Compliance BasicsRisk AssessmentSecurity RuleNIST

What Is a HIPAA Risk Assessment and Why Does Your Practice Need One?

April 3, 20268 min read

The HIPAA Security Rule requires every covered entity to conduct a risk assessment — but most small practices have never done one. Here is exactly what it involves, what it must cover, and how to use the results to build a defensible compliance program.

What the Law Actually Requires

Under 45 CFR 164.308(a)(1)(ii)(A), every covered entity must "conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity."


This is not optional. It is the foundational requirement of the HIPAA Security Rule, and OCR uses it as the starting point for every investigation.


What a Risk Assessment Must Cover

A compliant risk assessment must address:


  • **Scope** — All systems, devices, and workflows that create, receive, maintain, or transmit ePHI
  • **Threat Identification** — Ransomware, phishing, insider threats, physical theft, natural disasters
  • **Vulnerability Identification** — Unpatched software, weak passwords, missing MFA, unsecured Wi-Fi
  • **Likelihood and Impact** — A risk matrix rating each threat on a High/Medium/Low scale
  • **Current Controls** — What safeguards are already in place
  • **Risk Register** — A prioritized list of risks with treatment plans
  • **Residual Risk** — What risk remains after controls are applied

  • The NIST SP 800-30 Framework

    OCR recommends using NIST SP 800-30 as the methodology for HIPAA risk assessments. Haskera maps every finding to both the HIPAA Security Rule citation and the corresponding NIST CSF v2.0 function (Identify, Protect, Detect, Respond, Recover).


    How Often Must You Do It?

    There is no fixed interval in the regulation, but OCR expects you to review and update your risk assessment whenever there is a "significant change" to your environment — a new EMR system, a new vendor, a new office location, or a security incident.


    Best practice: conduct a full assessment annually and a lightweight review quarterly.

    Automate your HIPAA compliance with Haskera

    Generate tailored policies, track your compliance score, and share audit-ready reports with one click.