Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What are the HIPAA Safeguards?

HIPAA Safeguards are the administrative, technical, and physical safeguards that covered entities are required to maintain by the terms of the HIPAA Security Rule to protect individuals’ electronic protected health information (ePHI).


The Security Rule defines Administrative Safeguards as “administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.” The Administrative Safeguards comprise more than half of the HIPAA Security Requirements. Administrative Safeguards include: 

  • Implementation of a Security Management Process
  • Designation of Security Personnel
  • Implementation of Information Access Management policies and procedures for authorizing access to ePHI
  • Provision of Workforce Training and Management
  • Performance of regular Evaluations against the requirements of the Security Rule


The Security Rule defines Technical Safeguards as “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.” The Technical Safeguards include:

  • Implementation of Access Control policies and procedures that allow only authorized persons to access ePHI
  • Implementation of Audit Controls to record and examine access and other activity in information systems that contain or use ePHI
  • Implementation of Integrity Controls, policies, and procedures to ensure ePHI is not destroyed or improperly altered
  • Implementation of technical security measures to ensure Transmission Security—guarding against unauthorized access to ePHI transmitted over an electronic network


The Security Rule defines Physical Safeguards as “physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.” The Physical Safeguards include:

  • Management of Facility Access and Control, a covered entity must limit physical access to its facilities while ensuring that authorized access is allowed
  • Implementation of Workstation and Device Security policies and procedures to specify proper use of and access to workstations and electronic media

Additional resources you might like:

Company news
Blog
Celebrating international momentum at our first-ever VantaCon UK

We’re thrilled to host our first-ever VantaCon UK in London today as we continue to accelerate international momentum and expand our global footprint.

Compliance
Event
How to Automate ISO 27001 & SOC 2 Compliance

Join Vanta’s 45-minute live product demo on 15 May at 1pm AEST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
How to demonstrate secure AI practices with ISO 42001

Join Vanta and A-LIGN for a Coffee and Compliance session on ISO 42001 —what it is, what types of organizations need it, and how it works.

Additional resources you might like:

Company news
Blog
Celebrating international momentum at our first-ever VantaCon UK

We’re thrilled to host our first-ever VantaCon UK in London today as we continue to accelerate international momentum and expand our global footprint.

Compliance
Event
How to Automate ISO 27001 & SOC 2 Compliance

Join Vanta’s 45-minute live product demo on 15 May at 1pm AEST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
How to demonstrate secure AI practices with ISO 42001

Join Vanta and A-LIGN for a Coffee and Compliance session on ISO 42001 —what it is, what types of organizations need it, and how it works.

Security
Guide
Growing pains: How to update and automate outdated security processes

Has your business outgrown its security processes? Learn how to update them in this guide.

Company news
Blog
Celebrating 1,000 reviews on G2 and our first-ever Customer Week

With over 1,000 reviews, Vanta has been named the #1 Leader in G2’s Grid® Report for Security Compliance | Spring 2024.

Compliance
Event
Automating your existing compliance program

With Vanta, you get enough flexibility to choose between a wealth of pre-built content and the ability to customize and configure the product to match your program’s needs. Curious to see this in action?

Compliance
Event
How to automate ISO 27001 & SOC 2 compliance

Join Vanta’s 45-minute live product demo on 25 April at 11 am BST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
ISO 27001 & SOC 2 compliance automation

Join Vanta’s 45-minute live product demo on 10th April at 1pm AEST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
Combating threats through a continuous compliance

In the world of cloud infrastructure, security teams frequently find themselves bouncing between tools to track alignment to compliance standards. What’s more, they must often contend with a lack of visibility into risk and potential threats.

Get compliant and
build trust, fast.

Two wind turbines on a white background.
Get compliant and build trust,
fast.
Get started