HIPAA8 min read

HIPAA Compliance Checklist

This checklist provides a practical guide for technology companies achieving HIPAA compliance. Whether you're a SaaS company entering the healthcare market or expanding your compliance program, use this checklist to track progress and identify gaps.

The checklist covers administrative, physical, and technical requirements, with specific focus on business associate obligations most relevant to technology companies.

Key Takeaways

Aspect Details
Foundation Risk assessment is the starting point for all compliance
Documentation Policies, procedures, and evidence must be maintained
Ongoing HIPAA compliance is continuous, not one-time
Technology focus Most safeguards for SaaS are technical and administrative
Timeline Initial compliance typically takes 2-4 months

Quick Answer: HIPAA compliance requires implementing administrative, physical, and technical safeguards based on a risk assessment. For technology companies, key areas include security policies, access controls, encryption, audit logging, workforce training, vendor management, and incident response.

Before You Start

Determine Your HIPAA Status

  • Confirmed you handle PHI on behalf of covered entities (business associate)
  • Identified all covered entities you serve
  • Understood your obligations under existing BAAs
  • Identified all subcontractors who access PHI

Establish Ownership

  • Designated HIPAA Security Officer
  • Designated HIPAA Privacy Officer (can be same person)
  • Established compliance reporting to leadership
  • Allocated budget and resources

Phase 1: Risk Assessment

The risk assessment is the foundation of HIPAA compliance. Everything else flows from understanding your risks.

Scope and Inventory

  • Identified all systems that create, receive, maintain, or transmit ePHI
  • Documented data flows showing how PHI moves through systems
  • Inventoried all locations where PHI is stored
  • Identified all personnel with PHI access
  • Documented all third parties with PHI access

Threat and Vulnerability Assessment

  • Identified potential threats to ePHI (natural, human, environmental)
  • Identified vulnerabilities in systems and processes
  • Assessed current security controls
  • Determined likelihood of threat occurrence
  • Assessed potential impact of threats

Risk Analysis and Documentation

  • Calculated risk levels for identified threats
  • Prioritized risks for remediation
  • Documented risk assessment methodology and findings
  • Created risk register with all identified risks
  • Established risk acceptance criteria and process

Risk Management Plan

  • Developed remediation plan for unacceptable risks
  • Assigned ownership for each remediation item
  • Established timeline for remediation
  • Defined process for tracking remediation progress
  • Documented risk acceptance decisions with rationale

See our detailed guide on HIPAA Risk Assessment.

Phase 2: Administrative Safeguards

Policies and Procedures

Core policies required:

  • Information Security Policy
  • Acceptable Use Policy
  • Access Control Policy
  • Data Classification Policy
  • Encryption Policy
  • Incident Response Policy
  • Business Continuity/Disaster Recovery Policy
  • Vendor Management Policy
  • Physical Security Policy
  • Workforce Security Policy (hiring, termination, sanctions)
  • Risk Management Policy
  • Privacy Policy (PHI handling)
  • Breach Notification Policy

Policy management:

  • Policies approved by leadership
  • Policies accessible to workforce
  • Policy review schedule established (at least annual)
  • Policy version control implemented
  • Policy acknowledgment process for workforce

Workforce Security

Access authorization:

  • Defined roles requiring PHI access
  • Documented access authorization procedures
  • Implemented access request and approval workflow
  • Established access review process (at least quarterly)

Workforce clearance:

  • Background check process for PHI access roles
  • Verification of access appropriateness before granting
  • Documentation of clearance decisions

Termination procedures:

  • Access revocation process for terminations
  • Access revocation process for role changes
  • Device and credential return procedures
  • Access revocation within 24 hours of termination

Security Awareness Training

  • Initial HIPAA training for all workforce members
  • Role-specific training for PHI handlers
  • Annual refresher training program
  • Training on recognizing security threats (phishing, social engineering)
  • Training completion tracking and documentation
  • Regular security awareness communications

Incident Response

  • Incident response plan documented
  • Incident types defined and categorized
  • Response procedures for each incident type
  • Escalation procedures defined
  • Communication templates prepared
  • Incident response team identified
  • Incident response testing (at least annual tabletop exercise)

Breach Notification

  • Breach assessment procedures documented
  • Breach notification procedures documented
  • Notification templates prepared
  • Breach log/register maintained
  • Process for notifying covered entities (within required timeframe)
  • Process for supporting covered entity notifications

Contingency Planning

Backup:

  • Automated backup procedures implemented
  • Backup encryption implemented
  • Backup testing performed regularly
  • Backup restoration procedures documented
  • Off-site backup storage (separate from production)

Disaster recovery:

  • Disaster recovery plan documented
  • Recovery Time Objective (RTO) defined
  • Recovery Point Objective (RPO) defined
  • Recovery procedures documented
  • Recovery testing performed (at least annually)

Business continuity:

  • Critical systems identified
  • Emergency mode operations procedures
  • Communication plan for outages

Vendor Management

  • Vendor inventory maintained
  • PHI-accessing vendors identified
  • BAAs obtained from all PHI-accessing vendors
  • Vendor security assessment process
  • Vendor monitoring process
  • Vendor termination procedures

Phase 3: Physical Safeguards

For SaaS companies, most physical safeguards are handled by cloud providers. Focus on your office environment and endpoint devices.

