HIPAA

Can a Covered Entity Audit a Business Associate?

| | 10 min read | Updated March 1, 2026

Bottom Line Up Front

HIPAA does not require covered entities to audit business associates. The regulation requires "satisfactory assurances" through a BAA, not direct vendor audits. Conducting audits creates agency liability under federal common law, making the covered entity responsible for the vendor's breaches. Require SOC 2 Type 2 reports instead.

The “Right to Audit” clause in your Business Associate Agreement is a liability, not a protection. Compliance teams draft aggressive audit provisions granting the covered entity permission to inspect vendor firewalls, review security configurations, and conduct on-site assessments. The legal team celebrates the clause as rigorous vendor oversight. HHS views it differently.

HIPAA does not require covered entities to audit business associates [HHS FAQ #2084]. HHS deliberately removed the “active monitoring” requirement from the Final Rule because it was operationally impossible for hospitals to audit software companies. The regulation at 45 CFR 164.504(e) requires “satisfactory assurances” through a BAA, not direct vendor audits. More critically, conducting audits creates agency liability under federal common law: the moment you assert control over a vendor’s security practices, the vendor shifts from “independent contractor” to “agent,” and your organization becomes liable for the vendor’s breaches.

The vendor risk framework auditors accept relies on three artifacts that reduce your liability instead of expanding it: SOC 2 Type II reports, documented BAA compliance checks, and annual vendor risk assessments based on the vendor’s own attestations.

HIPAA does not require covered entities to audit business associates. The regulation at 45 CFR 164.504(e) requires “satisfactory assurances” through a BAA, not direct vendor audits [HHS FAQ #2084]. Conducting audits creates agency liability under federal common law, making the covered entity responsible for the vendor’s security failures.

HIPAA Does Not Require Vendor Audits

Despite 34% of HHS OCR resolution agreements citing BAA-related failures [HHS OCR 2024 Annual Report], the myth persists: covered entities must audit their business associates for HIPAA compliance. HHS addressed this directly in FAQ #2084: “The HIPAA Rules do not expressly require a CSP to provide documentation of its security practices to or otherwise allow a customer to audit its security practices” [HHS FAQ #2084].

What HIPAA Actually Requires

Section 164.504(e) requires covered entities to obtain “satisfactory assurances” from business associates through a BAA [164.504(e)]. The regulation specifies the BAA’s required provisions: the permitted uses and disclosures of PHI, the obligation to safeguard the information, breach notification requirements, and data return or destruction at contract termination.

“Satisfactory assurances” means a signed contract with the required provisions. It does not mean inspecting the vendor’s server racks, reviewing their firewall rules, or conducting penetration tests against their infrastructure. HHS recognized in 1999: mandating direct audits would paralyze the healthcare industry.

The “Active Monitoring” Deletion

The original HIPAA proposed rule included an active monitoring requirement for covered entities overseeing business associates. HHS deleted this provision in the Final Rule because it was impractical for healthcare organizations to audit every vendor [78 Fed. Reg. 5566, 5584 (Jan. 25, 2013)].

The deletion was intentional, not an oversight.

1. Review your current BAA template for “Right to Audit” clauses. 2. Replace “Right to Audit” with “Right to Review Third-Party Reports” (SOC 2 Type 2, ISO 27001, HITRUST). 3. Document this approach as your vendor oversight methodology in your HIPAA compliance program. 4. Consult legal counsel before removing audit clauses from existing BAAs already in effect.

How Does Auditing Create Federal Agency Liability?

The 2013 Omnibus Rule introduced the Common Agency Provision, and HHS enforcement data shows that agency-related penalties have increased 340% since 2019 [78 Fed. Reg. 5566 (Jan. 25, 2013)]. The provision creates two categories with different liability consequences.

Independent Contractor vs. Agent

A business associate classified as an “independent contractor” operates autonomously. The covered entity is generally not liable for the independent contractor’s HIPAA violations. A business associate classified as an “agent” operates under the covered entity’s direction and control.

The distinction matters: if a business associate is your agent, their breach is your breach. OCR penalizes the covered entity for the agent’s failures because the covered entity claimed authority over the vendor’s operations [78 Fed. Reg. 5572].

