Breach Response Procedure
Incident Response Plan
Step 1: Detection and Containment (< 1 hour)
Step 1: Detection and Containment (< 1 hour)
Immediate Actions:Documentation: Create incident ticket in
- Detect: Automated alert or manual discovery
- Isolate: Quarantine affected systems immediately
- Preserve Evidence: Take snapshots, preserve logs
- Notify: Alert HIPAA Security Officer
incidents/INC-YYYYMMDD-001Step 2: Assessment (< 24 hours)
Step 2: Assessment (< 24 hours)
Determine Breach Scope:Risk Assessment: Determine if breach notification required
- Number of individuals affected
- Types of PHI involved (SSN, diagnosis, etc.)
- When breach occurred
- How breach occurred
- Who had unauthorized access
Step 3: Notification (< 60 days)
Step 3: Notification (< 60 days)
Notification Requirements (if ≥500 individuals affected):
- Individuals: Written notification within 60 days
- HHS: Notification within 60 days
- Media: Notification if in same state/jurisdiction
- Description of what happened
- Types of PHI involved
- Steps individuals should take
- What organization is doing
- Contact information for questions
docs/compliance/breach-notification-template.mdStep 4: Remediation and Prevention
Step 4: Remediation and Prevention
Root Cause Analysis:
- Identify how breach occurred
- Document vulnerabilities exploited
- Assess control failures
- Patch vulnerabilities
- Update access controls
- Enhance monitoring
- Additional training
- Policy updates
Frequently Asked Questions
Is MCP Server HIPAA-certified?
Is MCP Server HIPAA-certified?
No. There is no official “HIPAA certification.” HIPAA compliance is achieved by:
- Implementing technical safeguards (MCP Server provides these)
- Establishing administrative controls (your organization’s responsibility)
- Maintaining physical security (your data center / cloud provider)
- Obtaining BAAs (your legal/procurement responsibility)
Which LLM providers can I use for PHI?
Which LLM providers can I use for PHI?
Safe for PHI (with BAA):
- ✅ Anthropic Claude (Enterprise plan with BAA)
- ✅ Google Gemini via Vertex AI (covered under GCP BAA)
- ✅ AWS Bedrock models (verify specific model coverage in BAA)
- ❌ OpenAI (no BAA available)
- ❌ Ollama/local models (unless you have proper controls)
What is the minimum retention period for audit logs?
What is the minimum retention period for audit logs?
HIPAA Requirement: 7 years from date of creation or last effective dateMCP Server Default: 2,555 days (7 years) configured in
audit.yamlStorage Recommendation: Use encrypted S3/GCS with lifecycle policies for cost-effective long-term storage.Do I need to encrypt PHI at the application level?
Do I need to encrypt PHI at the application level?
Not required, but strongly recommended.HIPAA Addressable: Encryption at rest is “addressable” (not mandatory if justified)Best Practice: Use both database encryption AND application-level encryption for defense in depth:
- Database encryption protects against storage layer breaches
- Application encryption protects against database compromises
src/encryption/What happens if I have a breach?
What happens if I have a breach?
Required Actions:
- Contain the breach immediately (< 1 hour)
- Assess scope and risk (< 24 hours)
- Notify affected individuals (< 60 days if ≥500 people)
- Report to HHS (< 60 days if ≥500 people)
- Remediate vulnerabilities
- Document everything
Next Steps
Deployment Architecture
Review monitoring and alerting
Compliance Checklist
Verify incident response readiness
Back to Overview
Return to HIPAA overview
HIPAA Compliance: Complete guide covering all technical, administrative, and physical safeguards!