RSG Logic · The offering · HIPAA Security Rule Readiness
Layer 02 · Productized · Fixed fee

HIPAA Security Rule
Readiness Assessment.

The proposed 2026 HIPAA Security Rule update would eliminate the "addressable" safeguard category — making controls like MFA and encryption mandatory. It is a proposed rule, contested, and not yet final; we prepare practices for the direction with work that holds regardless. We deliver the full Security Risk Analysis (required under the Security Rule today), the policy suite, the BAA inventory, and the evidence to satisfy an OCR audit. BAA signed before any work begins. Starting at $7,500.

NPRM
2026 Security Rule update
HHS / OCR · proposed, not yet final
0·
Addressable safeguards (if finalized)
Proposed: all become mandatory
3·
Categories of safeguards
Administrative · physical · technical
$1.5M+
Maximum OCR fine · per violation tier
45 CFR §160.404 (2024 adjustment)
— The 2026 update

Every safeguard becomes mandatory.

Since 1996, the HIPAA Security Rule has split safeguards into two categories: required (no choice) and addressable (implement, adopt an equivalent, or document why neither applies). The 2026 update eliminates that distinction. Every listed safeguard becomes mandatory — encryption, audit logs, workforce training, contingency planning, sanction policies, and the rest.

For most small practices, "addressable" was a quiet escape hatch. Encryption at rest on workstations? Addressable. Documented sanction policy for workforce violations? Addressable. Annual workforce training? Addressable. None of that survives the update. The day the rule takes effect, every safeguard you've been treating as optional becomes a finding on an OCR audit and a question your malpractice insurer will ask before renewal.

The good news: the underlying work is finite. A clean Security Risk Analysis, a policy suite mapped to the new rule, a BAA review, and the evidence binder to back it all up. We've productized exactly that engagement.

Sources: HHS Office for Civil Rights · 45 CFR §164.302–.318 · 2026 Security Rule NPRM
01 — Why this audit, why now

An SRA you can't actually defend isn't an SRA.

Most small healthcare practices have something they call a Security Risk Analysis. It's usually a downloaded template, partially filled out, last updated when the EHR rolled in. OCR doesn't accept that. Underwriters don't accept that. And neither does the malpractice carrier when the questions get specific.

01.

OCR enforcement is rising, not falling.

HHS Office for Civil Rights has steadily increased enforcement actions year over year. Small practices used to be below the radar. They aren't anymore — random audits and complaint-driven investigations both find them. The SRA is the first document OCR asks for.

HHS OCR enforcement highlights · 2023–2025
02.

Your malpractice insurer is asking now.

Healthcare practice insurance — malpractice, general liability, cyber — increasingly requires HIPAA evidence on the application. "Do you have a current Security Risk Analysis?" isn't a yes/no anymore. Underwriters want to see the document.

Practice insurance applications · 2025–2026 cycle
03.

Your EHR vendor isn't your compliance partner.

EHRs handle ePHI inside their walls. They don't audit your workstations, your printers, your back office, your terminated workforce, your business associates, or your physical access controls. The SRA covers your whole environment — not just the parts the EHR sees.

Common compliance gap pattern · RSG Logic findings
02 — What we assess

Three categories. Every safeguard.

The HIPAA Security Rule organizes safeguards into three categories: administrative, physical, and technical. The proposed 2026 update would make currently-addressable safeguards mandatory; we assess against the rule as it exists today and prepare for the proposed direction. Below is what we examine in each category — and what an OCR auditor will ask to see.

01.
Administrative

Security Management Process

Risk analysis (the SRA itself), risk management plan, sanction policy, information system activity review.

45 CFR §164.308(a)(1)
02.
Administrative

Workforce Security & Access Management

Authorization and supervision, workforce clearance, termination procedures, access authorization, access establishment and modification.

45 CFR §164.308(a)(3) & (a)(4)
03.
Administrative

Security Awareness & Training

Security reminders, malware protection, log-in monitoring, password management. Training cadence and completion evidence.

45 CFR §164.308(a)(5)
04.
Administrative

Incident Response & Contingency Planning

Incident response procedures, data backup plan, disaster recovery plan, emergency mode operation plan, testing and revision.

45 CFR §164.308(a)(6) & (a)(7)
05.
Administrative

Business Associate Agreements

BAA inventory across all business associates, contractual cyber requirements, ongoing posture verification, remediation language.

45 CFR §164.308(b)
06.
Physical

Facility Access Controls

Contingency operations, facility security plan, access control and validation, maintenance records, workstation siting.

45 CFR §164.310(a)
07.
Physical

Workstation & Device Security

Workstation use policy, workstation security controls, device and media controls (disposal, re-use, accountability, backup).

45 CFR §164.310(b)–(d)
08.
Technical

Access Control & Audit Controls

Unique user identification, emergency access procedure, automatic logoff, encryption and decryption, audit log review.

45 CFR §164.312(a)–(b)
09.
Technical

Integrity, Authentication, Transmission

Mechanisms to authenticate ePHI integrity, person or entity authentication, integrity controls and encryption in transit.

45 CFR §164.312(c)–(e)
— The deliverable

The Security Risk Analysis.

The mandatory document under 45 CFR §164.308(a)(1). Most templates floating around are checklists masquerading as analyses. Ours is the document an OCR auditor opens, reads, and accepts — methodology declared, scope documented, every safeguard rated on impact and likelihood, every finding paired with the evidence that proves the control is real.

