HHS HIPAA Security Rule Mandates Annual Pen Tests, 72-Hour Recovery by Late 2026
Proposed rule converts addressable specs to mandatory controls. Healthcare IT buyers face budget shifts for testing, MFA, and encryption before six-month grace period ends.
Mandatory Controls Replace Addressable Specs
HHS proposed changes to the HIPAA Security Rule in January 2025 that convert previously optional controls into mandatory requirements for all covered entities and business associates. The final rule is expected in May 2026, with a six-month implementation grace period. This eliminates flexibility that allowed smaller organizations to argue certain security measures were too expensive or impractical.
The rule mandates annual penetration tests, biannual vulnerability scans, and 72-hour data restoration capabilities. Organizations that currently perform risk analyses without follow-through on testing or recovery drills will face enforcement. OCR settled 10 cases in the first five months of 2025 specifically over missing risk analyses, with fines in the millions. The shift from addressable to mandatory removes the compliance wiggle room those settlements exploited.
What Changes for Procurement
Technology asset inventories must be updated annually. Network mapping becomes a documented requirement, not a best practice. Multi-factor authentication applies to all system access, not just privileged accounts. Encryption of electronic protected health information must cover data at rest and in transit. Unused software and open ports must be removed.
These requirements directly affect vendor selection. MFA tools that cover only VPN or administrative access no longer meet the standard. Encryption that applies selectively to databases but not backup files creates a compliance gap. Asset management platforms that require manual updates instead of automated discovery add labor costs that smaller IT teams cannot absorb.
Vendors offering HIPAA-aligned security frameworks or zero-trust architectures gain an advantage over cheaper alternatives that require custom configuration to meet the new baseline. The 72-hour recovery mandate particularly benefits backup and disaster recovery providers with tested automation, as manual restoration processes cannot consistently meet that window.
Budget Reallocation Required
Annual penetration testing and biannual vulnerability scanning represent new recurring costs for organizations that previously conducted these assessments on ad hoc schedules or not at all. A single penetration test for a mid-size health system typically costs $15,000 to $50,000 depending on scope. Doubling scan frequency adds vendor fees and internal remediation hours.
Smaller entities face the sharpest budget impact. A three-physician practice that outsourced IT security to a managed service provider on a flat monthly fee now needs to budget separately for mandated testing and documentation. This shifts purchasing power toward MSPs that bundle testing and compliance reporting, and away from providers offering only infrastructure management.
The rule increases financial risk for non-compliance. Healthcare data breaches affected 238 million Americans in 2024. Ransomware hit 67% of healthcare organizations in 2024, nearly double the 2021 rate. OCR enforcement after the grace period will prioritize organizations that lack documented evidence of mandated controls, not just those that suffer breaches.
Vendor Landscape Impact
No specific products are named in the proposed rule, but it references NIST frameworks that favor certain architectural approaches. Real-time monitoring tools that provide continuous compliance reporting become more valuable than periodic assessment tools. Platforms that automate asset inventory and network mapping reduce the manual overhead of annual updates.
The requirement to verify vendor security posture before contract renewal creates a documentation burden. Organizations need business associate agreements that include evidence of MFA, encryption, and recovery capabilities. This favors established vendors with mature compliance programs over newer entrants that cannot produce third-party attestations or audit reports.
Smaller software vendors that serve niche clinical workflows face a choice: invest in security infrastructure that meets the mandatory baseline, or exit the healthcare market. The rule does not grandfather existing contracts. Business associates must meet the same requirements as covered entities, which means a small lab result interface vendor must implement the same MFA and encryption standards as a national EHR provider.
What to Watch
The May 2026 finalization date determines when the six-month clock starts. Organizations should model budget impact now based on the proposed requirements, as public comments closed in March 2025 and major changes are unlikely. Procurement cycles for MFA, encryption, and testing services take three to six months, which leaves minimal slack after final publication.
OCR audit priorities after the grace period will focus on organizations with prior breach history or OCR settlements. The shift from addressable to mandatory means previous justifications for not implementing controls no longer apply. Legal risk increases for boards and executives who delay compliance investments, as regulatory citations will directly reference unmet mandatory requirements rather than arguable addressable specifications.
Technology decisions, clearly explained.
Weekly analysis of the tools, platforms, and strategies that matter to B2B technology buyers. No fluff, no vendor spin.
