Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the HIPAA Security Rule?

The HIPAA Security Rule is a 2005 addition to the original Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA required the Secretary of the US Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information. 


The HIPAA Security Rule operationalizes the protections contained in the HIPAA Privacy Rule by addressing the administrative, physical, and technical safeguards that organizations called covered entities must put in place to secure individuals’ electronic protected health information or ePHI.


Specifically, covered entities must:

  • Ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit
  • Identify and protect against reasonably anticipated threats to the security or integrity of the information
  • Protect against reasonably anticipated, impermissible uses or disclosures
  • Ensure compliance by their workforce


A primary goal of the Security Rule is to protect the privacy of individuals’ health information while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care. The Security Rule is designed to be flexible and scalable so a covered entity can implement policies, procedures, and technologies appropriate for the entity’s size, organizational structure, and risks to consumers’ ePHI.

Additional resources you might like:

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Product updates
Events
Turn Every Promise into Predictable Trust: Customer Commitments in Action

Join us for a live demo of Customer Commitments and see how Vanta turns contracts into structured, actionable intelligence.

Comparisons and reviews
Blog
The 4 best Trust Center products for 2026

Compare top platforms, key features, and buying criteria to find the right fit for compliance and sales teams.

Additional resources you might like:

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Product updates
Events
Turn Every Promise into Predictable Trust: Customer Commitments in Action

Join us for a live demo of Customer Commitments and see how Vanta turns contracts into structured, actionable intelligence.

Comparisons and reviews
Blog
The 4 best Trust Center products for 2026

Compare top platforms, key features, and buying criteria to find the right fit for compliance and sales teams.

Security
Blog
How to request security budget from your CFO and exec teams

Bridge security and finance, show risk in dollars, and secure budgets.

Product updates
Blog
New in Vanta | March 2026

Vanta’s newest updates help you automate SSPs, unlock deeper integrations, and more.

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Compliance
Events
Beyond the Checkbox: Scaling Compliance Across European Regulations

Watch to learn how to scale your compliance program across NIS2, DORA, and the EU AI Act — without duplicating controls or overwhelming your team.

Product updates
Events
Goodbye, Audit Chaos. Hello, Calm-pliance.

Watch this edition of Vanta Delivers to see how we’re putting audit chaos behind us and moving forward into Calm-pliance.

Product updates
Blog
New in Vanta | February 2026

Vanta’s latest releases give teams more control over audits, automated TPRM evidence collection, and more.