ComplyCreate
HomeComplianceHIPAA Risk Assessment
Compliance Guide

HIPAA Risk Assessment: What It Is and How to Actually Do One

By ComplyCreate Editorial Team  ·  Published Apr 24, 2026  ·  Last reviewed Apr 24, 2026

Quick answer: The HIPAA Security Rule requires every covered entity and business associate to conduct a documented risk analysis under 45 CFR § 164.308(a)(1). It's the most frequently cited missing document in OCR enforcement. A risk assessment also reveals your vendor relationships — and once you know which vendors have ePHI access, you'll know which ones need Business Associate Agreements.

The Security Rule's risk analysis requirement is the foundation of HIPAA security compliance. Without it, you cannot know what you need to protect, where your vulnerabilities are, or whether your existing controls are adequate. And without documentation, OCR has no way to verify compliance — making it the most commonly cited deficiency when investigations arise.

What Is a HIPAA Risk Assessment?

A HIPAA risk assessment (formally called a "risk analysis" in the Security Rule) is a systematic process for identifying and documenting potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI that your organization creates, receives, maintains, or transmits. It is required by 45 CFR § 164.308(a)(1)(ii)(A) as a required (not addressable) specification.

The risk assessment does not assess whether you are "HIPAA compliant" in a general sense — it specifically assesses the security risks to ePHI in your environment. The output is a documented risk register that identifies specific threats and vulnerabilities, their likelihood, their potential impact, and your existing controls — resulting in a risk level (high/medium/low or a numeric score) for each risk item.

Who Must Conduct a Risk Assessment?

All covered entities and all business associates that create, receive, maintain, or transmit ePHI are required to conduct a risk analysis. This is not limited to large organizations. A solo therapist using an EHR, a billing company processing electronic claims, and a cloud storage provider hosting patient data are all required to conduct risk assessments.

What the Risk Assessment Must Cover

HHS's guidance on risk analysis specifies that a complete and thorough risk assessment must include:

The 6-Step Risk Assessment Process

Step 1: Define Scope

Document all the ePHI your organization handles. Where does it live? On-premises servers, cloud environments, EHR systems, email, laptops, mobile devices, backup systems, portable drives? Map the data flows: where does ePHI enter your organization, how does it move through systems, where does it leave, and where is it stored? A data flow diagram is helpful but not required. The scope must be comprehensive — OCR has penalized organizations for assessments that failed to cover all ePHI environments.

Step 2: Identify ePHI and Its Locations

Create an inventory of all systems, applications, and devices that store or transmit ePHI. This should include your EHR, billing system, practice management software, email (if used for patient communication), voicemail, fax servers, cloud storage, backup systems, and any portable devices (laptops, tablets, smartphones) used by staff who access ePHI. This step often reveals vendor relationships that require BAAs — any vendor who stores your ePHI is a business associate.

Step 3: Identify Threats and Vulnerabilities

For each ePHI location, identify relevant threats — external (ransomware, hackers, phishing) and internal (accidental disclosure, unauthorized access by employees, device loss). Then identify vulnerabilities: weaknesses in your technical environment (outdated software, weak passwords, unencrypted laptops), physical environment (unlocked server rooms, unattended workstations in patient areas), and administrative processes (inadequate training, no workforce access review). HHS's free SRA Tool provides a structured threat/vulnerability library to work from.

Step 4: Assess Current Controls

Document the security controls already in place for each identified threat-vulnerability pair. Are you using encryption? Multi-factor authentication? Automatic logoff? Regular software patching? Endpoint security software? Workforce access reviews? This step requires honest assessment — documenting controls that are planned but not yet implemented will not satisfy OCR's requirements.

Step 5: Determine Risk Level

Combine likelihood and impact to determine a risk level for each identified risk. A common approach is a 3×3 or 5×5 risk matrix: low/medium/high likelihood × low/medium/high impact = overall risk level (low/medium/high or scores like 1–9 or 1–25). Existing controls reduce the residual risk level. Document the rationale for each risk level assignment. High-risk items require priority attention in your risk management plan.

Step 6: Document Everything

The risk assessment must be documented in writing. OCR will request this document in virtually every HIPAA investigation. The documentation should be retained for 6 years per 45 CFR § 164.530(j). Once complete, the risk assessment feeds directly into your risk management plan — the companion requirement under § 164.308(a)(1)(ii)(B) — which specifies what security measures you will implement to reduce high and medium risks to a reasonable level.

How Often to Conduct a Risk Assessment

HIPAA requires the risk assessment to be conducted "as needed to keep security measures current." OCR's guidance interprets this to mean at least annually and after any material change — a major EHR upgrade, a new office location, acquisition of another practice, adding a new service line, or any significant change in your ePHI environment. An assessment more than 12–18 months old is likely to be questioned by OCR as outdated.

Common Mistakes

Tools and Resources

HHS provides a free Security Risk Assessment (SRA) Tool at healthit.gov. The tool is available as a downloadable application for Windows and generates a report that can be used as documentation. It's designed for small to medium-sized healthcare organizations.

See also our HIPAA compliance checklist for the full list of Security Rule implementation requirements beyond the risk assessment.

Frequently Asked Questions

Is a HIPAA risk assessment required?

Yes. 45 CFR § 164.308(a)(1)(ii)(A) requires all covered entities and business associates to conduct an accurate and thorough risk analysis. This is a required (not addressable) specification — it cannot be substituted with an alternative measure. OCR cites missing or inadequate risk assessments in the majority of its enforcement actions.

How often must you do a risk assessment?

At least annually and after any material change in operations, technology, workforce, or physical environment. OCR's guidance specifies "as needed to keep security measures current." An assessment conducted three or more years ago is generally considered inadequate in an enforcement context.

What is the difference between a risk assessment and a risk analysis?

HIPAA uses "risk analysis" (§ 164.308(a)(1)(ii)(A)) to mean the process of identifying threats, vulnerabilities, likelihood, and impact — the assessment itself. "Risk management" (§ 164.308(a)(1)(ii)(B)) refers to implementing controls to reduce identified risks. The terms risk analysis, risk assessment, and security risk assessment (SRA) are used interchangeably in practice.

Can I do my own HIPAA risk assessment?

Yes. HHS provides the free SRA Tool at healthit.gov. Small practices can use this tool to conduct and document a compliant risk assessment. Larger organizations with complex ePHI environments may benefit from engaging a qualified HIPAA security consultant. The completed assessment must be documented in writing regardless of who conducts it.

What does OCR look for in a risk assessment?

OCR examines whether the risk assessment covers all ePHI locations, identifies realistic threats (including ransomware and insider threats), documents existing controls, assesses likelihood and impact for each threat-vulnerability pair, and resulted in a risk management plan addressing identified high-risk items. OCR also verifies the assessment was updated annually and after material changes.

What to do next

After completing your risk assessment, address the two most commonly identified gaps: