HIPAA 2025 Updates: What Changed and What You Need to Do
HHS has proposed the most significant updates to the HIPAA Security Rule since its original implementation. Driven by the Change Healthcare catastrophe and the escalating threat landscape, these updates transform many "addressable" requirements into mandatory ones. The era of compliance flexibility is ending.
Key Proposed Changes
Encryption: No Longer Addressable
Under current rules, encryption is "addressable," meaning covered entities can implement equivalent alternative measures if they document why encryption isn't reasonable. The proposed update makes encryption of ePHI at rest and in transit mandatory. No alternatives. No exceptions.
Impact: Practices with unencrypted servers, workstations, laptops, or backup media must implement encryption. Unencrypted devices containing ePHI become automatic violations.
MFA: Mandatory
Multi-factor authentication for all systems accessing ePHI is proposed as a mandatory requirement. The Change Healthcare breach (caused by missing MFA) is explicitly cited as justification.
Network Segmentation
Networks containing ePHI must implement segmentation to prevent lateral movement during a breach. Systems that don't need ePHI access must be isolated from systems that do.
72-Hour Recovery
Covered entities must be able to restore critical systems within 72 hours of a cybersecurity incident. This requires tested backup and recovery procedures with documented recovery time objectives.
Annual Penetration Testing
Annual penetration testing and vulnerability scanning every six months are proposed as mandatory requirements.
Technology Asset Inventory
Covered entities must maintain a complete, current inventory of all technology assets that create, receive, maintain, or transmit ePHI. This includes medical devices, imaging systems, and IoT devices.
Compliance Timeline
The proposed rules include a compliance timeline of 180 days after finalization for most requirements, with extended timelines for certain technical controls. Practices should begin preparation now.
Action Items
- Encrypt everything. Full disk encryption on all workstations and laptops. Database encryption for your EHR. Encrypted backup media. This is becoming non-negotiable.
- Deploy MFA everywhere. Every system that accesses patient data needs MFA. EHR, email, remote access, cloud storage. All of it.
- Implement network segmentation. Separate clinical systems from guest Wi-Fi, personal devices, and administrative networks.
- Test your recovery. Can you restore operations within 72 hours? If you haven't tested, you don't know. Test now.
- Build your asset inventory. Catalog every device that touches ePHI. Include medical devices, imaging systems, and network equipment.
- Budget for penetration testing. Annual pen tests and biannual vulnerability scans will be mandatory. Get quotes and budget accordingly.
These proposed rules reflect lessons learned from years of catastrophic breaches. They're not surprising. They're the same controls we've been recommending for nine years. The difference is they're about to be legally required.