HIPAA Security Risk Assessment
The formal Risk Analysis required by the Security Rule, documented and defensible.
This is the formal Risk Analysis that the HIPAA Security Rule requires every covered entity and business associate to conduct. We produce a scoped, documented, and audit-defensible deliverable that satisfies 164.308(a)(1)(ii)(A) outright.
Satisfies
- 45 CFR § 164.308(a)(1)(ii)(A) — Risk Analysis
- 45 CFR § 164.308(a)(1)(ii)(B) — Risk Management
- 45 CFR § 164.308(a)(8) — Evaluation
Deliverables
- ePHI Asset InventoryComplete inventory of systems that create, receive, maintain, or transmit ePHI — including data flow diagrams, storage locations, and transmission channels.
- Threat & Vulnerability AssessmentIdentified threats mapped to your specific environment. Every vulnerability tied to a likelihood and impact rating using a documented methodology.
- Risk RegisterSpreadsheet-format risk register with inherent risk, control effectiveness, and residual risk scores. Exportable for your GRC platform.
- Remediation RoadmapPrioritized by residual risk. Quick wins, medium-term engineering, and strategic investments separated out with effort estimates.
- Executive SummaryBoard-ready 10-page summary for your CEO, Chief Compliance Officer, and external counsel.
Scope
- • One production environment + one staging environment
- • Up to 2 mobile applications (iOS, Android)
- • External + authenticated HTTP testing
- • Static evidence review for administrative and physical safeguards
Who it’s for
Digital health startups, telehealth platforms, EHR vendors at Series A+, and any organization that has never had a formal Risk Analysis completed by a third party.