725+
healthcare breaches reported to HHS OCR in 2023
$10.9M
average cost of a healthcare data breach (IBM 2023)
88%
of healthcare organizations experienced a data breach in the past two years
60 days
maximum breach notification window under HIPAA

Healthcare organizations operate under a dual mandate that no other sector faces: protect sensitive patient data while keeping life-critical systems available around the clock. A ransomware attack that shuts down a hospital billing system is an inconvenience; one that takes down an ICU's monitoring systems can kill patients. That stakes difference explains why healthcare remains the most targeted and most breached sector globally, and why HIPAA compliance alone is insufficient as a security strategy. This guide walks through both the regulatory requirements and the operational security controls that actually protect electronic Protected Health Information (ePHI).

What HIPAA Actually Requires of Security Teams

HIPAA's Security Rule covers ePHI at rest and in transit. It establishes three categories of safeguards: administrative, physical, and technical. Security teams own the technical safeguards directly, and must implement or document as addressable the following controls.

Access Control (Required)

Unique user IDs, emergency access procedures, automatic logoff, and encryption/decryption mechanisms. Every user touching ePHI needs a traceable identity.

Audit Controls (Required)

Hardware, software, and procedural mechanisms that record and examine activity in systems containing ePHI. This is the log retention and SIEM use case for healthcare.

Integrity Controls (Addressable)

Mechanisms to authenticate that ePHI has not been altered or destroyed in an unauthorized manner. File integrity monitoring and digital signatures apply here.

Transmission Security (Addressable)

Encryption of ePHI in transit across open networks. TLS 1.2+ minimum; TLS 1.3 preferred. Any ePHI traversing the internet without encryption is an immediate violation.

Person Authentication (Required)

Verify that a person seeking access to ePHI is the claimed identity. MFA is the practical implementation, though HIPAA does not explicitly mandate it.

Conducting a HIPAA Risk Analysis

The risk analysis is the foundational HIPAA requirement and the most commonly cited deficiency in OCR audits. A compliant risk analysis is not a checklist exercise — it is a documented assessment of threats, vulnerabilities, and likelihood/impact ratings for all ePHI the organization creates, receives, maintains, or transmits.

Scope ePHI inventory

Enumerate every system, application, database, device, and media type that stores or transmits ePHI. Shadow IT and medical devices are the usual gaps.

Identify threats and vulnerabilities

Map threats (ransomware, insider misuse, hardware theft, misconfiguration) to vulnerabilities in each ePHI-handling system.

Assess current controls

Document what controls exist and evaluate their effectiveness. An unpatched EHR server with no EDR is a different risk profile than a patched, monitored system.

Determine likelihood and impact

Rate each threat-vulnerability pair using a defined scale. OCR expects qualitative ratings (High/Medium/Low) at minimum; quantitative risk scoring strengthens defensibility.

Document and remediate

The risk analysis must be written, reviewed periodically, and drive a risk management plan. Periodic means at least annually and after significant environmental changes.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Healthcare-Specific Threat Landscape

Healthcare faces threats that compound standard enterprise risks with sector-specific attack surfaces.

Ransomware targeting EHR availability

Attackers know hospitals cannot defer patient care. Double-extortion ransomware hits EHR systems first, then exfiltrates ePHI before encrypting. The combination creates both operational and regulatory crisis simultaneously.

Medical device security

Legacy infusion pumps, imaging systems, and monitoring equipment run unpatched operating systems (often Windows XP or CE) with no EDR support and no patch path. Network segmentation is the primary control.

Third-party and vendor risk

Business Associates (BAs) under HIPAA must sign BAAs and implement equivalent safeguards. The Change Healthcare breach (2024) demonstrated that a single BA compromise can affect 100+ million patients across thousands of covered entities.

Phishing targeting clinical staff

Clinical workflows require constant email and link-based communication. Healthcare phishing click rates run 2-3x enterprise averages. BEC targeting accounts payable and pharmacy procurement is increasing.

Insider threat in high-turnover environments

Healthcare has high staff turnover and strong motivation for insider data theft (patient records sell for $250-$1,000 each on darknet markets). Privileged access reviews and UEBA monitoring are essential.

Technical Controls for ePHI Protection

Implementing HIPAA technical safeguards in practice requires mapping controls to real systems and workflows.

Network segmentation for clinical systems

Separate clinical networks (EHR, PACS, medical devices) from corporate IT and guest WiFi using VLANs or SDN segmentation. Medical device networks should be isolated with deny-all egress except required destinations.

Encryption at rest

Full-disk encryption on all workstations and laptops. Database-level encryption or tablespace encryption for EHR databases. Encrypted backup media — a stolen unencrypted backup tape triggers breach notification.

Privileged access management

Limit privileged access to EHR databases, backup systems, and network infrastructure. PAM vaulting prevents credential theft from propagating to patient data repositories.

Audit logging and SIEM

HIPAA requires audit logs; regulations do not specify retention periods, but OCR investigations look back 6 years. Retain security-relevant logs for at least 3 years; 6 years for compliance documentation.

Email security

Enforce TLS on all outbound email containing ePHI. HIPAA allows email transmission of ePHI if appropriate safeguards are in place — secure email gateways with TLS enforcement and DLP scanning satisfy this.

Breach Notification: What Happens After an Incident

HIPAA's Breach Notification Rule requires covered entities to notify affected individuals, HHS OCR, and in some cases, media outlets following a breach of unsecured ePHI. Unsecured means not encrypted to NIST standards. The timeline is strict.

