April 17, 2026

How US Healthcare Security Requirements Are Changing, and What It Means for Your GRC Program

Written by
Rebecca Williams
GRC Consultant

For most US healthcare organizations, the compliance journey started in the same place: HIPAA and SOC 2, emerging over time to include NIST CSF.

HIPAA set the legal baseline. The Security, Privacy, and Breach Notification Rules defined what had to be protected and how. NIST CSF gave teams a flexible, risk-based way to organize their cybersecurity programs around five core functions: Identify, Protect, Detect, Respond, Recover.

For years, that combination was enough. HIPAA told you what was required. NIST CSF gave you a structure. You built your controls, gathered evidence, passed your audits, and moved on.

That's no longer the reality.

The divergence

Across the US healthcare sector, GRC teams are now managing a much wider set of obligations, frameworks, and guidance than they were even three years ago. The landscape has expanded in several directions at once.

NIST SP 800-53 is increasingly relevant beyond its traditional federal agency audience. Healthcare organizations with government contracts, participation in federal programs, or large payer relationships are adopting 800-53's prescriptive control catalog as the basis for their security programs rather than relying solely on CSF's high-level risk categories. 800-53 offers the granularity that CSF intentionally avoids, and for organizations operating at scale, that granularity is becoming necessary.

HITRUST CSF has moved from "nice to have" to a de facto requirement for organizations doing business with large health systems and payers. HITRUST consolidates HIPAA, NIST, and ISO requirements into a single certifiable framework with tiered assessments (e1, i1, r2). It's no longer unusual for a HITRUST validated assessment to be a contractual prerequisite in vendor relationships across the sector.

HICP (Health Industry Cybersecurity Practices) is where the landscape gets less familiar for organizations still focused exclusively on HIPAA and HITRUST. Developed by HHS and the Health Sector Coordinating Council under Section 405(d) of the Cybersecurity Act of 2015, HICP provides practical, threat-specific cybersecurity guidance organized around the five most common attack vectors in healthcare: phishing, ransomware, equipment loss or theft, insider data loss, and attacks on connected medical devices.

HICP is technically voluntary. In practice, it carries material regulatory weight. Public Law 116-321 (HR 7898), passed in 2021 as an amendment to the HITECH Act, requires HHS to consider whether an organization has implemented recognized security practices, including HICP, when calculating fines or conducting investigations. The "12-month rule" means that organizations documenting HICP practices in place for at least 12 months before an investigation can receive mitigated fines, reduced audit timelines, and more favorable regulatory treatment.

That legal incentive structure changes the calculus. HICP isn't a mandate, but organizations that ignore it take on measurable regulatory risk: higher fines, longer audit timelines, and less favorable treatment when HHS comes knocking.

HPH CPGs (Health and Public Health Cybersecurity Performance Goals) add another layer. Developed by HHS, these define Essential Goals and Enhanced Goals for healthcare cybersecurity, based on the 2023 Hospital Cyber Resiliency Landscape Analysis. Unlike HICP, which carries direct regulatory incentive through HR 7898, HPH CPGs are currently voluntary guidance without an equivalent enforcement mechanism. They do, however, align closely with existing HIPAA and NIST requirements and are widely understood as signaling where future regulatory expectations are heading. Organizations adopting them early are positioning themselves ahead of that trajectory.

Why this matters for GRC teams

The challenge isn't any single framework. Each one, taken individually, is manageable. The challenge is maintaining continuous, auditable security across all of them simultaneously.

A healthcare GRC team managing any combination of HIPAA obligations, HITRUST certification, NIST 800-53 controls, HICP alignment, and HPH CPG coverage is not managing separate compliance programs. They're managing overlapping control sets, shared evidence requirements, and different audit cadences across frameworks that were never designed to work together natively.

The practical reality: controls shift, evidence becomes outdated, new guidance enters scope, audit readiness becomes a moving target. And threats don't pause for your next audit cycle.

Point-in-time audits sample a handful of controls on a single day. That's a snapshot of a program that doesn't stop moving. It was always an imperfect approach. With every new framework, guidance document, and regulatory incentive that enters scope, the gap between what point-in-time audits capture and what continuous security actually requires gets wider.

What continuous looks like in practice

Moving from reactive to continuous compliance means three things need to change at the operational level.

Evidence collection has to be automated, with your team reviewing the results. Integrations pull evidence from connected systems (cloud infrastructure, identity providers, endpoint management, ticketing systems), replacing the manual cycle of emailing control owners, chasing responses, and assembling screenshots. Your GRC team then reviews that evidence against control criteria. When evidence doesn't meet standards, findings surface to the control owner for remediation. You're not relying on sampling during audit prep; you're monitoring year-round.

Controls need to be monitored year-round, not sampled once a year. Automated checks tied to each control verify that encryption, access, and logging standards remain in place continuously. When something doesn't meet criteria, your GRC team sees the finding and works with the control owner to remediate. No waiting for audit day to discover gaps.

Cross-framework mapping has to eliminate duplication. Once you map controls across frameworks (a setup task, typically handled during implementation), evidence you collect for HIPAA carries to your HITRUST and NIST programs. No duplicated collection cycles. One piece of evidence serves multiple compliance obligations.

These aren't aspirational capabilities. They're the operational baseline required to manage a healthcare compliance environment that now spans multiple frameworks, guidance documents, and regulatory expectations.

How Complyance supports this shift

Complyance unifies HIPAA, HITRUST, NIST (CSF and 800-53), and related guidance including HICP and HPH CPGs into a single operating environment where compliance obligations feed directly into evidence collection, AI review, and continuous monitoring.

Integrations pull evidence automatically from connected systems. Complyance's HIPAA Agent then reviews that evidence against HIPAA-specific control criteria and flags gaps. Your GRC team acts on findings, faster than manual review, but still under your team's oversight. The distinction matters: integrations collect, AI reviews quality, your team decides.

Continuous control monitoring ties automated checks to each control so standards are verified year-round, not just when auditors are watching. When something fails, your GRC team sees it before your auditors do.

Cross-framework mapping means that once controls are mapped across your programs, evidence carries across HIPAA, HITRUST, NIST, and other frameworks without manual recreation. No separate collection cycles for each framework.

Risk and reporting visibility connects control gaps to your risk register with financial impact quantification. Board reporting ties top risks to remediation status. Control trends track quarter-over-quarter, so your CISO can present a complete, quantified risk picture to leadership across every program.

The result: audit prep shifts from weeks of chasing evidence to reviewing continuous monitoring data. Risk remediation happens year-round instead of being rushed during audit prep. Your GRC team focuses on security work, not administrative overhead.

The bigger picture

HIPAA set the legal foundation. HITRUST made compliance certifiable. NIST gave teams a risk-based structure. HICP and HPH CPGs are adding regulatory incentives and performance targets that make the bar higher and more specific.

For GRC teams, the question is no longer whether they can meet any one of these. It's whether their program can maintain continuous, auditable coverage across all of them without burning out the team or relying on point-in-time snapshots that miss what happens between audits.

Complyance gives teams the automation, cross-framework mapping, and continuous monitoring to make that sustainable, year-round.

See how Complyance helps healthcare teams manage HIPAA, HITRUST, and NIST simultaneously without audit fire drills.

Complyance is the AI powered, end-to-end GRC platform