Executive summary: The HIPAA Security Rule overhaul targeting finalization in 2026 isn't a rewrite-it's a shift from "document your intent" to "prove your controls work." On December 27, 2024, HHS's Office for Civil Rights (OCR) issued a Notice of Proposed Rulemaking (NPRM) to overhaul the HIPAA Security Rule, mandating multi-factor authentication (MFA), mandatory encryption, and removing "addressable" safeguards.1hhs.gov For healthcare IT and compliance teams, manual access management and SSO-only approaches have moved from nuisance to outright regulatory liability.
This article breaks down the 2026 Security Rule changes through the lens of access management-what's actually in the NPRM, real impact on EHR and clinical systems, vendor connections, and what "good" identity governance looks like when auditors demand continuous, evidence-based proof-not last-minute spreadsheets.
From Flexible to Prescriptive: The 2026 HIPAA Security Rule Resets Expectations
For two decades, HIPAA's Security Rule offered required and addressable safeguards. "Addressable" meant "implement if reasonable and appropriate-or document why not." In practice, this let organizations justify weak encryption, skip MFA, and support manual access controls.
The 2026 update flips that script.
The NPRM removes the distinction between "required" and "addressable" specifications. All are required, with only narrow exceptions.1hhs.gov
It also introduces clear technical and administrative mandates that directly target access management:
- Mandatory multi-factor authentication for systems accessing electronic protected health information (ePHI), with limited exceptions1hhs.gov
- Mandatory encryption of ePHI at rest and in transit, again with limited exceptions1hhs.gov
- Annual, documented compliance audits for covered entities and business associates1hhs.gov
- Technology asset inventory and network map tracing ePHI flows across systems, apps, and vendors, refreshed annually1hhs.gov
- Prescriptive risk analysis tied to the asset map, not generic assessments1hhs.gov
- Vulnerability scanning every six months and penetration testing yearly1hhs.gov
- Contingency planning: 72-hour restoration goals for key systems, 24-hour notification for activated contingency plans1hhs.gov
- Vendors must annually verify technical safeguards (MFA, encryption) with written certification1hhs.gov
Industry consensus points to a 2026 timeline:
- Most experts expect the final Security Rule update to publish around May 2026, with deadlines late 2026 or early 2027 after a 180-day to one-year ramp-up.2medcurity.com
Bottom line: 2026 is when HIPAA shifts from encouraging strong access controls to demanding them-with granular technical expectations.
Old vs New: Shifts in Access Management
| Control area | Legacy Security Rule | 2026 NPRM direction |
|---|---|---|
| Implementation specs | Required & addressable; exceptions justified on paper | All required; exceptions rare and tightly documented |
| MFA | Strongly recommended, not explicitly required | MFA required for ePHI with limited exceptions |
| Encryption | "Addressable" at rest/in transit; compensating controls common | Required at rest/in transit for ePHI, limited exceptions |
| Risk analysis | High-level, often infrequent and generic | Detailed, mapped to inventory, threats, and ePHI flows |
| Compliance audits | Internal spot checks; OCR audits only after incidents | Annual audits for covered entities and business associates |
| Vendor oversight | BAAs with broad "HIPAA compliance" language | Contracts specify MFA, encryption, incident response, annual proof from vendor |
| Technical testing | Pen tests and scans optional, maturity-dependent | Vuln scanning minimum twice yearly; annual pen test required |
| Incident & contingency plans | Policy focus, rarely tested | Tested, proven, 72-hour recovery goals, 24-hour notification on plan activation |
IT and security leaders: You're accountable for what your systems actually do-not what the policy says.
The Breach Backdrop: Why Regulators Are Fixated on Identity & Access
The tighter Security Rule is a direct response to real breach data:
- 2023: Healthcare orgs reported 725 breaches of 500+ records, exposing 133M patient records-double 2022's total3paubox.com
- By end of 2024, 259M Americans had their PHI compromised-4 out of 5 people in the US4aha.org
- Almost 80% of breaches trace to hacking/IT incidents; ransomware and credential abuse now routine5hipaajournal.com
- In 2024, 34% of attacks involved stolen credentials, another 34% exploited vulnerabilities-both directly targeted by new rules6ispartnersllc.com
OCR is escalating penalties as well:
- 2026 penalty tables put Tier 4 violations (willful neglect not corrected) at $73,011 to $2,190,294 per violation, annual cap per provision7hipaajournal.com
- Enforcement collections doubled from $2.1M (2022) to $4.1M (2023), even as the number of settlements stayed steady8hipaajournal.com
Identity is where attackers are winning and regulators are responding.
If your access model is still "passwords + paper approvals + trust the vendor," the 2026 rule is engineered to make that indefensible.
What 2026 Really Demands of Access Management & EHR Security
The NPRM doesn't prescribe a specific tool-it defines outcomes.
1. MFA Anywhere ePHI Lives-Not Just Obvious Gaps
Historically, many providers put MFA on VPNs and email, but EHRs and clinical workstations ran with weaker controls.
With the NPRM, accountability applies to every ePHI entry point:
- Core EHRs/EMRs (Epic, Cerner, Meditech, etc.)
- Clinical specialty systems
- Cloud EHR integrations, remote portals
- Patient portals, telehealth
- Admin tools with ePHI access (billing, RCM, reporting)
"SSO has MFA" won't cut it if Epic remains open through a shared login or a vendor circumvents your controls. Complete identity governance-spanning SSO, clinical, and long-tail SaaS-now matters. Iden is built precisely to apply fine-grained, real-time access guarantees to every app, not just 20% with SCIM or behind SSO.
2. Encryption: Table Stakes, Not Negotiable
Encryption at rest/in transit for ePHI is moving from "addressable" to baseline.
For access management, this means:
- **Credential theft bypasses encryption-**longstanding breach pattern
- Auditors now insist on knowing who accessed decrypted data, when, and on what justification
Encryption is the lock. Access governance controls the keys-who gets them, and how long.
3. From Rubber-Stamp Reviews to Evidence-Backed Decisions
Traditional access reviews = CSV exports from 20+ systems, spreadsheets sent to managers, near-universal approval.
This won't survive a 2026 audit. The NPRM's audit and risk-analysis demands move you to:
- Continuous visibility: Who has access, where, and why, system-wide
- Time/purpose-limited access for sensitive roles
- Immutable audit logs: Every grant, change, and revoke tied to policy or approval trail
Iden delivers exactly this: continuous governance, fine-grained permissions, and tamper-proof logs. Proof, not compliance theater.
4. Vendor and Third-Party Access: Now Within Scope
NPRM substantially tightens business associate scrutiny:
- Annual audits and certifications
- Explicit BAA requirements (MFA, encryption, response times, NIST alignment)
- 24-hour incident notification1hhs.gov
Almost half of major data breaches trace to third-party access.9censinet.com You need:
- Full lifecycle automation for vendor identities
- Policies enforced on those accounts (MFA, least privilege, time-bounded)
- Evidence those controls are applied
Iden is built-at core-to close identity blindspots, including non-SCIM, non-API and long-tail tools legacy IGA ignores.
Why Manual Access & SSO-Only Models Are Regulatory Risks
The NPRM really asks: Can you prove, at any moment, who has access to all ePHI, why, and how quickly you'd remove it?
For those relying on tickets, SSO group assignments, local admins, or spreadsheets, the answer is consistently "no."
| Model | ePHI system coverage | MFA coverage | Audit evidence | Regulatory risk |
|---|---|---|---|---|
| Manual | Patchy; EHR modules, vendor accounts missed | Inconsistent; app-by-app | Fragmented; screenshots/emails | High |
| SSO-only | Good for web apps; weak for EHRs/clinical | Strong at login, but bypassable | SSO logs only, lacks entitlements | High-Medium |
| Complete IGA | All systems, incl. EHRs, non-API apps | Policy-driven, everywhere ePHI lives | Central, immutable logs; ready-made | Lower |
Iden users see: ~80% fewer manual tickets within weeks, 120 quarterly hours saved on user reviews, 30% SaaS savings via license reclamation and "no SCIM tax" automation.
Fewer tickets, fewer blindspots, real audit evidence-and an operating system for HIPAA-grade access management.
Continuous, Evidence-Driven Identity Governance: What OCR Will Actually Check
Don't misread "annual audit" as a bigger box-ticking season. The NPRM wants continuous evidence-based compliance:
- Continuous governance: Any change in role, employment, or vendor re-aligns access across all ePHI systems automatically.
- Immutable audit logs: Tamper-proof, system-wide logs for every entitlement change.
- Granular entitlements: Not "EHR user", but "read-only cardiology, no oncology, no export."
- Organizational instinct: AI-driven, autonomous workflows (Agentic Workflows) create access that's consistent, quick, and policy-driven.
