top of page

HIPAA Backup Compliance 2026: What the Proposed HHS Security Rule Means for Your Practice

  • Writer: Scott Pagel
    Scott Pagel
  • 18 hours ago
  • 6 min read

For the first time in more than two decades, the HIPAA Security Rule is getting a significant overhaul. In December 2024, the U.S. Department of Health and Human Services (HHS) published a Notice of Proposed Rulemaking (NPRM) that would fundamentally change how healthcare organizations protect, back up, and recover electronic Protected Health Information (ePHI).


This isn't a minor update. If finalized, it's a ground-up rewrite of the expectations placed on covered entities and their business associates as well as the organizations that wait to prepare will be the ones caught scrambling when enforcement begins.


At SafeStorz, we've spent years building backup and recovery infrastructure designed around exactly these principles. Here's what you need to know about the proposed changes, and how to make sure your backup environment can meet the bar that's coming.


Hipaa security rule change written out in blue font with the logo

What HHS Is Proposing: The Big Picture


The proposed HIPAA Security Rule changes represent the first major revision since the 2013 Omnibus Rule. The core shift is this: HHS is eliminating the "addressable vs. required" distinction that has given healthcare organizations flexibility and, in practice, an excuse not to implement critical security measures.


Under the new proposal, all implementation specifications would be required. Not recommended. Not flexible. Required.


That matters specifically for backup and recovery, where many organizations have historically treated protections as optional or "good enough." Those days are ending.


What the Proposed Rule Requires for Backup and Recovery


Here are the specific backup and recovery provisions healthcare organizations need to plan for:


Exact Retrievable Copies of ePHI


HHS proposes requiring covered entities to establish and implement a written data backup plan that includes procedures for creating and maintaining exact retrievable copies of ePHI. Not approximations. Not "most of the data." Exact, verifiable, retrievable copies.


72-Hour Recovery Window


Under the proposed rule, organizations must be able to restore critical electronic information systems and data within 72 hours of a loss event. This is a hard target and for organizations without verified backup testing in place, 72 hours can disappear fast when you're actually dealing with a ransomware incident or hardware failure.


Separate Technical Controls for Backup and Recovery


The proposal explicitly requires separate technical controls for backup and recovery of ePHI and critical electronic information systems. This means your production environment and your backup environment can't share the same attack surface. Logical separation isn't enough if both systems are accessible from the same compromised credential.


Annual Testing and Documentation of It


Under the proposed changes, organizations must review and test their contingency plans at least once every 12 months and document the results. Not just "we ran a test." Documented, verifiable evidence that recovery actually works. That documentation becomes a critical asset during a compliance audit or breach investigation.


Annual Compliance Audits


The rule proposes requiring a documented compliance audit, internal or third-party, at least once per year. If your IT infrastructure can't support an audit trail, your backup solution is already behind.


Business Associate Verification


Covered entities would be required to verify that their business associates have implemented required technical safeguards, including written certification from a subject matter expert. If SafeStorz holds or accesses your ePHI, that's exactly the level of accountability we operate at.


Why This Matters Now


The final rule isn't published yet and the current political environment adds some uncertainty about timeline. A regulatory freeze was issued by the Trump administration in early 2025, and the exact path to finalization remains fluid.


But here's the truth: the direction is clear, and the gap between where most healthcare organizations are today and where these rules require them to be is significant.


Healthcare is the single most-targeted sector for ransomware. In 2024 alone, over 44 million Americans had their healthcare data exposed due to breaches. The Change Healthcare ransomware incident affected 100 million individuals in a single event. These aren't edge cases, they're the baseline threat environment your backup strategy has to survive.


HHS estimates first-year compliance costs at approximately $9 billion across the industry. That number reflects how far behind most organizations actually are. Getting ahead of it now is far cheaper than remediating after a breach or scrambling during a compliance audit.


What a Compliant Backup Environment Actually Looks Like


Let's get practical. A backup environment that meets the proposed HIPAA Security Rule requirements has several non-negotiable characteristics:


Encryption in transit and at rest: Every backup transfer is encrypted. Every stored copy is encrypted. This isn't optional under the proposed rule, and it hasn't been smart practice to skip it for years.


