Alert

Proposed HIPAA Security Rule Update: What Healthcare Leaders Need to Know

January 28, 2026
two dentists or doctors looking contemplative out the window

Key Takeaways

  • The proposed HIPAA Security Rule update makes many previously flexible safeguards now mandatory, requiring stricter compliance.
  • Key changes include mandated multi-factor authentication, stronger encryption standards, comprehensive asset and vulnerability management, and enhanced vendor oversight.
  • Healthcare leaders should update risk analyses, inventories, and technical controls now to ease future compliance.

HS has issued a Notice of Proposed Rulemaking (NPRM) to tighten the HIPAA Security Rule, significantly reducing flexibility in how covered entities protect ePHI. For healthcare leaders, this update reinforces a broader reality: compliance alone is no longer enough — security controls must support operational resilience, patient safety, and continuity of care.

This is the largest HIPAA Security Rule update in over a decade, aiming to boost ePHI protection and address flexibility concerns.

Who Is Impacted

All covered entities and business associates handling ePHI should prepare for compliance. Smaller providers often have larger implementation gaps and should start planning and resourcing now.

The NPRM’s emphasis on reducing “flexibility” means that previously tolerated approaches will be harder to justify.

What Are the Potential Changes

Key proposals include:

  • Convert many addressable specifications into required controls, narrowing the flexibility organizations previously had.
  • Authentication and access controls: mandated multi-factor authentication (MFA, which requires users to present two or more forms of verification to access systems) for remote access and privileged accounts, with tighter session-management and authorization practices.
  • Encryption and integrity: stronger expectations around encryption of ePHI in transit and at rest, plus integrity controls and anti-tamper measures.
  • Asset and vulnerability management: requirements for annual asset inventories, ongoing vulnerability scanning, patch management, and documented remediation timelines.
  • Logging and telemetry: explicit logging and retention requirements to support incident detection and forensic investigations.
  • Third-party/vendor oversight: stricter Business Associate Agreement (BAA) expectations, vendor due diligence, and oversight obligations.

What You Should Prioritize Today

Organizations that take these actions now will reduce risk and simplify future compliance, even before a final rule is issued. These priorities should not be addressed as isolated IT projects, but as part of a unified risk strategy that spans clinical operations, finance, IT, and vendor management.

1. Update your risk analysis to an operational roadmap.

Convert your high-level risk analysis into an actionable remediation plan that maps existing gaps to the NPRM’s proposed controls (MFA, encryption, logging, asset inventory, etc.). Prioritize remediation by probable impact and exploitability.

2. Build or refresh an accurate asset and data inventory.

Track where ePHI lives (systems, backups, cloud services) and which vendors have access. The NPRM’s expected requirements for asset inventories and vendor oversight make this foundational.

3. Implement and test MFA and encryption broadly.

MFA for remote and privileged access and encryption of ePHI in transit/at rest are highlighted as top items. Start rollouts and table-top test scenarios (provider logins, EHR access, telehealth endpoints).

4. Strengthen logging, monitoring, and IR readiness.

Expand logging to include user activity and privileged operations, ensure logs are protected and retained, and test incident response playbooks with realistic scenarios.

5. Tighten vendor/BAA management.

Re-examine BAAs and vendor security questionnaires, require evidence of controls (MFA, encryption, logging) and include audit/monitoring rights and SLAs for patching and incident notification.

6. Plan budget and timeline — don’t wait for the final rule.

Technology rollouts, third-party remediation, and new monitoring/forensics tools take time and money. Preparing budgets and phased timelines now reduces scramble if the rule moves quickly.

Questions Boards and Executive Teams Should Be Asking

  • Do we have a current, documented inventory of assets that store or transmit ePHI?
  • Where are our largest gaps on MFA, encryption, logging, patching, and vendor oversight?
  • What projects will need budget and how long will procurement and deployment take?
  • Are our incident response and forensic capabilities sufficient to meet stricter logging and notification expectations?

How Eide Bailly Can Help

The NPRM signals a significant tightening of expectations for protecting ePHI. While the final rule and timeline are not certain, healthcare leaders should assume reduced flexibility and prepare accordingly.

Early focus on inventory, MFA/encryption, logging, and vendor oversight cuts cyber risk and prepares organizations for final compliance.

Our Risk Advisory team can help you convert the NPRM language into a practical compliance plan. If the rule becomes final, having an assessed and partially implemented program will reduce implementation time and exposure. Let’s talk.

FAQs: Proposed HIPAA Security Rule Update

What is changing in the proposed HIPAA Security Rule?

HHS’s NPRM would tighten the HIPAA Security Rule by converting many “addressable” safeguards into required controls and adding new obligations. Practically, this reduces flexibility and makes several controls mandatory.

Who is impacted by the update?

All covered entities and business associates that create, receive, maintain, or transmit ePHI should prepare. Smaller providers often have bigger implementation gaps and should start planning now.

What new technical controls are expected to be required?

The expected requirements include: using multi factor authentication (MFA) for both remote access and privileged accounts; implementing stronger encryption for ePHI in transit and at rest; maintaining comprehensive logging and retention practices to support detection and forensic analysis; establishing an asset inventory along with vulnerability scanning and patch management that follows documented remediation timelines; and strengthening vendor and BAA oversight through stricter due diligence processes.

Why is this update significant?

It’s the largest HIPAA Security Rule update in over a decade, intended to boost ePHI protection and address variability from the addressable/required distinction. This shift also pushes healthcare organizations toward the unified risk governance models already necessary to address ransomware, vendor outages, and operational disruptions.

Should we wait for the final rule before budgeting?

No. Technology rollouts and vendor remediation take time. Prepare budgets and phased timelines now to avoid a scramble.

Beyond HIPAA: From Compliance to Comprehensive Risk Leadership

doctor-laptop-paperwork
Discover how to embed HIPAA in a unified risk strategy to protect patients, reduce risk, and strengthen resilience.
Read the Article

About the Author(s)

Eric Pulse

Eric A. Pulse, CCSFP, CHQP

Principal/Risk Advisory Practice Leader
Eric joined Eide Bailly in 2013 and has over 25 years of experience in public accounting and consulting. He leads Eide Bailly’s Risk Advisory Services practice and specializes in providing information technology, risk advisory, and cybersecurity consulting services to a variety of industries, including banking, credit unions, healthcare, insurance, retail, manufacturing, and governments. He advises Eide Bailly clients on how to keep their valuable data secure in a world of increasingly sophisticated cyber threats. With his many years of experience, Eric has become a true thought leader in the culture of cybersecurity.