U.S. HICP (Medium Practice) — Health Industry Cybersecurity Practices

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
U.S. HICP (Medium Practice) is a cybersecurity framework that helps healthcare organizations identify and implement best practices to reduce cyber risks and protect sensitive health information. It provides tailored guidance for medium-sized healthcare entities, focusing on the practical realities and threats facing the sector.
Developed by the U.S. Department of Health and Human Services (HHS) in collaboration with industry stakeholders, HICP aims to address the evolving threat landscape impacting healthcare organizations. The framework outlines key cybersecurity controls, risk management strategies, and incident response processes relevant to medium-sized providers, clinics, and health systems.
Organizations implement HICP (Medium Practice) by adopting recommended security controls, conducting regular risk assessments, and integrating its guidance into existing compliance and privacy programs such as HIPAA. HICP can supplement other frameworks, such as NIST or HITRUST, supporting regulatory compliance, improved security governance, and operational resilience in healthcare environments.
Why it Matters
U.S. HICP (Medium Practice) offers targeted guidance to healthcareorganizations seeking to address industry-specific cyber risks andregulatory requirements.
Key benefits include:
- Strengthen information security governance
Establish clearroles, responsibilities, and oversight processes for cybersecuritymanagement in healthcare settings.
- Enhance regulatory compliance support
Promote alignmentwith HIPAA requirements and foster readiness for audits andenforcement actions.
- Improve incident detection and response
Enableorganizations to identify, contain, and recover from cyber threatsand data breaches more effectively.
- Promote operational resilience
Reduce thelikelihood and impact of service disruptions or patient care delayscaused by cyber incidents.
- Support protection of patient data
Apply industrypractices to safeguard sensitive health information againstunauthorized access, disclosure, or loss.
How it Works
The U.S. Health Industry Cybersecurity Practices (HICP) MediumPractice is structured around a set of foundational cybersecurity“Threats” and “Practices,” each mapped to the mostsignificant risks facing the healthcare sector. The frameworkorganizes these practices into five key cybersecurity threatareas—such as email phishing and data loss—and aligns them withten recommended security practices. Each practice is detailed withtechnical and procedural safeguards, maturity indicators, and examplescenarios, providing a blueprint for risk management, governance, andimplementation.
Healthcare organizations apply HICP Medium Practice by assessingtheir security posture against these predefined practices andcontrols. They implement recommended security safeguards—such asaccess management, asset inventory, and monitoring—to addressspecific threat scenarios. Ongoing activities include mappingcontrols to existing compliance and governance requirements,conducting risk assessments, training staff, and continuouslymonitoring for vulnerabilities and incidents to support regulatorycompliance.
Using SmartSuite, organizations operationalize HICP Medium Practicethrough the use of centralized control libraries, risk registers, andpolicy governance modules tailored to HICP’s structure. Evidencecollection tools facilitate documentation of control effectiveness,while compliance tracking and remediation workflows support auditreadiness and reporting. Dashboards enable real-time monitoring,helping teams maintain continuous alignment with HICP security andcompliance practices.
Key Elements
- Threat and Vulnerability Safeguards
Describessecurity measures designed to address common healthcare sectorthreats and system vulnerabilities.
- Identity and Access Management
Specifiesframeworks for controlling user authentication, authorization, andprivileged access to sensitive health data.
- Asset and Device Security
Establishesprotocols for managing, securing, and monitoring medical andinformation technology devices.
- Network and Data Protection Measures
Outlines layeredapproaches for safeguarding data in transit and at rest withinhealthcare environments.
- Incident Response Processes
Definesstructured procedures for detecting, analyzing, and responding tocybersecurity incidents.
- Governance and Compliance Oversight
Organizespolicies and accountabilities to ensure continual adherence toregulatory and industry requirements.
Framework Scope
U.S. HICP (Medium Practice) is adopted by healthcare organizations,business associates, and vendors managing protected healthinformation and clinical systems. The framework governs cybersecuritypractices across healthcare IT environments and connected devices,and is typically leveraged to address regulatory requirements,mitigate cybersecurity risks, and support compliance programs andorganizational resilience.
Framework Objectives
U.S. HICP (Medium Practice) guides healthcare organizations inmanaging cybersecurity risks and safeguarding sensitive data.
Strengthen cybersecurity governance and foster a culture of riskmanagement
Enhance protection of patient data through effective securitycontrols
Support regulatory compliance with industry standards and laws
Improve operational resilience against evolving cyber threats
Promote audit readiness by maintaining documentation and monitoringactivities
Enable continuous improvement of data protection and privacypractices HICP (Medium Practice) aligns with cybersecurity frameworkslike NIST Cybersecurity Framework, HIPAA Security Rule, and CISControls, offering sector-specific guidance for U.S. healthcareorganizations. It is typically adopted to strengthen operationalsecurity, meet regulatory expectations, and implement best practicesfor protecting healthcare sector data and critical systems.
Framework in Context
HICP (MediumPractice) aligns with cybersecurity frameworks like NISTCybersecurity Framework, HIPAA Security Rule, and CIS Controls,offering sector-specific guidance for U.S. healthcare organizations.It is typically adopted to strengthen operational security, meetregulatory expectations, and implement best practices for protectinghealthcare sector data and critical systems.
Common Framework Mappings
HICP (Medium Practice) is commonly mapped to other prominent securityand privacy frameworks in healthcare and critical infrastructure tostreamline compliance, unify risk assessments, and meet broadregulatory and industry requirements.
Mapped frameworks include:
CIS Controls
COBIT
HIPAA Security Rule
ISO/IEC 27001
ISO/IEC 27002
NIST Cybersecurity Framework
NIST SP 800-53
PCI DSS
SOC 2
- ClassificationCategoryCybersecurityDomainCybersecurityFramework FamilyOther
- Regulatory ContextTypeGuidanceLegal InstrumentFrameworkSectorHealthcare SectorIndustryHealthcare & Life Sciences
- Region / PublisherRegionNorth AmericaRegion DetailUnited StatesPublisherU.S. Department of Health and Human Services (HHS)
- VersioningVersionHICP 2023Effective DateJanuary 2019Issue DateDecember 28, 2018
- AdoptionAdoption ModelSecurity BaselineImplementation ComplexityModerate
- Official ReferenceOpen Link in New TabSource
License included / downloadable: Yes
HICP is published by HHS and is publicly available for free from official HHS and NIST websites. License included with platform
How SmartSuite Supports HICP (Medium Practice)
Strengthen cybersecurity protections for mid-sized healthcare organizations by organizing HICP recommended safeguards, tracking implementation progress, and maintaining documentation supporting healthcare cybersecurity resilience.
HICP Security Practices Library
Organize HICP cybersecurity practices aligned to the top healthcare cybersecurity threats.
Asset and System Risk Visibility
Track medical devices, EHR systems, clinical applications, and supporting infrastructure requiring protection.
Security Risk Assessment and Mitigation Planning
Identify cybersecurity risks affecting healthcare operations and track mitigation strategies.
Identity, Access, and Endpoint Security Governance
Manage authentication controls, endpoint protection, and privileged access to clinical systems.
Vendor and Third-Party Risk Oversight
Monitor cybersecurity risks associated with healthcare vendors, software providers, and connected medical devices.
Healthcare Cybersecurity Incident and Program Maturity Reporting
Track cybersecurity incidents, remediation actions, and program maturity across healthcare security operations.
Related frameworks

