HIPAA Encryption Standards: Key Requirements
Post Summary
Encryption is no longer optional for healthcare organizations under HIPAA. As of 2026, encryption is a mandatory requirement for protecting electronic protected health information (ePHI). This shift eliminates the previous flexibility of risk-assessment-based exceptions. Here's what you need to know:
- Encryption Requirements: HIPAA now mandates encryption for both stored data (AES-256) and data in transit (TLS 1.2+, with TLS 1.3 recommended).
- Breach Protection: Proper encryption can exempt organizations from breach notification requirements, provided the encryption keys remain secure.
- Key Management: Secure storage of encryption keys in FIPS 140-3 compliant modules is critical to maintaining compliance and minimizing breach risks.
- Compliance Standards: NIST guidelines (SP 800-111, SP 800-52, SP 800-57) outline the technical standards for encryption and key management.
Healthcare organizations must implement strong encryption measures, conduct regular risk assessments, and maintain thorough documentation to avoid costly penalties and ensure patient trust. This is especially critical as cyberattacks like ransomware increasingly threaten patient care and operational uptime.
5 HIPAA Security Rule
sbb-itb-535baee
Key HIPAA Requirements for Encryption
HIPAA Encryption Standards: Before vs. After the 2026 Security Rule Update
Technical Safeguards for Encryption
The HIPAA Security Rule, outlined in 45 CFR §164.312, specifies encryption requirements for two key scenarios: data at rest and data in transit.
For data at rest, §164.312(a)(iv) mandates that covered entities implement encryption and decryption mechanisms for electronic protected health information (ePHI) stored in systems like electronic health records (EHRs), databases, or portable devices. For data in transit, §164.312(e)(ii) requires encryption whenever ePHI is transmitted over communication networks, such as email, telehealth platforms, or health information exchanges (HIEs).
Unencrypted portable devices remain a major vulnerability in healthcare. For instance, in 2017, Children's Medical Center of Dallas (CMCD) faced a $3.2 million settlement with the Office for Civil Rights (OCR) after failing to secure portable devices. The incidents included the theft of an unencrypted BlackBerry in 2009 and an unencrypted laptop in 2013. The OCR found that CMCD had identified these risks years earlier but failed to address them [2][3].
The shift from "addressable" to "required" standards has significantly changed how encryption obligations are interpreted.
Addressable vs. Required Standards
In the past, HIPAA classified encryption as an "addressable" implementation specification, which led many organizations to view it as optional.
"Addressable does not mean optional. When a specification is addressable, covered entities must assess whether implementing it is reasonable and appropriate for their environment." - Danielle Barbour, Kiteworks [3]
The 2026 Security Rule update removed any uncertainty by making encryption required for all covered entities and business associates. This update eliminates the option for a risk-assessment bypass or "equivalent alternative measures." It also establishes clear technical standards: AES-256 for data at rest and TLS 1.2 or higher (with TLS 1.3 recommended) for data in transit.
| Feature | Before (2003–2025) | After (2026 Update) |
|---|---|---|
| Classification | Addressable | Required |
| Risk Assessment Bypass | Allowed | Not allowed |
| Alternative Measures | Permitted if documented | Not permitted |
| Technical Standard | Vague/NIST-referenced | Explicit (AES-256, TLS 1.2+) |
These changes reinforce encryption's role as a critical protective measure, particularly in the context of breach notification requirements.
Breach Notification and Encryption
Encryption not only safeguards sensitive data but also provides a layer of protection against breach notification penalties. Properly encrypted ePHI is exempt from breach notification requirements, provided that the encryption keys remain secure. For example, if a device is lost or stolen but uses NIST-standard encryption, the incident may not require notification to patients, the Department of Health and Human Services (HHS), or the media - assuming the encryption keys were not compromised [2][3].
Without encryption, organizations face average breach costs exceeding $10 million and mandatory public disclosure for incidents impacting 500 or more individuals [3].
