Patient data systems
ePHI in EHR systems, patient portals, and clinical apps. Cross-patient data access — where one patient's portal account can access another's records — is the healthcare equivalent of a SaaS tenant isolation failure.
ePHI systems under HIPAA Security Rule §164.308(a)(8). Patient portals, EHR integrations, telehealth platforms, and FHIR APIs — each an attractive target. We sign a Business Associate Agreement before testing, scope to your ePHI environment, and deliver findings formatted for OCR audit readiness.
Healthcare organizations face disproportionate breach rates. PHI sells for more than credit card data on criminal markets, and systems are often legacy.
ePHI in EHR systems, patient portals, and clinical apps. Cross-patient data access — where one patient's portal account can access another's records — is the healthcare equivalent of a SaaS tenant isolation failure.
Insecure SMART on FHIR OAuth2 scope implementation, insufficiently isolated patient compartments in FHIR R4 endpoints, bulk data API access control gaps, and HL7 2.x injection through message parsing.
Video session isolation failures, recording storage access controls, prescription and visit note exposure through web app vulnerabilities, and insecure file upload handling in patient intake flows.
Weak session management, insecure password reset flows, MFA not enforced for clinical staff, and account enumeration through login error messages. Provider accounts carry full PHI access.
Billing systems, pharmacy networks, lab result delivery, and HIE connections. Each integration is an additional access path to ePHI, often with weaker security controls than the core system.
Patient-facing iOS and Android apps. Insecure local storage of PHI, missing certificate pinning, offline data caching risks, and biometric authentication bypass.
The Security Rule touches penetration testing through multiple standards. OCR enforces these during investigation and audit.
Scope is defined by your ePHI environment and agreed in writing before testing starts.
Authentication, session management, and authorization across all patient-facing and clinical-staff-facing access paths. Cross-patient record access is the primary test objective.
SMART on FHIR OAuth2 scope implementation, FHIR resource authorization, patient compartment isolation, bulk data API access controls, and HL7 2.x message parsing security.
Video session isolation, recording storage access controls, prescription and visit note exposure, and secure messaging implementation.
Revenue cycle management integrations that sit alongside PHI. PCI DSS implications if payment card data is present in the same systems.
Patient-facing iOS and Android apps. PHI stored locally, certificate pinning, offline cache handling, and biometric authentication bypass. OWASP MASVS aligned.
Storage of ePHI in S3, GCS, or Azure Blob. IAM access to ePHI datastores, logging configuration, encryption at rest and in transit. Optional add-on to the application test.
Structured for OCR audit readiness and your internal HIPAA compliance record.
Not a deliverable — a precondition. A Business Associate Agreement is executed before any testing begins. Required by HIPAA before a vendor can access ePHI-adjacent systems.
Each finding mapped to the Security Rule standard it implicates. Risk level stated in terms of likelihood and impact to ePHI confidentiality, integrity, and availability — the three-part HIPAA risk framework.
Structured findings output ready to feed your HIPAA risk analysis and risk management plan. Findings are formatted so your compliance team can reference them directly in §164.308(a)(1) documentation.
Post-fix re-validation from the same engineer. Each finding marked resolved, partially resolved, or accepted with documented rationale. Required for the OCR audit trail.
Signed by the named engineer. States methodology, ePHI scope reference, dates, and retest outcome. For your internal HIPAA compliance record and any OCR investigation response.
Every finding with reproducible exploit or step-by-step walkthrough. Your engineering team verifies before triage. No vague "sensitive data exposure" findings without proof.
Yes, always. A Business Associate Agreement is executed before any testing begins. This is a non-negotiable HIPAA requirement. Some testing vendors skip it. We don't.
A risk analysis (§164.308(a)(1)) assesses all risks to ePHI across administrative, physical, and technical safeguards. A penetration test is the technical validation: does the control actually work against an active adversary? Pentest findings feed the risk analysis. They're complementary, not interchangeable.
Yes. We test SMART on FHIR OAuth2 scope implementation, FHIR resource authorization, patient compartment isolation, bulk data API access controls, and HL7 FHIR R4 endpoint security.
Both, typically. HIPAA requires technical safeguard evaluation (satisfies §164.308(a)(8)). Enterprise health system customers also require SOC 2. One well-scoped engagement produces a report that satisfies both evidence requirements.
We document it as a finding and notify you immediately. We do not exfiltrate, store, or analyze PHI beyond what is necessary to demonstrate the vulnerability. All access is documented in the engagement log for your BAA audit trail.
30-minute scoping call covers your ePHI environment, your compliance deadlines, and the BAA. Free.