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

COBIT 2019 is a governance framework that helps organizations govern and manage IT to meet business goals, risks, and compliance.

HITRUST CSF is a certifiable, risk-based cybersecurity and privacy framework for managing regulatory compliance and protecting sensitive data.

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.
Frequently Asked Questions For U.S. HICP (Medium Practice) — Health Industry Cybersecurity Practices
The U.S. Health Industry Cybersecurity Practices (HICP) Medium Practice is designed to assist healthcare organizations in identifying and implementing cybersecurity practices that address common threats. Its goal is to improve organizational cyber resilience and better protect sensitive health information and systems.
U.S. HICP is not a mandatory or certifiable standard but is a voluntary set of cybersecurity guidelines. However, adopting HICP may demonstrate reasonable security practices under regulatory scrutiny, such as during HIPAA audits, and can serve as evidence of due diligence regarding information protection.
The HICP Medium Practice is intended for mid-sized healthcare providers and organizations with moderate resources and cybersecurity maturity. Organizations should assess their environment, resource availability, and risk tolerance to determine if Medium Practice aligns with their needs.
Medium Practice focuses on five top threats: email phishing, ransomware, loss/theft of equipment, insider threats, and attacks against network-connected medical devices. It provides actionable controls, such as multi-factor authentication, endpoint protection, regular backups, access management, and security training.
Implementation involves reviewing organizational risks, mapping HICP’s suggested practices against current controls, and closing identified security gaps. Engagement from leadership, documented policies, technology updates, and employee awareness are critical steps in operationalizing Medium Practice recommendations.
HICP complements regulatory and industry standards like HIPAA Security Rule and NIST Cybersecurity Framework. While it doesn't replace these requirements, it provides practical, threat-informed guidance that can support compliance with broader regulatory obligations.
While not subject to certification, maintaining alignment with HICP involves continually assessing risks, updating controls, training staff, and reviewing cyber incidents. Documenting adherence to HICP practices provides a defensible position during audits or investigations.
SmartSuite can help organizations manage U.S. HICP by enabling effective risk tracking, control implementation, and evidence collection. Its workflow tools support audit readiness, continuous monitoring, and generate reports that facilitate proactive compliance and assurance activities.
Manage controls, risks, evidence, and audits in one platform designed for modern governance, risk, and compliance.

