Say Good-Bye to Policy Roulette

Ken Schwarz — CISSP, CISM, CGRC, ITIL • March 10, 2026

Changes to HIPAA Will Require Written Policies

The coming update to the HIPAA Security Rule is shaping up to be one of the most consequential changes healthcare organizations have seen in years. At last word, the revisions are still expected around May, and while many people assume the changes will be incremental, the direction they point is anything but casual. The message from regulators is clear: the era of loosely interpreted security practices is ending.


One of the more telling changes involves something that sounds deceptively simple—documentation. The revised rule is expected to require covered entities to maintain written policies addressing every standard and implementation specification within the Security Rule, whether those provisions apply directly to the organization or not. In other words, it will no longer be enough to say, “That requirement doesn’t apply to us.” Organizations will now need to explain why it doesn’t apply and document the reasoning behind that determination.


At first glance, that might sound like a bureaucratic exercise. In reality, it reflects a deeper shift in regulatory thinking.

For years, the Health Insurance Portability and Accountability Act framework has relied heavily on the concept of “flexibility of approach.” The Security Rule recognizes that a rural clinic, a mid-sized physician group, and a multi-hospital health system cannot all implement security controls in the exact same way. Organizations have been allowed to scale their safeguards based on size, complexity, and risk.


The problem is that flexibility has too often been interpreted as "optional".


Investigations following major healthcare breaches routinely uncover the same underlying issue: controls were never formally evaluated in the first place. Decisions were made informally, assumptions went undocumented, and security measures that should have been implemented were simply never considered in a structured way. When regulators ask why something wasn’t implemented, “we didn’t think it applied” doesn’t carry much weight if there is no written analysis behind it.


Requiring written policies for every standard closes that gap. It forces organizations to move from assumption to deliberation. Each safeguard must be considered, assessed against the organization’s environment, and either implemented or formally justified if it is not.


Seen in isolation, this requirement might feel like an administrative burden. Viewed in context, it’s part of a much broader effort to address what has become a relentless wave of healthcare breaches. Year after year, the volume of incidents reported to the U.S. Department of Health and Human Services continues to climb. The industry has reached a point where the phrase “record number of breaches” has almost become routine.


Healthcare organizations face a uniquely difficult threat landscape. They manage some of the most valuable data on the black market, often operate with constrained IT resources, and rely on complex ecosystems of vendors and interconnected systems. Meanwhile, ransomware operators have learned that disruptions in healthcare carry immediate operational consequences, which increases the pressure to pay.


Against that backdrop, regulators are steadily tightening expectations around security governance.


Documentation may not sound like a frontline defense against cyberattacks, but it plays a critical role in building a resilient security program. When policies are comprehensive and clearly articulated, they create a shared understanding of how security is supposed to function within the organization. They define responsibilities, establish decision-making frameworks, and ensure that risk management is not left to improvisation.


More importantly, written policies reveal gaps. When organizations are forced to map their operations against every requirement in the Security Rule, weaknesses that were previously invisible often come into focus. Missing controls and unmanaged risks become far easier to identify when they are laid out in black and white.


In that sense, the upcoming changes should not be viewed solely as regulatory tightening. They are also an opportunity for organizations to bring clarity and discipline to their security posture.


Many healthcare entities will discover that the real challenge is not implementing new technology but establishing the governance structure that should have been in place all along. Policies that fully address the Security Rule require organizations to think systematically about risk analysis, access management, contingency planning, vendor oversight, and incident response. They require security to be treated not as a set of tools but as an operational function woven into the organization’s daily practices.


The healthcare sector has reached a moment where incremental improvements are no longer enough. The scale and sophistication of cyber threats have grown faster than many security programs have evolved to meet them. Regulators recognize that reality, and the forthcoming Security Rule changes reflect an effort to close that gap.


Whether the final rule arrives in May or slightly later, the direction is already clear. Healthcare organizations will be expected to demonstrate not only that they have safeguards in place, but that they have thoughtfully evaluated every requirement of the Security Rule and documented the reasoning behind their decisions.


In the end, that shift represents something more than compliance. It represents a move toward accountability. And in an industry where the protection of patient data is inseparable from the protection of patient trust, that accountability has never mattered more.

By Ken Schwarz — CISSP, CISM, CGRC, ITIL March 25, 2026
Because the Castle Walls are No Longer Enough
By Ken Schwarz—CISSP, CISM, CGRC, ITIL February 25, 2026
Cybersecurity Is Built on Small Habits, Not Grand Gestures
By Ken Schwarz—CISSP, CISM, CGRC, ITIL February 11, 2026
The Hidden Risk in Medical Imaging Environments
By Ken Schwarz — CISSP, CISM, CGRC, ITIL January 29, 2026
How Cost-Centered Cybersecurity Hurts SME Healthcare Practices
By Ken Schwarz — CISSP, CISM, CGRC, ITIL January 23, 2026
By Ken Schwarz — CISSP, CISM, CGRC, ITIL January 12, 2026
MFA Can No Longer Wait
By Ken Schwarz- CISSP, CISM, CGRC, ITIL December 29, 2025
“I Thought IT Had That Covered”
By Ken Schwarz - CISSP, CISM, CGRC, ITIL December 18, 2025
Passing the Audit Doesn't Mean You're Bulletproof