New Vertical Technologies
HomeAbout
Case StudiesBlogContact
(410) 417-8591
New Vertical Technologies

Your trusted partner for IT services, cybersecurity, and software development.

Services

  • Managed IT Services
  • Cloud Services
  • Cybersecurity
  • Website & App Development
  • Software Development
  • Consulting
  • Computer Support

Industries & Locations

  • Healthcare IT Maryland
  • Dental IT Support
  • HIPAA IT Compliance
  • Email & Microsoft 365
  • IT Support Eastern Shore
  • Managed IT Annapolis

Quick Links

  • About Us
  • Products
  • FAQ
  • Contact

Contact Us

401 Log Canoe Cir

Stevensville, MD 21666

Sales: (410) 417-8591

Support: (410) 266-8031

info@newverticaltech.com

© 2026 New Vertical Technologies. All rights reserved.

  • Privacy Policy
  • Terms of Service
← Back to BlogCompliance

What Is a HIPAA Security Risk Analysis?

One of the most frequently cited findings in HIPAA enforcement actions — and one of the most misunderstood requirements. Here's what a Security Risk Analysis actually is, what it must cover, and why a vulnerability scan alone isn't enough.

February 23, 202610 min readBy New Vertical Technologies

In This Article

Understanding the Security Risk AnalysisWhy the SRA Is RequiredKey Components of an SRASRA vs. Vulnerability ScanHow Often Should It Be Performed?Common Mistakes Healthcare Organizations MakeWhat Happens After the Analysis?

Healthcare organizations rely heavily on technology to deliver patient care, manage billing, and maintain operational efficiency. But with increased reliance on electronic systems comes a clear legal obligation: protect the patient data those systems create and store. One of the most important requirements under the HIPAA Security Rule is the Security Risk Analysis (SRA). Despite being mandatory, it remains one of the most misunderstood — and most commonly cited violation — in OCR enforcement actions.

Understanding the HIPAA Security Risk Analysis

A HIPAA Security Risk Analysis is a formal, documented evaluation of how an organization creates, receives, stores, or transmits electronic protected health information (ePHI). The purpose is to identify vulnerabilities and threats that could compromise patient data — and to determine the likelihood and potential impact of each risk.

Critically, the HIPAA Security Rule does not prescribe a single checklist or tool. It requires organizations to perform a risk-based evaluation tailored to their specific environment. A small dental practice in Annapolis and a 10-location medical group in Baltimore both have the same legal obligation, but the scope and findings of their analyses will look completely different.

At its core, the Security Risk Analysis answers three critical questions:

1

Where is ePHI located?

Servers, workstations, cloud apps, email, mobile devices, backups — all of it.

2

What risks could expose or compromise that information?

Technical threats, human error, vendor access, physical risks, and more.

3

What safeguards are in place — and where are the gaps?

An honest gap analysis that drives a real remediation plan.

Why the Security Risk Analysis Is Required

HIPAA compliance is not just about installing antivirus software or encrypting laptops. Regulators expect organizations to understand their risks and make informed, documented decisions about security controls. The SRA is the mechanism for demonstrating that understanding.

Failure to conduct a proper Security Risk Analysis is consistently one of the most common findings in HIPAA enforcement actions brought by the Office for Civil Rights (OCR). Organizations that skip or perform superficial assessments typically discover their gaps only after a breach — or during an audit triggered by one.

A well-executed SRA provides:

  • Early gap identification: Find compliance gaps before regulators or attackers do — and fix them on your timeline, not theirs.
  • Reduced breach risk: Directly reduces the likelihood of ransomware, data loss, and business email compromise targeting ePHI.
  • Prioritized IT investment: Leadership can allocate security budgets based on actual risk — not perceived risk or vendor sales pressure.
  • Defensible documentation: In the event of a breach or OCR investigation, a documented SRA demonstrates good-faith due diligence.

For healthcare administrators, the SRA should be viewed as a strategic planning tool — not just a regulatory obligation. The insights it generates directly improve IT decision-making, vendor selection, and budget allocation.

Key Components of a HIPAA Security Risk Analysis

While every organization's environment is different, a comprehensive Security Risk Analysis follows a structured process. Each component builds on the last — skipping steps produces an incomplete analysis that is unlikely to satisfy OCR scrutiny.

1. Asset and Data Inventory

The analysis begins with a complete picture of where ePHI exists. Many organizations underestimate how widely patient data is distributed across their environment.

On-site servers and workstations
Cloud platforms and SaaS applications
Practice management and EHR systems
Email systems and file storage
Mobile devices and tablets used for patient care
Backup systems and off-site media

2. Threat Identification

Next, potential threats to identified ePHI systems must be cataloged. Threat modeling considers both technical and operational risks.

Phishing and business email compromise
Ransomware and malware attacks
Insider misuse or privilege escalation
Lost or stolen devices containing ePHI
Weak passwords or unpatched systems
Unauthorized vendor or third-party access

3. Vulnerability Assessment

A vulnerability analysis reviews the specific weaknesses that could allow identified threats to succeed. This phase typically combines technical scanning with policy and workflow review.

Outdated or end-of-life operating systems
Missing multi-factor authentication
Improper firewall or network segmentation
Excessive user permissions (least privilege violations)
Unsupported legacy applications with ePHI access
Gaps in employee security awareness training

4. Risk Determination

Each identified issue is evaluated across four dimensions to produce a risk score. This drives prioritization rather than treating all findings as equally urgent.

Likelihood of occurrence

How probable is it that this threat actually exploits this vulnerability?

Potential impact on patient data

What is the severity if ePHI is compromised, destroyed, or disclosed?

Exposure scope

How many patient records or systems would be affected?

Existing safeguards

What controls already reduce the risk, and how effective are they?

Risks are categorized as Low, Medium, or High to help leadership prioritize remediation.

5. Documentation and Reporting

HIPAA requires the analysis to be documented. Without written evidence of the process and findings, there is no SRA in the eyes of OCR — regardless of what work was actually done.

The final report must include:

Methodology and scope of the analysis
All systems and data flows reviewed
Full list of identified risks with severity ratings
Recommended remediation steps for each finding
Prioritized action plan with timelines and owners

Security Risk Analysis vs. Vulnerability Scan

This is one of the most common misconceptions in healthcare IT. Many practices believe they have completed their HIPAA risk analysis because their IT team ran a network scan. A vulnerability scan is a useful technical tool — but it represents only a small fraction of what an SRA requires.

Vulnerability Scan

  • Identifies unpatched software and open ports
  • Automated technical tool output
  • Shows what is vulnerable technically
  • Does not cover policies, training, or admin safeguards
  • Does not satisfy the HIPAA Security Rule on its own

HIPAA Security Risk Analysis

  • Covers administrative, physical, and technical safeguards
  • Reviews policies, training, access controls, vendor BAAs
  • Evaluates processes and workflows — not just systems
  • Produces OCR-compliant written documentation
  • Satisfies the HIPAA Security Rule requirement

The Key Distinction

A vulnerability scan may identify that patches are missing. A Security Risk Analysis evaluates whether the organization has a formal patch management process, documented policies, and ongoing monitoring — and asks whether leadership is actually accountable for those controls.

How Often Should a Risk Analysis Be Performed?

HIPAA does not specify an exact interval, but OCR guidance and industry best practice call for a full Security Risk Analysis at least annually. Beyond the calendar trigger, an SRA should also be performed whenever significant changes occur.

Implementing a new EHR, PM system, or cloud platform
Opening additional practice locations
Mergers, acquisitions, or new business affiliations
Major infrastructure upgrades or migrations
A security incident, breach, or near-miss event
Significant changes in workforce size or structure

Organizations should treat the SRA as part of an ongoing compliance program — not a one-time checkbox. Continuous monitoring between formal analyses keeps the risk posture current without waiting for the annual review cycle.

Common Mistakes Healthcare Organizations Make

Many organizations believe they are compliant when they are not. These are the pitfalls we see most frequently when working with healthcare practices that have never had an independent compliance review.

Using outdated assessments

An SRA from 2020 does not reflect a cloud migration completed in 2023, three new providers added, or a new EHR implementation. If the assessment doesn't match your current environment, it doesn't protect you.

Delegating entirely to IT without executive involvement

HIPAA compliance is an organizational responsibility — not just an IT function. The Security Officer and executive leadership must be engaged in the process and results.

Failing to track remediation after findings are identified

Identifying a risk and doing nothing about it may actually worsen your compliance posture. OCR expects to see evidence that identified risks were addressed.

Treating compliance as paperwork

A binder of policies that no one reads and a completed form that doesn't reflect real controls is not compliance. It's documentation theater — and OCR has become skilled at spotting it.

Ignoring cloud platforms and third-party vendors

Every SaaS application, cloud storage service, or IT vendor with access to ePHI must be included in the analysis and covered by a signed Business Associate Agreement.

What Happens After the Analysis?

Completing the Security Risk Analysis is only the first step. The real value — and the real compliance obligation — comes from acting on the findings. OCR expects to see a remediation plan and evidence of progress.

Typical corrective actions following an SRA include:

Email security hardening

SPF, DKIM, DMARC configuration and phishing simulation training

MFA rollout

Multi-factor authentication enforced on all ePHI-accessible systems

Backup and DR improvements

Tested recovery procedures and offsite/cloud backup validation

Network segmentation

Isolating clinical systems from general office traffic

Policy formalization

Written security policies, incident response plans, and acceptable use agreements

Employee training

Annual security awareness training with documentation of completion

Organizations should maintain a remediation roadmap — a living document that tracks each identified risk, the corrective action taken, the responsible party, and the completion date. This roadmap is your primary evidence of continuous improvement and is exactly what OCR requests during a compliance review.

The Bottom Line

A HIPAA Security Risk Analysis is more than a compliance checkbox — it is the foundation of a mature healthcare cybersecurity strategy. By systematically identifying where ePHI lives, cataloging real-world threats, assessing vulnerabilities, and prioritizing safeguards, healthcare organizations can protect patient trust while reducing operational, financial, and regulatory risk.

Practices that approach the SRA proactively consistently find that it improves not only compliance posture but also overall IT stability, infrastructure planning, and long-term budget management. Whether conducted internally or with a managed services and compliance partner, a thorough and well-documented Security Risk Analysis is the single most important step toward demonstrable HIPAA compliance.

Need a HIPAA Security Risk Analysis for Your Practice?

NVT conducts comprehensive HIPAA Security Risk Analyses for medical practices, dental offices, and healthcare organizations across Maryland. We deliver OCR-ready documentation, a prioritized remediation roadmap, and an IT partner who stays engaged through the follow-through.

View HIPAA IT ServicesRequest a Consultation

Related Articles

Compliance

HIPAA Compliance: IT Requirements for Healthcare Providers

The technical safeguards every covered entity must have in place under the HIPAA Security Rule.

Healthcare IT

On-Site vs. Cloud Hosting for Healthcare & Dental Software

A complete infrastructure decision guide for EHR and practice management systems.

Cybersecurity

Top Cybersecurity Threats Facing Maryland Businesses in 2026

Ransomware, phishing, and the threats most likely to target healthcare practices.