HIPAA Security Testing: What Healthcare Companies Actually Need to Do | Lorikeet Security Skip to main content
Back to Blog

HIPAA Security Testing: What Healthcare Companies Actually Need to Do

If you build software that touches patient data, you have heard the word HIPAA more times than you can count. You probably know you need to be "HIPAA compliant." You may have even purchased a penetration test because someone told you it was required. But here is the uncomfortable truth: HIPAA compliance is far broader than a pentest, and most healthcare startups are leaving major gaps in their security programs because they do not understand what the Security Rule actually requires.

This guide breaks down the HIPAA Security Rule in terms your engineering team can act on. We will cover what the regulation actually says about security testing, why a penetration test alone is not sufficient, where healthcare companies consistently fail, and what you need to do to protect PHI and satisfy regulators.

The HIPAA Security Rule: What It Actually Says

The HIPAA Security Rule (45 CFR Part 164, Subparts A and C) establishes national standards for protecting electronic protected health information, or ePHI. Unlike PCI-DSS, which gives you a specific checklist of controls, HIPAA is deliberately flexible. It requires covered entities and business associates to implement safeguards that are "reasonable and appropriate" given the organization's size, complexity, capabilities, and the risks to ePHI.

The Security Rule organizes its requirements into three categories of safeguards: administrative, physical, and technical. Each category contains a mix of required and addressable implementation specifications. "Required" means you must implement the safeguard. "Addressable" does not mean optional. It means you must assess whether the specification is reasonable and appropriate for your environment, and if you decide not to implement it, you must document why and implement an equivalent alternative.

Critical distinction: "Addressable" in HIPAA does not mean "optional." It means you must evaluate the specification, determine if it applies to your environment, and either implement it, implement an equivalent measure, or document why neither is reasonable. Ignoring addressable specifications without documented rationale is a compliance violation.

Administrative Safeguards (164.308)

Administrative safeguards are the policies, procedures, and organizational measures that manage the security of ePHI. They include risk analysis, risk management, workforce security, information access management, security awareness training, security incident procedures, contingency planning, and evaluation. For most healthcare startups, this is where the biggest gaps exist. You may have strong encryption and access controls in your application, but if you have not conducted a formal risk assessment or do not have documented incident response procedures, you are out of compliance.

Physical Safeguards (164.310)

Physical safeguards address the physical access to systems and facilities where ePHI is stored or processed. This includes facility access controls, workstation use and security policies, and device and media controls. In a cloud-native world, you may assume physical safeguards are your cloud provider's problem. For the infrastructure layer, that is partially true if your cloud provider has a BAA in place. But physical safeguards also apply to your offices, employee workstations, and any devices that access ePHI. A developer laptop with unencrypted storage and no screen lock policy is a physical safeguard failure.

Technical Safeguards (164.312)

Technical safeguards are the technology controls that protect ePHI. These are where your engineering team will spend the most time and where security testing has the most direct impact. We will do a deep dive into these in a later section, but they cover access controls, audit controls, integrity controls, person or entity authentication, and transmission security.

What HIPAA Actually Requires for Security Testing

Here is where most healthcare companies get confused. HIPAA does not contain a line item that says "conduct an annual penetration test." What it does require, explicitly and without ambiguity, is a risk analysis and risk management process.

The Risk Analysis Requirement (164.308(a)(1)(ii)(A))

This is the single most important requirement in the Security Rule, and it is the one that OCR (the Office for Civil Rights, which enforces HIPAA) cites most frequently in enforcement actions. The regulation requires you to "conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate."

This is not a vulnerability scan. It is not a penetration test. It is a comprehensive risk assessment that examines your entire environment: your applications, infrastructure, processes, people, and vendors. It identifies threats, evaluates vulnerabilities, assesses the likelihood and impact of potential incidents, and determines what safeguards are in place to mitigate those risks.

The Evaluation Requirement (164.308(a)(8))

HIPAA also requires periodic "technical and nontechnical evaluation" of your security controls. This is where penetration testing and vulnerability assessments fit into the regulatory framework. The evaluation must be performed in response to environmental or operational changes and should assess whether your security policies and procedures meet the requirements of the Security Rule. A penetration test is one form of technical evaluation, but it is not the only form required.

