← Back to Blog

HIPAA Security Rule 2026: What Engineers Must Automate Now

hipaacomplianceregulationengineering

The HIPAA Security Rule NPRM (2026) adds 15 new cybersecurity requirements. Most compliance articles explain them in legal language. This one explains them in code.

vlayer already covers all 15. Here's what each one means for your CI/CD pipeline.

The 9 requirements you can automate today

1. Multi-Factor Authentication (HIPAA-MFA-001)

Rule: All access to ePHI must enforce MFA. No exceptions.

What vlayer checks: Login and auth endpoints that don't verify an MFA token or claim.

// Fails: login without MFA verification
export async function POST(req: Request) {
  const { email, password } = await req.json();
  const user = await authenticate(email, password);
  const token = jwt.sign({ userId: user.id }, SECRET);
  return Response.json({ token });
}
CRITICAL  HIPAA-MFA-001
  Authentication endpoint does not enforce multi-factor authentication
  File: app/api/auth/login/route.ts:2
  HIPAA: 45 CFR §164.312(a)(2)(i)

2. Encryption at Rest (HIPAA-ENC-REST-001)

Rule: All ePHI must be encrypted with AES-256 or stronger at rest.

What vlayer checks: Database connections without encryption, PHI in localStorage/cookies, unencrypted backups.

// Fails: database without encryption config
const pool = new Pool({
  connectionString: process.env.DATABASE_URL,
  ssl: false, // ePHI stored without encryption at rest
});
CRITICAL  HIPAA-ENC-REST-001
  Database connection has SSL disabled — ePHI may be unencrypted at rest
  HIPAA: 45 CFR §164.312(a)(2)(iv)

3. Session Timeout (HIPAA-SESSION-001)

Rule: Sessions must auto-expire within 15 minutes of inactivity.

// Fails: session maxAge set to 24 hours
const session = {
  maxAge: 86400000, // 24h — exceeds HIPAA 15-min requirement
  secure: true,
};
HIGH  HIPAA-SESSION-001
  Session timeout exceeds HIPAA 15-minute idle requirement
  HIPAA: 45 CFR §164.312(a)(2)(iii)

4. Immediate Access Revocation (HIPAA-REVOKE-001)

Rule: When a user is deactivated, all their active sessions and tokens must be invalidated immediately.

What vlayer checks: User deactivation/deletion code that doesn't include token revocation logic.

5. Breach Notification (HIPAA-BREACH-001)

Rule: Automated breach detection with 24-hour notification capability.

What vlayer checks: Security error handlers without breach notification integration.

6. Network Segmentation (HIPAA-SEGMENT-001)

Rule: PHI services must be network-segmented from non-PHI services.

What vlayer checks: CORS origin: * on PHI endpoints, missing VPC/subnet configuration.

7. Technology Asset Inventory (HIPAA-ASSET-001)

Rule: Maintain an inventory of all systems that process or store ePHI.

What vlayer checks: Scans for database connections, storage services, and third-party integrations to auto-generate an asset inventory.

8. ePHI Flow Mapping (HIPAA-FLOW-001)

Rule: Document how ePHI flows through your system — input, processing, storage, output.

What vlayer checks: Traces PHI data paths through your codebase and generates a flow map.

9. Vulnerability Scanning (HIPAA-PENTEST-001)

Rule: Automated vulnerability scanning must be integrated into CI/CD.

What vlayer checks: Presence of scanning tools (Dependabot, Snyk, Trivy) in your CI configuration.

HIGH  HIPAA-PENTEST-001
  No automated vulnerability scanning detected in CI/CD configuration
  HIPAA: 45 CFR §164.308(a)(8)

How to check all 15 in one command

npx vlayer scan ./src

vlayer checks all 9 automatable HIPAA 2026 requirements on every scan. The remaining 6 (physical safeguards, workforce training, BAA management, contingency planning, security officer designation, risk analysis) are organizational — vlayer provides templates for those.

npx vlayer templates list

The enforcement date is coming. Automate what you can now and document the rest.