Back to Insights
Cybersecurity

Cybersecurity Governance for HIPAA-Regulated Organizations: Beyond the Checklist

HIPAA's Security Rule requires more than annual risk assessments and a policies binder. Here is what a technically enforced cybersecurity governance program looks like for covered entities and business associates.

Orville Matias
Cybersecurity Governance for HIPAA-Regulated Organizations: Beyond the Checklist

Healthcare organizations are among the most targeted by ransomware groups and data extortion actors in the United States. The combination of high-value PHI, aging infrastructure, and compliance programs that prioritize documentation over technical enforcement creates an attractive target profile.

#1

Most Targeted Sector

Healthcare leads all industries for ransomware

$10.9M

Avg. Healthcare Breach

2024 IBM Cost of Data Breach Report

2003

HIPAA Security Rule

Technical controls required since inception

2026

Proposed Update

HHS OCR Security Rule modernization on agenda

The HIPAA Security Rule has required healthcare organizations to implement cybersecurity controls since 2003. The proposed 2025 Security Rule update — on the HHS OCR enforcement agenda for 2026 — would make those requirements significantly more prescriptive. What has not changed is the core problem: most healthcare organizations treat HIPAA cybersecurity compliance as a documentation exercise rather than a technical security program.

This article addresses what HIPAA's Security Rule actually requires from a technical controls standpoint, where the most common gaps occur, and what a defensible cybersecurity governance program looks like.

What the HIPAA Security Rule Actually Requires

The Security Rule establishes three categories of safeguards for electronic PHI (ePHI): administrative, physical, and technical. Most compliance programs focus heavily on administrative safeguards (policies, training, risk analysis) and neglect the technical safeguard requirements that require actual implementation and ongoing management.

Technical Safeguards (45 CFR §164.312)

The technical safeguard requirements include:

*Access Controls.* Unique user identification for all users who access ePHI. Emergency access procedures. Automatic logoff. Encryption and decryption of ePHI. These are not aspirational standards — they are required specifications with documented implementation requirements.

*Audit Controls.* Hardware, software, and procedural mechanisms that record and examine activity in systems containing ePHI. This requirement is not satisfied by a system that logs activity — it requires that logs are examined. Organizations with no log review process are non-compliant with this requirement regardless of what their documentation says.

📌 Important

Generating audit logs is not enough. HIPAA requires that logs are examined. An organization with active logging but no documented log review process is non-compliant with 45 CFR §164.312(b) — and OCR investigators know to ask for both.

*Integrity Controls.* Mechanisms to authenticate ePHI and ensure it has not been improperly altered or destroyed. This includes file integrity monitoring in systems containing patient records.

*Transmission Security.* Encryption of ePHI transmitted over networks. This applies to email containing PHI, API calls between systems, cloud storage synchronization, and remote access to clinical systems.

The Proposed 2025 Security Rule Update

HHS OCR's proposed update — which was on the May 2026 regulatory agenda — includes several changes that would significantly strengthen technical requirements:

  • Mandatory technology asset inventories with explicit coverage of AI tools
  • Enhanced vulnerability scanning and penetration testing requirements with defined frequency
  • Mandatory multi-factor authentication for all systems containing ePHI
  • Specific requirements for network segmentation
  • Enhanced incident response plan requirements with defined recovery time objectives
  • Organizations that are already operating to these standards have minimal exposure to the proposed update. Organizations that are not will face a compliance gap when the rule finalizes.

    Where Healthcare Organizations Are Most Exposed

    Unmanaged endpoints accessing ePHI. Clinical staff accessing patient records from personal devices, unmanaged laptops, or shared workstations with no MDM (Mobile Device Management) enrollment. Each unmanaged device is a potential breach vector and an uncontrolled access point for ePHI.

    Legacy systems without patch management. EHR platforms, medical devices, and clinical workstations running outdated operating systems or unpatched software. Many healthcare organizations have legacy clinical systems that cannot be updated without vendor certification — and the compensating controls for those systems (network segmentation, enhanced monitoring) are frequently absent.

    Insufficient audit log review. Organizations that generate audit logs but have no process for reviewing them regularly. Security incidents detected through log review are stopped earlier, with lower breach impact, than incidents detected by patients, external parties, or ransomware deployment.

    Weak privileged access controls. Shared administrative credentials for clinical systems and EHR platforms. Service accounts with excessive permissions. IT staff with standing privileged access to systems containing ePHI without just-in-time access controls.

    Third-party and vendor access. EHR vendors, billing companies, medical device manufacturers, and IT support providers with ongoing access to ePHI systems. Vendor access that is not monitored, not time-limited, and not scoped to minimum necessary access is one of the most frequent breach vectors in healthcare.

    No incident response testing. Organizations with written incident response plans that have never been tested. An untested IR plan is discovery documentation that shows you knew what to do but did not verify you could do it.

    What Technically Enforced Cybersecurity Governance Looks Like

    The gap between a documented cybersecurity program and a technically enforced cybersecurity program is the gap between what your policies say and what your systems actually do.

    A technically enforced cybersecurity governance program for a HIPAA-regulated organization includes:

    Managed endpoint security. Every device accessing ePHI — workstations, laptops, tablets, mobile devices — under active management with EDR (Endpoint Detection and Response), enforced disk encryption, automatic patching, and MDM enrollment. Controls are active, not aspirational.

    Identity and access management. Unique credentials for every user, MFA enforced on all systems containing ePHI, privileged access managed through a PAM (Privileged Access Management) platform, quarterly access reviews. No shared credentials, no standing privilege.

    Network segmentation. Clinical systems containing ePHI on isolated network segments with firewall rules preventing lateral movement. Medical devices on separate VLANs. Remote access through VPN with MFA — not open RDP.

    Continuous monitoring. Security event logs from all systems containing ePHI forwarded to a SIEM (Security Information and Event Management) platform with active monitoring and alerting. Anomalous access patterns, failed authentication attempts, and unusual data transfers generate alerts reviewed by security personnel.

    Vulnerability management. Regular authenticated vulnerability scanning of all systems containing ePHI, with defined remediation SLAs based on severity. Critical vulnerabilities remediated within 15 days. High severity within 30 days. Evidence maintained for audit.

    Incident response with tested playbooks. A written IR plan with specific procedures for ransomware, unauthorized access to ePHI, and vendor-related incidents — tested at least annually through a tabletop exercise with documented results.

    Why Governance Without Infrastructure Control Fails

    Most healthcare organizations engage compliance consultants who deliver a risk analysis, update their policies, and leave. Twelve months later, the policies exist but the technical controls were never implemented, or were implemented once and never maintained.

    Governance that is not built on managed infrastructure is advisory. It tells you what to do without the operational capacity to verify it is being done.

    Centience builds cybersecurity governance programs on the infrastructure we manage. That means vulnerability scans run on schedule and evidence is collected automatically. Endpoint controls are active on every device we manage. Audit logs are reviewed and anomalies are escalated. When OCR requests documentation, it has already been assembled.

    Is your cybersecurity governance program technically enforced or just documented?

    Schedule your AI Governance Assessment. We evaluate cybersecurity controls alongside AI governance.

    Book Your Assessment

    Orville Matias, Founder and CEO of Centience

    Article written by

    Orville Matias

    Orville Matias is Founder & CEO of Centience, an AI and Technology Governance firm for regulated industries. He has 20+ years of experience building and operating compliance programs for organizations under SEC, FINRA, and HIPAA oversight.

    Ready to Build a Defensible Governance Program?

    Centience delivers AI and technology governance built on managed infrastructure — enforceable, not just documented.

    Book Your AI Governance Assessment
      Centience — AI & Technology Governance for Regulated Organizations