When you hear “OCR HIPAA Audits,” you may think, “not me.” Yet audits hit groups of every size. In 2024–2025, OCR said audits would review selected Security Rule controls with a focus on hacking and ransomware (OCR Audit Program). These audits cover covered entities and business associates.
“OCR HIPAA Audits” are not pop quizzes. They are document reviews against the Audit Protocol (HHS Audit Protocol). The protocol maps to Security, Privacy, and Breach Notification standards. You must show policies, implementation, and proof. Keep that mindset as you read.
1) Policies and procedures for using and safeguarding PHI
OCR asks for current policies and procedures. They must match daily practice and be retained at least six years. See Policies and Documentation at 45 C.F.R. §164.316 (eCFR 164.316).
2) Risk analysis and the follow-on risk management plan
OCR wants an enterprise-wide risk analysis and the plan to fix found risks. Doing an SRA without action fails. See Security Management Process at 45 C.F.R. §164.308(a)(1)(ii)(A)–(B) (eCFR 164.308).
3) Security awareness and training with attendance proof
Provide training content and proof of attendance. See Security Awareness and Training at 45 C.F.R. §164.308(a)(5) (eCFR 164.308).
4) Anti-malware and patching evidence
Show your anti-malware program and patch cadence. See Protection from Malicious Software and Evaluation at 45 C.F.R. §164.308(a)(5)(ii)(B) and §164.308(a)(8) (eCFR 164.308).
5) Data backup process and proof it runs
Backups must exist and be tested under your Contingency Plan. See 45 C.F.R. §164.308(a)(7) (eCFR 164.308).
6) Technical access controls and password policy
Provide access control settings, unique IDs, automatic logoff, and authentication details. See Technical Safeguards at 45 C.F.R. §164.312(a) and §164.312(d) (eCFR 164.312). HHS’ Security Rule summary is also helpful (HHS Security Rule Summary).
Breach assessment and notification procedures. You must assess breaches and notify on time. See Breach Notification Rule at 45 C.F.R. §164.404 and Subpart D (eCFR 164.404, Subpart D index).
System activity review and audit logs. Show who accessed PHI and when. See Audit Controls and Information System Activity Review at 45 C.F.R. §164.312(b) and §164.308(a)(1)(ii)(D) (eCFR 164.312, eCFR 164.308).
Transmission security and integrity controls. Protect data in motion and guard integrity. See 45 C.F.R. §164.312(c)–(e) (eCFR 164.312) and HHS’ Tech Safeguards brief (HHS Tech Safeguards PDF).
Device and media controls. Keep an inventory and have reuse and disposal steps. See Physical Safeguards at 45 C.F.R. §164.310 (eCFR 164.310).
Facility access and workstation security. Limit physical access and define workstation use. See 45 C.F.R. §164.310 (eCFR 164.310).
Business associate oversight. Keep a list of BAs and signed BAAs. See Organizational Requirements at 45 C.F.R. §164.308(b) and §164.314 (eCFR 164.314).
Documentation retention. Keep HIPAA documentation for six years from creation or last effective date. See 45 C.F.R. §164.316(b)(2)(i) (eCFR 164.316).
The pattern repeats. Weak risk analysis, risk management, and audit/evaluation drive findings and settlements.
Those are the pressure points behind every document request. The Audit Protocol reflects them (HHS Audit Protocol).
Getting audit-ready takes time. EPI Compliance and Taino Consultants help teams set up clear policies, complete SRAs, close gaps with practical work plans, and keep tidy proof trails. They provide training content and simple registers for assets, vendors, and logs—so you can show evidence fast.
HIPAA requires keeping documentation for six years. An auditor can ask for any of it (eCFR 164.316).
Questions/Tasks |
Reference |
Evidence Provided |
Who is your HIPAA Security Officer? |
Yes ☐ No ☐ |
|
Does your organization have a sanction policy? |
Yes ☐ No ☐ |
|
Provide copies of your Security Risk Analysis for 2021. |
Yes ☐ No ☐ |
|
Provide your Risk Management plan for 2021. |
Yes ☐ No ☐ |
|
Provide a list of devices that contain PHI. |
Yes ☐ No ☐ |
|
Provide evidence of annual HIPAA Security training. |
Yes ☐ No ☐ |
|
Provide a list of Business Associates and BAA assurances. |
§164.308(b), §164.314 |
Yes ☐ No ☐ |
Provide your Breach policies and procedures. |
§164.308(a)(6), §164.404 |
Yes ☐ No ☐ |
Any “No” means you have a gap that fails HIPAA. “Yes” must have documents, logs, and artifacts.
Policies and Procedures: Keep them current, signed, and shared with staff. Update after changes (§164.316).
SRA + Risk Management: Do a full SRA and show the plan that closes each risk (§164.308(a)(1)(ii)(A)–(B)).
Training: Keep attendance, quiz results, agendas, and reminders (§164.308(a)(5)).
Anti-Malware and Patching: Keep AV dashboards, patch reports, and playbooks (§164.308(a)(5)(ii)(B), §164.308(a)(8)).
Backups: Keep schedules, test results, and recovery logs (§164.308(a)(7)).
Audit Trails: Keep system logs, access reviews, and exception handling notes (§164.312(b), §164.308(a)(1)(ii)(D)).
OCR’s public cases show fines and strict corrective action plans when risk analysis, risk management, audit logging, and vendor oversight fall short. See the Anthem record settlement (HHS), Premera (HHS), Excellus (HHS), PIH Health (HHS), and Montefiore (HHS). OCR also keeps a running list of resolution agreements you can review (HHS Enforcement Archive).
OCR HIPAA Audits measure proof, not promises. Start with a current SRA. Then drive a risk management plan. Keep policies, training, backups, patches, and logs ready to show. Keep all HIPAA documentation for at least six years. If you hit a “No,” fix it and record the fix.
If any answer lacks proof, treat it as not compliant and close the gap now.