HIPAA Security Rule
Health Insurance Portability and Accountability Act security standards for protecting electronic protected health information (ePHI)
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (5)
Administrative Safeguards
Administrative actions, policies, and procedures to manage security measures
| Code | Title |
|---|---|
| 314.4(c)(2) | Data inventory and classification |
| 314.4(c)(4) | Secure application development |
| 314.4(c)(6) | Data disposal procedures |
| 314.4(c)(7) | Change management |
| 314.4(e) | Security awareness training |
| HIPAA-164.308(a)(1) | Security management process |
| HIPAA-164.308(a)(2) | Assigned security responsibility |
| HIPAA-164.308(a)(3) | Workforce security |
| HIPAA-164.308(a)(4) | Information access management |
| HIPAA-164.308(a)(5) | Security awareness and training |
| HIPAA-164.308(a)(6) | Security incident procedures |
| HIPAA-164.308(a)(7) | Contingency plan |
| HIPAA-164.308(a)(8) | Evaluation |
| HIPAA-164.308(b)(1) | Business associate contracts and other arrangements |
Organizational Requirements
Requirements for business associate contracts and group health plans
| Code | Title |
|---|---|
| HIPAA-164.314(a)(1) | Business associate contracts or other arrangements |
| HIPAA-164.314(b)(1) | Requirements for group health plans |
Physical Safeguards
Physical measures, policies, and procedures to protect electronic information systems
| Code | Title |
|---|---|
| HIPAA-164.310(a)(1) | Facility access controls |
| HIPAA-164.310(b) | Workstation use |
| HIPAA-164.310(c) | Workstation security |
| HIPAA-164.310(d)(1) | Device and media controls |
Policies, Procedures and Documentation
Requirements for policies, procedures and documentation
| Code | Title |
|---|---|
| HIPAA-164.316(a) | Policies and procedures |
| HIPAA-164.316(b)(1) | Documentation |
Technical Safeguards
Sections 500.10-500.15: Encryption, monitoring, MFA, and data handling
| Code | Title |
|---|---|
| 314.4(c)(1) | Access controls |
| 314.4(c)(3) | Encryption requirements |
| 314.4(c)(5) | Multi-factor authentication |
| 314.4(c)(8) | Monitoring and logging |
| HIPAA-164.312(a)(1) | Access control |
| HIPAA-164.312(b) | Audit controls |
| HIPAA-164.312(c)(1) | Integrity |
| HIPAA-164.312(d) | Person or entity authentication |
| HIPAA-164.312(e)(1) | Transmission security |
| NYDFS-500.10 | Cybersecurity Personnel and Intelligence |
| NYDFS-500.11 | Third-Party Service Provider Security Policy |
| NYDFS-500.12 | Multi-Factor Authentication |
| NYDFS-500.13 | Asset Management and Data Governance |
| NYDFS-500.14 | Monitoring and Logging |
| NYDFS-500.15 | Encryption of Nonpublic Information |
Maps to 548 other frameworks
Frequently Asked Questions
What is HIPAA Security Rule?
HIPAA Security Rule is a compliance framework from United States with 5 domains and 37 controls. Health Insurance Portability and Accountability Act security standards for protecting electronic protected health information (ePHI) It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does HIPAA Security Rule have?
HIPAA Security Rule has 37 controls organised across 5 domains. The largest domains are Technical Safeguards (15 controls), Administrative Safeguards (14 controls), Physical Safeguards (4 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does HIPAA Security Rule map to?
HIPAA Security Rule maps to 548 other compliance frameworks. The top mapping partners are MDS2 (Medical Device) (49% coverage), US Gramm-Leach-Bliley Act (GLBA) — Higher Education Safeguards Rule (49% coverage), FAA Cybersecurity Framework for Aviation (49% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with HIPAA Security Rule compliance?
Start your HIPAA Security Rule compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about HIPAA Security Rule requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 37 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required