Learn how to a build a cloud-first strategyRegister Now


HIPAA Compliance - Security Audit Checklist and risk analysis guidelines?

Posted on 2010-01-04
Medium Priority
Last Modified: 2012-06-21
We are looking to do our own HIPAA security audit and risk analysis from a technical standpoint, making sure that the IT infrastructure is secure and that there are policies in place to address everything regarding computer/data security and HIPAA.  Is there a good place to get a checklist that  third party IT auditing firms might use if they are hired to conduct a HIPAA analysis on a network?
Question by:Steve Bantz
LVL 29

Expert Comment

by:Michael Worsham
ID: 26171851
I recommend contacting the ISS X-Force Professional Services team:

LVL 12

Accepted Solution

sarangk_14 earned 2000 total points
ID: 26171928

A checklist is a fairly standard document, the questions auditors may ask would change from person to person or organization to organization.

You might find the following links useful:


Hope this helps.

Warm regards,

Featured Post

Upgrade your Question Security!

Add Premium security features to your question to ensure its privacy or anonymity. Learn more about your ability to control Question Security today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question