The Change Healthcare breach of 2024 affected an estimated 100 million individuals — the largest healthcare breach in US history — through a single Business Associate without MFA on a Citrix portal.

HHS OCR Incident Summary, 2024

Individual notification

Within 60 days of discovering a breach, notify each affected individual. Notification must include what happened, what information was involved, what you are doing about it, and what individuals can do to protect themselves.

HHS OCR notification

Breaches affecting 500+ individuals in a state must be reported to HHS OCR within 60 days. Breaches affecting fewer than 500 can be batched and reported annually by March 1.

Media notification

Breaches affecting 500+ residents of a state or jurisdiction require notification to prominent media outlets in that state within 60 days.

Business Associate notification

BAs must notify covered entities within 60 days of discovering a breach. The covered entity's clock starts when the BA provides notice, or when the covered entity should reasonably have known.

Medical Device Security: The Unpatched Attack Surface

The FDA's 2023 Cybersecurity Requirements for Medical Devices (Section 524B of the FD&C Act) now require manufacturers to submit cybersecurity plans for premarket approval. But the installed base of legacy devices remains enormous. Security teams must manage what they cannot patch.

Asset discovery and inventory

You cannot protect what you cannot see. Deploy passive network discovery (Claroty, Medigate, Armis) purpose-built for biomedical environments. Active scanning risks crashing legacy device firmware.

Network isolation

Place medical devices on dedicated VLANs with firewall rules permitting only required clinical communication flows. No internet access, no direct corporate network access.

Monitoring without agents

Use network-based behavioral analytics to detect anomalous device behavior. An infusion pump initiating SMB connections or DNS lookups to unknown domains is an immediate alert.

Vendor coordination

Establish device-specific vulnerability tracking with each biomedical vendor. Most vendors publish security bulletins through MDS2 forms and their own advisories. Subscribe to all of them.

Building an OCR-Defensible Security Program

OCR investigations are triggered by breach reports and complaints. Organizations that demonstrate a mature, documented security program with a completed risk analysis and risk management plan receive significantly lower penalties than those that cannot produce documentation. The Resolution Agreements OCR has published show multi-million dollar settlements for organizations that had neither documented their risks nor implemented basic controls. Defensibility comes from written policies, completed risk analyses, staff training records, and evidence that identified risks were addressed.

The bottom line

Healthcare cybersecurity requires meeting both HIPAA's legal floor and the operational security standard required to actually protect patients and systems. A completed, current risk analysis is the single most important compliance artifact. But the technical controls — segmentation, encryption, PAM, audit logging, and medical device isolation — are what actually prevent breaches. The sector's threat profile demands both.

Frequently asked questions

What are HIPAA's required technical safeguards?

HIPAA's Security Rule requires four technical safeguards: access control (unique user IDs, emergency access, automatic logoff), audit controls (activity logging in ePHI systems), integrity controls (addressable — mechanisms to prevent unauthorized ePHI alteration), and transmission security (addressable — encryption of ePHI over open networks). Person authentication is also required, with MFA being the standard implementation.

How often must a HIPAA risk analysis be conducted?

HIPAA does not specify a frequency, but OCR expects the risk analysis to be reviewed periodically and updated after significant environmental changes. In practice, annual review is the minimum defensible standard, with additional assessments required after major system changes, acquisitions, or incidents.

What triggers HIPAA breach notification?

Any unauthorized acquisition, access, use, or disclosure of unsecured ePHI that compromises its security or privacy triggers breach notification. Unsecured means not encrypted to NIST standards. There is a limited exception for inadvertent disclosures where the recipient would not be able to retain the information. Encrypted ePHI that is breached does not trigger notification.

Are medical devices covered under HIPAA?

Medical devices that create, receive, maintain, or transmit ePHI are covered systems under HIPAA's Security Rule. The covered entity (hospital or clinic) is responsible for implementing appropriate safeguards even if the device vendor controls the software. Network segmentation, passive monitoring, and MDS2 form-based vulnerability tracking are the primary security controls for unagentable legacy devices.

What is a Business Associate Agreement (BAA) and why does it matter?

A BAA is a contract required by HIPAA between a covered entity and any vendor (Business Associate) that creates, receives, maintains, or transmits ePHI on its behalf. The BAA establishes the BA's obligation to implement HIPAA safeguards and report breaches. Without a BAA in place, any disclosure of ePHI to that vendor is itself a HIPAA violation. The Change Healthcare breach (2024) showed that BA breaches can trigger covered entity notification obligations affecting millions of patients.

What is the fine for a HIPAA violation?

OCR civil penalties range from $100 to $50,000 per violation, with annual caps of $25,000 to $1.9 million per violation category. The tier depends on culpability: unknowing violations attract the lowest penalties; willful neglect with no correction can reach $1.9 million per category per year. Criminal penalties apply when violations involve intentional misuse of ePHI.

Does HIPAA require encryption?

HIPAA designates encryption as an addressable specification, meaning organizations must implement it or document why it is not reasonable and appropriate and what equivalent alternative exists. In practice, given modern threat levels, OCR expects encryption of ePHI in transit (TLS) and at rest. Encrypted ePHI that is lost or stolen does not trigger breach notification — making encryption both a compliance and an incident response tool.

Sources & references

  1. HHS OCR — HIPAA Security Rule Guidance
  2. NIST — Health IT Security
  3. HC3 — Health Sector Cybersecurity
  4. CISA — Healthcare Cybersecurity

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.