Previous All Posts Next

HIPAA Security Risk Assessment

Posted: March 28, 2026 to Compliance.

Why the Risk Assessment Is HIPAA's Most Critical Requirement

The HIPAA security risk assessment is not just another compliance checkbox. It is the foundation that drives every other security decision in your organization. The HHS Office for Civil Rights has made risk assessment deficiencies the number one finding in enforcement actions, with multiple million-dollar settlements resulting from inadequate or missing risk assessments.

A thorough risk assessment tells you where your ePHI is, what threatens it, how vulnerable you are, and what you need to do about it. Without this information, every other security measure is guesswork.

Risk Assessment Methodology Overview

The HHS guidance on risk analysis outlines the required methodology. This guide breaks each step into actionable tasks.

Process Overview

StepPurposeOutput
1. Scope definitionDefine what is being assessedScope document
2. Data inventoryIdentify all ePHI locationsePHI inventory
3. Threat identificationIdentify potential threatsThreat catalog
4. Vulnerability assessmentIdentify weaknessesVulnerability register
5. Control evaluationAssess existing safeguardsControl effectiveness ratings
6. Likelihood determinationRate probability of threatsLikelihood ratings
7. Impact analysisRate potential damageImpact ratings
8. Risk calculationCombine likelihood and impactRisk scores
9. Risk responseDecide how to address risksRisk management plan
10. DocumentationRecord everythingComplete risk assessment report

Step 1: Define the Scope

Every system, application, and process that creates, receives, maintains, or transmits ePHI must be included in your assessment scope.

Scope Checklist

  • Electronic health records (EHR) system
  • Practice management software
  • Email systems used for PHI communication
  • Medical devices that store or transmit patient data
  • Cloud services that process or store ePHI
  • Mobile devices used by staff for PHI access
  • Network infrastructure (routers, switches, firewalls, Wi-Fi)
  • Workstations and laptops used to access ePHI
  • Backup systems containing ePHI copies
  • Physical locations where ePHI is stored or accessed
  • Paper records (if being converted to or from electronic)
  • Business associate systems that handle your ePHI

Step 2: ePHI Data Inventory

Document every place ePHI resides, including locations most organizations overlook.

Commonly Overlooked ePHI Locations

  • Voicemail systems with patient messages
  • Fax servers and multifunction printer hard drives
  • Staff personal devices (BYOD)
  • Appointment scheduling platforms
  • Patient portals and communication apps
  • Billing and claims processing systems
  • Analytics and reporting databases
  • Development and testing environments using real data
  • Former employee devices not yet returned or wiped

Data Flow Mapping

For each system, document how ePHI flows in and out. This reveals transmission paths that need encryption and handoff points that need access controls.

Step 3: Identify Threats

Threat Categories

CategoryExamples
NaturalFloods, hurricanes, earthquakes, power outages
Human (intentional)Hackers, ransomware, insider theft, social engineering
Human (unintentional)Employee errors, misdirected emails, lost devices
EnvironmentalPower failures, HVAC failures, water damage
TechnicalSystem failures, software bugs, network outages

Current Threat Landscape for Healthcare

  • Ransomware targeting healthcare (increased 300% in recent years)
  • Phishing attacks impersonating EHR vendors, insurance companies, and colleagues
  • Insider threats from disgruntled employees or those with excessive access
  • Medical device vulnerabilities (unpatched firmware, default credentials)
  • Business email compromise targeting billing and accounts payable

Step 4: Identify Vulnerabilities

Assessment Methods

  1. Technical scanning: Automated vulnerability scans of networks, systems, and applications
  2. Configuration review: Compare system configurations against CIS benchmarks and vendor guidelines
  3. Policy review: Evaluate written policies against HIPAA requirements
  4. Staff interviews: Assess awareness of security procedures and potential workarounds
  5. Physical inspection: Walk through facilities checking physical safeguards
  6. Penetration testing: Simulate real attacks to find exploitable weaknesses

Common Healthcare Vulnerabilities

  • Unpatched systems (especially legacy medical devices)
  • Weak or shared passwords
  • Lack of network segmentation between clinical and administrative networks
  • Missing encryption on portable devices and email
  • Inadequate backup testing (backups exist but have never been restored)
  • Excessive user permissions (staff with access beyond their role)
  • Missing or incomplete audit logging

Step 5: Evaluate Existing Controls

For each threat-vulnerability pair, evaluate the effectiveness of current controls.

