HIPAA audit criteria and types of audits
HIPAA audits evaluate whether covered entities and business associates comply with the Privacy, Security, Breach Notification, and Enforcement Rules. Audits focus on how organizations manage risk, implement safeguards, train their workforce, and retain required documentation—generally for at least six years.
Audits are conducted primarily by the Office for Civil Rights (OCR) within the US Department of Health and Human Services. Audit criteria are based on HIPAA regulations, HHS guidance, and enforcement trends.
Types of HIPAA audits
HIPAA audits can take several forms, depending on the organization’s role, risk profile, and triggering event.
- OCR desk audits: Desk audits are conducted remotely and focus on reviewing submitted documentation such as risk assessments, policies, training records, incident logs, and Business Associate Agreements (BAAs).
- OCR on-site audits: On-site audits are typically reserved for higher-risk organizations or follow-up investigations. These audits may include staff interviews, system walkthroughs, demonstrations of technical controls, and inspections of physical facilities.
- Internal HIPAA audits: Organizations often conduct internal audits—quarterly or annually—to identify gaps and validate compliance before external reviews. Internal audits are a key component of ongoing risk management.
- Third-party audits and assessments: Independent audits such as HITRUST, SOC 2, or ISO certifications are sometimes used to demonstrate HIPAA alignment to customers or partners. While these are not substitutes for OCR audits, they are commonly mapped to HIPAA requirements for vendor assurance.
- Administrative safeguards, including documented risk analyses, security management processes, workforce training records, and contingency plans
- Physical safeguards, such as facility access controls, workstation security, and device and media management procedures
- Technical safeguards, including access controls, encryption, multi-factor authentication, audit logging, and monitoring
- Evidence of ongoing monitoring and vulnerability management
- Incident response and breach notification readiness
- Adherence to the minimum necessary standard
- Execution and oversight of BAAs across vendors and subcontractors
- Map controls directly to HIPAA standards under 45 CFR §§164.308–164.316
- Centralize compliance evidence in a single repository or platform for easy retrieval
- Conduct mock audits or tabletop reviews to test readiness
- Train staff on audit procedures and expected responses
- Update controls to reflect evolving requirements, such as annual vulnerability scanning and enhanced monitoring
SOC Frameworks Overview
SOC 2 Basics
SOC 2 Compliance Process
SOC 2 Compliance Process
Sprinto: Your ally for all things compliance, risk, governance


