HIPAA is the Atlas's first regulatory framework — federal law, enforced by HHS Office for Civil Rights, with no certification body and no annual audit ritual. The Security Rule (Subpart C) is principle-based and short by federal-law standards. Enforcement comes from breaches and complaints, not from scheduled visits. The discipline is in proving you would have passed.
No HIPAA certificate exists. Like CSF, validation comes through SOC 2+ examinations, HITRUST (which absorbs HIPAA wholesale), or third-party HIPAA risk assessments. OCR audits when investigating breaches or complaints — rarely otherwise.
HIPAA is law, not standard. The Security Rule (45 CFR Part 164 Subpart C) is principles-based and short by federal-law standards — fewer than 25 implementation specifications across all three safeguard categories. Its brevity is intentional: the rule was designed to be technology-neutral and scalable to entities ranging from solo physicians to multinational health insurance carriers. That flexibility is also what makes it confusing to operationalize.
"Addressable" is the most misread term. Many entities treat addressable specifications as optional. They are not. Each addressable spec must be assessed; if reasonable and appropriate, it must be implemented. If not, the entity must document why and implement an equivalent alternative. Decisions like "we don't encrypt at rest because it's just addressable" — without documented analysis or equivalent compensating measure — are exactly the pattern that drives OCR enforcement actions.
Enforcement is episodic, not periodic. Unlike SOX (annual) or ISO 27001 (3-year cycle), HIPAA has no scheduled audit. OCR investigates after a breach is reported, after a complaint is filed, or — rarely — through a compliance audit program (the 2016–17 Phase 2 audits being the most recent comprehensive round). Most entities operate for years without OCR contact, then face intense scrutiny when a triggering event occurs.
The chain of liability runs through BAAs. Pre-Omnibus Rule (2013), only Covered Entities had direct HIPAA obligations; Business Associates were liable only via contract. The Omnibus Rule extended HIPAA's reach to BAs and their subcontractors directly. Today, every BA must comply with the Security Rule, and every CE must have BAAs in place with every BA — and every BA must have BAAs in place with every subcontractor handling ePHI. The chain is documentary; gaps in it are first-line enforcement targets.
Civil money penalties scale with culpability. HITECH's tier structure as currently adjusted (Aug 2024 HHS Federal Register notice, further OMB 1.02598 multiplier applied Jan 2026): no knowledge ($141-$71,162 per violation), reasonable cause ($1,424-$71,162), willful neglect-corrected ($14,232-$71,162), willful neglect-not corrected ($71,162-$2,134,831). Annual cap per provision around $2.13M. These ranges are inflation-adjusted yearly under the Federal Civil Penalties Inflation Adjustment Act Improvements Act; always confirm the current Federal Register notice at time of use. The willful neglect tiers are where most multi-million-dollar settlements live.
The Administrative category is the largest because that's where most enforcement happens. Failures of Risk Analysis, Risk Management, BAA management, sanction policy enforcement, and security incident response account for the majority of OCR Resolution Agreements. Technical controls failures matter, but administrative process failures are easier for OCR to demonstrate and easier to penalize.
The Physical category often gets shrunk by cloud architecture. If your only physical premises are workforce home offices and BA-owned data centers, your Physical safeguards collapse to: workstation use policies, device and media controls (mostly addressable via MDM), and contractual reliance on BA SOC 2 reports for facility controls. That's a defensible posture — but only if you have BAAs and review BA security reports systematically.
Technical controls map cleanly to other frameworks. Unique User ID = SOC 2 CC6.1 = ISO A.5.16 = PCI Req 8. Audit Controls = SOC 2 CC7.2 = ISO A.8.15 = PCI Req 10. Encryption = essentially universal. The crosswalk overhead is minimal once your Technical safeguards are in place.
The 6-year documentation retention is unusually long. Most frameworks require ~3 years. HIPAA requires 6 from the date of creation or the date when last in effect — whichever is later. For policies in continuous use, that means perpetual retention plus 6 years past the policy's eventual retirement. For records of one-time events (training session in 2020), it means retaining the record through 2026 minimum.
