Healthcare Compliance

HIPAA Vendor Risk Assessment Requirements

The HIPAA Security Rule requires covered entities to assess the risk of every business associate that touches PHI. Most organizations do this with a spreadsheet and hope for the best.

What HIPAA actually requires for vendor risk

The HIPAA Security Rule at § 164.308(b)(1) — the Security Management Process standard — imposes three obligations on covered entities regarding business associates.

First, assess risk before sharing PHI. Before allowing a vendor to access, process, or store protected health information, the covered entity must evaluate the vendor's security posture and determine whether adequate safeguards are in place. This is the vendor risk assessment.

Second, ensure a BAA is in place. A Business Associate Agreement is a written contract that establishes the permitted uses and disclosures of PHI, requires the business associate to implement appropriate safeguards, and mandates breach notification. No BAA, no PHI sharing — period.

Third, monitor the business associate relationship. The covered entity must have ongoing oversight of its business associates' compliance with the BAA and applicable HIPAA requirements. This is not a one-time check. See our HIPAA industry page for the full control mapping.

BAA determination walkthrough: BambooHR

Using BambooHR as a practical example — an HRIS/payroll platform that processes employee information for healthcare organizations.

Does this vendor access PHI? BambooHR processes employee records including names, dates of birth, Social Security numbers, health insurance enrollment data, and potentially disability accommodation records. For a covered entity (hospital, clinic, health plan), employee health insurance data and disability records qualify as PHI. Answer: yes.

Is a BAA required? Yes — BambooHR functions as a business associate when it processes PHI on behalf of a covered entity.

Does the vendor offer a BAA? ThirdProof's investigation of BambooHR identified SOC 2, SOC 1, and PCI DSS claims on its trust page at trust.bamboohr.com, all classified as vendor-attested. The trust page also references EU-US DPF and Swiss-US DPF participation. A BAA should be requested directly through BambooHR's compliance team.

What does the investigation reveal about compliance posture? BambooHR received Tier 4 — Low Risk at 80% confidence. Key findings: clean sanctions screening, clean domain reputation across 94 security engines, 11 open ports with 0 CVEs, and HTTP security headers scoring C (50/100). Recommended actions: obtain PCI DSS AoC, request SOC 2 Type II report, and execute a HIPAA BAA alongside the CCPA Service Provider Agreement.

Common HIPAA vendor gaps ThirdProof finds

Across investigations of healthcare-adjacent vendors, four patterns emerge consistently.

Vendors claiming HIPAA compliance without published BAA. A vendor's trust page may list HIPAA in its compliance certifications, but HIPAA compliance is not independently certifiable like SOC 2 or ISO 27001. There is no HIPAA certification body. When ThirdProof finds a HIPAA claim, it classifies it as vendor-attested and flags a recommended action to request the actual BAA and the vendor's HIPAA risk assessment documentation.

Missing HITRUST certification despite claiming it. HITRUST CSF is the closest thing to a HIPAA certification — an independently assessed framework that maps to HIPAA requirements. Some vendors claim HITRUST on their trust page but are not listed in the HITRUST assessor directory. ThirdProof's three-tier verification (independently verified, vendor-attested, not found in evidence) catches this discrepancy.

Subprocessor lists not published. The BAA flow-down requirement means your vendor's subprocessors that access PHI also need BAAs. If your vendor does not publish a subprocessor list, you have no visibility into downstream PHI exposure. ThirdProof's subprocessor discovery scanner flags vendors with no published subprocessor documentation.

HTTP security deficiencies on platforms handling PHI. While HTTP security headers on a marketing site do not directly indicate application-level security, they reflect the vendor's security configuration standards. Okta scored F (20/100) on HTTP headers — notable for a vendor that may process authentication data for healthcare systems.

OCR enforcement and business associate oversight

The HHS Office for Civil Rights (OCR) has increased enforcement around business associate oversight. Notable enforcement actions demonstrate the risk.

In its breach investigation guidance, OCR consistently examines whether the covered entity conducted a risk assessment of its business associate before sharing PHI, whether a BAA was in place at the time of the breach, and whether the covered entity had an ongoing monitoring program for its business associates. Covered entities that cannot demonstrate these three elements face higher settlement amounts.

The practical takeaway: document your vendor risk assessment process, maintain BAAs for every business associate, and keep evidence of periodic reassessment. ThirdProof's investigation reports provide the assessment evidence; the BAA and reassessment schedule are your responsibility to maintain.

Assess your business associates in under 2 minutes. ThirdProof checks compliance documentation, certification claims, and PHI exposure across 22 sources.

See this in action

ThirdProof automates vendor risk assessment across 24 intelligence sources. Investigate any vendor in under 2 minutes — no questionnaires, no vendor cooperation required.

Try ThirdProof Free →

No credit card required

Frequently asked questions

What is a HIPAA business associate?+
A business associate is any person or entity that performs functions or activities on behalf of a covered entity that involve the use or disclosure of PHI. Examples include cloud hosting providers storing PHI, HRIS platforms processing employee health data, payment processors handling health plan payments, and IT service providers with access to systems containing PHI. Each business associate requires a BAA and ongoing risk assessment.
Is HIPAA compliance independently certifiable?+
No. Unlike SOC 2 or ISO 27001, there is no official HIPAA certification issued by a certification body. When a vendor claims 'HIPAA compliant,' they are self-attesting that they follow HIPAA requirements. HITRUST CSF certification is the closest independent validation — it maps controls to HIPAA requirements and is assessed by a third-party assessor. Always verify compliance claims independently rather than accepting vendor attestations at face value.
What should a HIPAA vendor risk assessment include?+
A HIPAA vendor risk assessment should include: BAA determination (does this vendor access PHI?), BAA verification (is a signed BAA in place?), security posture evaluation (sanctions, cyber risk, compliance certifications), subprocessor identification (who are the vendor's subprocessors that may access PHI?), and documented recommended actions with timelines. The assessment should be repeated annually for critical business associates.
What happens if a business associate has a data breach?+
Under HIPAA, business associates must notify the covered entity within 60 days of discovering a breach. The covered entity must then notify affected individuals and HHS. If the breach affects 500+ individuals, OCR publishes it on the Breach Portal. The covered entity's liability depends on whether it conducted adequate due diligence — documented vendor risk assessment, current BAA, and ongoing monitoring. Organizations without these elements face higher settlement amounts.

Put this into practice

Investigate any vendor across 24 intelligence sources in under 2 minutes. Your first investigation is free.

Start Free Investigation →

No credit card required