What HIPAA Requires

A comprehensive risk analysis covering all ePHI, documented risk management plans, periodic technical and nontechnical evaluations, ongoing monitoring of security controls, and documented policies for every safeguard. This is a continuous program, not a point-in-time test.

What Most Companies Do

Run an annual penetration test, file the report, and call it compliant. No formal risk assessment. No documented risk management plan. No evaluation of administrative or physical safeguards. No ongoing monitoring. This approach leaves massive gaps that OCR will find.

HIPAA Compliance vs. Actual Security

This is a distinction that matters enormously in healthcare. Being HIPAA compliant means you have implemented the safeguards required by the Security Rule and can demonstrate compliance through documentation, risk assessments, and evidence of controls. Being actually secure means your systems, processes, and people can withstand real-world attacks and protect patient data from compromise.

These two things overlap, but they are not the same. We have seen organizations that pass HIPAA audits with flying colors but have critical vulnerabilities in their applications. We have also seen organizations with excellent security engineering practices that fail HIPAA evaluations because they lack the required documentation and formal processes.

The goal should be both. HIPAA provides a useful framework for thinking about security comprehensively. But if you treat compliance as a checkbox exercise, you will have the documentation without the protection. And when a breach happens, OCR will look not just at whether you had policies in place, but at whether your security measures were actually reasonable and appropriate given the risks.

The OCR test: After a breach, OCR does not just ask "were you compliant?" They ask "were your security measures reasonable and appropriate?" A stack of policies that nobody follows and a pentest report that nobody acts on will not help you. OCR looks at whether you actually implemented and maintained effective safeguards, not just whether you had the right paperwork.

Technical Safeguards Deep Dive

The technical safeguards under 164.312 are the controls that your engineering team is directly responsible for. Let us break down each one and what it means in practice for a modern healthcare application.

Access Controls (164.312(a)(1))

HIPAA requires that you implement technical policies and procedures for systems that maintain ePHI to allow access only to authorized persons or software programs. The implementation specifications include:

Audit Controls (164.312(b))

You must implement hardware, software, and procedural mechanisms that record and examine activity in systems that contain or use ePHI. In practice, this means comprehensive logging of who accessed what ePHI, when, and what they did with it. This is not just application-level logging. It includes database access logs, API access logs, administrative access to infrastructure, and file-level access to any system containing ePHI.

The audit controls requirement is where many healthcare startups fall short. They log application events but not database queries. They track user logins but not data exports. They monitor production but not staging environments that contain copies of real patient data. A penetration test can validate whether your audit controls detect unauthorized access, but the controls need to exist first.

Integrity Controls (164.312(c)(1))

You must implement policies and procedures to protect ePHI from improper alteration or destruction. The addressable implementation specification calls for electronic mechanisms to corroborate that ePHI has not been altered or destroyed in an unauthorized manner. In practice, this means checksums or hashing for data integrity validation, database integrity constraints, backup verification procedures, and controls that prevent unauthorized modification of patient records.

Person or Entity Authentication (164.312(d))

You must implement procedures to verify that a person or entity seeking access to ePHI is the one claimed. This goes beyond username and password. For systems that access ePHI, you should be implementing multi-factor authentication, certificate-based authentication for system-to-system communication, and strong identity verification for password resets and account recovery. MFA is not technically "required" by the letter of the regulation, but try explaining to OCR after a breach that you decided single-factor authentication was reasonable and appropriate for accessing patient records.

Transmission Security (164.312(e)(1))

You must implement technical security measures to guard against unauthorized access to ePHI being transmitted over an electronic communications network. The addressable specifications include integrity controls for transmitted data and encryption. Again, while technically addressable, transmitting ePHI without encryption in 2026 is indefensible. TLS 1.2 or higher for data in transit is the baseline. API communications, email containing PHI, file transfers, and any other transmission of ePHI must be encrypted.

Penetration Testing for HIPAA: What to Scope

While a pentest alone does not satisfy HIPAA's security testing requirements, it is a critical component of your technical evaluation. Here is how to scope a penetration test that actually serves your HIPAA compliance needs.

