Data Protection & Privacy
DETAIL

HIPAA Security Rule / NIST SP 800-66 Rev. 2

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

The HIPAASecurity Rule, supported by guidance in NIST SP 800-66 Rev. 2, is afederal regulation and best practice framework that helpsorganizations safeguard electronic protected health information(ePHI) through the implementation of administrative, physical, andtechnical security controls. Its core objective is to ensure theconfidentiality, integrity, and availability of health data processedby covered entities and their business associates.

Published by theU.S. Department of Health and Human Services (HHS), with NISTproviding technical guidance, this rule applies to healthcareproviders, health plans, and business associates handling ePHI. Theframework addresses key areas such as access control, security riskanalysis, workforce training, incident response, and ongoingmonitoring to support regulatory compliance and effective riskmanagement in the healthcare sector.

Organizationsimplement the HIPAA Security Rule and align to NIST SP 800-66 byconducting risk assessments, establishing internal security controls,training personnel on compliance requirements, and periodicallyreviewing technical safeguards. This integration strengthenscybersecurity resilience, supports audit readiness, and ensuresalignment with broader information security and privacy standardscommonly required for healthcare compliance programs.

Why it Matters

The HIPAASecurity Rule, supported by NIST SP 800-66, is essential forprotecting electronic health information and managing regulatoryrisks in healthcare organizations.

Key benefitsinclude:

•  Strengthen data protection practices

Safeguard theconfidentiality and integrity of electronic protected healthinformation against unauthorized access and breaches.

•  Enhance regulatory alignment

Enablehealthcare organizations and their business associates tosystematically meet mandatory federal requirements for data security.

•  Increase audit readiness

Fostercontinuous improvement and documentation of policies to supportinternal and external auditing with confidence.

•  Promote operational resilience

Improve recoveryprocesses, business continuity, and ongoing monitoring to reduce theimpact of security incidents on healthcare operations.

•  Support robust incident response

Enable fasterdetection and response to security threats through comprehensive riskassessments and well-defined response procedures.

How it Works

The HIPAASecurity Rule, further supported by NIST SP 800-66 Revision 2,structures requirements around three main safeguard categories:administrative, physical, and technical. Each category consists ofspecific security controls and implementation specifications thatorganizations must consider to protect electronic protected healthinformation (ePHI). NIST SP 800-66 Rev. 2 provides a mapping of theHIPAA Security Rule’s requirements to recommended risk managementprocesses and control practices, creating a framework that connectsregulatory mandates to practical cybersecurity and privacy measuresin healthcare and life sciences environments.

In practice,organizations assess risks to their ePHI, implement required andaddressable security controls, develop supporting governancepolicies, and monitor for ongoing compliance. This typically involvesconducting risk assessments, selecting and documenting securitysafeguards, training staff, implementing technical controls such asaccess restrictions and encryption, and performing periodicevaluations to ensure ongoing compliance with both HIPAA and NISTrecommendations. Organizations also leverage these resources tosupport audit readiness, incident response planning, and alignmentwith broader health sector cybersecurity programs.

With SmartSuite,organizations can operationalize the HIPAA Security Rule and NIST SP800-66 Rev. 2 by referencing a library of control requirements,populating risk registers, centralizing policy governance, andtracking compliance activities in real time. The platform supportsevidence collection, remediation workflows, and continuousmonitoring, enabling organizations to efficiently demonstrateadherence, manage audit processes, and monitor the maturity of theirHIPAA-aligned security practices.

Key Elements

•  Administrative Safeguards Structure

Establishespolicies and workforce requirements addressing organizationalmanagement of ePHI security.

•  Physical Security Domains

Definesprotections related to facility access, workstation use, and physicalmedia handling.

•  Technical Safeguards Framework

Specifiestechnological controls such as access, audit, and transmissionsecurity for electronic data.

•  Security Risk Analysis Process

Describesprocedures for identifying, evaluating, and mitigating threats toePHI confidentiality, integrity, and availability.

•  Workforce Training and Awareness

Outlinesrequirements for ongoing employee education on compliance obligationsand security responsibilities.

•  Security Incident Response Planning

Organizesmechanisms for identifying, reporting, and managing securityincidents involving protected health information.

•  Ongoing Evaluation and Review

Establishesperiodic review processes to measure security control effectivenessand ensure continued HIPAA compliance.

Framework Scope

The HIPAASecurity Rule, guided by NIST SP 800-66 Rev. 2, is implemented byhealthcare providers, health plans, and business associates thatstore, process, or transmit electronic protected health information.It governs information systems and electronic data environments andis typically adopted when complying with regulatory obligations ormeeting compliance assessments for privacy and security inhealthcare.

Framework Objectives

The HIPAASecurity Rule, supported by NIST SP 800-66 Rev. 2, outlines essentialobjectives for safeguarding electronic protected health informationthrough effective cybersecurity and risk management practices.

•  Protect the confidentiality, integrity, and availability ofhealth data and ePHI

•  Strengthen governance and oversight to ensure regulatorycompliance with data protection laws

•  Establish comprehensive security controls for effective riskmanagement and resilience

•  Improve organizational preparedness to detect, respond to, andrecover from cyber threats

•  Support ongoing audit readiness and transparency in privacy andsecurity practices

•  Enable alignment with industry standards to promote robustinformation governance The HIPAA Security Rule, supported by NIST SP800-66 guidance, maps to controls in frameworks like NIST SP 800-53,HITRUST CSF, and ISO/IEC 27001. Organizations implement it primarilyfor regulatory compliance and breach risk reduction, often alongsideHITRUST certification, security governance initiatives, oroperational security improvements in healthcare environments.

Common Framework Mappings

Organizationscommonly map HIPAA/NIST SP 800-66 to complementary security andprivacy frameworks to streamline controls alignment, audit readiness,and cross-jurisdictional data protection requirements.

