A practical, step-by-step guide to conducting a HIPAA risk analysis — the single most commonly cited deficiency in OCR enforcement actions. Covers scope, methodology, documentation, and risk management planning.
If there is one HIPAA requirement that healthcare organisations consistently fail to meet — and that the Office for Civil Rights (OCR) consistently cites in enforcement actions — it is the risk analysis. The HIPAA Security Rule at 45 CFR § 164.308(a)(1) requires covered entities and business associates to conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of all electronic protected health information (ePHI) they create, receive, maintain, or transmit.
This is not a one-time exercise. It is an ongoing process that must be updated whenever significant changes occur to your environment, systems, or operations — and reviewed at least annually.
The OCR's guidance makes clear that a risk analysis is the prerequisite for all other HIPAA Security Rule compliance. Without it, you cannot know what safeguards are appropriate, and you cannot demonstrate that your security programme is reasonable and appropriate for your specific environment.
The OCR's guidance on risk analysis identifies nine required elements:
Begin by defining the boundaries of your risk analysis. The scope must include all systems, applications, devices, and locations where ePHI is created, received, maintained, or transmitted. This includes:
A common scoping error is limiting the analysis to "IT systems" while overlooking medical devices, portable media, and remote access scenarios. The OCR expects a comprehensive scope.
For each system and location in scope, document:
This inventory is the foundation of your risk analysis and should be maintained as a living document.
For each ePHI asset identified in Step 2, identify the threats that could cause harm and the vulnerabilities that could be exploited. Threats fall into three categories:
Natural threats: Floods, fires, earthquakes, power outages, and other environmental events that could damage systems or disrupt access to ePHI. Human threats: Both intentional (malicious insiders, external attackers, social engineering) and unintentional (accidental deletion, misconfiguration, lost devices) human actions that could compromise ePHI. Environmental threats: Hardware failures, software bugs, network outages, and other technical failures that could affect ePHI availability or integrity.For each threat, identify the vulnerabilities it could exploit. Common vulnerabilities include:
For each threat/vulnerability pair, document the existing controls that mitigate the risk. Be honest about the effectiveness of existing controls — overestimating control effectiveness is a common error that leads to underestimating residual risk.
Controls to assess include:
For each threat/vulnerability pair, assign a likelihood rating and an impact rating. The OCR does not prescribe a specific methodology, but a simple three-level scale (High/Medium/Low) is commonly used and defensible.
Likelihood reflects the probability that a given threat will exploit a given vulnerability, taking into account existing controls. Factors to consider include:Combine likelihood and impact to produce an overall risk level for each threat/vulnerability pair. A simple risk matrix approach works well:
| | Low Impact | Medium Impact | High Impact |
|---|---|---|---|
| High Likelihood | Medium | High | Critical |
| Medium Likelihood | Low | Medium | High |
| Low Likelihood | Low | Low | Medium |
Document the risk level for each identified risk, along with the rationale for your assessment.
Compile your findings into a written risk analysis document. This document should include:
The risk register becomes the foundation for your risk management plan.
The risk analysis itself is not sufficient — the Security Rule also requires a risk management plan that implements security measures to reduce identified risks to a reasonable and appropriate level. Your risk management plan should:
The risk analysis is not a one-time exercise. It must be reviewed and updated:
"The OCR does not expect perfection — it expects a genuine, documented effort to understand and manage risk. A well-documented risk analysis that identifies real risks and drives real remediation is far more defensible than a polished document that does not reflect operational reality."
Eunoia Consulting Co. provides HIPAA risk analysis services for healthcare organisations of all sizes. Our approach combines regulatory expertise with deep operational knowledge to produce risk analyses that are both defensible and actionable.
We also offer a [Data Governance Assessment](/data-governance-assessment) that includes HIPAA risk analysis readiness as one of six evaluated dimensions.
[Contact us](/contact) to discuss your HIPAA compliance needs.
Book a complimentary strategy call to discuss how Eunoia Consulting can help your organisation.