HIPAA Security Rule / NIST SP 800-66 Rev. 2

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
The HIPAASecurity Rule, supported by guidance in NIST SP 800-66 Rev. 2, is afederal regulation and best practice framework that helpsorganizations safeguard electronic protected health information(ePHI) through the implementation of administrative, physical, andtechnical security controls. Its core objective is to ensure theconfidentiality, integrity, and availability of health data processedby covered entities and their business associates.
Published by theU.S. Department of Health and Human Services (HHS), with NISTproviding technical guidance, this rule applies to healthcareproviders, health plans, and business associates handling ePHI. Theframework addresses key areas such as access control, security riskanalysis, workforce training, incident response, and ongoingmonitoring to support regulatory compliance and effective riskmanagement in the healthcare sector.
Organizationsimplement the HIPAA Security Rule and align to NIST SP 800-66 byconducting risk assessments, establishing internal security controls,training personnel on compliance requirements, and periodicallyreviewing technical safeguards. This integration strengthenscybersecurity resilience, supports audit readiness, and ensuresalignment with broader information security and privacy standardscommonly required for healthcare compliance programs.
Why it Matters
The HIPAASecurity Rule, supported by NIST SP 800-66, is essential forprotecting electronic health information and managing regulatoryrisks in healthcare organizations.
Key benefitsinclude:
• Strengthen data protection practices
Safeguard theconfidentiality and integrity of electronic protected healthinformation against unauthorized access and breaches.
• Enhance regulatory alignment
Enablehealthcare organizations and their business associates tosystematically meet mandatory federal requirements for data security.
• Increase audit readiness
Fostercontinuous improvement and documentation of policies to supportinternal and external auditing with confidence.
• Promote operational resilience
Improve recoveryprocesses, business continuity, and ongoing monitoring to reduce theimpact of security incidents on healthcare operations.
• Support robust incident response
Enable fasterdetection and response to security threats through comprehensive riskassessments and well-defined response procedures.
How it Works
The HIPAASecurity Rule, further supported by NIST SP 800-66 Revision 2,structures requirements around three main safeguard categories:administrative, physical, and technical. Each category consists ofspecific security controls and implementation specifications thatorganizations must consider to protect electronic protected healthinformation (ePHI). NIST SP 800-66 Rev. 2 provides a mapping of theHIPAA Security Rule’s requirements to recommended risk managementprocesses and control practices, creating a framework that connectsregulatory mandates to practical cybersecurity and privacy measuresin healthcare and life sciences environments.
In practice,organizations assess risks to their ePHI, implement required andaddressable security controls, develop supporting governancepolicies, and monitor for ongoing compliance. This typically involvesconducting risk assessments, selecting and documenting securitysafeguards, training staff, implementing technical controls such asaccess restrictions and encryption, and performing periodicevaluations to ensure ongoing compliance with both HIPAA and NISTrecommendations. Organizations also leverage these resources tosupport audit readiness, incident response planning, and alignmentwith broader health sector cybersecurity programs.
With SmartSuite,organizations can operationalize the HIPAA Security Rule and NIST SP800-66 Rev. 2 by referencing a library of control requirements,populating risk registers, centralizing policy governance, andtracking compliance activities in real time. The platform supportsevidence collection, remediation workflows, and continuousmonitoring, enabling organizations to efficiently demonstrateadherence, manage audit processes, and monitor the maturity of theirHIPAA-aligned security practices.
Key Elements
• Administrative Safeguards Structure
Establishespolicies and workforce requirements addressing organizationalmanagement of ePHI security.
• Physical Security Domains
Definesprotections related to facility access, workstation use, and physicalmedia handling.
• Technical Safeguards Framework
Specifiestechnological controls such as access, audit, and transmissionsecurity for electronic data.
• Security Risk Analysis Process
Describesprocedures for identifying, evaluating, and mitigating threats toePHI confidentiality, integrity, and availability.
• Workforce Training and Awareness
Outlinesrequirements for ongoing employee education on compliance obligationsand security responsibilities.
• Security Incident Response Planning
Organizesmechanisms for identifying, reporting, and managing securityincidents involving protected health information.
• Ongoing Evaluation and Review
Establishesperiodic review processes to measure security control effectivenessand ensure continued HIPAA compliance.
Framework Scope
The HIPAASecurity Rule, guided by NIST SP 800-66 Rev. 2, is implemented byhealthcare providers, health plans, and business associates thatstore, process, or transmit electronic protected health information.It governs information systems and electronic data environments andis typically adopted when complying with regulatory obligations ormeeting compliance assessments for privacy and security inhealthcare.
Framework Objectives
The HIPAASecurity Rule, supported by NIST SP 800-66 Rev. 2, outlines essentialobjectives for safeguarding electronic protected health informationthrough effective cybersecurity and risk management practices.
• Protect the confidentiality, integrity, and availability ofhealth data and ePHI
• Strengthen governance and oversight to ensure regulatorycompliance with data protection laws
• Establish comprehensive security controls for effective riskmanagement and resilience
• Improve organizational preparedness to detect, respond to, andrecover from cyber threats
• Support ongoing audit readiness and transparency in privacy andsecurity practices
• Enable alignment with industry standards to promote robustinformation governance The HIPAA Security Rule, supported by NIST SP800-66 guidance, maps to controls in frameworks like NIST SP 800-53,HITRUST CSF, and ISO/IEC 27001. Organizations implement it primarilyfor regulatory compliance and breach risk reduction, often alongsideHITRUST certification, security governance initiatives, oroperational security improvements in healthcare environments.
Common Framework Mappings
Organizationscommonly map HIPAA/NIST SP 800-66 to complementary security andprivacy frameworks to streamline controls alignment, audit readiness,and cross-jurisdictional data protection requirements.
Mappedframeworks include:
CIS CriticalSecurity Controls
EU General DataProtection Regulation (GDPR)
HITRUST CommonSecurity Framework (HITRUST CSF)
ISO/IEC 27001
ISO/IEC 27701
NISTCybersecurity Framework
NIST SP 800-53
SOC 2
- ClassicifationCategoryData Protection & PrivacyDomainCybersecurityFramework FamilyNIST Special Publications
- Regulatory ContextTypeRegulationLegal InstrumentRegulationSectorHealthcare SectorIndustryHealthcare & Life Sciences
- Region / PublisherRegionNorth AmericaRegion DetailUnited StatesPublisherU.S. Department of Health and Human Services (HHS)
- VersioningVersionHIPAA Security Rule / NIST SP 800-66 Rev. 2Effective DateApril 21, 2003Issue DateFebruary 20, 2003
- AdoptionAdoption ModelRegulatory ComplianceImplementation ComplexityHigh
- Official ReferenceOpen Link in New TabSource
License included / downloadable: Yes
The HIPAA Security Rule and NIST SP 800-66 guidance are publicly available through HHS and NIST publications.
How SmartSuite Supports US HIPAA Security Rule / NIST SP 800-66 R2
Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.
ePHI Scope and System Inventory
Define where ePHI is stored and transmitted, with clear boundaries and owners.
Safeguard Library and Ownership
Track administrative, physical, and technical safeguards with owners and procedures.
HIPAA Risk Analysis and Mitigation
Run HIPAA risk analysis, track mitigation plans, and document risk decisions.
Evidence and Audit Trail
Centralize policies, training, access controls, and monitoring evidence per safeguard.
BA Agreements and ePHI Vendor Monitoring
Manage BA agreements, due diligence, and ongoing monitoring for ePHI vendors.
Audit and Compliance Reporting
Report safeguard status, open gaps, and readiness across systems and teams.
Related frameworks