Mappedframeworks include:

CIS CriticalSecurity Controls

EU General DataProtection Regulation (GDPR)

HITRUST CommonSecurity Framework (HITRUST CSF)

ISO/IEC 27001

ISO/IEC 27701

NISTCybersecurity Framework

NIST SP 800-53

SOC 2

At a Glance
HIPAA Security Rule (45 CFR Part 164, Subpart C) — NIST SP 800-66 Rev. 2
  • checklist
    Classicifation
    Category
    info
    Data Protection & Privacy
    Domain
    info
    Cybersecurity
    Framework Family
    info
    NIST Special Publications
  • info
    Regulatory Context
    Type
    info
    Regulation
    Legal Instrument
    info
    Regulation
    Sector
    info
    Healthcare Sector
    Industry
    info
    Healthcare & Life Sciences
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    North America
    Region Detail
    info
    United States
    Publisher
    info
    U.S. Department of Health and Human Services (HHS)
  • published_with_changes
    Versioning
    Version
    info
    HIPAA Security Rule / NIST SP 800-66 Rev. 2
    Effective Date
    info
    April 21, 2003
    Issue Date
    info
    February 20, 2003
  • graph_3
    Adoption
    Adoption Model
    info
    Regulatory Compliance
    Implementation Complexity
    info
    High
  • captive_portal
    Official Reference
License Information

License included / downloadable: Yes

The HIPAA Security Rule and NIST SP 800-66 guidance are publicly available through HHS and NIST publications.

Official Resources
HIPAA Security Rule Guide
Provides official guidance on implementing the HIPAA Security Rule to protect electronic health information.
chevron_forward
NIST SP 800-66 Revision 2
Outlines security practices for healthcare to support HIPAA compliance.
chevron_forward
SMARTSUITE

How SmartSuite Supports US HIPAA Security Rule / NIST SP 800-66 R2

Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.

ePHI Scope and System Inventory

Define where ePHI is stored and transmitted, with clear boundaries and owners.

Safeguard Library and Ownership

Track administrative, physical, and technical safeguards with owners and procedures.

HIPAA Risk Analysis and Mitigation

Run HIPAA risk analysis, track mitigation plans, and document risk decisions.

Evidence and Audit Trail

Centralize policies, training, access controls, and monitoring evidence per safeguard.

BA Agreements and ePHI Vendor Monitoring

Manage BA agreements, due diligence, and ongoing monitoring for ePHI vendors.

Audit and Compliance Reporting

Report safeguard status, open gaps, and readiness across systems and teams.

Related frameworks

CIS Controls v8.1

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

Learn More
arrow_forward
GDPR

GDPR is an EU regulation that protects individuals' personal data and strengthens organizations' accountability for privacy.

Learn More
arrow_forward
HITRUST CSF v11.5

HITRUST CSF is a certifiable, risk-based cybersecurity and privacy framework for managing regulatory compliance and protecting sensitive data.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27701

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
SOC 2

SOC 2 assesses and reports on a service organization's controls for security, availability, processing integrity, confidentiality, and privacy.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For HIPAA Security Rule (with NIST SP 800-66 Rev. 2 Guidance)

What is the HIPAA Security Rule used for?

The HIPAA Security Rule is designed to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). It establishes federal requirements for safeguarding health data processed by covered entities and their business associates in the healthcare sector.

Is compliance with the HIPAA Security Rule mandatory?

Yes, compliance with the HIPAA Security Rule is mandatory for all covered entities and business associates that create, receive, maintain, or transmit ePHI. Non-compliance may result in both civil and criminal penalties enforced by the U.S. Department of Health and Human Services (HHS).

Who must comply with the HIPAA Security Rule?

The HIPAA Security Rule applies to healthcare providers, health plans, healthcare clearinghouses (collectively, "covered entities"), and their business associates that handle ePHI. This includes any organization that processes or stores ePHI on behalf of covered entities.

What are the key safeguards required by the HIPAA Security Rule?

The HIPAA Security Rule requires organizations to implement administrative, physical, and technical safeguards. These include conducting risk assessments, managing workforce security, controlling access to ePHI, protecting against unauthorized disclosures, and ensuring ongoing evaluation of security measures.

How do organizations implement the HIPAA Security Rule using NIST SP 800-66 Rev. 2?

Organizations use NIST SP 800-66 Rev. 2 as technical guidance to map HIPAA Security Rule requirements to practical security controls and risk management practices. Implementation typically involves risk analysis, selecting required and addressable controls, documenting policies, training staff, and maintaining evidence of compliance activities.

How does the HIPAA Security Rule relate to other security frameworks?

The HIPAA Security Rule aligns with broader cybersecurity and privacy standards, such as NIST Cybersecurity Framework or ISO 27001, but focuses specifically on ePHI. NIST SP 800-66 Rev. 2 helps organizations bridge HIPAA requirements with recognized information security best practices for the healthcare sector.

What are ongoing compliance requirements for the HIPAA Security Rule?

Maintaining HIPAA Security Rule compliance requires periodic risk assessments, regular review of security controls, continuous policy updates, ongoing workforce training, incident response planning, and robust documentation. Organizations should monitor and update their safeguards to address emerging threats and regulatory updates.

How would SmartSuite support HIPAA Security Rule (with NIST SP 800-66 Rev. 2 Guidance)?

SmartSuite can help organizations manage HIPAA Security Rule compliance by centralizing the tracking of risks, maintaining a library of control requirements, supporting evidence collection, and streamlining audit preparation. The platform enables ongoing monitoring, remediation workflow management, and comprehensive reporting to demonstrate and sustain alignment with HIPAA and NIST SP 800-66 Rev. 2 best practices.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward