Cybersecurity
DETAIL

U.S. HICP (Medium Practice) — Health Industry Cybersecurity Practices

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

U.S. HICP (Medium Practice) is a cybersecurity framework tailored for medium-sized healthcare organizations, providing practical guidance for identifying, managing, and mitigating common cybersecurity threats. The framework aims to enhance cybersecurity resilience and protect sensitive health information within medium-sized healthcare settings.

Developed by the U.S. Department of Health and Human Services (HHS) in collaboration with industry and government partners, HICP Medium Practice is designed for organizations with 200 to 500 employees. It provides threat-specific mitigation recommendations organized into ten cybersecurity practice areas, focusing on the five most prevalent cyber threats facing healthcare organizations.

Organizations implement HICP Medium Practice by integrating its recommended practices into existing security and compliance programs, conducting risk assessments, and aligning cybersecurity activities with HIPAA and other applicable regulations.

Why it Matters

HICP (Medium Practice) provides medium-sized healthcare organizations with actionable, threat-focused cybersecurity guidance scaled to their operational environment.

Key benefits include:

Address healthcare-specific threats

Implement targeted controls for the five most prevalent cyber threats to healthcare organizations, including phishing and ransomware.

Support HIPAA compliance

Align security practices with HIPAA Security Rule requirements through practical, implementable guidance tailored to medium healthcare settings.

Improve risk management

Apply a structured risk management approach to prioritize security investments and reduce cybersecurity vulnerabilities.

Enhance incident response

Develop capabilities to detect, contain, and recover from cybersecurity incidents affecting clinical operations and patient data.

How it Works

HICP Medium Practice structures its guidance around five key cyber threats to healthcare organizations and ten cybersecurity practice areas. The framework maps threats to specific technical practices with recommendations scaled to the medium practice size and complexity.

Organizations implement HICP Medium Practice by conducting gap assessments against the ten practice areas, prioritizing improvements based on threat relevance and risk, implementing recommended technical and administrative controls, and monitoring ongoing compliance.

Key Elements

Threat-Focused Practice Areas

Organizes cybersecurity guidance around the five key threats most relevant to healthcare organizations of medium size.

Ten Cybersecurity Practice Areas

Provides structured guidance across ten domains including email protection, endpoint protection, and access management.

Scalable Technical Recommendations

Offers implementation guidance scaled to the capabilities and resources of medium-sized healthcare organizations.

HIPAA Alignment

Connects cybersecurity practices to HIPAA Security Rule requirements to support regulatory compliance.

Framework Scope

U.S. HICP (Medium Practice) is designed for healthcare organizations with 200 to 500 employees handling electronic health information and clinical operations.

Framework Objectives

HICP (Medium Practice) provides medium-sized healthcare organizations with targeted cybersecurity guidance to reduce threats and improve resilience.

Address the five most prevalent cybersecurity threats facing medium healthcare organizations

Support HIPAA compliance through practical, scalable security controls

Enhance cybersecurity risk management and governance practices

Improve detection and response capabilities for cyber incidents

Protect patient data and clinical operations from cybersecurity threats

Enable audit readiness through documented security practices and controls

At a Glance
HICP 2018 – Medium
  • checklist
    Classicifation
    Category
    info
    Cybersecurity
    Domain
    info
    Cybersecurity
    Framework Family
    info
    Other
  • info
    Regulatory Context
    Type
    info
    Guidance
    Legal Instrument
    info
    Framework
    Sector
    info
    Healthcare Sector
    Industry
    info
    Healthcare & Life Sciences
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    North America
    Region Detail
    info
    United States
    Publisher
    info
    U.S. Department of Health and Human Services (HHS)
  • published_with_changes
    Versioning
    Version
    info
    HICP 2023
    Effective Date
    info
    January 2019
    Issue Date
    info
    December 28, 2018
  • graph_3
    Adoption
    Adoption Model
    info
    Security Baseline
    Implementation Complexity
    info
    Moderate
  • captive_portal
    Official Reference
License Information

License included / downloadable: Yes

HICP is published by HHS and is publicly available for free from official HHS and NIST websites. License included with platform

Official Resources
Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients
Provides the official HHS publication describing HICP practices and threat mitigation matrix.
chevron_forward
HPH Sector Cybersecurity Framework Implementation Guide
Describes how to implement the NIST Cybersecurity Framework for healthcare using HICP alignment.
chevron_forward
SMARTSUITE

How SmartSuite Supports HICP (Medium Practice)

Strengthen cybersecurity protections for mid-sized healthcare organizations by organizing HICP recommended safeguards, tracking implementation progress, and maintaining documentation supporting healthcare cybersecurity resilience.

HICP Security Practices Library

Organize HICP cybersecurity practices aligned to the top healthcare cybersecurity threats.

Asset and System Risk Visibility

Track medical devices, EHR systems, clinical applications, and supporting infrastructure requiring protection.

Security Risk Assessment and Mitigation Planning

Identify cybersecurity risks affecting healthcare operations and track mitigation strategies.

Identity, Access, and Endpoint Security Governance

Manage authentication controls, endpoint protection, and privileged access to clinical systems.

Vendor and Third-Party Risk Oversight

Monitor cybersecurity risks associated with healthcare vendors, software providers, and connected medical devices.

Healthcare Cybersecurity Incident and Program Maturity Reporting

Track cybersecurity incidents, remediation actions, and program maturity across healthcare security operations.

Related frameworks

CIS Controls v8.1

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

Learn More
arrow_forward
COBIT 2019

COBIT 2019 is a governance framework that helps organizations govern and manage IT to meet business goals, risks, and compliance.

Learn More
arrow_forward
HITRUST CSF v11.5

HITRUST CSF is a certifiable, risk-based cybersecurity and privacy framework for managing regulatory compliance and protecting sensitive data.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27002:2022

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
SOC 2

SOC 2 assesses and reports on a service organization's controls for security, availability, processing integrity, confidentiality, and privacy.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For U.S. HICP (Medium Practice) — Health Industry Cybersecurity Practices

What is the U.S. HICP (Medium Practice) used for?

The U.S. Health Industry Cybersecurity Practices (HICP) Medium Practice is designed to assist healthcare organizations in identifying and implementing cybersecurity practices that address common threats. Its goal is to improve organizational cyber resilience and better protect sensitive health information and systems.

Is U.S. HICP required for healthcare organizations?

U.S. HICP is not a mandatory or certifiable standard but is a voluntary set of cybersecurity guidelines. However, adopting HICP may demonstrate reasonable security practices under regulatory scrutiny, such as during HIPAA audits, and can serve as evidence of due diligence regarding information protection.

Who should use the U.S. HICP (Medium Practice)?

The HICP Medium Practice is intended for mid-sized healthcare providers and organizations with moderate resources and cybersecurity maturity. Organizations should assess their environment, resource availability, and risk tolerance to determine if Medium Practice aligns with their needs.

What are the key concepts and controls in HICP (Medium Practice)?

Medium Practice focuses on five top threats: email phishing, ransomware, loss/theft of equipment, insider threats, and attacks against network-connected medical devices. It provides actionable controls, such as multi-factor authentication, endpoint protection, regular backups, access management, and security training.

How do organizations implement HICP (Medium Practice)?

Implementation involves reviewing organizational risks, mapping HICP’s suggested practices against current controls, and closing identified security gaps. Engagement from leadership, documented policies, technology updates, and employee awareness are critical steps in operationalizing Medium Practice recommendations.

How does U.S. HICP relate to other healthcare cybersecurity frameworks?

HICP complements regulatory and industry standards like HIPAA Security Rule and NIST Cybersecurity Framework. While it doesn't replace these requirements, it provides practical, threat-informed guidance that can support compliance with broader regulatory obligations.

What are the ongoing compliance requirements for HICP?

While not subject to certification, maintaining alignment with HICP involves continually assessing risks, updating controls, training staff, and reviewing cyber incidents. Documenting adherence to HICP practices provides a defensible position during audits or investigations.

How would SmartSuite support U.S. HICP (Medium Practice)?

SmartSuite can help organizations manage U.S. HICP by enabling effective risk tracking, control implementation, and evidence collection. Its workflow tools support audit readiness, continuous monitoring, and generate reports that facilitate proactive compliance and assurance activities.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward