Valtik Studios
HIPAA · Security Rule · OCR Audit

HIPAA Security Assessment

Risk analyses, penetration tests, and readiness work for healthcare providers, telehealth platforms, health-tech SaaS, and Business Associates. Built to the proposed 2024-2026 HIPAA pentest mandate before it becomes enforceable.

HIPAA enforcement is escalating. The Security Rule is about to require pentesting.

The HIPAA Security Rule has been enforced since 2005. Penalties have escalated year over year — $12 million in 2024 alone from HHS OCR settlements. The proposed Security Rule update published in December 2024 goes further: it explicitly requires annual penetration testing, specific technical controls, and faster breach response timelines.

Valtik runs HIPAA security assessments for Connecticut healthcare providers recovering from the Yale New Haven Health breach fallout, DFW health-tech SaaS companies handling PHI for thousands of customers, and Business Associates nationwide preparing for OCR audits. Every assessment produces the documents OCR asks for during investigations.

The Yale New Haven Health breach of April 2025 affected over 5.5 million patient records and triggered both HHS OCR and Connecticut AG inquiries. Every Connecticut healthcare provider is now under heightened scrutiny. Risk analyses over 18 months old are inadequate for current enforcement.

Who this is for

Covered Entities

  • Hospitals and health systems
  • Physician practices and medical groups
  • Dental, vision, and specialty providers
  • Health plans and insurers
  • Healthcare clearinghouses
  • Federally Qualified Health Centers (FQHCs)
  • Behavioral and mental health providers

Business Associates

  • Telehealth platforms
  • Electronic Health Record (EHR) vendors
  • Practice management SaaS
  • Billing, coding, and revenue cycle services
  • Cloud hosting providers handling PHI
  • Data analytics and AI platforms processing PHI
  • Medical device manufacturers with connected platforms
  • Health and wellness apps handling PHI on behalf of Covered Entities

What the assessment includes

Risk analysis (45 CFR 164.308(a)(1)(ii)(A))

The foundation document OCR asks for first during any audit. We produce a documented risk analysis identifying every system processing ePHI, the threats and vulnerabilities to each, and the likelihood and impact of each risk. This is not a one-page executive summary — this is the detailed document OCR investigators read line by line.

Administrative safeguards review (164.308)

  • Security management process and workforce training
  • Security incident procedures and response planning
  • Contingency planning (disaster recovery, emergency operations)
  • Evaluation procedures (periodic technical and nontechnical evaluation)
  • Business Associate Agreement review and tracking

Physical safeguards review (164.310)

  • Facility access controls and validation
  • Workstation use and workstation security
  • Device and media controls (disposal, re-use, encryption requirements)

Technical safeguards review (164.312)

  • Access controls (unique user identification, emergency access, automatic logoff, encryption/decryption)
  • Audit controls and log review procedures
  • Integrity controls for ePHI
  • Person or entity authentication (MFA requirements)
  • Transmission security (encryption in transit for ePHI)

Penetration testing of ePHI-handling systems

Active testing of the systems that store, process, or transmit ePHI. Includes patient portals, telehealth platforms, EHR integrations, billing systems, and any third-party integrations that receive PHI. We validate findings with working proof-of-exploit and map them to HIPAA Security Rule requirements.

Breach notification readiness

45 CFR 164.404-164.410 requires notification to affected individuals, HHS, and (for breaches over 500 individuals) media within 60 days. We evaluate your breach detection capabilities, notification procedures, and incident response runbook.

What the proposed 2024-2026 HIPAA update adds

The Notice of Proposed Rulemaking (NPRM) published December 27, 2024 proposes substantial upgrades to the Security Rule. Key provisions we build into current assessments so you are ready when (not if) it becomes enforceable:

  • Annual penetration testing — currently discretionary, proposed as mandatory
  • Asset inventory — every system handling ePHI documented with owner, classification, support status
  • MFA requirement — phishing-resistant MFA required for privileged access and remote access
  • Encryption baseline — encryption required rather than "addressable" for ePHI
  • Incident response testing — annual tabletop exercises with documented results
  • 24-hour notification for certain breaches — faster timeline than current 60 days for specified categories

HIPAA + state privacy laws in Connecticut and Texas

Connecticut's CTDPA and Texas's state laws create additional obligations beyond HIPAA. Health data has special sensitive-data status in most state privacy laws. Our assessments include overlay reviews for:

  • Connecticut — CT Public Act 19-196 (breach notification), CTDPA sensitive data category for health data, CT AG enforcement posture
  • Texas — SB 2610 safe harbor requirements, Texas Identity Theft Enforcement and Protection Act, Texas Medical Privacy Act additional protections

Timeline and pricing

Engagement sizeTimelinePrice range
Small practice (under 25 staff, single location)3-4 weeks$8,000 - $18,000
Mid-size practice or group (25-150 staff)4-6 weeks$18,000 - $45,000
Multi-location health system6-10 weeks$45,000 - $120,000+
Health-tech SaaS / Business Associate4-8 weeks$20,000 - $75,000

Fixed-price quotes provided after a scoping call. No hourly surprises, no scope creep billing.

Common questions

Is a self-assessment good enough?

OCR's consistent finding in enforcement actions is that self-assessments fail. OCR-qualified third-party assessments produce documentation that survives scrutiny. Self-assessments are better than nothing but do not satisfy the "accurate and thorough" standard in 164.308.

We just had an incident. Can you help with that?

Yes. Post-incident assessments establish root cause, validate remediation, and produce the documentation OCR will request as part of their investigation. We have experience coordinating with breach coaches and HIPAA counsel.

What if we do not have a formal risk analysis yet?

Most practices we work with do not. The assessment produces one. This is the single most important HIPAA document and the most common item OCR cites as missing or inadequate.

Related reading

Ready to start?

Free website security check — no obligation, no sales pitch. Delivered as a plain-English findings report in 48 hours.

Request Free Check