The HIPAA Security Rule (45 CFR Part 164, Subpart C) sets three categories of safeguards: Administrative, Physical, and Technical. Each category lists required and addressable specifications. Required means you must implement it. Addressable means you implement it, document a reasonable equivalent, or document why neither is reasonable and appropriate. Addressable is not optional.
For a Microsoft 365 covered entity, the Technical Safeguards section is where most of the audit conversation happens. It defines unique identification, emergency access, automatic logoff, encryption, integrity verification, authentication, and transmission security. Microsoft 365 has native settings or services that satisfy each one. The challenge is wiring them all up at the same time and proving it on demand.
The checklist below organizes the controls by HIPAA section. Each item lists what the control does and the specific tenant setting that implements it. Controls in the Veri-Tech HIPAA coverage scope are paraphrased from our control registry. The registry cross-maps every HIPAA control to CIS, NIST 800-53, CISA SCuBA, and SOC 2, so a single tenant scan covers all of them at once.