Table of Contents

Reach SOC 2 Compliance in 6 Weeks or Less.

  / ISO 27001 Penetration Testing: What Auditors Expect and How to Deliver It

ISO 27001 Penetration Testing: What Auditors Expect and How to Deliver It

ISO 27001 does not use the words “penetration test” anywhere. And yet, auditors conducting Stage 2 assessments routinely expect to see one

Understanding why that gap exists, and how to close it, is what separates organizations that sail through ISO 27001 certification from those that get caught off-guard.

This guide covers what the standard actually says about security testing, which controls drive the expectation for penetration testing, what types of testing are relevant, and how to build a testing programme that genuinely supports your ISMS rather than simply ticking a compliance box.

ISO 27001 Pentesting

What Is Penetration Testing in the context of ISO 27001?

ISO 27001 penetration testing refers to structured, simulated attacks conducted against an organization’s systems, networks, and applications in order to identify exploitable vulnerabilities before real attackers do. In the context of ISO 27001, it serves a specific purpose: providing evidence that the technical controls underpinning your Information Security Management System (ISMS) actually work under real-world conditions.

The distinction matters. A vulnerability scan tells you what weaknesses exist whilst a penetration test tells you whether those weaknesses are exploitable, to what degree, and with what consequence. That difference is exactly what auditors are looking for when they ask for testing evidence.

Penetration testing is not an isolated activity in an ISO 27001 programme. Its findings feed directly into three of the most scrutinised documents in your ISMS: the risk register, the risk treatment plan, and the Statement of Applicability (SoA). A risk listed in your register as “medium” looks very different once a tester has demonstrated they can chain it into a full domain compromise.

Is Penetration Testing a Requirement for ISO 27001?

No, it is not explicitly required. The standard does not mandate it by name.

What ISO 27001 does require is that organisations establish and maintain a functioning ISMS, perform systematic risk assessments (Clause 6.1.2), implement appropriate controls (Clause 8), evaluate the performance and effectiveness of those controls (Clause 9), and pursue continual improvement (Clause 10). Vulnerability assessment and penetration testing supports every one of those activities with hard evidence.

Two Annex A controls make it practically impossible to demonstrate compliance without some form of penetration testing: A.8.8 (Management of Technical Vulnerabilities) and A.8.29 (Security Testing in Development and Acceptance). Auditors conducting Stage 2 assessments will expect to see testing evidence mapped to both. Organisations that substitute a vulnerability scan report and call it done regularly receive non-conformances.

The absence of an explicit penetration testing requirement is sometimes misread as permission to skip it. In practice, certified auditors universally expect evidence of testing that goes beyond automated scanning. Relying solely on scan reports is the fastest route to a failed audit.

What ISO 27001:2022 Says About Security Testing

Annex A 8.29: Security Testing in Development and Acceptance

Annex A 8.29 requires organisations to define and implement security testing processes throughout the development lifecycle and before final acceptance of any system. This applies to both in-house development and outsourced or third-party software.

The control is preventive in nature. Its purpose is to ensure that no application, database, or system goes into production with known, unmitigated vulnerabilities. For in-house development, the standard specifically references conducting code reviews, performing vulnerability scans, and carrying out penetration tests to identify weak coding and design. For outsourced environments, organisations must set contractual requirements that ensure suppliers meet equivalent security testing standards, accepting a supplier’s assurance without evidence is not sufficient.

Annex A 8.29 does not prescribe specific tools or techniques. What it demands is that testing is risk-based, documented, and proportionate to the sensitivity and exposure of the system. A low-risk internal tool used by five people warrants a different level of scrutiny than a customer-facing payment platform. Security testing should scale with risk, and it should happen throughout development, not only at the end.

Worth knowing: Annex A 8.29 consolidates two controls from ISO 27001:2013, specifically A.14.2.8 (System security testing) and A.14.2.9 (System acceptance testing), into a single, clearer requirement. The 2022 version makes the expectation of penetration testing more explicit, particularly for major releases and architectural changes.

Auditors will ask to see signed penetration test reports or independent security audit summaries for recent major system updates. If such evidence does not exist, they have grounds to mark the control as non-compliant.

Annex A 8.8: Management of Technical Vulnerabilities

Annex A 8.8 is the vulnerability management control. It requires organisations to identify, assess, and address technical vulnerabilities in a timely manner, taking a proactive and risk-based approach rather than reacting only when something breaks.

Crucially, the control explicitly lists periodic, documented penetration tests, conducted either by internal staff or by a qualified third party, as a method for identifying vulnerabilities. Automated scanners have their place, but penetration tests are recognised here as the mechanism for discovering high-risk weaknesses that scanners routinely miss: logic flaws, chained vulnerabilities, privilege escalation paths, and misconfigurations that only become dangerous in combination.

Annex A 8.8 replaces two controls from ISO 27001:2013: A.12.6.1 (Technical vulnerability management) and A.18.2.3 (Technical compliance review). The 2022 version introduces a broader, more holistic approach, including the organisation’s public responsibilities, the role of cloud providers, and the expectation that vulnerability management is integrated with change management rather than treated as a separate activity.

Reach SOC 2 Compliance in 6 Weeks or Less

Schedule Your Free SOC 2 Assessment Today

The Role of Penetration Testing in ISO 27001 Compliance

Risk Assessment and Treatment

ISO 27001’s risk-based model sits at the core of everything. Penetration testing feeds that model with real-world evidence rather than hypothetical assumptions. When a tester demonstrates that an attacker can move laterally from a compromised workstation to a production database in four steps, that finding transforms what was previously a theoretical risk into a documented, evidenced vulnerability with a severity rating, an exploitability score, and a required remediation action.

This evidence directly informs how risks are treated. ISO 27001 requires organisations to choose one of four treatment options for each risk: mitigate, accept, avoid, or transfer. Without penetration test data, those decisions rest on estimation. With it, they rest on proof. If you haven’t yet mapped your current control gaps against what testers are likely to find, an gap analysis is a useful starting point before commissioning a test.

Security Controls Validation

Your ISMS documentation asserts that certain controls are in place and working. Penetration testing verifies whether that is actually true. Network segmentation, multi-factor authentication, access restrictions, encryption in transit: these can all appear correctly configured on paper while being trivially bypassable in practice.

According to NIST Special Publication 800-115, organisations should conduct analysis and reporting that translates penetration test findings into concrete risk mitigation actions. Mapping each finding to a specific Annex A control, and documenting whether that control withstood or failed the test, is precisely the kind of evidence that satisfies an auditor and strengthens your SoA.

Monitoring and Continual Improvement

ISO 27001’s Clause 10 requires continual improvement of the ISMS. Penetration testing is one of the most direct mechanisms for driving that improvement. Each test cycle identifies new weaknesses, confirms previous remediations are holding, and adjusts your risk picture to reflect changes in the threat landscape and your own infrastructure. An annual penetration test programme, properly integrated with your risk register, is a living feedback loop rather than a point-in-time snapshot.

Types of Penetration Testing for ISO 27001

ISO 27001 · ISMS-Scoped
Penetration Testing Categories
Every asset type within scope is a candidate for testing proportionate to its risk profile
ISMS scope boundary
Network Infrastructure
Routers, firewalls, switches and remote access controls
Annex A 8.20
Web Application Security
Injection attacks, broken auth and business logic flaws
Wireless Testing
Wi-Fi networks, rogue access points and weak encryption
Application & API Security
Auth weaknesses, data exposure and rate-limiting gaps
Annex A 8.29
Social Engineering
Phishing and pretexting to assess personnel controls
Annex A 6.3
Mobile Security
Insecure data storage and transport layer security gaps
Remote Working Assessment
VPN configs, endpoint controls and cloud access paths
Firewall Configuration Review
Rule sets, zone configs and permissive policy drift
Scope: all asset types within the ISMS boundary are candidates for testing
Annex A control mapped

The scope of penetration testing for ISO 27001 should align with the boundaries of your ISMS. Every asset type that falls within scope is a candidate for testing proportionate to its risk profile. The following categories represent the most relevant testing types for organisations pursuing or maintaining certification.

Network Infrastructure Testing evaluates routers, firewalls, switches, intrusion detection systems, and remote access controls. Testers attempt to bypass network defences, pivot between segments, and exploit protocol weaknesses. This directly validates Annex A 8.20 (Secure network architecture).

Web Application Security Testing assesses internet-facing applications for vulnerabilities including injection attacks, broken authentication, insecure direct object references, and business logic flaws. The OWASP Top 10 provides a widely accepted reference framework for this type of testing.

Wireless Testing examines the security of Wi-Fi networks, including rogue access points, weak encryption configurations, and captive portal bypasses. Wireless environments are frequently underscoped in ISO 27001 programmes despite representing a meaningful attack surface.

Application and API Security Review assesses internal and external APIs for authentication weaknesses, excessive data exposure, rate-limiting failures, and injection vulnerabilities. As API-driven architectures become the norm, this testing type has grown in direct relevance to Annex A 8.29 compliance.

Social Engineering Testing simulates phishing campaigns and pretexting attempts to assess whether personnel controls are effective. This type directly informs people-focused controls including Annex A 6.3 (Information security awareness, education and training).

Mobile Security Testing reviews mobile applications and their backend interactions for insecure data storage, weak authentication, and insufficient transport layer security.

Remote Working Assessment evaluates the security of remote access infrastructure, VPN configurations, endpoint controls, and cloud access pathways. Given the permanent shift to hybrid working in most organisations, this assessment type is increasingly relevant to any ISMS scope.

Firewall Configuration Review examines rule sets, zone configurations, and egress controls to identify permissive rules, redundant exceptions, and policy drift that may have accumulated over time.

Penetration Testing Perspectives and Methodologies

The perspective from which a penetration test is conducted determines what it can realistically find. Choosing the right methodology for each testing context is part of scoping effectively. For a deeper look at the trade-offs involved, see our guide on automated vs manual penetration testing.

Black Box Testing provides the tester with no prior knowledge of the target environment. This most closely simulates an external attacker who has done reconnaissance but has no insider access. It is realistic in terms of attack simulation but may miss issues that require architectural understanding to identify.

Grey Box Testing gives the tester partial information: network diagrams, application credentials, or high-level architecture documentation. This is often the most practical approach for ISO 27001 engagements because it balances realism with efficiency. The tester can focus on meaningful attack paths rather than spending engagement time on reconnaissance.

White Box Testing provides full access to source code, architecture documentation, and configuration details. This is the most thorough approach and is particularly relevant to Annex A 8.29, where the goal is to identify insecure coding patterns and design flaws before deployment.

Pro Tip

For most organizations pursuing ISO 27001 certification, a combination of grey box external testing and white box application testing offers the best return on investment. The former validates perimeter and infrastructure controls; the latter directly evidences Annex A 8.29 compliance for development environments.

What Should an ISO 27001 Penetration Test Plan Include?

A penetration test without a documented plan produces findings that are difficult to defend in an audit. The plan should define the scope (which systems, IP ranges, and applications), the testing methodology (black, grey, or white box), the testing window, rules of engagement, and who has authorised the engagement.

The resulting report should include an executive summary that maps findings to business impact, a technical findings section with severity ratings tied to a recognised scoring system such as CVSS, remediation guidance for each finding, and a retesting section that confirms whether fixes are effective. Findings should be explicitly mapped to Annex A controls wherever possible. An auditor reviewing this report should be able to trace each finding to a specific risk, a treatment decision, and an outcome.

Critically, penetration test documentation should be stored in your organisation’s native ISMS repositories, your SharePoint, Confluence, or equivalent. Findings sitting inside a third-party tool’s dashboard are not visible to auditors and do not demonstrate management ownership or oversight.

How Penetration Testing Supports Your ISMS

In-House Development Environments

For organisations that develop software internally, Annex A 8.29 requires that security testing is embedded in the development lifecycle, not bolted on at the end. Penetration testing is listed specifically as a method for identifying weak coding and design. The practical expectation is that significant releases and architectural changes are subject to an independent penetration test before promotion to production. “Independent” is the operative word: internal developers testing their own code does not meet the requirement.

Outsourced Development Environments

Where development is delegated to a third party, the organisation remains responsible for security outcomes. Annex A 8.29 requires that contractual arrangements include security testing requirements, and Annex A 5.20 (Supplier relationships) establishes the broader framework for managing supplier security obligations. Accepting a vendor’s self-attestation in lieu of test evidence introduces risk that auditors will probe.

Structural and Organisational Changes

Penetration testing should not be a purely calendar-driven exercise. Any significant change, a cloud migration, a new application, a network rearchitecture, an acquisition, reintroduces risk that existing controls may not adequately address. ISO 27001’s change management requirements (Annex A 8.32) and continual improvement obligations both support the case for trigger-based testing in addition to annual cycles.

ISO 27001:2022 vs ISO 27001:2013: Changes to Security Testing Requirements

What Changed in Annex A 8.29 for ISO 27001:2022

The 2022 update consolidated Annex A 14.2.8 (System security testing) and A.14.2.9 (System acceptance testing) from the 2013 standard into a single, clearer control: A.8.29. The consolidation is not merely administrative. The new control is more explicit about the requirement for security testing in both the development phase and at acceptance, for both in-house and outsourced environments.

The 2022 version also places greater emphasis on the idea that testing must be risk-based and documented, not performed as a routine checklist exercise. Auditors under the 2022 standard are expected to check not only that testing occurred, but that test plans linked security requirements to test cases, that findings were triaged appropriately, and that remediation was verified before sign-off. This is a meaningful shift from how many organisations approached the 2013 requirements.

How ISO 27001:2013 Approached Acceptance Testing

Under the 2013 standard, acceptance testing (A.14.2.9) was largely focused on confirming that new systems met predefined acceptance criteria before deployment. Security testing (A.14.2.8) addressed systematic testing of systems against defined security requirements. The two controls were related but treated separately, and in practice many organisations satisfied them with functional test results rather than dedicated security testing. The 2022 consolidation closes that gap by making security validation in both development and acceptance a single, unified expectation. Organisations still working toward transition should also review the common ISO 27001 pitfalls that trip up programmes during this shift.

How to Maintain ISO 27001 Certification Through Ongoing Penetration Testing

Certification is not a destination. Annual surveillance audits and three-yearly recertification audits require ongoing evidence that your ISMS is functioning, including that security testing is current and that findings are being acted upon.

The practical standard for maintaining certification through penetration testing involves testing at least annually, with additional targeted tests following material changes to systems or infrastructure. Tests should be completed six to eight weeks before any scheduled audit to allow time for remediation. Maintain a remediation log that maps each finding to a closure date and a verification test, and formally accept in writing any residual risk that cannot be fully remediated before the audit.

The risk register and Statement of Applicability should always reflect the most recent test cycle. If a penetration test uncovered a weakness in network segmentation six months ago and your SoA still describes segmentation as fully effective, an auditor will notice the inconsistency. For organisations building out or reassessing their current testing programme, starting with an ISO 27001 gap analysis is an effective way to prioritise where testing effort is most urgently needed.

Organisations that are new to this process or working through a transition to the 2022 standard often benefit from working with an experienced ISO 27001 consultant who can align the testing programme with audit expectations from the outset. Equally, pairing your penetration testing evidence with a rigorous ISO 27001 internal audit process, or using dedicated internal audit services, ensures that findings are properly integrated into your ISMS before an external auditor arrives.