However, key management plays a pivotal role in maintaining safe harbor eligibility. If an attacker obtains both encrypted data and the decryption keys, the exemption no longer applies. Similarly, in ransomware attacks, ePHI is presumed compromised unless it was encrypted prior to the attack and the keys remained secure [2]. To ensure the safe harbor remains intact, encryption keys should be stored in Hardware Security Modules (HSMs), keeping them separate from the data they protect. This approach strengthens data security and minimizes the risk of breaches.
Technical Guidelines for HIPAA-Compliant Encryption
These guidelines break down how to meet HIPAA's encryption standards, ensuring electronic protected health information (ePHI) stays secure whether stored or transmitted.
NIST-Recommended Algorithms and Key Sizes

HIPAA relies on NIST (National Institute of Standards and Technology) to define acceptable encryption methods. For ePHI, the go-to standard is AES (Advanced Encryption Standard), which supports 128-bit, 192-bit, and 256-bit key lengths. Among these, AES-256 is the preferred choice in healthcare because of its stronger resistance to potential future threats:
"AES-256 encryption satisfies HIPAA requirements when properly implemented and, critically, qualifies PHI as 'unusable, unreadable, or indecipherable' under HHS guidance." [3]
However, encryption alone isn’t enough. To meet HIPAA's safe harbor rules, cryptographic modules must comply with FIPS 140-2/3 validation standards. Without this validation, even strong encryption won’t exempt you from breach reporting requirements. Key NIST publications to follow include:
- SP 800-111: Guidelines for data at rest
- SP 800-52: Recommendations for data in transit
- SP 800-113: VPN implementation guidance
- SP 800-57: Key management lifecycle best practices
Encryption for Data at Rest
When it comes to stored ePHI, encryption methods should align with the storage medium. Every type of storage - whether it's EHR databases, file servers, cloud storage, portable devices, or backups - must use AES-256 encryption. The specifics depend on the environment:
- Full-disk encryption (FDE) is ideal for laptops and mobile devices. Tools like BitLocker or FileVault ensure data remains unreadable if the device is lost or stolen.
- File- or folder-level encryption works better for shared environments, where granular access control is needed for specific files or directories.
Backups and archives require extra attention. HIPAA mandates that archived ePHI remain encrypted for its entire lifecycle, which spans at least six years. As Natasa Djalovic, Senior Content Writer at Jatheon, emphasizes:
"Encryption is a lifecycle obligation, meaning that data sitting in an archive six years from now needs the same protection as data transmitted today." [2]
Standard system backups won’t cut it for HIPAA compliance. Instead, you’ll need a searchable, encrypted archive with a clear chain of custody and an audit trail.
Encryption for Data in Transit
Protecting ePHI during transmission is just as critical as securing it in storage. The current encryption standard for data in transit is TLS (Transport Layer Security) 1.3, as outlined in NIST SP 800-52. While TLS 1.2 is still acceptable, TLS 1.3 is preferred for its improved security - it eliminates outdated cipher suites and addresses vulnerabilities like downgrade attacks.
Older protocols, including SSL, TLS 1.0, and TLS 1.1, should be disabled entirely. These outdated methods have known flaws and don’t provide the safe harbor protection required under HIPAA.
For remote access scenarios, such as employees connecting to clinical systems from home, IPsec VPNs (covered under NIST SP 800-113) add an extra layer of encryption on top of TLS. Additionally, automated email encryption at the gateway level is essential. This ensures that emails containing PHI are encrypted automatically, reducing the risk of human error - a common weak point in data-in-transit security.
Best Practices for Encryption Governance
Strong encryption is only as effective as the governance framework supporting it. Without proper governance, even the most advanced encryption tools can fall short. Governance ensures encryption operates smoothly across your organization and keeps you prepared for audits and incident investigations.
Encryption Key Management
The CMS Key Management Handbook emphasizes:
"The security of the cryptosystem is dependent upon successful key management." [6]
Mismanaged keys - whether lost, stolen, or forgotten - can lead to irreversible data loss or security breaches.
To avoid such risks, key management should follow a structured lifecycle: generation, distribution, use, deactivation, and destruction. Each phase must have clear ownership and strict controls. Keys should be stored in validated Hardware Security Modules (HSMs) compliant with FIPS 140-3 standards. These modules physically safeguard keys from the systems they protect. In cloud setups, choose a key management model like CMK, BYOK, or HYOK based on your risk profile and operational needs.