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

GDPR is an EU regulation that protects individuals' personal data and strengthens organizations' accountability for privacy.

HITRUST CSF is a certifiable, risk-based cybersecurity and privacy framework for managing regulatory compliance and protecting sensitive data.

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.
Frequently Asked Questions For HIPAA Security Rule (with NIST SP 800-66 Rev. 2 Guidance)
The HIPAA Security Rule is designed to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). It establishes federal requirements for safeguarding health data processed by covered entities and their business associates in the healthcare sector.
Yes, compliance with the HIPAA Security Rule is mandatory for all covered entities and business associates that create, receive, maintain, or transmit ePHI. Non-compliance may result in both civil and criminal penalties enforced by the U.S. Department of Health and Human Services (HHS).
The HIPAA Security Rule applies to healthcare providers, health plans, healthcare clearinghouses (collectively, "covered entities"), and their business associates that handle ePHI. This includes any organization that processes or stores ePHI on behalf of covered entities.
The HIPAA Security Rule requires organizations to implement administrative, physical, and technical safeguards. These include conducting risk assessments, managing workforce security, controlling access to ePHI, protecting against unauthorized disclosures, and ensuring ongoing evaluation of security measures.
Organizations use NIST SP 800-66 Rev. 2 as technical guidance to map HIPAA Security Rule requirements to practical security controls and risk management practices. Implementation typically involves risk analysis, selecting required and addressable controls, documenting policies, training staff, and maintaining evidence of compliance activities.
The HIPAA Security Rule aligns with broader cybersecurity and privacy standards, such as NIST Cybersecurity Framework or ISO 27001, but focuses specifically on ePHI. NIST SP 800-66 Rev. 2 helps organizations bridge HIPAA requirements with recognized information security best practices for the healthcare sector.
Maintaining HIPAA Security Rule compliance requires periodic risk assessments, regular review of security controls, continuous policy updates, ongoing workforce training, incident response planning, and robust documentation. Organizations should monitor and update their safeguards to address emerging threats and regulatory updates.
SmartSuite can help organizations manage HIPAA Security Rule compliance by centralizing the tracking of risks, maintaining a library of control requirements, supporting evidence collection, and streamlining audit preparation. The platform enables ongoing monitoring, remediation workflow management, and comprehensive reporting to demonstrate and sustain alignment with HIPAA and NIST SP 800-66 Rev. 2 best practices.
Put CRI Profile into action with SmartSuite
Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