"Failure to conduct an accurate and thorough Risk Analysis" is OCR's most-cited finding by a significant margin. Many millions of dollars in CMPs and Resolution Agreements trace back to inadequate or absent SRAs. The pattern is consistent: a breach occurs, OCR opens an investigation, OCR demands the SRA, the entity produces something thin or nonexistent, and the enforcement action follows.
An SRA is not a checklist completion. Many small entities use the HHS Security Risk Assessment Tool or vendor-provided templates and treat them as sufficient. They aren't unless customized to the entity's actual environment, ePHI inventory, threats, and controls. Generic SRAs that could apply to any entity of similar size are flagged as inadequate.
The SRA must drive the Risk Management plan. SRA without risk management is documentation theater. Each identified risk must be tied to a treatment decision (mitigate, accept, transfer, avoid) and to specific safeguards being implemented. OCR commonly traces from SRA findings to risk management plan to actual implementation — gaps in this trace are evidence of program failure.
Periodic updates matter as much as the initial SRA. An SRA from 2019 may have been thorough at the time. By 2026, the entity has new systems, new vendors, new threats, possibly a breach. An SRA that hasn't been refreshed is at best stale and at worst evidence that the entity didn't take its program seriously. NIST SP 800-66r2 (Feb 2024) explicitly recommends annual SRAs at minimum, with event-driven updates for major changes.
The SRA is the foundation for everything else. Sanction policy ties to the workforce risks identified in the SRA. Encryption decisions tie to the SRA's analysis of threat to ePHI in transit and at rest. BA selection criteria tie to risks identified in the BA category. Without a real SRA, every downstream decision lacks documented analytical basis — and every downstream decision becomes harder to defend in an OCR investigation.
| HIPAA standard | SOX | SOC 2 (TSC) | ISO 27001:2022 | NIST CSF 2.0 | PCI DSS v4.0.1 | HITRUST v11 | Shared evidence |
|---|---|---|---|---|---|---|---|
| §164.308(a)(1) — Security Mgmt | ELC · risk memo |
CC3.1 – CC3.4 |
Cl. 6.1 |
GV.RM · ID.RA |
Req 12.3 |
03.a · 03.b |
Risk analysis report, risk treatment plan, sanction policy |
| §164.308(a)(2) — Assigned Resp | ELC · governance |
CC1.3 |
Cl. 5.3 |
GV.RR |
Req 12.4 |
02.a |
Security officer designation, RACI matrix, role descriptions |
| §164.308(a)(3) — Workforce Sec | ITGC — Access |
CC1.4 · CC6.2 |
A.6.1 · A.5.18 |
PR.AT-01 |
Req 12.6 · Req 7 |
02.b · 02.c |
Onboarding/termination tickets, workforce clearance records |
| §164.308(a)(4) — Access Mgmt | ITGC — Access |
CC6.1 – CC6.3 |
A.5.15 · A.8.2 |
PR.AA-05 |
Req 7 |
01.b · 01.v |
JML tickets, UAR exports, IAM config |
| §164.308(a)(5) — Awareness/Train | ELC · COSO Comp.4 |
CC1.4 |
A.6.3 |
PR.AT-01 |
Req 12.6 |
02.e · 02.f |
Training completion reports, phishing tests, attestations |
| §164.308(a)(6) — Incident Procs | BPC · IT ops |
CC7.3 – CC7.5 |
A.5.24 – A.5.27 |
RS.MA · RS.AN |
Req 12.10 |
11.a – 11.c |
Incident tickets, IR plan, post-incident reports |
| §164.308(a)(7) — Contingency | BPC · resilience | A1.2 · A1.3 |
A.5.29 · A.5.30 |
RC.RP |
Req 12.10 |
12.b · 12.c |
DR plan, last-test report, RTO/RPO documentation |
| §164.308(a)(8) — Evaluation | Internal Audit fn | CC4.1 · CC4.2 |
