Does HIPAA Require Penetration Testing? - CYBRI

Does HIPAA Require Penetration Testing?

|

BY Paul Kubler

Explicitly speaking, HIPAA does not require pen-testing. Nor does it require a vulnerability scan. It does, however, require a risk assessment to evaluate the security posture, which is often done during a pen test. 

Beyond this, several consulting and compliance organizations have made recommendations to help you achieve compliance. For example, NIST has issued a “special recommendation” for HIPAA that states, “conduct trusted penetration testing of the effectiveness of security controls in place, if reasonable and appropriate. 
This validates your exposure to actual vulnerabilities.” While this is not a requirement, it does push for pen testing to be conducted to achieve the requirements of HIPAA.

Does HIPAA require annual penetration testing?

HIPAA makes no requirements for how often or even that you should conduct a pen test. That being said, it is in your best interest to conduct a yearly penetration test to understand your risk posture best. You must test and evaluate your security controls at least once per year. Doing this via a pen test is a great way to ensure you meet the HIPAA requirements.

In addition to penetration testing services, many organizations (including us here at CYBRI) recommend regular vulnerability scanning. We recommend at least perform quarterly scans, if not more, frequently to minimize the risks of security breaches.

If you have vulnerabilities, you want to address them as soon as possible, and doing frequent scans will help prevent someone from breaking into your company.

What does HIPAA Require for Cybersecurity?

Per the standards outlined by the HHS, to be compliant, the following must be followed (per HHS.gov):

The Security Rule requires covered entities to maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting e-PHI. Specifically, covered entities must:

  1. Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit;
  2. Identify and protect against reasonably anticipated threats to the security or integrity of the information;
  3. Protect against reasonably anticipated, impermissible uses or disclosures; and
  4. Ensure compliance by their workforce.

The Administrative Safeguards provisions in the Security Rule require covered entities to perform risk analysis as part of their security management processes. 

The security rule’s risk analysis and management provisions are addressed separately here because, by helping to determine which security measures are reasonable and appropriate for a particular covered entity, risk analysis affects the implementation of all of the safeguards contained in the Security Rule. 

A risk analysis process includes, but is not limited to, the following activities:

  1. Evaluate the likelihood and impact of potential risks to e-PHI;
  2. Implement appropriate security measures to address the risks identified in the risk analysis;
  3. Document the chosen security measures and, where required, the rationale for adopting those measures; and
  4. Maintain continuous, reasonable, and appropriate security protections.

While the security standards do not explicitly mention pen testing and vulnerability scanning, they are heavily implied and meet the requirements as outlined.

CYBRI’s Risk Analysis for HIPAA Compliance

To help you meet your compliance needs for HIPAA, we have developed an annual program focused on analyzing and preventing your cyber risk. Here’s an overview of the program.

  • Annual pen test of the internal and external environment
  • Quarterly vulnerability scanning of the internal and external environment
  • Phishing tests for employees with access to sensitive data
  • Data exfiltration simulation and DLP assessments
  • Data spillage and leakage review of non-HIPAA areas looking for accidentally misplaced data.

Cybersecurity is becoming increasingly important in today’s digital world, and the trends for cyber attacks have been growing exponentially over the years. We believe they will continue to do so.

Contact us today to discover if you need protection.

Discuss your project now

Related Content

Previous
Next

Schedule a personalized demo with CYBRI.

Don't wait, reputation damages & data breaches could be costly.

Tell us a little about your company so we can ensure your demo is as relevant as possible. We’ll take the scheduling from there!
Michael B.
Michael B.Managing Partner, Barasch & McGarry
Read More
I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
Tim O.
Tim O.CEO at Cylera
Read More
I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
Sergio V.
Sergio V.CTO at HealthCare.com
Read More
I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
L.D. Salmanson
L.D. SalmansonCEO at Cherre.com
Read More
We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
Marco Huslmann
Marco HuslmannCTO MyPostcard
Read More
CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
Alex Rothberg
Alex RothbergCTO IntusCare
Read More
I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
John Tambuting
John TambutingCTO Pangea.app
Read More
I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
Previous
Next

Discuss your Project







    Michael B.
    Michael B.Managing Partner, Barasch & McGarry
    Read More
    I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
    Tim O.
    Tim O.CEO at Cylera
    Read More
    I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
    Sergio V.
    Sergio V.CTO at HealthCare.com
    Read More
    I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
    L.D. Salmanson
    L.D. SalmansonCEO at Cherre.com
    Read More
    We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
    Marco Huslmann
    Marco HuslmannCTO MyPostcard
    Read More
    CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
    Alex Rothberg
    Alex RothbergCTO IntusCare
    Read More
    I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
    John Tambuting
    John TambutingCTO Pangea.app
    Read More
    I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
    Previous
    Next

    Find mission-critical vulnerabilities before hackers do.

    CYBRI’s manual pen tests are performed by U.S.-based highly certified Red Team experts.

    We help businesses detect & remediate catastrophic vulnerabilities in applications, cloud, and networks.