Enforce dual control and separation of duties. No single individual should have the authority to generate, access, and retire a key without oversight from a second, authorized party. Automating key rotation through a cloud-native Key Management Service (KMS) helps prevent cryptoperiod violations, where keys are used longer than recommended. According to NIST SP 800-57, every key should have a defined cryptoperiod to minimize exposure if compromised. [5]
Additionally, key revocation should align with HR offboarding processes. When an employee with key management responsibilities exits the organization, their access must be revoked immediately. Incorporating these practices into your annual risk analysis helps identify and close any encryption vulnerabilities.
Integrating Encryption into Risk Management
Encryption decisions must align with your broader HIPAA-required risk analysis. This involves an annual review that maps all locations where electronic protected health information (ePHI) is created, stored, transmitted, or received. Overlooking any of these areas - especially in cloud environments - can lead to compliance gaps, such as untracked encryption keys across services.
A central key registry can address this challenge. This registry should log critical information for each active key, including its owner, algorithm, bit length, and expiration date. A complete inventory supports practices like cryptographic erasure, where destroying a key renders associated data unreadable. It also ensures no stray copies of a key remain in use.
Encryption tracking should extend to third-party vendors and Business Associates (BAs). While a Business Associate Agreement (BAA) is necessary when vendors handle ePHI, a signed agreement alone doesn’t guarantee proper encryption practices. Active verification should be part of your third-party vendor risk management process. For better oversight, consider tools that automate and centralize vendor monitoring.
Using Censinet for Risk Oversight
Centralized oversight is critical for maintaining effective encryption practices across your organization. Censinet RiskOps™ offers a platform designed specifically for healthcare organizations to manage encryption-related risks across their ecosystem, including third-party vendors, clinical applications, medical devices, and supply chains.
With Censinet Connect™, you can perform detailed vendor risk assessments to identify encryption vulnerabilities before they escalate into larger issues. The platform’s AI-powered features, like Censinet AI™, automatically analyze vendor evidence and highlight key risks, allowing your team to focus on strategic priorities. For healthcare organizations juggling complex vendor networks, this level of visibility transforms encryption governance into a continuous, manageable process.
Implementing and Maintaining HIPAA-Compliant Encryption
Building an Encryption Architecture
Start by identifying every point where ePHI (electronic protected health information) is created, transmitted, stored, or received. This includes endpoints, cloud platforms, medical devices, email servers, and data warehouses. Any missing piece in this mapping leaves a gap in your security framework.
Once you’ve mapped these locations, apply the appropriate encryption standards at each layer. Use AES-256 for data at rest and TLS 1.3 for data in transit. For archived data, rely on immutable storage to ensure no unauthorized changes or deletions occur during the required six-year HIPAA retention period. Encryption isn’t a one-and-done task - it’s an ongoing responsibility. Even archived data demands the same level of protection as active data.
Be mindful of often-overlooked areas like BYOD (Bring Your Own Device) policies and email communications. Personal devices that access ePHI fall under the HIPAA Security Rule, so enforce encryption through Mobile Device Management (MDM) software. For emails, ensure your tools encrypt the entire message, including the header, to avoid exposing sensitive details.
Finally, formalize these security measures with clear policies and real-time documentation. Proper documentation not only supports compliance but also helps monitor the effectiveness of your encryption architecture by measuring what matters for healthcare cybersecurity.