Follow the PHI Data Flow

The most important scoping exercise for a HIPAA pentest is mapping your PHI data flows. Where does ePHI enter your system? Where is it stored? Where is it processed? Where is it transmitted? Who and what has access to it? Your pentest scope should cover every system, application, and network segment that touches ePHI at any point in its lifecycle.

This means testing:

BAA Requirements and Testing Boundaries

If you are a business associate (which most health tech companies are), your Business Associate Agreement with covered entities may include specific security testing requirements. Review your BAAs before scoping a pentest. Some covered entities require their business associates to conduct annual penetration testing, share results, and remediate findings within specific timeframes. Your pentest scope should satisfy any BAA obligations in addition to your own compliance needs.

Additionally, if your application integrates with a covered entity's systems, you need to coordinate testing boundaries. You cannot pentest a hospital's EHR system without their explicit authorization. Define clear rules of engagement that specify which systems are in scope for testing and which are off-limits.

Testing PHI-Specific Controls

A HIPAA-focused penetration test should specifically evaluate controls that are unique to healthcare environments:

Common HIPAA Security Failures in Healthcare Startups

After conducting security assessments for dozens of healthcare startups and digital health companies, these are the failures we see most consistently. None of them are exotic. All of them are preventable. And every single one of them has resulted in OCR enforcement actions against other organizations.

Health Tech Specific Risks

The healthcare technology landscape has evolved rapidly, and each category of health tech brings its own security challenges. Here are the risk areas we focus on when assessing modern healthcare applications.

Telehealth Platforms

Telehealth exploded during the COVID-19 pandemic and has remained a standard delivery model. The security risks are significant. Video consultations transmit ePHI in real time and must be encrypted end-to-end. Session recordings, if retained, are ePHI and must be stored and protected accordingly. Chat functionality within telehealth sessions often logs PHI in plaintext. Screen sharing can inadvertently expose other patients' records. And the platforms themselves often use WebRTC or similar protocols that can leak IP addresses and other metadata.

We regularly find that telehealth platforms have strong encryption for the video stream itself but weak security around the supporting infrastructure: appointment scheduling, patient intake forms, chat logs, and session metadata.

EHR Integrations

If your product integrates with Electronic Health Record systems, you are handling some of the most sensitive data in healthcare. EHR integrations via HL7 FHIR, HL7 v2, or proprietary APIs create complex data flows that are difficult to secure. Common issues include overly broad FHIR scopes that request more patient data than necessary, insecure token storage for OAuth-based EHR connections, lack of data minimization in API responses, and insufficient logging of data access through integration endpoints.

The 21st Century Cures Act and its information blocking provisions add another layer of complexity. You need to support data interoperability while maintaining security. These goals are not in conflict, but they require careful implementation.

Patient Portals

Patient portals are the most common attack surface in healthcare applications. They are internet-facing, they handle authentication for non-technical users, and they provide direct access to ePHI. The most common vulnerabilities we find in patient portals include weak password policies (or no password requirements at all for initial registration), insecure account recovery flows that can be exploited to take over other patients' accounts, broken access controls that allow patients to view other patients' records, insufficient rate limiting on authentication endpoints, and PHI exposure in URL parameters that get logged by web servers and analytics tools.

Mobile Health Apps

Mobile health applications introduce risks that do not exist in web applications. Data stored on the device may persist after the user logs out. Push notifications can display PHI on lock screens. The application may cache ePHI in ways that survive app deletion. Biometric authentication may fall back to device passcode, which may be a four-digit PIN. And the app may communicate with backend APIs over networks that the user controls, making man-in-the-middle attacks a real concern if certificate pinning is not implemented.

For a detailed look at mobile application security testing, see our guide on mobile app security testing.

OCR Enforcement Trends and Recent Penalties

Understanding how the Office for Civil Rights enforces HIPAA helps you prioritize your security investments. OCR has become increasingly aggressive in recent years, and the penalties are substantial.