  • 01.
    Cover & scope statement
    Practice profile, ePHI inventory, systems in scope, methodology, assessment dates.
  • 02.
    Threat & vulnerability identification
    Reasonably anticipated threats and vulnerabilities to the confidentiality, integrity, and availability of ePHI.
  • 03.
    Safeguard analysis
    Each administrative, physical, and technical safeguard assessed for current state, gaps, and remediation priority.
  • 04.
    Risk rating matrix
    Impact × likelihood scoring for each finding, with defensible rationale OCR can read.
  • 05.
    Evidence appendix
    Policy excerpts, configuration exports, training records, BAA inventory, screenshots — the proof behind each control.
  • 06.
    Risk Management Plan
    The companion document the Security Rule requires alongside the SRA. Prioritized remediation, ownership, target dates.
security-risk-analysis.pdf · Q2 2026 ● 62 pages
RSG Logic · HIPAA Security Rule Readiness
Security Risk Analysis · illustrative preview
Prepared for: anonymized dental practice · Phoenix metro · 12 workforce · single location
45 CFR §164.308(a)(1) 3 safeguard categories 2026 Security Rule
Contents
01.Scope, methodology, ePHI inventory01
02.Threat & vulnerability identification06
03.Safeguard analysis · administrative12
04.Safeguard analysis · physical26
05.Safeguard analysis · technical34
06.Risk rating matrix & findings register44
07.Evidence appendix52
08.Risk Management Plan (companion document)58
Finding 12 · Technical · Encryption High severity
Workstations storing ePHI lack full-disk encryption
Six of nine clinical workstations contain locally cached ePHI from the EHR; none have FileVault or BitLocker enabled. Under the 2026 update, encryption-at-rest moves from addressable to mandatory for ePHI-bearing workstations.
Evidence: MDM device report 2026-04-15 · screenshots of FileVault status (3 enabled · 6 disabled) · EHR vendor confirmation of local caching behavior. Mapped to: 45 CFR §164.312(a)(2)(iv) · 2026 update §164.312(a)(2)(iv) reclassification.
Illustrative preview. Real SRAs are scoped to the specific practice and contain de-identified workforce and patient data.
03 — How the assessment runs

Five steps. Three to four weeks.

Predictable rhythm, scoped before kickoff. Signed BAA precedes any access. You know what we're doing, what we need from your team, and what you'll hold at the close — plus the verify pass once remediation is done.

  1. 01

    BAA & intake

    Signed BAA before any access. A 30-minute intake call to confirm scope: practice profile, workforce count, EHR vendor, locations, business associates, current SRA status (if any), and the deadline driving the engagement.

    Deliverable
    Signed BAA · scoped proposal · kickoff date.
  2. 02

    Assess

    We walk the three safeguard categories with your team. Workforce interviews where needed, document review, policy assessment, technical configuration capture, walk-through of physical controls, BAA inventory and review.

    Deliverable
    Working assessment file · evidence captured.
  3. 03

    Synthesize

    Findings packaged into the SRA: scope statement, threat identification, safeguard-by-safeguard analysis, risk rating matrix, evidence appendix, and the Risk Management Plan that accompanies it.

    Deliverable
    SRA draft + Risk Management Plan · ready for review.
  4. 04

    Walk-through

    Live review with practice leadership. We translate findings into plain English, prioritize the remediation roadmap by impact, and confirm the three remediation paths — we do the work, we lead your IT or EHR vendor through it, or we coordinate an outside firm.

    Deliverable
    Final SRA · in your hands · OCR-ready.
  5. 05

    Verify (optional)

    After remediation closes, we re-audit against the same standard and produce a delta report — what moved, what improved, what's still open. Optional add-on or bundled with Compliance Care.

    Deliverable
    Delta report · proof the fix is real.
04 — Questions

What practices actually ask before they hire us.

The 2026 update raises specific questions. Below are the ones we hear most often from dental, optometry, chiropractic, PT, behavioral health, and small primary care practices. Email [email protected] if yours isn't here.

Fixed fee, scoped before kickoff. Starting at $7,500 for small single-location practices (up to 10 workforce). Group practices and multi-site environments are quoted after a 30-minute discovery call. No hourly billing — productized work is fixed-price, full stop.

05 — The guarantee

We carry the risk, not you.

You should not have to wire a five-figure fee to a firm on faith and hope the Security Risk Analysis holds up when it matters. So we structure the engagement so the risk sits with us.

— The performance guarantee

If an OCR auditor rejects the Security Risk Analysis as insufficient for the requirement it addresses, we revise it free until it is accepted — or we refund the engagement fee in full.

01.

50% on delivery, not up front

Half to start, half only when the SRA and Risk Management Plan are in your hands and you have reviewed them. You see the work before the second invoice.

02.

BAA first, scoped timeline

A signed BAA precedes any access to ePHI. The delivery date is set in the proposal before kickoff for a standard single-location practice — not a moving target.

03.

We do the evidence work

The practice manager and clinical lead give us a few interview hours across the engagement. We handle the document review, configuration capture, and the SRA writeup. It does not become your front desk's second job.

Ready before the rule change.

A 30-minute conversation with a senior consultant. Bring the deadline (renewal, OCR notice, audit timeline, or just calendar urgency) and a quick read of what's currently in place. You'll leave with a clearer picture of what the 2026 update changes for your practice — and a fixed-fee proposal if it makes sense to engage.