Cl. 9.2 |
ID.IM |
Req 12.4.1 |
06.h |
Internal audit reports, mgmt review minutes |
| §164.308(b) — BA contracts | ITGC + BPC · TPRM |
CC9.2 |
A.5.19 – A.5.23 |
GV.SC |
Req 12.8 · Req 12.9 |
05.k |
BAA inventory, vendor due-diligence packages, SOC 2s |
| §164.310(a) — Facility Access | ITGC — Operations |
CC6.4 |
A.7.1 – A.7.4 |
PR.AA-06 |
Req 9.1 – 9.4 |
08.b |
Badge logs, CCTV retention, visitor records, BA SOC 2 §III |
| §164.310(b)(c) — Workstations | ITGC — Operations |
CC6.7 |
A.7.7 · A.8.1 |
PR.PS-05 |
Req 9 |
08.j |
Workstation policy, MDM enrollment, screen-lock config |
| §164.310(d) — Device/Media | ITGC — Operations |
CC6.5 |
A.7.10 · A.7.14 |
PR.DS-02 |
Req 9.4 · Req 3.2 |
07.a |
Asset register, disposal certs, media re-use logs |
| §164.312(a) — Access Control | ITGC — Access |
CC6.1 – CC6.3 |
A.5.15 · A.5.17 · A.8.2 |
PR.AA-01 · PR.AA-05 |
Req 7 · Req 8 |
01.b · 01.d |
IAM config, MFA enforcement, emergency access procedure |
| §164.312(b) — Audit Controls | ITGC — Operations |
CC7.1 · CC7.2 |
A.8.15 · A.8.16 |
DE.CM-01 |
Req 10 |
09.aa |
SIEM rules, log retention config, alert tuning |
| §164.312(c) — Integrity | ITGC — Operations |
PI1.1 |
A.8.10 · A.8.11 |
PR.DS-01 |
Req 11.5 |
09.bb |
FIM logs, data validation rules, backup integrity tests |
| §164.312(d) — Authentication | ITGC — Access |
CC6.1 |
A.5.16 · A.5.17 |
PR.AA-01 |
Req 8 |
01.b · 01.q |
MFA enforcement, password policy, SSO config |
| §164.312(e) — Transmission | ITGC — Operations |
CC6.7 |
A.8.24 |
PR.DS-02 |
Req 4 |
09.s |
TLS scan, cert inventory, VPN config |
| §164.314 — BAAs & Group Health | BPC · TPRM |
CC9.2 |
A.5.19 |
GV.SC |
Req 12.8.2 |
05.k |
BAA library, contract review records, BA breach notifications |
HIPAA's Technical safeguards map cleanly to every other framework in the Atlas because they describe outcomes (unique user ID, audit logs, encryption, authentication, transmission security) rather than implementations. SOC 2's CC6.x covers the same ground at a slightly higher level of abstraction. ISO 27001's A.5.15–A.5.18 and A.8.x are essentially identical in intent. PCI DSS's Reqs 7, 8, 10, and 4 are more prescriptive versions of the same controls.
The Administrative safeguards are where translation work matters more. HIPAA's Security Management Process (164.308(a)(1)) maps to ISO 27001's Clause 6.1, NIST CSF's GV.RM and ID.RA, and SOC 2's CC3.1–CC3.4 — but the artifact required (an SRA report) is uniquely HIPAA-shaped. A SOC 2 risk assessment template will not satisfy HIPAA without customization to the ePHI inventory, threat landscape, and HIPAA-specific risk treatment vocabulary.
HITRUST swallows HIPAA whole. A HITRUST r2 certification with HIPAA included as an Authoritative Source produces a single MyCSF assessment that satisfies HIPAA, the HITRUST requirements, and several other frameworks simultaneously. This is why HITRUST has dominant share among healthcare SaaS — the alternative is running parallel HIPAA, SOC 2, and ISO programs.
The SOC 2+ HIPAA path is the most common compromise. The CPA performs a SOC 2 examination that explicitly maps to HIPAA Security Rule criteria. The output is a SOC 2 report with HIPAA mapping appendix. Customers asking "are you HIPAA-compliant?" can be shown the report. Cost is ~25% above plain SOC 2; effort is similar. This works well unless customers demand HITRUST specifically.