Control Effectiveness Scale

RatingDescription
EffectiveControl fully mitigates the risk. Tested and verified
Partially effectiveControl reduces but does not eliminate the risk
IneffectiveControl exists but does not meaningfully reduce the risk
MissingNo control exists for this threat-vulnerability pair

Steps 6-8: Risk Calculation

Likelihood Rating

LevelDescriptionScore
Very LowUnlikely to occur1
LowPossible but not expected2
MediumCould reasonably occur3
HighLikely to occur within the assessment period4
Very HighAlmost certain to occur5

Impact Rating

LevelDescriptionScore
MinimalMinor inconvenience, no PHI exposure1
LowLimited PHI exposure, minimal harm2
MediumSignificant PHI exposure, moderate harm3
HighLarge-scale PHI exposure, substantial harm4
CriticalCatastrophic PHI exposure, severe patient harm, regulatory action5

Risk Level = Likelihood x Impact

  • Critical (20-25): Immediate action required
  • High (12-19): Address within 30 days
  • Medium (6-11): Address within 90 days
  • Low (1-5): Address during normal operations

Step 9: Risk Response and Management Plan

For each identified risk, select a response strategy and document specific actions.

Response Strategies

  • Mitigate: Implement controls to reduce risk to an acceptable level
  • Accept: Acknowledge the risk and document the rationale (only for low risks)
  • Transfer: Shift risk to another party (cyber insurance, business associate)
  • Avoid: Eliminate the risk by changing the process or technology

Management Plan Template

For each risk requiring mitigation:

  1. Description of the risk
  2. Current risk level
  3. Planned remediation action
  4. Responsible person
  5. Target completion date
  6. Expected residual risk level after remediation
  7. Status tracking

Step 10: Documentation

The final risk assessment report must be comprehensive, dated, and retained for 6 years. It should include all of the above steps plus an executive summary, methodology description, and sign-off from organizational leadership.

Our HIPAA compliance team conducts thorough risk assessments using industry-standard methodology, producing documentation that satisfies OCR requirements and provides actionable remediation roadmaps.

For additional guidance, also see our penetration testing services which complement the risk assessment with hands-on technical validation of your security controls.

Frequently Asked Questions

Can I use a free risk assessment tool?

HHS provides a free Security Risk Assessment Tool (SRA Tool) suitable for small practices. Larger organizations typically need more sophisticated tools or professional assessors. Regardless of the tool used, the methodology and documentation requirements remain the same.

How long does a risk assessment take?

For a small practice (5-20 employees), a thorough assessment takes 2-4 weeks. For mid-sized organizations, 4-8 weeks. For large healthcare systems, 8-16 weeks. These timelines include data gathering, analysis, and documentation.

What happens if OCR finds our risk assessment inadequate?

An inadequate risk assessment is one of the most cited findings in OCR enforcement actions. Penalties can range from corrective action plans to multi-million-dollar settlements. Failure to conduct a risk assessment at all has resulted in some of the largest HIPAA fines in history.

Do business associates need their own risk assessment?

Yes. Business associates are independently responsible for conducting their own HIPAA risk assessments covering the ePHI they create, receive, maintain, or transmit. Covered entities should verify their business associates have completed this requirement.

Should I hire a professional or do it in-house?

Small practices with simple IT environments can use the HHS SRA Tool for in-house assessment. Organizations with complex environments, multiple locations, or high-risk profiles benefit significantly from professional assessment. External assessors bring objectivity and expertise that internal teams may lack.

What is the relationship between risk assessment and penetration testing?

The risk assessment identifies and evaluates risks at a strategic level. Penetration testing validates specific technical vulnerabilities by attempting to exploit them. They are complementary: the risk assessment identifies what to test, and penetration testing verifies whether controls actually work.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Achieve Compliance with Expert Guidance

CMMC, HIPAA, NIST, PCI-DSS — we have 80% of documentation pre-written to accelerate your timeline.

Learn About Compliance Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now