rule would make MFA a required specification for all workforce member access to systems containing ePHI. Currently MFA is strongly encouraged through NIST guidance and OCR cybersecurity guidance but is not explicitly required under the Security Rule itself.

This change will require significant operational investment for organizations with legacy systems, particularly those using shared workstations, older EHR platforms, or point-of-care devices that have not been designed with MFA in mind.

Asset inventories and network maps — required documentation

Organizations would be required to maintain current, accurate inventories of all technology assets that store, process, or transmit ePHI — and network maps showing how ePHI flows between systems. This requirement directly addresses the most common gap OCR finds in breach investigations: organizations that did not know where their ePHI was located.

Annual penetration testing — required, not optional

The proposed rule would require annual penetration testing of systems containing ePHI. Penetration testing — where security professionals actively attempt to breach an organization's defenses — provides a far more realistic assessment of security posture than vulnerability scanning alone. Currently this practice is recommended but not required.

72-hour restoration objectives — recovery planning gets teeth

Organizations would be required to establish and document a 72-hour recovery time objective for restoring access to ePHI following a security incident. This directly addresses the operational reality of ransomware attacks, where the inability to access patient records creates immediate patient safety risks.

Annual compliance audits

The proposed rule would require annual internal audits of Security Rule compliance — documented reviews of whether policies, procedures, and technical controls continue to meet requirements. This is distinct from a risk analysis and would need to occur in addition to ongoing risk analysis activities.

Note

The proposed rule also includes a 24-hour notification requirement for certain access changes — specifically when workforce member access to ePHI systems is modified. This creates operational demands for HR and IT teams who must coordinate rapidly on access management.

What has not changed

It is important to note that these are proposals; the existing Security Rule remains in force until a final rule is published.

Every organization subject to HIPAA must continue to meet all current Security Rule requirements. The proposed rule does not reduce or defer any existing obligation. Organizations that are currently non-compliant with the existing rule — particularly those lacking a current risk analysis — face immediate enforcement exposure regardless of whether the final rule is published.

The industry pushback — and why it may not matter

The proposed rule generated significant opposition from healthcare industry groups who argued that many of the requirements — particularly mandatory MFA and annual penetration testing — would be disproportionately burdensome for small and rural providers.

OCR has acknowledged these concerns but has not indicated it will substantially scale back the proposed requirements. The agency's public position is that the current cybersecurity threat environment in healthcare — with large breaches affecting hundreds of millions of patients annually — justifies stronger mandatory requirements regardless of implementation burden.

Warning

Small practice exceptions are not expected in the final rule. OCR's public statements have consistently emphasized that the proposed requirements apply to all covered entities and business associates regardless of size. Small practices should not plan on being exempted.

What your organization should do now

Waiting for the final rule before beginning preparation is a strategic mistake. Organizations that start now will have more time to implement changes methodically — rather than rushing to meet a compliance deadline.

Audit your encryption posture today. Identify every system, database, device, and data flow that stores or transmits ePHI. Determine what is currently encrypted and what is not. For unencrypted systems, begin the planning process for encryption now — procurement, vendor engagement, and implementation take time.

Assess your MFA readiness. Inventory all systems used to access ePHI. Determine which support MFA natively, which require additional configuration, and which may require replacement or supplemental solutions. Legacy EHR and medical device systems often present the greatest challenges.

Build your asset inventory. Begin documenting all technology assets that touch ePHI — including cloud services, mobile devices, and third-party vendor systems. This documentation will be required under the final rule and is already expected by OCR under the current rule's risk analysis requirement.

Engage a penetration testing vendor. If your organization has never conducted a penetration test, engage a qualified security firm to conduct one before the final rule takes effect. The first test typically reveals more than subsequent annual tests — better to discover vulnerabilities now than after the rule is final.

Update your contingency plan. Review your disaster recovery and business continuity plans against the proposed 72-hour restoration objective. If your current plan cannot realistically achieve 72-hour recovery for ePHI systems, identify what changes are needed.

The HIPAA Security Rule overhaul is the most significant compliance event in healthcare privacy in over a decade. Whether the final rule publishes in May 2026 or later in the year, the proposed requirements are clear and the direction is set. Organizations that treat preparation as optional until after the final rule publishes will face a very compressed implementation timeline.

Sources & citations

  • HHS OCR HIPAA Security Rule NPRM Fact SheetOpen
  • Alston & Bird — HIPAA Security Rule Still on Track for FinalizationOpen
  • 45 CFR Part 164 Subpart C — Current Security StandardsOpen

All content verified against official HHS guidance and the Code of Federal Regulations.

Frequently asked questions

When will the HIPAA Security Rule final rule be published?
OCR has listed May 2026 as the target finalization date on its official regulatory agenda. However, final rules are frequently delayed. If published in May 2026, a compliance deadline would likely follow in 2027 after a grace period. Monitor HHS.gov and medcomply.ai for publication updates.
Will encryption of ePHI become mandatory under the new rule?
Yes — if finalized as proposed. The NPRM proposes making encryption of ePHI at rest and in transit a required specification rather than addressable. Under the current rule, encryption is addressable — meaning organizations can choose alternatives with documentation. The proposed rule eliminates that flexibility.
Will multi-factor authentication be required?
Yes — the proposed rule would make MFA a required specification for all systems containing ePHI. Currently MFA is not explicitly required under the Security Rule, though it is strongly encouraged by OCR and NIST guidance.
Does the current Security Rule still apply while the final rule is pending?
Yes — absolutely. The existing Security Rule remains fully in force until a final rule is published and its compliance deadline passes. Organizations must continue to meet all current Security Rule requirements regardless of pending rulemaking.
How much time will organizations have to comply after the final rule is published?
The NPRM proposed a 180-day compliance period for most provisions after the final rule's effective date. Some provisions may have longer implementation windows. If finalized in May 2026, the earliest mandatory compliance would likely be late 2026 or early 2027.

Not legal advice. medcomply.ai provides compliance intelligence for educational and operational planning. Consult qualified counsel for legal interpretation.