Policy and Documentation Requirements
HIPAA-compliant encryption requires detailed documentation. Your policies should outline everything from approved encryption algorithms to key management practices and exception handling. Strong documentation is the backbone of compliance and an effective incident response strategy. Below is a breakdown of essential documentation categories:
| Documentation Category | Key Requirements |
|---|---|
| Encryption Policy | Specify approved algorithms (e.g., AES-256, TLS 1.3), explain implementation decisions, and detail exception handling procedures. |
| Key Management | Define standards for key generation, rotation schedules, custodian roles, and revocation protocols. |
| Risk Assessment | Update annually to map ePHI locations and document encryption measures. |
| Incident Response | Include safe harbor analysis procedures to determine whether a breach must be reported. |
| Vendor Management | Maintain a list of Business Associates with signed BAAs (Business Associate Agreements) and transform third-party risk management through collaborative exchanges. |
| Access & Audit Logs | Keep tamper-evident records of all user access, searches, and exports of ePHI. |
A key point regarding BAAs: even if a cloud provider stores encrypted data without access to decryption keys, a signed BAA is still mandatory. Past enforcement cases highlight the risks of neglecting encryption vulnerabilities, with penalties serving as a stark reminder of the consequences. [2]
Monitoring and Continuous Improvement
Regular monitoring is essential to keep encryption controls effective against emerging threats. Encryption methods can become outdated, keys may exceed their recommended lifespans, and new systems might be introduced without proper oversight. The proposed 2024 HIPAA Security Rule updates address these realities, requiring vulnerability scans every six months and annual penetration testing. [2]
To further strengthen your defenses, configure systems to reapply encryption after session timeouts. This prevents unattended, authenticated sessions from leaving data exposed. Additionally, maintain tamper-evident audit logs to track every instance of access, search, or export of ePHI. These logs not only enhance internal monitoring but also serve as critical evidence during OCR (Office for Civil Rights) audits.
Use each audit cycle as a chance to uncover and address vulnerabilities before they escalate into enforcement actions. Continuous improvement ensures your encryption practices remain aligned with HIPAA requirements and evolving security challenges.
Conclusion
Encryption is no longer a choice for healthcare organizations managing ePHI - it’s a requirement. The revised HIPAA Security Rule has elevated encryption from "addressable" to mandatory, eliminating the previous flexibility of risk-assessment-based exceptions [1].
In 2024, millions of protected health records were exposed due to healthcare breaches in the U.S., highlighting the severe consequences of inadequate data security [4]. Implementing AES-256 encryption for data at rest and TLS 1.3 for data in transit remains one of the most reliable ways to mitigate such risks. It also ensures eligibility for the HITECH Act's breach notification safe harbor.
Maintaining compliance involves a few critical steps: identifying where ePHI is stored, securing encryption keys, and thoroughly documenting decisions to prepare for OCR audits. Compliance expert Devi Narayanan emphasizes this point:
"Encryption today is a foundational compliance control and a strategic risk management tool that influences breach impact, audit outcomes, and even legal liability." [4]
Beyond current requirements, organizations must also look to the future. Preparing for post-quantum cryptography (PQC) is essential to safeguard data with long retention periods. Patient records encrypted with outdated key exchanges could be at risk of quantum attacks within the next decade, making forward-thinking encryption strategies vital [1].
The next steps are clear: conduct a thorough ePHI audit, enforce NIST-approved encryption standards, strengthen key management practices, and establish continuous monitoring. These actions reinforce the technical, governance, and compliance strategies detailed in this guide. Ultimately, robust encryption not only fulfills regulatory obligations but also ensures the safety and trust of patients.
FAQs
What changes in 2026 for HIPAA encryption?
Starting in 2026, HIPAA encryption requirements are getting stricter. Encryption will no longer be addressable - it will become mandatory. This means all covered entities must encrypt electronic protected health information (ePHI) both at rest and in transit. For data at rest, Advanced Encryption Standard (AES-256) will be required. For data in transit, protocols like TLS 1.2 or newer must be used. This change removes the previous flexibility, enforcing stricter measures to safeguard sensitive health information.
When does encryption remove breach notification duties?
Encryption can exempt organizations from breach notification duties under HIPAA when unauthorized individuals access or acquire data. By making the data unusable, unreadable, or indecipherable, encryption ensures it cannot be exploited, removing the need for breach reporting.
How should we store and rotate encryption keys?
HIPAA mandates strict practices for managing encryption keys to safeguard sensitive data. This includes ensuring keys are securely generated, stored, and destroyed using methods like Hardware Security Modules (HSMs) or trusted cloud-based systems.
To stay compliant and reduce risks, it's critical to rotate encryption keys every 90 days for high-risk systems or immediately if a security breach occurs. Additionally, maintaining detailed audit logs of all key operations is essential. These logs should be retained for at least six years to meet HIPAA requirements and bolster overall security.
