What Are the Proposed Changes to the HIPAA Security Rule?

The U.S. Department of Health and Human Services (HHS) has proposed significant updates to the HIPAA Security Rule to address modern cyber threats. The changes mandate specific security practices, including regular vulnerability assessments and penetration tests, strict patch management deadlines, and the universal application of controls that were previously considered “addressable.”

Executive Summary

The Health Insurance Portability and Accountability Act (HIPAA) sets federal standards for protecting health information in the United States. In response to increasing cyber threats, the Office for Civil Rights (OCR) has proposed major updates to the HIPAA Security Rule. These changes aim to strengthen the protection of electronic Protected Health Information (ePHI) by formalizing security best practices. Key proposals include eliminating the distinction between “required” and “addressable” safeguards, making all controls mandatory. Organizations will be required to conduct vulnerability assessments every six months, perform penetration tests annually, and complete yearly compliance audits. The new rules also enforce strict deadlines for applying security patches: 15 days for critical risks and 30 days for high-priority ones. Additionally, the updates will mandate multi-factor authentication, data encryption, and real-time security monitoring. While a final timeline is not set, the changes have strong support, and organizations are expected to have 180 days to comply once the rule is enacted.

Key Takeaways

  • The distinction between “required” and “addressable” security controls will be eliminated, making all safeguards mandatory.
  • Vulnerability assessments are required every six months, and penetration tests are required annually.
  • Critical security patches must be applied within 15 days, and high-priority patches within 30 days.
  • Multi-factor authentication (MFA) and encryption for data at rest and in transit will be mandatory.
  • Annual compliance audits will be required to verify security measures.
  • Organizations will have 180 days to comply once the new rule takes effect.

What is the HIPAA Security Rule?

The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law that creates standards for protecting sensitive patient data. The law is divided into several sections, including the Privacy Rule, the Breach Notification Rule, and the Security Rule. The Security Rule specifically deals with safeguarding electronic Protected Health Information (ePHI), which includes identifiers like names, social security numbers, and medical records. It details administrative, physical, and technical safeguards that organizations handling ePHI must implement to protect its confidentiality, integrity, and availability. The Office for Civil Rights (OCR) is responsible for enforcing these standards and can conduct audits to ensure compliance.

What Are the Key Proposed Changes to the Security Rule?

The OCR issued a notice for proposed updates to address the modern threat landscape. The most significant change is the removal of the distinction between “required” and “addressable” implementation specifications, which will limit exemptions and enforce a uniform standard of security. The updates also introduce a strict cadence for security testing and patch management.

The following table summarizes the new mandatory security requirements and their proposed deadlines:

RequirementFrequency / Deadline
Vulnerability AssessmentEvery 6 months
Penetration TestEvery 12 months
Compliance AuditAnnually
Critical Patch ImplementationWithin 15 days
High-Priority Patch ImplementationWithin 30 days

Other mandated measures include the implementation of multi-factor authentication (MFA), encryption for all ePHI both at rest and in transit, anti-malware protection, and technology to support real-time security monitoring and incident response.

What is the Timeline for the New HIPAA Security Rule?

The public comment period for the proposed changes closed in March 2025, and the OCR is currently reviewing the 4,745 comments submitted. While there is no official timeline for implementation, the proposals have bipartisan support, suggesting they will be rolled out soon. Once the updated rule is finalized and takes effect, organizations will be given a 180-day grace period to achieve full compliance with the new requirements.

How Can Organizations Prepare for HIPAA Compliance?

The Cybersecurity Extension for SAP helps automate compliance assessments for the technical safeguards of the HIPAA Security Rule. It can identify compliance gaps in SAP solutions related to authentication, access control, unapplied security patches, and auditing standards. The solution also supports assessments for other frameworks like GDPR and NIST.

Furthermore, the Cybersecurity Extension for SAP provides threat detection and incident response capabilities. It generates alerts for suspected security breaches, which can be investigated using built-in procedures. This supports the new requirements for continuous security monitoring and compliance with the HIPAA Breach Notification Rule.

Frequently Asked Questions (FAQ)

What is HIPAA?
The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law that establishes national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge.

What is the difference between the HIPAA Privacy, Security, and Breach Notification Rules?
The Privacy Rule covers the protection of all Protected Health Information (PHI) in any form. The Security Rule specifically covers electronic PHI (ePHI) and mandates technical, physical, and administrative safeguards. The Breach Notification Rule requires covered entities to notify affected individuals and HHS following a breach of unsecured PHI.

Do HIPAA rules apply to organizations outside the U.S.?
HIPAA applies to any organization that stores, processes, or transmits PHI for U.S. citizens, regardless of where the organization is located. Other regions have similar regulations, such as GDPR in the European Union and PIPEDA in Canada.

Share the Post: