Products/HIPAA Compliance Pack

HIPAA Compliance Pack

Enterprise add-on · $199/mo

Maps 67 of your Veri-Guard M365 controls to 45 CFR Part 164 across 17 CFR sections, with Required vs. Addressable scoring per the HIPAA Security Rule. Generates CFR-cited evidence packages, gap reports, and AI-driven PHI Breach Drills — all without ever accessing the protected health information itself.

67Mapped controls
17CFR sections
§16445 CFR Part 164
PHIBreach drills

How HIPAA Compliance Pack Works

Step-by-step walkthrough from scan to evidence handoff

1

Run a Veri-Guard scan first

HIPAA Compliance Pack layers on top of your existing Veri-Guard tenant assessment. The 67 HIPAA-mapped controls are a subset of the 548 controls Veri-Guard scans across Identity, Intune, Exchange, Teams, SharePoint, and Defender. Re-runs of the underlying scan automatically refresh the HIPAA mapping.

2

Open the HIPAA Hub

From the sidebar, click HIPAA. Your dashboard shows per-safeguard status grouped by Administrative (§164.308), Physical (§164.310), and Technical (§164.312) safeguards. Each safeguard shows pass / fail with Required vs. Addressable badges and direct citations into 45 CFR Part 164.

3

Review the scope honestly

The pack assesses what Microsoft 365 can prove. It covers Technical safeguards in full, the M365-observable portion of Administrative safeguards, and a limited subset of Physical safeguards (Workstation Security §164.310(c) and Device/Media Controls §164.310(d)). It does NOT cover workforce training, BAAs, risk-analysis documentation, contingency planning, or facility access controls — those organizational safeguards require separate evidence outside of M365.

4

Generate the evidence packet

Click "Export Evidence" to produce an auditor-ready packet — per-safeguard evidence with CFR citations, the underlying M365 policy proofs, the assessment date, Required vs. Addressable scoring, and SHA-256 signed manifests. Available as PDF or DOCX, optionally white-labeled for MSP clients.

5

Run PHI Breach IR drills

Spin up AI-generated PHI breach incident response drills calibrated to your tenant's actual safeguard configuration. Scenarios are tied to your specific gaps — e.g., "an unencrypted export to a personal device" or "an unauthorized PHI disclosure via shared link." Multi-attendee runner with WORM-locked audit trail.

6

Hand off to your Privacy Officer

Evidence packets, gap reports, and PHI Breach Drill transcripts are signed, dated, and exportable for the HIPAA Privacy Officer, Business Associate auditor, or third-party HITRUST / 405(d) assessor. Public verification URLs let auditors confirm authenticity without portal access.

Data Handling

What the assessment touches, processes, stores, and explicitly never accesses

Data the HIPAA pack assesses

  • Conditional Access policies enforcing MFA and access controls (mapped to §164.308(a)(4), §164.312(a)(1))
  • Exchange encryption and S/MIME settings (mapped to §164.312(e)(1) Transmission Security)
  • Audit logging configuration in Entra and Microsoft Purview (§164.312(b))
  • Workstation security policies in Intune (§164.310(c))
  • Device/Media Controls — Intune device wipe, remote lock, encryption (§164.310(d))
  • Anti-malware and threat protection settings (§164.308(a)(1), §164.308(a)(5))
  • Information access management policies (§164.308(a)(4))

How the assessment is processed

  • 67 Veri-Guard controls are cross-mapped to 17 CFR sections in 45 CFR Part 164
  • Each control is scored Required (mandatory) or Addressable (must be implemented or documented why not)
  • Per-safeguard pass / fail status with CFR citations
  • Gap reports generated with auditor-friendly evidence narratives
  • AI Breach Drill scenarios tied to actual safeguard configuration (not generic playbooks)

What is stored after assessment

  • HIPAA gap reports with CFR citations in Azure Table Storage
  • Per-safeguard pass / fail history with assessment dates
  • Evidence packet exports (PDF / DOCX) in Azure Blob Storage (encrypted at rest)
  • PHI Breach Drill session transcripts (WORM-locked, Enterprise audit trail)
  • Retention: 3 years (Enterprise/MSP) for HIPAA-tagged artifacts

Data the HIPAA pack never accesses

  • Protected Health Information (PHI) itself — message contents, attachments, file payloads
  • Mailbox contents, OneDrive files, SharePoint document libraries
  • User passwords, MFA secrets, or recovery codes
  • Audit log content (only audit-logging configuration is assessed, not the logs themselves)
  • Patient records, clinical notes, or any ePHI stored in M365

Permissions

All read-only — HIPAA Compliance Pack inherits Veri-Guard's permissions and adds none of its own

Permission Model

HIPAA Compliance Pack inherits the read-only Microsoft Graph permissions Veri-Guard already uses. No additional Microsoft 365 permissions are required, and the pack performs no writes to your tenant. The mapping, scoring, and evidence-pack generation are all read-only post-processing of the underlying scan data.

Policy.Read.All
Read
Always

Inherited from Veri-Guard — read Conditional Access policies, named locations, and authentication methods for §164.312(a)(1) mapping

Directory.Read.All
Read
Always

Inherited from Veri-Guard — read directory objects for access-management evaluation §164.308(a)(4)

SecurityEvents.Read.All
Read
Always

Inherited from Veri-Guard — read security configurations for §164.308(a)(1) and §164.308(a)(5) mapping

Organization.Read.All
Read
Always

Inherited from Veri-Guard — read tenant metadata and licensing for safeguard prerequisite checks

Safety Controls

  • Read-only assessment — HIPAA Compliance Pack performs zero writes to your tenant
  • No PHI access — the pack assesses safeguard configuration, never the protected data itself
  • CFR-cited evidence — every assessed safeguard cites the specific 45 CFR Part 164 section
  • Required vs. Addressable distinction preserved exactly as written in the HIPAA Security Rule
  • SHA-256 signed evidence manifests for auditor verification
  • Public verification URLs let auditors confirm authenticity without portal access
  • WORM-locked PHI Breach Drill sessions — immutable audit trail
  • Honest scope — assessment clearly identifies what M365 cannot prove (BAAs, training, contingency plans)

Capabilities

Maps 67 Veri-Guard M365 controls to 45 CFR Part 164 — all from authoritative public crosswalks
Covers Technical safeguards (§164.312) in full
Covers the M365-observable portion of Administrative safeguards (§164.308)
Limited Physical safeguards: Workstation Security (§164.310(c)) and Device/Media Controls (§164.310(d))
Required vs. Addressable scoring per HIPAA Security Rule implementation specifications
CFR-cited per-safeguard evidence with M365 policy proofs
Gap reports with auditor-friendly evidence narratives
PHI Breach IR Drill generation — multi-attendee runner, WORM-locked audit trail
PDF + DOCX evidence packet export with SHA-256 signed manifests
White-label support on MSP plans for client-facing HIPAA reports
Available as a $199/mo Enterprise add-on ($166/mo annual)

Frequently Asked Questions

What does the HIPAA Compliance Pack actually assess?
It assesses the M365-observable subset of 45 CFR Part 164 — 67 Veri-Guard controls mapped to 17 CFR sections across Technical safeguards (§164.312) in full, the M365-observable portion of Administrative safeguards (§164.308), and a limited subset of Physical safeguards focused on Workstation Security (§164.310(c)) and Device/Media Controls (§164.310(d)).
What does it NOT assess?
It does not evaluate workforce training (§164.308(a)(5)), incident response procedures, risk analysis documentation, contingency plans, Business Associate Agreements (§164.308(b)), or facility access controls (§164.310(a)(1)). Those organizational safeguards must be addressed separately. A strong score on this pack is evidence of strong M365 configuration — not a substitute for a full HIPAA compliance program.
Does Veri-Tech access any actual PHI?
No. The HIPAA Compliance Pack assesses the *configuration* that protects PHI — Conditional Access policies, encryption settings, audit-logging configuration, device controls — never the protected data itself. Mailbox contents, file contents, and patient records are explicitly outside the scope of every Veri-Tech product.
Is this enough for HIPAA compliance?
No single tool achieves HIPAA compliance. The HIPAA Compliance Pack is one component of a broader compliance program. It provides strong evidence of M365 configuration that addresses the Technical and parts of the Administrative and Physical safeguards. Pair it with workforce training, signed Business Associate Agreements, an independent risk analysis, contingency planning, and a full HIPAA attestation for an audit-ready posture.
How is the PHI Breach Drill different from a generic IR drill?
PHI Breach Drills are calibrated to your tenant's actual safeguard gaps. Instead of a generic ransomware playbook, scenarios are tied to specific Required or Addressable safeguard implementations — e.g., "your audit-logging gap means a workforce-member exfil might not be detected in time to meet the 60-day Breach Notification Rule." Multi-attendee runner with WORM-locked audit trail for HIPAA Privacy Officer documentation.
Why is this an Enterprise add-on, not part of Veri-Guard?
HIPAA assessment requires the cross-framework mapping engine, CFR-citation infrastructure, and the AI Breach Drill generation that lives on the Enterprise tier. The $199/mo add-on price reflects the additional licensing and support commitments for organizations handling PHI. Annual billing at $166/mo (a $396 discount) is also available.