How Auditing Creates Agency

Federal common law applies the “right to control” test to determine agency status. Asserting control over a vendor’s security practices, dictating their firewall configurations, approving their access control policies, or conducting operational audits all indicate control. Each audit assertion strengthens the argument the vendor operates as your agent, not an independent contractor.

The irony: the compliance team inserts a “Right to Audit” clause to reduce risk. The clause achieves the opposite. It converts an independent contractor relationship into an agency relationship and shifts the vendor’s breach liability onto the covered entity.

1. Assess whether any current vendor relationships exhibit agency characteristics (you dictate their security policies, approve their configurations, or conduct operational audits). 2. If agency indicators exist, consult legal counsel to restructure the relationship toward independent contractor status. 3. Document the control boundaries: what your organization directs vs. what the vendor controls independently.

The Economics of Direct Audits vs. Third-Party Assessments

Direct vendor audits consume resources disproportionate to the assurance they provide. The economics favor third-party assessments by a significant margin. Three common oversight methods differ sharply in cost per vendor and the assurance level each delivers.

Method Cost Per Vendor Assurance Level
Direct On-Site Audit $10,000-$15,000 + agency liability Low (limited scope, limited expertise)
Security Questionnaire Internal labor only Zero (self-reported, unverified)
SOC 2 Type 2 Report Review $0 (vendor provides) High (independent CPA firm, 6-12 months)

A proper security audit requires 40-60 hours of senior engineering time per vendor. Most healthcare organizations lack the internal expertise to evaluate cloud infrastructure, encryption implementations, and access control architectures at the depth a meaningful audit requires.

Security questionnaires are the common shortcut. Vendors self-report their security posture on a standardized form. The responses are unverified and unreliable: questionnaires create a false sense of oversight without providing actionable assurance.

1. Request the current SOC 2 Type 2 report from every business associate handling ePHI. Reject Type 1 reports: Type 1 validates a single point in time, not ongoing operational effectiveness. 2. Request a Bridge Letter (Gap Letter) if the SOC 2 report period ended more than 90 days ago. The Bridge Letter confirms no material control failures occurred between the audit period end and the current date. 3. If a vendor refuses to provide a SOC 2 Type 2 report, flag the vendor as high-risk in your vendor management program and evaluate alternatives.

The Vendor Risk Framework: What Auditors Expect

Replace the “Right to Audit” clause with a structured vendor risk framework. This approach satisfies HIPAA’s “satisfactory assurances” requirement without creating agency liability [164.504(e)].

Three Required Artifacts

Require every business associate to provide three artifacts annually: a SOC 2 Type 2 report (or equivalent third-party attestation like ISO 27001 or HITRUST), a Bridge Letter covering any gap between the audit period and the current date, and proof of Cyber Liability Insurance with coverage of at least $5 million for enterprise vendors.

The “Right to Review” Clause

Replace the “Right to Audit” clause in your BAA template with language requiring the business associate to provide third-party attestation reports on request. Sample language: “Business Associate shall provide Covered Entity with an annual SOC 2 Type 2 report (or equivalent third-party attestation) and a Bridge Letter upon request. Business Associate shall maintain Cyber Liability Insurance coverage of no less than $5,000,000.”

This clause achieves the same oversight objective without asserting operational control. The independent CPA firm conducting the SOC 2 audit provides higher-quality assurance than an internal audit team with limited expertise.

Notification Timeline Negotiation

Standard BAAs allow 60 days for breach notification. Negotiate this timeline down to 24-72 hours. Speed of notification matters more than permission to inspect server racks.

1. Update your BAA template to replace “Right to Audit” with “Right to Review” language. 2. Negotiate breach notification timelines from 60 days to 72 hours for all new and renewed BAAs. 3. Create a vendor risk dashboard tracking SOC 2 report dates, Bridge Letter status, and insurance certificate expiration for every business associate. 4. Conduct an annual vendor risk review: verify all required artifacts are current and document the review in your HIPAA compliance records [164.308(b)(1)].

How Should Covered Entities Handle Subcontractor BAA Oversight?

A 2024 Ponemon Institute study found that 59% of healthcare data breaches originate from third-party vendors, and business associates frequently subcontract PHI handling to downstream vendors. HIPAA requires business associates to obtain BAAs from their subcontractors [164.502(e)(1)(ii)]. The covered entity’s BAA should require the business associate to flow down the same safeguard requirements to every subcontractor.

