The biggest overhaul to the HIPAA Security Rule since its inception is here. If you work in hospital IT, health system infrastructure, or healthcare security engineering, these changes directly affect your architecture decisions and implementation timelines.
What Changed and Why It Matters
HHS finalized major updates to 45 CFR Part 164 (the HIPAA Security Rule) that eliminate many of the "addressable" implementation specifications that previously gave organizations flexibility. For hospitals, this means several controls that were optional are now mandatory.
The 6 Critical Changes for Hospital IT
1. Encryption Is Now Required (Not Addressable)
Previously, encryption was an "addressable" specification — you could document why an alternative was reasonable. That's over.
// What this means in practice:
- All ePHI at rest: AES-256 encryption minimum
- All ePHI in transit: TLS 1.2+ required
- Database-level encryption for EHR systems
- Full-disk encryption on all endpoints
- Encrypted backup storage
Implementation priority: If you're not already encrypting everywhere, start with data in transit (easiest wins) then tackle at-rest encryption.
2. Multi-Factor Authentication Everywhere
MFA is now required for ALL systems that access ePHI — not just remote access or VPN:
- EHR system logins
- Medical device management consoles
- Administrative systems with patient data
- Email systems (if they contain PHI)
- Cloud service provider portals
Practical tip: Evaluate FIDO2/WebAuthn for clinical workstations. Smart card or proximity badge + PIN works well for shared workstation environments.
3. 72-Hour Security Incident Notification
This is a big one. Covered entities must now report certain security incidents to HHS within 72 hours of discovery — much faster than the previous breach notification timeline.
Previous timeline:
Discovery → 60-day investigation → Notification (if breach confirmed)
New timeline:
Discovery → 72-hour notification to HHS (for qualifying incidents)
Discovery → 60-day notification to individuals (unchanged for breaches)
What qualifies: Not every incident triggers the 72-hour rule. Focus on incidents involving unauthorized access to ePHI or system compromises that could affect ePHI integrity.
4. Mandatory Technology Asset Inventory
Annual comprehensive inventory of all technology assets that create, receive, maintain, or transmit ePHI:
- Network topology mapping
- Connected medical device inventory
- Cloud service inventory
- Data flow diagrams showing how ePHI moves through systems
# Example asset inventory structure
asset_inventory:
- name: "Epic EHR Production"
type: application
ephi_classification: high
encryption_at_rest: true
encryption_in_transit: true
mfa_enabled: true
last_vulnerability_scan: 2026-03-15
patch_status: current
business_owner: "CMO Office"
technical_owner: "EHR Team"
5. Defined Patch Management Timelines
No more "patch when convenient" — the new rule establishes specific remediation timelines:
- Critical vulnerabilities: Must be remediated within 15 calendar days
- High vulnerabilities: Within 30 calendar days
- Medium/Low: Risk-based timeline, documented in risk management plan
6. Enhanced Business Associate Oversight
Hospitals must now obtain written verification that business associates have implemented required security controls. Annual verification recommended.
Building Your Implementation Roadmap
Here's a practical phased approach:
Phase 1 (Immediate — 0-3 months):
- Complete technology asset inventory
- Identify encryption gaps
- Deploy MFA on highest-risk systems first
- Update incident response plan for 72-hour reporting
Phase 2 (3-6 months):
- Implement encryption for data in transit across all systems
- Roll out MFA to all ePHI-accessible systems
- Establish automated vulnerability scanning and patch management SLAs
- Begin BA verification process
Phase 3 (6-12 months):
- Complete at-rest encryption deployment
- Conduct comprehensive Security Risk Analysis reflecting new requirements
- Update all policies and procedures
- Train workforce on new incident reporting procedures
The Security Risk Analysis Connection
All of these changes feed back into your Security Risk Analysis (SRA). The SRA is where you document what you've implemented, identify remaining gaps, and create your remediation roadmap.
For hospitals dealing with dozens of systems across multiple locations, tools like Medcurity can help manage the complexity of conducting an enterprise-wide SRA and tracking remediation progress across departments.
Key Takeaways
- The 2026 HIPAA Security Rule removes flexibility — encryption and MFA are now mandatory
- 72-hour incident reporting requires updated IR plans and communication protocols
- Asset inventory and patch management need formal processes with documented timelines
- Start planning now — implementation takes time, especially for large hospital networks
- Your SRA must be updated to reflect these new requirements
For the complete breakdown of 2026 HIPAA Security Rule changes and what hospitals must do before the deadline, visit medcurity.com. Medcurity provides HIPAA compliance software built for hospitals starting at $25/month.
Top comments (0)