03. what we test
Typical ePHI system scope.
Scope follows your ePHI data flow. Any system that creates, receives, maintains, or transmits ePHI is in scope. Connected systems are typically in scope too.
Patient portal and EHR access layer
Authentication, session management, authorization between patient roles and clinician roles, data export controls. Usually the highest-risk surface from an external attacker's perspective.
API integrations — EHR, billing, lab
HL7 FHIR endpoints, billing system integrations, lab result pipelines. Third-party integrations frequently have weaker access controls than first-party surfaces. Often missed in vendor-led assessments.
Internal data access paths
Who can reach ePHI from inside the network? Database access controls, admin tooling, data warehouse permissions, logging coverage. Internal lateral movement to ePHI is the most common breach path.
Cloud storage and data pipelines
S3 / Blob / GCS buckets containing health records. ETL pipelines that touch PHI. Data lake permissions. IAM roles that can enumerate or export ePHI. Cloud misconfigurations are the leading cause of HIPAA breaches in SaaS health companies.
Audit logging validation
§164.312(b) requires audit controls that record and examine ePHI access activity. We verify that logging is present, covers the right events, and cannot be circumvented by an attacker who gains access.
Encryption in transit and at rest
§164.312(e)(2)(ii) encryption of ePHI in transit. TLS configuration, certificate validity, downgrade attack paths. At-rest encryption coverage and key management access controls.