Immutable, tamper-resistant backups: Ransomware specifically targets backup repositories. If your backup environment can be encrypted by the same attack that hit your production systems, you don't have a backup, you have a second target. Immutable storage means that once a backup is written, it can't be modified or deleted, even by an administrator.


Verified recoverability, not just successful backup jobs: A backup job completing successfully does not mean your data is recoverable. The proposed rule requires testing recovery. That means actually restoring data, verifying integrity, and documenting the result. If you can't tell an auditor the last time you ran a successful restore test, that's a gap that needs to close.


Separation from production environments: Backup systems need to be logically and, where possible, physically isolated from production. Shared credentials, shared networks, or backup agents running under production admin accounts are architectural vulnerabilities, not backup strategies.


Audit trails and documentation. Every backup run, every restore test, every modification to backup policy needs to be documented, timestamped, and accessible for audit.


How SafeStorz Backup Helps You Get There


SafeStorz backup solutions are built around the exact requirements the proposed HIPAA Security Rule codifies. We're not retrofitting compliance onto a generic storage product. This is the infrastructure we've been running for healthcare-adjacent clients for years.


Here's what we bring to the table:


Advanced security features to protect backups from tampering and ransomware: Our backup architecture uses immutable storage and role-based access controls, so backup data can't be encrypted or deleted by an attacker who compromises production credentials. One-click containment via Cynet XDR means threats are isolated before they can pivot to backup repositories.


Encrypted data in transit. All backup transfers across our private cloud infrastructure are encrypted end-to-end. There's no window where ePHI is moving in plaintext between your systems and ours.


Backup verification and recoverability testing. We don't just run backup jobs and hope. We perform verified restore testing, document results, and give you the audit evidence you need to demonstrate compliance. When an auditor asks when you last verified recovery of your ePHI, you'll have an answer.


Private cloud isolation that reduces your blast radius: Because SafeStorz runs a private cloud, not a shared hyperscaler environment, your backup infrastructure isn't sharing attack surface with thousands of other tenants. If another organization on AWS gets hit, that's their problem. In our environment, your data stays in your lane.


Compliance-ready documentation: We help you build and maintain the documentation that the proposed rule requires: backup policies, recovery procedures, test results, access controls, and change records.


What You Should Do Right Now


Whether the final rule lands in late 2026 or gets delayed further, the preparation is the same:


Review your current backup environment: When did you last run a verified restore test? Are your backups encrypted? Are they isolated from your production environment? These aren't future compliance questions, they're current security questions.


Identify your gaps. Most healthcare organizations have at least one of the following: unencrypted backup transfers, backups stored in the same environment as production, no documented recovery test in the last 12 months, or backup policies that haven't been reviewed in years.


Get ahead of the 72-hour recovery requirement. That window is tight. If you've never timed a full recovery scenario, you don't know whether you can hit it. Find out now, not during an incident.


Talk to SafeStorz. We offer backup assessments that map your current environment against the proposed HIPAA Security Rule requirements. We can show you exactly where you stand and what it would take to close the gap.


The PHI You're Protecting Isn't Abstract


Behind every backup job is a patient record. A prescription history. A diagnosis that someone doesn't want falling into the wrong hands. The proposed HIPAA Security Rule changes exist because the healthcare sector has been getting hit hard and the existing framework wasn't delivering adequate protection.


We take that seriously. If you're a covered entity or a business associate handling ePHI, your backup environment needs to be built for what the threat landscape actually looks like. Not for what it looked like in 2013.


SafeStorz is here to help you build it.


Learn More About Strengthening Your Backup and Security Strategy


Backup systems play an important role in protecting sensitive data and supporting compliance requirements, but they are most effective when they are part of a broader security and infrastructure strategy. SafeStorz provides resources that explore topics such as backup best practices, private cloud infrastructure, and integrated security monitoring.


If you are interested in learning more, you can explore additional materials from SafeStorz, including guidance on backup readiness, private cloud environments, and how layered security tools like XDR and managed detection and response help support overall infrastructure protection.


 
 
bottom of page