If you are ready to build a penetration testing programme that holds up under audit scrutiny, or need support aligning your existing testing evidence with ISO 27001 requirements, contact us to discuss your situation. You may also find it useful to learn more about how compliance automation tools can support your broader ISMS programme.

Axipro Author

Picture of Pedro Dias

Pedro Dias

Pedro has been writing online for over 10 years. With experience in all things programming, cyber security, and compliance, he is our editor-in-chief at Axipro.

Blog Highlights

Explore More Articles

The world’s first comprehensive AI law is not a single switch that flips on in August 2026. It is a layered regulation that has been activating in stages since February 2025. As of May 2026, it is already being rewritten to give companies more time on the hardest parts. Anyone trying to plan around a single deadline is working from a map that no longer matches the territory. The law’s reach is also global. Just as GDPR exported European privacy norms worldwide, the EU AI Act is producing a Brussels Effect for artificial intelligence: a regulation drafted in Europe that becomes the de facto global standard. Companies in the US, the UK, Bahrain, and anywhere else with EU customers or EU-facing outputs are already in scope, whether or not they have a European office. This guide cuts through the noise. It explains what the EU AI Act actually requires, who it applies to, which rules are already live, which were just pushed back by the EU’s recent simplification deal, and what the penalties really look like for companies of different sizes. What Is the EU AI Act? The EU AI Act (Regulation (EU) 2024/1689) is a horizontal law that sets harmonised rules for developing, placing on the market, and using artificial intelligence systems across the European Union. It is the first comprehensive AI law passed by any major regulator anywhere in the world, and it entered into force on 1 August 2024. The Act takes a risk-based approach. Rather than regulating AI as a single category, it sorts AI systems into tiers based on the harm they could cause to health, safety, or fundamental rights. The higher the risk, the stricter the obligations. Prohibited uses are banned outright. High-risk uses are heavily regulated. Most everyday AI — like spam filters and product recommenders — is left alone. The law also creates a separate, parallel regime for general-purpose AI (GPAI) models, the foundation models behind systems like ChatGPT, Claude, and Gemini. That regime is enforced at the EU level rather than at the national level. Why Was the EU AI Act Created? The official answer is to foster trustworthy AI in Europe. The real answer is broader: the EU watched generative AI go mainstream in late 2022 and concluded that existing law — particularly GDPR — was not enough to address the specific risks AI systems pose. Opacity in decision-making, bias in hiring tools, biometric surveillance, and the manipulation potential of generative models all sat uneasily in the regulatory gap between data protection law and product safety law. The EU’s stated goals are to protect health, safety, and fundamental rights, while preserving innovation and the single market. The political subtext is the Brussels Effect: do for AI what GDPR did for privacy, and let European rules become the global default by virtue of market access. Brazil, Canada, the UK, several US states, and Gulf jurisdictions, including Bahrain, are already drafting AI rules that borrow heavily from the EU framework. For a broader view of how AI governance is likely to evolve through the end of the decade, the trajectory is already becoming clear. Who Does the EU AI Act Apply To? The Act does not apply to AI itself. It applies to people and organisations that build, sell, or use AI systems. Article 3 defines those roles without reference to company size, so a two-person startup is in scope on the same legal basis as a Fortune 500 enterprise. Providers and Developers A provider is anyone who develops an AI system — or has one developed — and places it on the EU market or puts it into service under their own name or trademark. Providers carry the heaviest load of obligations, particularly for high-risk systems: risk management, technical documentation, conformity assessment, post-market monitoring, and incident reporting. A provider is distinct from a downstream developer who simply integrates a third-party AI component. But the line moves: if you take a general-purpose model and put your name on the resulting product, you can become a provider yourself. Deployers and Operators A deployer is anyone using an AI system in a professional capacity. If you are a bank running a credit-scoring model you bought from a vendor, you are a deployer. Deployers have lighter obligations than providers but still carry real ones: ensuring human oversight, monitoring system behaviour, informing affected individuals, and conducting fundamental rights impact assessments where required. The term operator in the Act is an umbrella that covers providers, deployers, importers, distributors, and authorised representatives. Application Outside the EU This is where many non-EU companies get caught. The AI Act applies extraterritorially. A US LLC training a model in Texas, a UK firm running an AI hiring tool, or a Bahrain-based fintech using AI for credit scoring is in scope the moment the output affects someone in the EU. If a US company develops an AI hiring tool and a German employer uses it on German candidates, the US provider is in scope — even with no EU office. The trigger is whether the system’s output is used in the Union, not where the company sits. Pro Tip: Selling AI tools to EU customers outside the EU. If you sell AI tools to EU customers from outside the EU, you must appoint an authorised representative established in a Member State before placing high-risk systems on the market. This is not optional and is one of the most commonly missed obligations for non-EU providers. The Risk-Based Approach: How the EU AI Act Classifies AI Systems The framework sorts AI systems into four tiers. The obligations scale with the tier. Unacceptable Risk: Prohibited AI Practices Article 5 prohibits eight categories of AI practice outright. These prohibitions became enforceable on 2 February 2025, well before the rest of the Act. The banned practices are: Subliminal or manipulative techniques are designed to distort behaviour and cause significant harm. Exploitation of vulnerabilities related to age or disability. Social scoring by public or private actors —

Phase 1 of the Cybersecurity Maturity Model Certification program went live on November 10, 2025. From that date, the Department of Defense can write CMMC requirements directly into new solicitations, and contractors who handle even basic government data cannot win awards without a current CMMC status in the Supplier Performance Risk System (SPRS). For roughly 63 percent of the Defense Industrial Base, that means Level 1: 15 foundational safeguards, an annual self-assessment, and a signed affirmation from a senior official. Level 1 is the smallest version of CMMC. It is also the one most contractors are about to encounter first, and the one with the highest false-confidence rate. This guide covers every requirement, every assessment objective, and every step from scoping to SPRS submission. What Is CMMC Level 1? CMMC Level 1 (Foundational) is the entry tier of the Cybersecurity Maturity Model Certification program, codified in 32 CFR Part 170. It requires defense contractors who handle Federal Contract Information (FCI) to implement 15 basic safeguarding practices and to confirm that implementation through an annual self-assessment. The 15 practices come directly from FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems, a clause that has technically applied to federal contractors since 2016. What CMMC added is an assessment methodology and a verification mechanism. Until CMMC, no one was checking whether contractors actually did the 15 things they were contractually obligated to do. Under the final CMMC Program Rule, effective December 16, 2024, that gap is closed. Earlier CMMC drafts described Level 1 as a 17-practice framework because three physical-protection requirements were listed separately. The final rule consolidates them, and the official count now sits at 15 practices with 17 underlying assessment objectives drawn from NIST SP 800-171A. Both numbers are correct, depending on which level of granularity you are working at. What Is the Purpose of CMMC Level 1? The purpose is narrow and specific: to protect FCI from unauthorized disclosure.  FCI is information the federal government either generates or receives during contract performance that is not intended for public release. Think proposal correspondence, delivery schedules, performance reports, and routine contract communications. None of it is classified. None of it is even particularly sensitive in the traditional sense. But aggregated across thousands of contractors and exposed to adversaries, it gives a meaningful picture of what the U.S. government is buying, from whom, and on what timeline. Level 1 exists because too much of the Defense Industrial Base was failing to apply even basic hygiene to that data. CMMC Level 1 turns inconsistent expectations into a yearly verification cycle. CMMC Level 1 Scope The CMMC Assessment Scope for Level 1 is defined in the official DoD CMMC Level 1 Scoping Guide. It covers every information system that processes, stores, or transmits FCI, along with the people, processes, and physical facilities that interact with those systems. In practical terms, scope includes workstations and servers that handle FCI, cloud services used to store or transmit FCI, email systems used to send or receive FCI, file-sharing platforms holding FCI documents, network infrastructure carrying FCI traffic, physical facilities where any of the above are located, and personnel with access to any of the above. Anything that does not touch FCI is out of scope. This is the simplest scoping model in CMMC, and it is also where most contractors trip up. The temptation is to declare a narrow scope (“just the one folder on the file server”) and ignore the email, the laptops, and the backups. Auditors and primes will not accept it. CMMC Level 1 Requirements: All 15 Practices Explained The 15 practices fall across six domains. Each is mapped to a NIST SP 800-171 control identifier, but Level 1 only assesses the subset of objectives relevant to FCI. Access Control (AC) AC.L1-B.1.I – Authorized Access Control Practice: Limit information system access to authorized users, processes acting on behalf of authorized users, or devices. Maintain a current list of users, processes, and devices authorized to access systems holding FCI. This means active user-account management: unique identifiers for each user, accounts disabled promptly when employment ends, and a documented process for reviewing who has access and why. Shared credentials are not acceptable. This is the foundation every other access control practice is built on, and it is where many contractors have their first reckoning with how loosely their environments have actually been managed. AC.L1-B.1.II – Transaction and Function Control Practice: Limit information system access to the types of transactions and functions that authorized users are permitted to execute. Apply the principle of least privilege. A user with access to read FCI does not automatically get access to delete it, share it externally, or modify system configurations. Role-based access controls (RBAC) satisfy this requirement. In practice, this means auditing what each role can actually do in your systems and trimming permissions down to what is genuinely necessary for the job function. AC.L1-B.1.III – External Connections Practice: Verify and control or limit connections to and use of external information systems. Know what external systems your in-scope environment connects to — cloud storage, partner networks, contractor laptops on home Wi-Fi — and apply controls to those connections. Acceptable Use Policies, VPN requirements, and explicit allow-lists for external sharing all map here. The key word is verify: you need documented evidence that external connections are inventoried and controlled, not just assumed to be fine. AC.L1-B.1.IV – Control Public Information Practice: Control information posted or processed on publicly accessible information systems. Make sure FCI does not end up on your public website, your company blog, or any other publicly accessible system. This is mostly a process control: establish who is allowed to publish to public-facing systems and what review happens before anything goes live. It sounds obvious, but incidents involving inadvertent FCI disclosure through company websites and public repositories are more common than the industry likes to admit. Identification and Authentication (IA) IA.L1-B.1.V – Identification Practice: Identify information system users, processes acting on behalf of users, or devices. Every user,

Risk analysis failures sit behind 76% of HIPAA enforcement actions in 2025, according to The HIPAA Journal’s annual breach report. That single statistic explains why healthcare organizations and their business associates are rethinking how they manage HIPAA. Its no longer enough to conduct an annual policy review, it is now a continuous control problem. Drata fits that shift. It is a security and compliance automation platform that connects to the systems where PHI lives, maps controls to the HIPAA Privacy, Security, and Breach Notification Rules, and keeps evidence current between formal assessments. This guide covers what Drata actually does for HIPAA: which rules it addresses, how the automation works in practice, what it leaves to humans, and how readiness compares to running parallel frameworks like SOC 2. What Is HIPAA and Why Does Compliance Matter? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is the U.S. federal law governing the protection of protected health information (PHI). It applies to two categories of organizations: covered entities (health plans, healthcare clearinghouses, and most providers) and business associates, a category that captures any vendor, SaaS company, or service provider that creates, receives, maintains, or transmits PHI on behalf of a covered entity. Enforcement is led by the HHS Office for Civil Rights (OCR). Penalties scale with culpability, capped at roughly $2.1 million per violation category per year after inflation adjustments. OCR’s 2025 enforcement priorities were almost entirely focused on the Security Rule, particularly the requirement to conduct a thorough, organization-wide risk analysis. The agency has confirmed that 2026 will follow the same playbook, with risk management evidence (proof that identified risks are being actively reduced) becoming a separate focus area in its own right. Healthcare also remains the most expensive sector for breaches. IBM’s 2024 Cost of a Data Breach Report put the average healthcare breach at $9.48 million, more than double the cross-industry average. The cost is not abstract: in 2025, OCR penalties for risk analysis failures ranged from $25,000 against small practices up to $3 million against a national medical supplier following a phishing-driven breach. What Is Drata and How Does It Support HIPAA Compliance? Drata is a GRC automation platform that integrates with cloud infrastructure, identity providers, HRIS systems, ticketing tools, and endpoint management to continuously collect evidence and test controls against more than 30 compliance frameworks. HIPAA was added in late 2021 as Drata’s third framework, joining SOC 2 and ISO 27001. For HIPAA specifically, Drata does not certify anyone; there is no formal HIPAA certification anyway, but it operationalizes the work that OCR expects to see when an investigation lands. That includes mapped controls for administrative, physical, and technical safeguards; policy templates for HIPAA-specific requirements like the Business Associate Agreement; embedded workforce training; an integrated risk management module; and an evidence library that auditors and counsel can access during a review. Worth Knowing: There is no government-issued HIPAA certification. Any vendor claiming to make you “HIPAA certified” is using marketing language. What auditors and OCR investigators actually look for is documented, ongoing compliance with the three HIPAA Rules. Drata’s value sits in producing that documentation continuously rather than retroactively. For a deeper look at what formal certification actually involves in adjacent frameworks, see our guide to HIPAA certification. Key HIPAA Requirements Drata Helps You Address HIPAA consists of three operative rules, each with distinct compliance obligations. Drata’s control library maps to all three. HIPAA Privacy Rule The Privacy Rule governs the use and disclosure of PHI in any form: electronic, paper, or verbal. It defines 18 specific identifiers that constitute PHI, sets the minimum necessary standard, and gives patients rights of access, amendment, and accounting of disclosures. Drata supports this through policy templates (notice of privacy practices, minimum necessary use, patient rights procedures), access tracking through integrations with identity providers, and workforce training that covers permissible uses and disclosures. HIPAA Security Rule The Security Rule is where most enforcement activity happens. It applies specifically to electronic PHI (ePHI) and requires three categories of safeguards: administrative, physical, and technical. According to HHS, the Security Rule “requires implementation of appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of electronic protected health information.” Drata’s control library maps directly to the 45 CFR Part 164 implementation specifications, both required and addressable. HIPAA Breach Notification Rule The Breach Notification Rule requires notification to affected individuals, HHS, and, for breaches affecting 500 or more residents of a state, the media, no later than 60 days after discovery. Drata supports breach response through incident management workflows, policy templates that codify the four-factor risk assessment, and audit trails for breach documentation. The platform does not file your OCR breach report for you; that remains a human task, but it keeps the underlying evidence organized. Important: OCR has explicitly stated that breach notification failures were the second most common reason for a financial penalty in 2025. More than one-fifth of enforcement actions included a breach notification violation. The 60-day clock starts at discovery, not at confirmation, so detection latency directly increases legal exposure. How Drata Automates HIPAA Compliance Automation in Drata operates on four layers: evidence collection, control monitoring, gap detection, and integration with healthcare-relevant tools. The combination is what produces the continuous compliance posture that OCR is now effectively demanding through its risk management initiative. Automated Evidence Collection for HIPAA Audits Drata reports that its platform automates roughly 80% of evidence collection across frameworks. For HIPAA, that means pulling configuration data from AWS, Azure, or GCP; enrollment status from MDM tools like Jamf or Intune; SSO and MFA enforcement from Okta or Entra ID; and onboarding/offboarding records from HRIS platforms. Instead of screenshotting these on demand for an auditor, the platform timestamps and stores them on a continuous basis. Real-Time HIPAA Compliance Monitoring The platform runs automated tests against connected systems daily. If MFA is disabled on an administrator account that has access to a system holding ePHI, the relevant control flips to failing status and the owner