Back to BlogCompliance Checklist

HIPAA Technical Safeguards: An Audit-Ready Checklist (45 CFR §164.312)

April 25, 2026
Darren Speed, MS, CHC
HIPAA Technical Safeguards: An Audit-Ready Checklist (45 CFR §164.312)

A practical, audit-ready checklist for the HIPAA Security Rule Technical Safeguards under 45 CFR §164.312 — built from real-world healthcare compliance observations. Use it to document your controls, validate your evidence, and surface gaps before OCR or your cyber-insurance carrier asks for proof.

How to use this checklist

Walk through each control. Mark it In Place or Gap, capture the evidence you'd produce in an audit, and assign an owner with a due date for anything missing.

This is not legal advice. Use alongside your organization's Risk Analysis and Risk Management plan.

1. Access Control — §164.312(a)(1)

Control In Place? Evidence to Keep Owner / Notes
Unique user identification (Required)   User list export, IAM policy, HR onboarding procedure  
Emergency access procedure (Required)   "Break-glass" policy, logs of emergency access, downtime procedures  
Automatic logoff (Addressable)   EHR timeout settings, workstation GPO/MDM policy, device config exports  
Encryption / decryption of ePHI (Addressable)   Disk encryption status, TLS policy, encryption key management summary  

Quick audit check: Can you produce evidence within 24 hours showing how access is provisioned, reviewed, and revoked?

2. Audit Controls — §164.312(b) (Required)

Control In Place? Evidence to Keep Owner / Notes
System activity review / audit logs enabled   SIEM/logging screenshots, retention settings, sample log exports  
Log retention & protection from tampering   Retention policy, immutable storage settings, admin access controls  
Alerting on suspicious activity   Alert rules, incident tickets, after-action notes  

Common gap: Logs exist, but there's no documented review process — no defined frequency, owner, or escalation triggers.

3. Integrity — §164.312(c)(1)

Control In Place? Evidence to Keep Owner / Notes
Mechanism to authenticate ePHI hasn't been altered or destroyed (Addressable)   EHR integrity controls, backup validation results, hash/signature controls  
Patch & vulnerability remediation process documented   Patch cadence, exceptions, remediation SLAs, risk acceptance forms  

Quick audit check: When a critical vulnerability is found, can you show the timeline from discovery → triage → remediation → verification?

4. Person or Entity Authentication — §164.312(d) (Required)

Control In Place? Evidence to Keep Owner / Notes
MFA for remote access and privileged accounts   MFA policy, conditional access rules, admin account inventory  
Identity proofing / account provisioning controls   HR/IAM workflow, access request approvals  

Common gap: MFA is enforced on the VPN only — not on email, admin portals, backups, or EHR admin roles.

5. Transmission Security — §164.312(e)(1)

Control In Place? Evidence to Keep Owner / Notes
Encrypt ePHI in transit (Addressable)   TLS config, secure messaging settings, email encryption policy  
Integrity controls for transmitted data (Addressable)   Secure file transfer process, checksums, system configuration  

Quick audit check: Where does ePHI leave your network — vendors, labs, billing, portals — and is it encrypted end-to-end?

Vulnerability Management

Where audits and ransomware risk converge. Not a standalone Technical Safeguard line item, but frequently requested as evidence supporting your Risk Management and Integrity controls. Use this mini-checklist to confirm you can prove a consistent program:

Item In Place? Evidence to Keep
External vulnerability scanning on a defined frequency   Scan schedule, latest results, change logs
Internal vulnerability scanning on a defined frequency   Scan schedule, network scope, latest results
Triage process (Critical / High / Medium / Low) with timelines   Remediation SLAs, ticketing workflow
Executive / Compliance summary available (non-technical)   1–2 page summary, risk register mapping
Retesting to verify fixes   Rescan results, closure evidence
Exceptions documented and risk accepted   Risk acceptance form, compensating controls

The "OCR-Ready" Evidence Pack

If OCR or your insurer asked for proof on short notice, you should be able to produce all of the following:

  1. Latest Risk Analysis summary — with the date it was last updated
  2. Vulnerability scanning cadence — plus the last 2–4 scans
  3. Remediation tracker — showing closure and retesting
  4. Policies — access control, logging, incident response, vendor management
  5. Proof of encryption and MFA — for all key systems

Need Help Closing the Gaps?

This checklist is designed to surface the items most often requested in OCR investigations and cyber-insurance reviews. If your organization needs help building or proving any of the controls above, HIPPO MT can act as your fractional Chief Compliance and Privacy Officer — at a fraction of the cost of a full-time hire.

Written by Darren Speed — Chief Compliance and Privacy Officer, HIPPO MT

Contact us at 817-422-1413 or visit www.hippomt.com to schedule a free consultation.

HIPAASecurity RuleTechnical SafeguardsOCRAuditCybersecurityePHIMFAEncryption

Ready to Strengthen Your Compliance Program?

Schedule a free consultation with our compliance experts and discover how we can help protect your healthcare organization.