Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is a HIPAA risk assessment?

The objective of a HIPAA risk assessment is to identify potential risks and vulnerabilities to the confidentiality, availability, and integrity of all protected health information (PHI) that an organization creates, receives, maintains, or transmits. 


The U.S. Department of Health & Human Services (HHS) does not specify a particular risk analysis methodology because covered entities and business associates vary in size, complexity, and capabilities. To meet the objective of a HIPAA risk assessment, HHS suggests an organization should: 


  • Identify where PHI is stored, received, maintained, or transmitted
  • Identify and document potential threats and vulnerabilities
  • Assess current security measures used to safeguard PHI
  • Assess the proper usage of existing security measures
  • Determine the likelihood of a reasonably anticipated threat
  • Determine the potential impact of a breach of PHI
  • Assign risk levels for vulnerability and impact combinations
  • Document the assessment and take action where necessary


HIPAA risk assessments are not a one-time event; they require periodic reviews when introducing new technology or implementing new work practices.

Additional resources you might like:

Vendor Risk Management
Blog
When tokenmaxxing leads to riskmaxxing

AI mandates are creating a security nightmare: a rise in Shadow AI, where unmanaged, unapproved AI tools operate inside company environments without oversight.

Vendor Risk Management
Events
AI broke your Third Party Risk Management program. Now what?

In this webinar, we'll show you exactly where traditional TPRM breaks down in an AI-first world, and how one team rebuilt their program to actually keep up.

Comparisons and reviews
Blog
Best TPRM Software in 2026: The shift to continuous monitoring

Compare leading tools for continuous monitoring, risk scoring, and vendor assessment automation.

Additional resources you might like:

Vendor Risk Management
Blog
When tokenmaxxing leads to riskmaxxing

AI mandates are creating a security nightmare: a rise in Shadow AI, where unmanaged, unapproved AI tools operate inside company environments without oversight.

Vendor Risk Management
Events
AI broke your Third Party Risk Management program. Now what?

In this webinar, we'll show you exactly where traditional TPRM breaks down in an AI-first world, and how one team rebuilt their program to actually keep up.

Comparisons and reviews
Blog
Best TPRM Software in 2026: The shift to continuous monitoring

Compare leading tools for continuous monitoring, risk scoring, and vendor assessment automation.

GRC
Blog
5 best GRC software solutions for enterprise teams in 2026

Enterprise risk is rising fast, but most teams still juggle disconnected tools that slow deals and create blind spots.

Compliance
Events
Learn how to automate compliance for SOC 2, ISO 27001, and more

Register to learn how Vanta’s Agentic Trust Platform helps fast-moving startups and security teams get audit-ready fast and stay continuously compliant.

Comparisons and reviews
Blog
The best vendor risk management software for 2026

Here are your best options for vendor risk management software, with Vanta taking the top spot.

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Product updates
Events
Turn Every Promise into Predictable Trust: Customer Commitments in Action

Watch on demand for a demo of Customer Commitments and learn how Vanta turns contracts into structured, actionable intelligence.

SOC 2
Events
SOC 2 Basics: A 30 Minute Guide for Startups

Watch on demand to get a clear, founder-friendly intro to SOC 2 in just 30 minutes.