FrameworksHIPAA Security
sector specificv2013 (proposed update 2025)Published
HIPAA Security Rule
HIPAA Security
The HIPAA Security Rule establishes national standards to protect electronic protected health information (ePHI). It requires covered entities and business associates to implement administrative, physical, and technical safeguards.
Issuing Body
U.S. Department of Health and Human Services (HHS)
Version
2013 (proposed update 2025)
Published
2003-02-20
Controls
20
Mapped Laws
—
| Control ID | Title | Domain | Maturity |
|---|---|---|---|
| HIPAA-164.308(a)(1) | Security Management Process Implement policies and procedures to prevent, detect, contain, and correct security violations. Includes risk analysis, risk management, sanction policy, and information system activity review. | — | defined |
| HIPAA-164.308(a)(2) | Assigned Security Responsibility Identify the security official who is responsible for the development and implementation of the policies and procedures required for the entity. | — | defined |
| HIPAA-164.308(a)(3) | Workforce Security Implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information, and to prevent those workforce members who do not have access from obtaining access. | — | defined |
| HIPAA-164.308(a)(4) | Information Access Management Implement policies and procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements of subpart E of this part. | — | defined |
| HIPAA-164.308(a)(5) | Security Awareness and Training Implement a security awareness and training program for all members of its workforce including management. Includes protection from malicious software, log-in monitoring, and password management. | — | defined |
| HIPAA-164.308(a)(6) | Security Incident Procedures Implement policies and procedures to address security incidents. Includes identification and response to suspected or known security incidents, mitigation of harmful effects, and documentation. | — | defined |
| HIPAA-164.308(a)(7) | Contingency Plan Establish and implement policies and procedures for responding to an emergency or other occurrence that damages systems containing ePHI. Includes data backup, disaster recovery, emergency mode operation, testing, and applications/data criticality analysis. | — | defined |
| HIPAA-164.308(a)(8) | Evaluation Perform a periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and subsequently, in response to environmental or operational changes affecting the security of ePHI. | — | defined |
| HIPAA-164.308(b)(1) | Business Associate Contracts A covered entity may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the covered entity's behalf only if the covered entity obtains satisfactory assurances that the business associate will appropriately safeguard the information. | — | defined |
| HIPAA-164.310(a)(1) | Facility Access Controls Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed. | — | defined |
| HIPAA-164.310(b) | Workstation Use Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access ePHI. | — | defined |
| HIPAA-164.310(c) | Workstation Security Implement physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users. | — | defined |
| HIPAA-164.310(d)(1) | Device and Media Controls Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain electronic protected health information into and out of a facility, and the movement of these items within the facility. | — | defined |
| HIPAA-164.312(a)(1) | Access Control Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights. | — | managed |
| HIPAA-164.312(b) | Audit Controls Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. | — | managed |
| HIPAA-164.312(c)(1) | Integrity Controls Implement policies and procedures to protect electronic protected health information from improper alteration or destruction. | — | managed |
| HIPAA-164.312(d) | Person or Entity Authentication Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed. | — | managed |
| HIPAA-164.312(e)(1) | Transmission Security Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network. | — | managed |
| HIPAA-164.316(a) | Policies and Procedures Implement reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, or other requirements of this subpart. | — | defined |
| HIPAA-164.316(b)(1) | Documentation Maintain the policies and procedures implemented to comply with this subpart in written (which may be electronic) form. Retain documentation for 6 years from the date of its creation or the date when it last was in effect, whichever is later. | — | defined |