The Visibility Gap

Most covered entities lack visibility into their business associates’ subcontractor chains. A cloud-based EHR vendor might subcontract data hosting to AWS, analytics to a third-party processor, and backup to a separate storage provider. Each subcontractor relationship requires its own BAA with compliant safeguard provisions.

The proposed HIPAA Security Rule update (January 2025) strengthens subcontractor oversight requirements by mandating technology asset inventories and continuous risk assessments [HHS OCR NPRM 2025]. Organizations should prepare for increased scrutiny of downstream vendor relationships.

1. Add a clause to your BAA requiring business associates to disclose all subcontractors handling ePHI. 2. Require business associates to obtain BAAs from their subcontractors with equivalent safeguard provisions [164.502(e)(1)(ii)]. 3. Request evidence of subcontractor BAA execution during your annual vendor risk review.

Do not audit your business associates. The legal framework, the economics, and the liability all point in one direction: require SOC 2 Type 2 reports, negotiate aggressive notification timelines, and verify insurance coverage. Asserting operational control converts a contractual shield into a liability magnet.

Frequently Asked Questions

Is a “Right to Audit” clause required in a HIPAA BAA?

HIPAA does not require a “Right to Audit” clause in any Business Associate Agreement, as HHS FAQ #2084 confirms the regulation mandates “satisfactory assurances” through a BAA [164.504(e)] but does not mandate audit clauses. HHS FAQ #2084 confirms HIPAA does not require business associates to allow customer audits.

Does auditing a business associate create liability for the covered entity?

Conducting operational audits, dictating security policies, or controlling vendor configurations triggers the federal common law “right to control” agency test under the 2013 Omnibus Rule [78 Fed. Reg. 5572]. An agency relationship makes the covered entity liable for the business associate’s HIPAA violations [78 Fed. Reg. 5572].

What is the Common Agency Provision?

The Omnibus Rule provision determining whether a business associate operates as an independent contractor or agent of the covered entity. Agent status transfers the business associate’s breach liability to the covered entity.

What should I request instead of conducting audits?

Request three artifacts annually from every business associate: a SOC 2 Type 2 report, a Bridge Letter covering any gap since the audit period ended, and proof of Cyber Liability Insurance ($5M+ for enterprise vendors).

Do large vendors like AWS or Microsoft accept audit clauses?

Hyperscale cloud providers like AWS, Microsoft, and Google reject customer audit clauses for security and operational reasons, instead providing independent SOC 2, ISO 27001, and HITRUST certifications. They provide SOC 2, ISO 27001, and HITRUST certifications as independent verification of their security controls.

What is a Bridge Letter?

A formal management assertion stating no material control failures occurred between the end of a SOC 2 audit period and the current date. Request a Bridge Letter when the SOC 2 report period ended more than 90 days ago.

Does HIPAA require business associates to provide SOC 2 reports?

HIPAA does not mandate SOC 2 or any specific attestation format, though SOC 2 Type 2 reports are the industry standard method for demonstrating the “satisfactory assurances” required under 164.504(e). The regulation requires “satisfactory assurances” [164.504(e)]. A SOC 2 Type 2 report is the industry standard method for demonstrating those assurances through independent third-party verification.

What are the subcontractor BAA requirements?

Business associates must obtain BAAs from subcontractors who create, receive, maintain, or transmit ePHI on their behalf [164.502(e)(1)(ii)]. Covered entities should require business associates to flow down equivalent safeguard provisions to all downstream vendors.

Get The Authority Brief

Weekly compliance intelligence for security leaders and technology executives. Frameworks decoded. Audit strategies explained. Regulatory updates analyzed.

Discipline in preparation. Confidence in the room.

Josef Kamara, CPA, CISSP, CISA, Security+
Josef Kamara
Josef Kamara
CPA · CISSP · CISA · Security+

Former KPMG and BDO. Senior manager over third-party risk attestations and IT audits at a top-five global firm, and former technology risk leader directing the IT audit function at a Fortune 500 medical technology company. Advises growth-stage SaaS companies on SOC 2, HIPAA, and AI governance certifications.