Iden is clear: Partial governance is theater. If your automation only touches the 20% of apps with SCIM, you're still exposed-and OCR knows it.
With Iden:
- Lifecycle automation across EHR, SaaS, and legacy apps (even those without SCIM/APIs)
- Fine-grained entitlements (not just on/off)
- Bank-grade encryption and immutable audits
- Zero-upkeep, policy-based processes engineered for lean teams
12-Month Blueprint: Prepare Access Management for HIPAA 2026
You don't need a 200-page plan. You need a targeted, time-bound path connecting rules to action.
Phase 1 (0-90 Days): Visibility and Gap Mapping
Map ePHI locations
Baseline your access model
- Identify identity source, MFA status, provisioning/offboarding method per system
- Flag where access exists but isn't tracked
Review evidence readiness
- For a random user/vendor, can you, in under 10 minutes, produce: approval trail, last review, and which systems they'd lose access to if offboarded?
- If not, this will fail under real audit.
Phase 2 (90-270 Days): Close High-Risk Gaps
Prioritize MFA rollout
- Start with remote and admin access; expand to clinical, SaaS, vendors
- Ensure vendor/third-party coverage
Automate joiner-mover-leaver flows
- Use HR events to trigger cross-system provisioning/deprovisioning
- If you only cover SCIM, upgrade to complete IGA like Iden
Ditch spreadsheets for access reviews
- Move to automated, policy-based reviews that pull direct entitlements and create immutable logs
- Target 50-75% reduction in quarterly review time; Iden sees typical savings of 120 hours/quarter
Phase 3 (270-365 Days): Operationalize Continuous Governance
Implement agentic workflows for high-risk access
- Use just-in-time, time-limited, AI-driven (agentic) access for privileged roles
Industrialize vendor access governance
- Treat vendors as staff: automate provisioning/deprovisioning, enforce policies, and produce evidence
Dry-run a 2026 audit
- Can you: list all ePHI systems, provide MFA coverage, produce evidence for 10 users/3 vendors, prove 24-hour deprovs?
- If you can't do this in days without scrambling, the governance isn't ready
Iden delivers: live in ~24 hours, automations in under an hour, manual tickets slashed by 80%, no need for a big-budget IAM project.
Frequently Asked Questions
How mandatory is MFA under the 2026 HIPAA Security Rule?
The NPRM states MFA is required for all systems accessing ePHI, with few exceptions.1hhs.gov
- Remote EHR/admin/cloud access: MFA is a must
- Shared workstations may use proximity/alternative second factors
- Exceptions must be narrowly documented, with compensating controls
- MFA as optional in 2026 will be indefensible
When will compliance with the new requirements be expected?
- NPRM published and highly detailed
- Experts predict final rule by May 2026; compliance late 2026/early 2027 (180-day to 1-year ramp)
- OCR signals these changes codify current best practice-delaying action is a mistake
Does using an EHR vendor or SSO provider guarantee access control compliance?
No.
- The EHR vendor controls their platform, but you govern who gets access, with what roles, and how fast you revoke it
- SSO often can't manage:
- Real app entitlements
- Non-SSO systems or legacy/departmental tools
- Vendor accounts outside your directory
- You're accountable for end-to-end governance everywhere ePHI is processed
How do HIPAA's 2026 changes connect with SOC 2, NIS2, CMMC, or DORA?
The Security Rule upgrades mirror:
- Strong access control/MFA (SOC 2 CC6, NIS2, etc.)
- Regular risk assessment/testing
- Vendor risk and contract controls
- Real-time access audit evidence
Supporting multiple frameworks? Don't build siloed control sets. A single, complete IGA platform like Iden speeds multi-framework mapping from one evidence trail.
Do small/mid-size healthcare organizations really have to comply?
Yes-but "compliance" doesn't require a massive IAM team.2medcurity.com
- Smaller organizations can lean on automation, plug-and-play connectors, and agentic workflows
- Expectation is consistent: controls that actually protect patients, no matter your size
Closing Takeaways
- The 2026 HIPAA Security Rule update is the most substantial tightening ever, laser-focused on closing identity and access gaps
- Manual, SSO-only, and spreadsheet reviews become regulatory risks, not just operational headaches
- Be audit-ready with complete coverage (every ePHI app), fine-grained control (roles/modules/projects), and continuous evidence (immutable logs, automated review)
- Iden was purpose-built for this: complete identity governance-simpler, faster, no compromise-for teams meeting 2026 demands without headcount surge.