Facility Security

If you have office space with PHI access:

  • Office access controls (badges, keys)
  • Visitor policies and logs
  • Clean desk policy
  • Secure disposal of paper documents

If using cloud providers:

  • Cloud provider BAA in place
  • Cloud provider compliance documentation reviewed (SOC 2, etc.)
  • Cloud provider security practices understood

Workstation Security

  • Workstation use policy documented
  • Screen lock requirements (automatic after inactivity)
  • Private screen filters (if working in public spaces)
  • Secure storage when not in use

Device and Media Controls

  • Device inventory maintained
  • Full disk encryption on all devices
  • Secure disposal procedures
  • Media sanitization procedures
  • Device tracking for PHI-capable devices
  • Remote wipe capability for mobile devices

Phase 4: Technical Safeguards

Access Control

Authentication:

  • Unique user IDs for all users
  • No shared accounts
  • Strong password requirements
  • Multi-factor authentication (MFA) for all PHI access
  • MFA for all administrative access
  • Password management procedures

Authorization:

  • Role-based access control (RBAC) implemented
  • Principle of least privilege applied
  • Access levels documented by role
  • Access reviews performed quarterly
  • Access revocation process

Session management:

  • Automatic session timeout implemented
  • Session timeout configured appropriately (15-30 minutes)
  • Secure session handling

Encryption

Data at rest:

  • Database encryption enabled
  • File storage encryption enabled
  • Backup encryption enabled
  • Encryption key management procedures

Data in transit:

  • TLS 1.2+ for all connections
  • HTTPS enforced on all endpoints
  • Certificate management procedures
  • Internal traffic encryption where appropriate

Audit Controls

  • Audit logging enabled on all systems
  • User access logging (logins, logouts, access to PHI)
  • Administrative action logging
  • Data modification logging
  • Log retention (minimum 6 years recommended)
  • Centralized log management
  • Log monitoring and alerting
  • Regular log review process

Integrity Controls

  • Data validation at input
  • Database integrity constraints
  • Checksums or hashing for critical data
  • Version control for data changes
  • Backup integrity verification

Transmission Security

  • All PHI transmitted over encrypted channels
  • API authentication implemented
  • Secure file transfer mechanisms
  • Email encryption for PHI (or secure messaging alternative)

See our detailed guide on HIPAA Technical Safeguards.

Phase 5: Business Associate Agreements

Upstream (Customer) BAAs

  • BAA template developed
  • BAA includes all required provisions
  • BAA execution process established
  • BAA tracking system in place
  • BAAs executed before PHI sharing

Downstream (Vendor) BAAs

  • All PHI-accessing vendors identified
  • BAAs obtained from cloud providers (AWS, GCP, Azure)
  • BAAs obtained from SaaS tools handling PHI
  • BAAs obtained from professional services with PHI access
  • BAA status tracked for all vendors

See our detailed guide on Business Associate Agreements.

Phase 6: Documentation and Evidence

Required Documentation

  • Risk assessment documentation
  • Policies and procedures
  • Training records
  • Access authorization records
  • Incident documentation
  • BAA copies
  • System configurations (as evidence)

Retention

  • Documentation retained for 6 years
  • Secure storage for documentation
  • Version control for documents
  • Easy retrieval when needed

Evidence Collection

  • Regular evidence collection process
  • Screenshots and exports of configurations
  • Access review documentation
  • Training completion records
  • Incident response documentation

Ongoing Compliance Activities

HIPAA compliance requires ongoing activities, not just initial implementation.

Periodic (Monthly/Quarterly)

  • Access reviews (quarterly)
  • Security awareness communications (monthly)
  • Vulnerability scanning (at least quarterly)
  • Log review and monitoring (ongoing)
  • Vendor monitoring (quarterly)
  • Incident response readiness check (quarterly)

Annual

  • Risk assessment update
  • Policy review and update
  • Security awareness training
  • Penetration testing
  • Disaster recovery testing
  • Business continuity plan review
  • Vendor re-assessment
  • Compliance program evaluation

Event-Driven

  • Risk assessment when significant changes occur
  • Policy updates when processes change
  • Access reviews when roles change
  • Incident response after incidents
  • Vendor assessment when new vendors onboarded

Quick Reference: Minimum Viable Compliance

For early-stage companies needing to establish baseline compliance quickly:

Must Have (Before Handling PHI)

  • Risk assessment completed
  • Core security policies documented
  • BAAs in place (customers and vendors)
  • Encryption implemented (at rest and in transit)
  • Access controls with MFA
  • Audit logging enabled
  • Workforce training completed
  • Incident response plan

Should Have (Within 30 Days)

  • Comprehensive policies and procedures
  • Regular access reviews
  • Backup and recovery testing
  • Vulnerability scanning
  • Log monitoring

Nice to Have (Within 90 Days)

  • Automated compliance monitoring
  • Advanced threat detection
  • SOC 2 report (for customer assurance)
  • Penetration testing

How Bastion Helps

Bastion helps technology companies work through this checklist efficiently:

  • Gap assessment: Evaluate your current state against requirements
  • Risk assessment: Conduct the required analysis with proper documentation
  • Policy development: Create policies tailored to your operations
  • Technical guidance: Implement safeguards correctly
  • Training: Develop and deliver workforce training
  • Ongoing support: Maintain compliance with regular check-ins

Ready to start your HIPAA compliance journey? Talk to our team


Sources