Definitive Guide

HIPAA Security Rule Guide 2026

The complete guide to HIPAA Security Rule compliance. Covers the three safeguard categories, mandatory risk assessment process, cloud security requirements, and a compliance checklist. PTG has delivered HIPAA security solutions since 2002.

CMMC Registered Practitioner Org|BBB A+ Since 2003|23+ Years Experience
The Three Safeguards

HIPAA Security Rule Structure

The Security Rule (45 CFR Part 164, Subpart C) protects ePHI through three categories of safeguards. "Addressable" does not mean optional.

45 CFR 164.308

Administrative Safeguards

Risk analysis, security management, workforce security, training, incident procedures, contingency planning, and BAA requirements. Roughly half of all Security Rule requirements.

45 CFR 164.310

Physical Safeguards

Facility access controls, workstation use and security policies, device and media controls for hardware containing ePHI.

45 CFR 164.312

Technical Safeguards

Access control (unique IDs, MFA), audit controls, integrity mechanisms, authentication, and transmission security (TLS 1.2+, VPN, encrypted email).

CRITICAL REQUIREMENT

Risk Analysis

The most frequently cited OCR deficiency. Must identify all ePHI systems, assess threats and vulnerabilities, determine risk levels, and document everything as a living document.

Who Must Comply

Security Rule Applies To

Healthcare Providers Health Plans Clearinghouses IT Service Providers Cloud Providers (AWS, Azure, GCP) EHR Vendors Medical Billing Companies All Business Associates
PTG Services

How PTG Helps

01

AI-Powered Risk Assessment

02

OCR Audit-Ready Documentation

03

Cloud and Hybrid Security Design

04

Technical Safeguard Implementation

05

Staff Security Training

06

Continuous Compliance Monitoring

FAQ

Frequently Asked Questions

What is the HIPAA Security Rule?

The federal regulation (45 CFR Part 164, Subpart C) establishing a national floor of protection for electronic PHI. It mandates administrative, physical, and technical safeguards with civil penalties reaching $2.13 million per violation category per year.

Does the Security Rule require encryption?

Encryption is addressable but expected. The proposed 2024 rule update would mandate encryption of ePHI at rest and in transit. PTG recommends implementing encryption now as the de facto standard.

What is a HIPAA Security Officer?

A designated individual responsible for developing and implementing security policies and procedures. This can be an existing employee or a virtual security officer from an outside firm like PTG.

What cloud providers are HIPAA-eligible?

AWS, Azure, and Google Cloud all offer HIPAA-eligible services with BAAs. However, using an eligible provider does not automatically make your deployment compliant. Your configuration must also satisfy the Security Rule.

How often should vulnerability scans be conducted?

The proposed 2024 rule update requires vulnerability scanning every six months and penetration testing annually. PTG recommends quarterly scans as a current best practice.

Does the Security Rule apply to small practices?

Yes. There is no size exemption. A solo provider with one desktop is subject to the same standards as a hospital system. The rule allows flexibility in implementation, not in obligation.

Get Started

Get Your HIPAA Security Assessment

AI-powered risk assessment combined with 23+ years of regulatory expertise. Protect your patients and satisfy OCR.