Enforcement by the Numbers

Since the HIPAA enforcement program began, OCR has collected over $140 million in penalties and settlements. The trend is clear: penalties are getting larger, investigations are getting more thorough, and OCR is targeting organizations of all sizes, not just large health systems. Small practices and health tech startups are not exempt.

The most common findings in OCR enforcement actions are:

  1. Failure to conduct a risk analysis - this appears in the vast majority of OCR settlements. It is the single most cited deficiency.
  2. Failure to manage identified risks - conducting a risk assessment but not implementing a risk management plan to address the findings.
  3. Insufficient access controls - failing to limit access to ePHI to only those who need it for their job functions.
  4. Lack of encryption - storing or transmitting ePHI without encryption, particularly on portable devices and in email.
  5. Missing BAAs - using vendors that access ePHI without signed Business Associate Agreements.

The Right of Access Initiative

OCR has also been aggressively enforcing patients' right to access their own health information. While this is not directly a security testing issue, it affects how your application handles patient data requests. Your systems must be able to provide patients with their ePHI in a timely manner and in the format they request. Failing to do so has resulted in penalties ranging from $15,000 to over $200,000.

State Attorney General Enforcement

In addition to OCR, state attorneys general have the authority to bring civil actions for HIPAA violations on behalf of state residents. Several states have exercised this authority, and state-level enforcement adds another layer of regulatory risk. Some states also have their own health data privacy laws that impose requirements beyond HIPAA, including state breach notification laws with shorter notification timelines than HIPAA's 60-day window.

The cost of non-compliance: HIPAA penalties range from $100 to $50,000 per violation, with annual caps up to $1.5 million per violation category. But the real cost is broader: breach notification expenses, credit monitoring for affected patients, legal fees, reputational damage, and lost business. For a health tech startup, a significant HIPAA breach can be an extinction-level event.

The Practical HIPAA Security Checklist

Here is a practical checklist for healthcare companies that want to move beyond checkbox compliance and build a security program that actually protects patient data. This is not an exhaustive list of every HIPAA requirement, but it covers the areas where we see the most failures and the highest risk.

Risk Assessment and Management

Technical Controls

Security Testing

Policies and Procedures

Operational Security

Building a HIPAA Security Program That Works

If you have read this far, you understand that HIPAA security is not a single test or a stack of policies. It is a continuous program that requires ongoing attention from your engineering, operations, and leadership teams. Here is how to approach it practically.

Start with the Risk Assessment

Everything in HIPAA flows from the risk assessment. It determines what safeguards are reasonable and appropriate for your organization. It identifies the threats and vulnerabilities you need to address. And it provides the documented foundation that OCR will evaluate if something goes wrong. If you do nothing else, do this. A thorough risk assessment is the single most important step you can take for HIPAA compliance.

Align Your Security Testing with Compliance Needs

Your penetration test should be scoped specifically to your ePHI environment and should test the controls that HIPAA requires. Work with a testing firm that understands healthcare and can map findings to HIPAA requirements. A generic web application pentest is better than nothing, but it will not address the healthcare-specific risks that regulators care about.

For a broader perspective on how compliance frameworks intersect with security testing, see our guides on SOC 2 vs. ISO 27001 for startups and the NIST Cybersecurity Framework practical guide. Many healthcare companies pursue multiple frameworks simultaneously, and understanding the overlaps saves significant effort.

Treat Compliance as a Continuous Process

HIPAA compliance is not something you achieve and then forget about. The Security Rule requires ongoing risk management, periodic evaluation, and continuous monitoring. Build security into your development lifecycle. Conduct regular access reviews. Update your risk assessment when your environment changes. And test your controls regularly, not just when an audit or assessment is due.

Do Not Forget Your Vendors

Your security program is only as strong as your weakest vendor. Every third party that handles ePHI on your behalf must have a BAA in place, and you should be evaluating their security posture as part of your risk management program. This includes cloud providers, analytics tools, email services, logging platforms, payment processors, and any other vendor that may come into contact with patient data.

HIPAA Security Testing and Compliance Support

We help healthcare companies build security programs that protect patient data and satisfy regulators. From risk assessments to penetration testing to ongoing compliance support, we understand what healthcare companies actually need.

Book a Consultation Read More Guides
-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!