Skip to main content

Risk Assessment & Compliance Policies

Overviewโ€‹

HIPAA Security Rule 45 CFR ยง 164.308(a)(1) requires an accurate and thorough assessment of potential risks to ePHI confidentiality, integrity, and availability. Risk assessments must be documented, repeated periodically, and whenever significant operational changes occur.


1. Risk Assessment Frameworkโ€‹

Use the NIST SP 800-30 methodology:

1. Prepare for Assessment
2. Identify Threat Sources and Events
3. Identify Vulnerabilities
4. Determine Likelihood
5. Determine Impact
6. Determine Risk (Likelihood ร— Impact)
7. Communicate Results
8. Maintain Assessment (ongoing)

Risk Scoring Matrixโ€‹

Likelihood \ ImpactNegligible (1)Minor (2)Moderate (3)Major (4)Critical (5)
Almost Certain (5)510152025
Likely (4)48121620
Possible (3)3691215
Unlikely (2)246810
Rare (1)12345
ScoreRisk LevelAction
20โ€“25CRITICALImmediate remediation
12โ€“19HIGHRemediate within 30 days
6โ€“11MEDIUMRemediate within 90 days
1โ€“5LOWAccept or remediate within 1 year

2. Risk Register โ€” GCP PHI Environmentโ€‹

RISK-001: Unauthorized Database Accessโ€‹

FieldValue
AssetCloud SQL (phi-db-instance)
ThreatUnauthorized access by attacker or insider
Inherent Risk15 (HIGH) โ€” Possible ร— Critical
ControlsPrivate IP, Auth Proxy, IAM least privilege, MFA, audit logging
Residual Risk5 (LOW) โ€” Rare ร— Critical

RISK-002: PHI Exposure via Application Logsโ€‹

FieldValue
AssetCloud Run / Cloud Logging
ThreatDeveloper accidentally logs PHI
Inherent Risk9 (MEDIUM)
ControlsCode review, log scanning CI check, PHI-safe logging library
Residual Risk6 (MEDIUM)

RISK-003: Redis Storing Raw PHIโ€‹

FieldValue
AssetCloud Memorystore
ThreatDeveloper caches PHI directly in Redis
Inherent Risk9 (MEDIUM)
ControlsCode review, Redis data policy, automated tests
Residual Risk6 (MEDIUM)

RISK-004: Compromised Service Account Keyโ€‹

FieldValue
AssetIAM Service Accounts
ThreatKey leaked (e.g., committed to git)
Inherent Risk8 (MEDIUM)
ControlsWorkload Identity (no keys), Secret Manager, key rotation, git pre-commit hooks
Residual Risk4 (LOW)

RISK-005: Audit Log Tamperingโ€‹

FieldValue
AssetCloud Audit Logs
ThreatInsider deletes logs to cover tracks
Inherent Risk8 (MEDIUM)
ControlsRetention lock on GCS bucket, REVOKE DELETE on DB audit table
Residual Risk4 (LOW)

RISK-006: Data Exfiltration via Misconfigured VPCโ€‹

FieldValue
AssetVPC / Network
ThreatPHI routed over public internet
Inherent Risk10 (MEDIUM)
ControlsVPC Service Controls, private IP enforcement
Residual Risk5 (LOW)

RISK-007: Third-Party Dependency Vulnerabilityโ€‹

FieldValue
AssetApplication code / containers
ThreatVulnerable library allows RCE or data exposure
Inherent Risk16 (HIGH) โ€” Likely ร— Major
ControlsDependabot, container scanning in CI, SCC Container Analysis
Residual Risk12 (HIGH) โ€” requires ongoing attention

3. Required HIPAA Policiesโ€‹

PolicyHIPAA ReferenceOwnerFrequency
Information Access Managementยง 164.308(a)(4)Privacy OfficerAnnual
Workforce Trainingยง 164.308(a)(5)HR + Privacy OfficerAnnual
Security Incident Responseยง 164.308(a)(6)Security OfficerAnnual
Contingency Plan (DR/BCP)ยง 164.308(a)(7)Security OfficerAnnual
Access Control Policyยง 164.312(a)Security OfficerAnnual
Audit Control Policyยง 164.312(b)Security OfficerAnnual
Transmission Securityยง 164.312(e)Security OfficerAnnual
Breach Notificationยง 164.400Privacy OfficerAnnual

4. Training Requirementsโ€‹

AudienceContentFrequency
All workforceHIPAA basics, PHI handling, incident reportingHire + annually
DevelopersSecure coding for PHI, PHI in logs, encryptionHire + annually
Cloud adminsGCP security controls, audit log reviewHire + annually

5. Business Associate Registerโ€‹

VendorServiceBAA SignedBAA Review Date
Google LLCGCP (Cloud Run, Cloud SQL, Memorystore)Yes[DATE+1yr]
[Vendor][Service][ ][DATE+1yr]

6. Evidence Retention (6 Years)โ€‹

All compliance documentation must be retained for 6 years from creation or last effective date:

  • Risk assessments and risk register
  • Security policies and procedures
  • Training records and acknowledgments
  • Audit logs
  • Incident reports
  • BAAs
  • DR test results
  • Breach notifications

This completes the HIPAA GCP documentation suite. Return to the HIPAA Checklist โ†’