HIPAA

HIPAA Security Rule 2026: What the Proposed Overhaul Means for Covered Entities

| | 13 min read

Bottom Line Up Front

The January 2025 HIPAA Security Rule NPRM eliminates the addressable/required distinction, mandates encryption, MFA, 72-hour system restoration, and annual penetration testing for all covered entities. HHS estimates $9.3 billion in first-year compliance costs. Organizations should begin gap remediation on encryption, MFA, and asset inventory now, regardless of the final rule's timeline.

The original HIPAA Security Rule took effect on April 21, 2005. Covered entities had two years of implementation runway after HHS published the final rule in February 2003. The regulatory logic was simple: set baseline safeguards, allow flexibility through “addressable” specifications, and let the industry mature into stronger protections over time. That logic held for two decades. The Security Rule received one minor update in 2013 under the HIPAA Omnibus Rule and then sat unchanged while the threat environment transformed around it.

The cost of that stagnation is measurable. Healthcare data breaches exposed 289 million patient records in 2024, a new annual record [HIPAA Journal Breach Statistics 2024]. The Change Healthcare ransomware attack alone compromised 190 million records and disrupted claims processing for months across the entire U.S. healthcare system [HHS OCR 2024]. Attackers exploited a single set of credentials without multi-factor authentication. A $22 million ransom payment followed. Twenty years of “addressable” flexibility produced an industry where the largest clearinghouse in the country operated without MFA on a critical access point.

HHS responded on December 27, 2024, with the most significant rewrite of the HIPAA Security Rule since its creation. The Notice of Proposed Rulemaking published in the Federal Register on January 6, 2025, replaces flexibility with prescription, eliminates the addressable/required distinction, and mandates specific technologies for the first time in the rule’s history [HHS OCR NPRM, 90 Fed. Reg. 898]. The HIPAA Security Rule 2026 overhaul carries a $9.3 billion first-year compliance cost estimate and faces organized industry opposition. Whether the final rule survives in its current form or arrives in slimmed-down fashion, the regulatory direction is clear: the era of self-directed security flexibility for covered entities is ending.

The HIPAA Security Rule 2026 NPRM eliminates the addressable/required distinction and mandates encryption, MFA, 72-hour system restoration, and annual penetration testing for all covered entities [HHS OCR NPRM, 90 Fed. Reg. 898]. HHS estimates $9.3 billion in first-year compliance costs across regulated entities and plan sponsors.

What Does the HIPAA Security Rule 2026 NPRM Actually Change?

The proposed rule rewrites 20 years of regulatory architecture in a single rulemaking. HHS published the NPRM on January 6, 2025, opening a 60-day comment period that closed March 7, 2025 [90 Fed. Reg. 898]. The proposal touches every category of safeguard: administrative, physical, and technical. Where the current rule sets 22 addressable specifications that covered entities could evaluate and potentially defer, the NPRM makes every specification mandatory with limited, defined exceptions. This is the structural shift that drives the cost estimates and the industry backlash. Organizations that built two decades of compliance programs around documented exceptions now face mandatory implementations across encryption, access management, audit logging, and incident response. The rule also moves from technology-neutral principles to technology-specific mandates for the first time, prescribing controls that the original 2003 framework intentionally left to organizational discretion.

The scope extends beyond covered entities. Business associates must now verify compliance annually through written analysis by a subject matter expert and provide written certification to their covered entity partners [HHS OCR NPRM 2025]. Business associate subcontractors face the same verification requirements. The compliance chain tightens at every link.

1. Pull your current HIPAA risk assessment and flag every specification currently marked “addressable: not implemented” or “risk accepted.” 2. Map each flagged item to the NPRM’s corresponding mandatory requirement. 3. Estimate implementation cost and timeline per control. This gap analysis becomes your budget justification document when the final rule publishes.

Which Technical Mandates Replace the Flexibility Framework?

The NPRM prescribes seven technical mandates that shift the Security Rule from principles-based to prescriptive. Encryption of ePHI at rest and in transit becomes mandatory for all covered entities and business associates, with limited exceptions replacing the current addressable classification [HHS OCR NPRM 2025]. Multi-factor authentication moves from best practice to regulatory requirement, closing the exact gap that enabled the Change Healthcare breach. Vulnerability scanning must occur at least every six months. Penetration testing must occur at least every 12 months. Anti-malware protection, network segmentation, and separate backup and recovery controls for ePHI round out the technical requirements. Each mandate carries specific implementation parameters rather than the current rule’s open-ended “reasonable and appropriate” standard.

Patch management receives explicit regulatory attention for the first time. The current rule requires covered entities to “protect against reasonably anticipated threats” under 164.306(a), a standard broad enough to encompass patching but never specific enough to enforce it consistently. The NPRM addresses this gap directly. Organizations must implement documented patch management processes with defined timelines for critical vulnerability remediation.

The 72-hour restoration requirement introduces operational continuity mandates. Covered entities must maintain written procedures to restore critical electronic information systems and data within 72 hours of loss [HHS OCR NPRM 2025]. This is not a breach notification timeline. It is a system restoration deadline: if a ransomware attack takes your EHR offline, the clock starts immediately, and your contingency plan must deliver operational recovery within three days.

1. Inventory every system that stores, processes, or transmits ePHI and verify encryption status at rest and in transit. 2. Confirm MFA deployment on all ePHI access points, prioritizing remote access, administrative portals, and EHR systems. 3. Test your disaster recovery plan against the 72-hour restoration standard. If your last DR test exceeded 72 hours, resize your recovery architecture before the final rule.

How Will Asset Inventory and Network Mapping Requirements Work?

The NPRM creates a new administrative safeguard requiring technology asset inventories and network maps for every regulated entity [HHS OCR NPRM 2025]. Covered entities and business associates must maintain a written inventory of all hardware, software, electronic media, and data capable of creating, receiving, maintaining, or transmitting ePHI. The inventory must be reviewed and updated at least every 12 months, and immediately in response to environmental or operational changes that affect ePHI. This requirement addresses a foundational gap: organizations cannot protect assets they have not identified. The 2024 breach data reinforces the point. When OCR investigators arrive after a breach, the first question is which systems held ePHI. Organizations without current asset inventories cannot answer it with confidence.

The network mapping requirement extends beyond inventory. Regulated entities must create and maintain maps showing how ePHI enters, exits, and moves within their electronic information systems [HHS OCR NPRM 2025]. The map must detail all technology assets that affect the confidentiality, integrity, or availability of ePHI, including access points from outside the organization’s systems. For health systems running dozens of clinical applications, interfaced medical devices, and cloud-hosted services, this mapping exercise surfaces data flows that risk assessments have missed for years.

Combined with the annual risk analysis requirement, these mandates create a continuous visibility standard. The asset inventory feeds the network map. The network map informs the risk analysis. The risk analysis drives the control implementations. Each component reinforces the others. Organizations running risk assessments against incomplete asset inventories, the most common gap auditors find, lose that option under the proposed rule.

1. Run a network discovery scan across all segments that touch ePHI and compare results against your current asset inventory. 2. Document every data flow: where ePHI enters your environment, how it moves between systems, and where it exits to business associates or external parties. 3. Identify any ePHI-capable systems missing from your current risk assessment scope. Each missing system represents an unassessed risk and a potential audit finding.

What Is the Compliance Timeline and Cost Impact?

HHS proposed a compliance timeline of 240 days from publication of the final rule: 60 days until the rule becomes effective, plus 180 days to reach full compliance [90 Fed. Reg. 898]. For organizations that have deferred encryption deployments, skipped MFA implementations, or maintained risk assessments built on addressable exceptions, 180 days is aggressive. The Change Healthcare breach demonstrated that a single missing control can cascade across the entire healthcare ecosystem. The proposed timeline reflects HHS’s judgment that the threat environment no longer supports extended implementation runways.

