
Healthcare’s threat surface keeps expanding, but a proper HIPAA Security Risk Analysis helps keep patient data safe.
Cloud migrations, remote work, third-party platforms, and AI tools create more places where electronic protected health information (ePHI) is created, stored, processed, and transmitted. In this environment, the HIPAA Security Risk Analysis remains the control that anchors the program in reality.
Weak HIPAA security risk analyses correlate with enforcement findings, operational disruption, and documented patient risk. This article clarifies what a HIPAA Security Risk Analysis is, why it matters, and how to build one that holds up against scrutiny.

A HIPAA Security Risk Analysis evaluates where ePHI is created, received, maintained, or transmitted, and how it could be compromised, then documents how the organization will reduce those risks to a reasonable and appropriate level.
In practice, that means:
HHS frames HIPAA Security Risk Analysis as foundational because it informs the selection of safeguards and technologies.
The Security Rule requires two paired implementation specifications. Covered entities and business associates must conduct an accurate and thorough HIPAA Security Risk Analysis, then manage the risks to a reasonable and appropriate level.
These duties appear in 45 C.F.R. § 164.308(a)(1)(ii) (A) for HIPAA Security Risk Analysis and § 164.308(a)(1)(ii)(B) for Risk Management.
HIPAA does not prescribe a fixed timetable. OCR explains that HIPAA Security Risk Analysis is an ongoing activity that must be reviewed and updated as needed, such as when environmental or operational changes affect the security of ePHI.
Common triggers include:
Many teams run a formal update each year and perform targeted re-runs on these triggers. The key is to align updates with reality.
Legally, the covered entity or business associate is responsible, including when third parties assist. The Security Rule also requires a designated security official who is responsible for developing and implementing the program described in Subpart C.
Effective HIPAA security risk analyses involve:
This structure ensures that the scope, findings, and remediation reflect the entire enterprise rather than a single system or department.
Leaders should expect practical documentation they can use.
The Security Rule uses flexibility of approach. Entities tailor safeguards based on size, complexity, capabilities, infrastructure, and the probability and criticality of risks.
Several technical safeguards, such as encryption, are addressable. Addressable means entities must implement the safeguard where reasonable and appropriate or document an equivalent alternative or a reason the safeguard is not reasonable.
The Security Rule requires written policies and procedures and documentation of actions, activities, and assessments. That includes the HIPAA Security Risk Analysis, risk management (guided by the HIPAA Security Risk Analysis) decisions, and updates.
Documentation must be retained for six years from the date of creation or the last effective date, whichever is later, and must be available to those responsible for implementation. Clear traceability from risk to treatment to dated proof is what allows programs to withstand audits and investigations.
Under the 2021 amendment to HITECH, Public Law 116-321, OCR must consider whether a regulated entity had recognized security practices in place for the prior 12 months when making certain enforcement and audit determinations.
OCR has described how entities can demonstrate those practices, such as NIST CSF aligned programs or 405(d) Health Industry Cybersecurity Practices, and has clarified this is a mitigating factor, not a safe harbor. Programs that operationalize recognized practices alongside a strong HIPAA Security Risk Analysis have better footing in investigations.

These are the risks that appear most often in audits, settlements, and sector research. Each subsection outlines the exposure and the shortcomings that keep HIPAA Security Risk analyses from passing muster. Use them to stress-test your current approach.
OCR’s national audit of 166 covered entities and 41 business associates found only 14% of covered entities and 17% of business associates substantially met the HIPAA Security Risk Analysis requirement.
On Risk Management, the compliance ratings were 6% for covered entities and 12% for business associates. Recurring failure modes included partial ePHI scoping, reliance on templates without entity-specific analysis, and a weak or nonexistent link from identified risks to funded remediation.
Common shortcomings include:
A JAMA Network Open cohort study found hospital cyber events were associated with regional disruptions, including higher emergency department volumes and delays for time-sensitive care at neighboring hospitals.
Economic research linked ransomware attacks to higher hospital mortality among patients already admitted when an attack began, with the largest effects during severe incidents. Weak HIPAA security risk analyses often overlook downtime risks, backup and restore realities, and clinical workarounds. Those gaps translate to worse outcomes during real events.
Where HIPAA Security Risk analyses fall short:
Healthcare’s dependence on clearinghouses, cloud services, and niche vendors concentrates risk. In 2024, 41.2% of tracked third-party breaches affected healthcare organizations.
This underscores why business associate data flows and oversight belong within the scope of HIPAA Security Risk Analysis rather than in a separate vendor exercise.
Telltale gaps include:
IBM’s 2024 report placed the global average breach cost at $4.88 million, with healthcare again the most expensive sector at $9.77 million per breach on average. These totals reflect disruption, response, and lost business, not just fines.
Even when penalties are modest, weak HIPAA Security Risk analyses show up later as prolonged recovery, extended downtime, and higher churn among patients and referring providers.
What weak programs share:
Programs depend on ownership. Name an executive sponsor and the required security official and involve privacy and compliance, IT and security, HIM, clinical leadership, and counsel.
Set a quarterly cadence with a standard agenda so scope, analysis, remediation, vendor oversight, and evidence stay current. Emphasize operational and outcome oriented metrics that leaders can act on.
Examples include:
A one-page summary with these metrics gives leaders a reliable view of momentum and blockers.

When the HIPAA Security Risk Analysis is behind or scattered across systems and inboxes, a structured quarter can create visible progress and a defensible record.
Days 1 to 30. Finish scope and reconcile inventories.
Days 31 to 60. Refresh the risk register and fund the top items.
Days 61 to 90. Implement high value controls and stage evidence.
Preparation shortens response time and reduces errors. Expedited requests are common. Letters often set deadlines within 10 to 30 days. Pre-stage a response playbook that names a coordinator, lists the document index, and describes version control and the secure workspace for collaboration. When a request arrives, freeze copies for the record while the team works from staged materials.
A tabletop drill once a year tests the process and yields practical improvements. Programs that can produce the scope pack, risk register, and evidence index on demand typically move through review faster.
More than one method can satisfy HIPAA if it is applied consistently, accurately scoped, and linked to prioritized, funded remediation.
What matters most are the outcomes. Complete scope, credible scoring, visible owners and dates, and evidence that controls operate.
Does a penetration test or EHR certification cover the HIPAA Security Risk Analysis?
No. A pen test is a useful input, not a substitute for an enterprise-wide HIPAA Security Risk Analysis and risk management (guided by the HIPAA Security Risk Analysis) program. EHR certification does not satisfy the Security Rule’s required implementation specifications at 45 C.F.R. § 164.308(a)(1)(ii)(A) and § 164.308(a)(1)(ii)(B).
How often is enough?
At least annually and after material change is a prudent practice. HIPAA’s requirement is an ongoing analysis updated as needed. Define re-run triggers in policy so updates occur when reality changes rather than only on a calendar.
What evidence is enough?
Proof that controls operate, not just exist. Keep recent logs, exports, and test results and index them to specific risks and systems. Reviewers look for traceability from risk to control to dated proof.
Do recognized security practices reduce exposure in enforcement?
OCR must consider whether recognized practices were in place and operating during the prior 12 months. This can mitigate penalties and remedies, although outcomes remain discretionary.
ChartRequest offers medical records exchange software and services to standardize requests and improve compliance.
When records move through ChartRequest, protection is built in and proof is easy to show. Our SOC 2 Type II and HITRUST-compliant systems safeguard sensitive information while your team works inside standardized, auditable workflows.
What you can rely on:
Meet with our team to review your compliance goals and see ChartRequest in action.