Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the HIPAA Security Rule?

The HIPAA Security Rule is a 2005 addition to the original Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA required the Secretary of the US Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information. 


The HIPAA Security Rule operationalizes the protections contained in the HIPAA Privacy Rule by addressing the administrative, physical, and technical safeguards that organizations called covered entities must put in place to secure individuals’ electronic protected health information or ePHI.


Specifically, covered entities must:

  • Ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit
  • Identify and protect against reasonably anticipated threats to the security or integrity of the information
  • Protect against reasonably anticipated, impermissible uses or disclosures
  • Ensure compliance by their workforce


A primary goal of the Security Rule is to protect the privacy of individuals’ health information while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care. The Security Rule is designed to be flexible and scalable so a covered entity can implement policies, procedures, and technologies appropriate for the entity’s size, organizational structure, and risks to consumers’ ePHI.

Additional resources you might like:

Security
Blog
How to request security budget from your CFO and exec teams

Bridge security and finance, show risk in dollars, and secure budgets.

Product updates
Blog
New in Vanta | March 2026

Vanta’s newest updates help you automate SSPs, unlock deeper integrations, and more.

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Additional resources you might like:

Security
Blog
How to request security budget from your CFO and exec teams

Bridge security and finance, show risk in dollars, and secure budgets.

Product updates
Blog
New in Vanta | March 2026

Vanta’s newest updates help you automate SSPs, unlock deeper integrations, and more.

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

SOC 2
Events
Learn How to Automate Compliance for SOC 2, ISO 27001, and More

Register to see how Vanta helps fast-moving startups and security teams get audit-ready fast and stay continuously compliant, turning compliance into a deal accelerator, not a blocker.

Compliance
Events
Beyond the Checkbox: Scaling Compliance Across European Regulations

Register to learn how to scale your compliance program across NIS2, DORA, and the EU AI Act — without duplicating controls or overwhelming your team.

Product updates
Events
Goodbye, Audit Chaos. Hello, Calm-pliance.

Watch this edition of Vanta Delivers to see how we’re putting audit chaos behind us and moving forward into Calm-pliance.

Product updates
Blog
New in Vanta | February 2026

Vanta’s latest releases give teams more control over audits, automated TPRM evidence collection, and more.

Compliance
Events
Getting Ready for APRA CPS 230/234 Compliance

Watch this on demand session to learn the most common CPS 234 readiness questions, and undersand how CPS 230 builds on these foundations.

Compliance
Events
Committed to Trust: How Our Customers Turn Promises into Proof

Watch on demand as leaders from GitHub, Modern Treasury, and Vanta’s own GRC team, dig into what it really takes to build trust into the way you work.