The cost numbers are significant. HHS estimates regulated entities will incur approximately $4.6 billion in first-year compliance costs, with health plan sponsors facing an additional $4.7 billion, totaling $9.3 billion across the industry [HHS OCR NPRM 2025]. For large health systems with existing security programs, the cost centers on upgrading addressable controls to mandatory status, deploying MFA across all ePHI access points, and building 72-hour restoration capabilities. For small and rural providers, the cost picture is more severe. Critical access hospitals operating on thin margins face mandatory encryption, MFA, and penetration testing requirements that the addressable framework previously let them defer.

The National Rural Health Association submitted comments highlighting that many rural providers operate in aging facilities with limited funding for infrastructure upgrades [NRHA Comments, March 2025]. Mandatory encryption and MFA requirements become disproportionately expensive when the underlying infrastructure requires replacement to support them. The cost-per-bed for a 25-bed critical access hospital differs fundamentally from the cost-per-bed for a 500-bed academic medical center. The NPRM applies the same requirements to both.

1. Build a compliance budget model using three scenarios: full NPRM adoption, modified rule with extended timelines, and current rule with enhanced enforcement. 2. Prioritize spending on the controls most likely to survive in any version of the final rule: encryption, MFA, and asset inventory. 3. Engage your incident response planning now. The 72-hour restoration and 24-hour BA notification requirements demand tested procedures, not documented aspirations.

Will the Final Rule Survive Industry Opposition?

The comment period closed March 7, 2025, with significant organized opposition. A coalition of eight industry associations, led by the College of Healthcare Information Management Executives (CHIME) and including the American Health Care Association and the Medical Group Management Association, sent a letter to President Trump on February 17, 2025, requesting rescission of the NPRM [CHIME Coalition Letter, February 2025]. The coalition argued the proposed rule places “substantial financial burdens on providers” and holds them to “unreasonable implementation timelines.” The letter explicitly framed the NPRM as contrary to the current administration’s deregulatory agenda.

The American Hospital Association (AHA) and other provider groups submitted formal comments raising similar concerns about cost burden, implementation timelines, and the elimination of addressable flexibility for resource-constrained providers. The argument is consistent: the Security Rule needs updating, but the NPRM’s scope, cost, and timeline create compliance obstacles that could weaken rather than strengthen healthcare cybersecurity if providers redirect clinical resources to regulatory compliance.

OCR’s Spring 2025 regulatory agenda still lists the final rule for May 2026 [HHS Regulatory Agenda 2025]. Whether HHS meets that timeline under the current administration remains uncertain. Three outcomes are plausible. First: the rule finalizes in substantially similar form, with the administration concluding that healthcare cybersecurity threats override deregulatory preferences. Second: HHS issues a modified rule that preserves core mandates (encryption, MFA, asset inventory) but extends compliance timelines and adds scaled requirements for small providers. Third: the rule stalls indefinitely while OCR focuses enforcement energy on the existing rule’s requirements. Regardless of outcome, the NPRM establishes the regulatory floor for future enforcement expectations. Organizations that wait for certainty before acting will find 180 days insufficient when certainty arrives.

1. Do not wait for the final rule to begin gap remediation. Every control in the NPRM reflects current cybersecurity best practices, and OCR already enforces the existing rule against organizations lacking these protections. 2. Track the HHS regulatory agenda quarterly for timeline updates. 3. Build your implementation plan to accommodate a continuous compliance monitoring model. Whether the rule arrives in 2026 or 2027, the direction is fixed.

The HIPAA Security Rule 2026 NPRM represents the most consequential healthcare privacy regulation update in two decades. The addressable/required distinction that shaped compliance programs since 2005 is ending. Organizations that begin gap remediation now, starting with encryption, MFA, and asset inventory, position themselves for compliance regardless of the final rule’s exact form or timeline.

Frequently Asked Questions

When does the HIPAA Security Rule 2026 take effect?

HHS targets May 2026 for the final rule, with a 240-day compliance window: 60 days to effectiveness plus 180 days to full compliance [90 Fed. Reg. 898]. Industry opposition and the current administration’s deregulatory stance create uncertainty around this timeline. Organizations should plan for compliance readiness by early 2027 at the latest.

What is the difference between the current HIPAA Security Rule and the 2026 proposed rule?

The current rule classifies 22 implementation specifications as “addressable,” allowing organizations to assess, defer, or substitute controls with documentation. The 2026 NPRM eliminates this distinction and makes all specifications mandatory [HHS OCR NPRM 2025]. It also prescribes specific technologies (encryption, MFA, network segmentation) rather than maintaining the original technology-neutral approach.

How much will HIPAA Security Rule 2026 compliance cost?

HHS estimates $9.3 billion in combined first-year costs: $4.6 billion for regulated entities and $4.7 billion for health plan sponsors [HHS OCR NPRM 2025]. Individual organizational costs depend on current security maturity. Entities already operating with encryption, MFA, and documented asset inventories face lower incremental costs than those relying on addressable exceptions.

Does the proposed rule apply to business associates?

Yes. Business associates must comply with every mandatory specification and provide annual written verification to their covered entity partners [HHS OCR NPRM 2025]. The verification requires analysis by a subject matter expert and written certification of accuracy. Business associate subcontractors face identical requirements, extending the compliance chain to every organization handling ePHI.

How does the 72-hour restoration requirement work?

Covered entities must maintain written procedures to restore critical ePHI systems within 72 hours of any loss event [HHS OCR NPRM 2025]. This is a system recovery deadline, not a breach notification timeline. If ransomware takes your EHR offline on Monday morning, your contingency plan must deliver operational recovery by Thursday morning. Business associates must notify covered entities within 24 hours of activating their own contingency plans.

What should covered entities do now to prepare for the HIPAA Security Rule 2026?

Start with three priorities. First: complete an asset inventory of every system creating, receiving, maintaining, or transmitting ePHI. Second: deploy encryption at rest and in transit across all identified systems. Third: implement MFA on every ePHI access point. These three controls appear in every plausible version of the final rule and align with current OCR enforcement expectations under the existing Security Rule.

Will small and rural healthcare providers receive different compliance requirements?

The NPRM as proposed applies the same mandatory requirements to all covered entities regardless of size [HHS OCR NPRM 2025]. The National Rural Health Association and other groups have argued for scaled requirements and extended timelines for resource-constrained providers [NRHA Comments, March 2025]. The final rule may include accommodations for small entities, but organizations should plan for full compliance requirements until HHS confirms otherwise.

How did the Change Healthcare breach influence the HIPAA Security Rule update?

The February 2024 Change Healthcare ransomware attack compromised approximately 190 million patient records and disrupted claims processing nationwide [HHS OCR 2024]. Attackers exploited credentials without MFA protection on a critical system. The breach accelerated HHS’s rulemaking timeline and directly informed the NPRM’s MFA mandate, 72-hour restoration requirement, and elimination of addressable flexibility that allowed deferral of controls like multi-factor authentication.

Get The Authority Brief

Weekly compliance intelligence for security leaders. Frameworks decoded. Audit strategies explained. Regulatory updates analyzed.

Need hands-on guidance? Book a free technical discovery call to discuss your compliance program.

Book a Discovery Call

Discipline in preparation. Confidence in the room.

Josef Kamara, CPA, CISSP, CISA, Security+
Josef Kamara
Josef Kamara
CPA · CISSP · CISA · Security+

Former KPMG and BDO. Senior manager over third-party risk attestations and IT audits at a top-five global firm, and former technology risk leader directing the IT audit function at a Fortune 500 medical technology company. Advises growth-stage SaaS companies on SOC 2, HIPAA, and AI governance certifications.