I have been in IT long enough to know how this movie ends. If both the regulators and Congress are pointing in the same direction, you are not going to “wait and see” your way out of it.
That is why the news out of Washington last week matters. The Senate HELP Committee advanced a healthcare cybersecurity bill during the week of March 3, 2026. The bill sets new minimum cybersecurity standards for HIPAA-regulated entities, including multifactor authentication, data encryption, penetration testing, and regular security audits.
On its own, that would be noteworthy. What makes it a flashing red light is the timing. HHS has already proposed a major 2026 update to the HIPAA Security Rule, and that proposal includes annual penetration testing. The expected finalization is May 2026.
So yes, this is quickly becoming a real HIPAA penetration testing requirement for 2026, and not just because one agency floated an idea. It is because multiple parts of government are converging on the same baseline controls.
Regulation plus legislation is how “recommendations” turn into budget line items
Here’s the practical difference. When a regulator updates a rule, plenty of organizations treat it like a paperwork problem. They hope for a long runway, they hope the enforcement is light, and they hope their interpretation is “reasonable.”
When Congress starts pushing minimum standards in parallel, that changes how executives hear it. It becomes much harder to treat security as optional, or as a thing you can slide into next year’s budget cycle. I am not making a political statement here. I am telling you how board rooms work.
If you are a covered entity or a business associate, your direction of travel is obvious. You are going to be expected to prove you have the basics, and “we have a policy” will not cut it. You will need evidence that the controls exist and that they work.
What’s in the HIPAA Security Rule proposal, in plain English
HHS proposed the update in late 2025, and it is expected to be finalized in May 2026. This is the most significant update to HIPAA security requirements since the original rule in 2003.
The proposed update includes:
- Mandatory annual security risk assessments
- Universal encryption of ePHI
- MFA
- 72-hour incident reporting
- Annual penetration testing
- Enhanced business associate oversight
That list is not “nice to have.” If it lands as expected, it is the new floor. Some orgs are already there. A lot are not. Either way, the days of treating HIPAA security as a spreadsheet exercise are numbered.
What’s in the Senate bill, and why it matters
The Senate HELP Committee advanced a healthcare cybersecurity bill with minimum standards that include MFA, encryption, penetration testing, and regular security audits. That sounds similar to what HHS is already proposing because it is. That is the point.
From an operator’s perspective, the bill is less about the exact words on the page and more about signal. Washington is saying that basic controls are not optional for HIPAA-regulated environments.
If you are hoping penetration testing stays a “best practice” you can argue about, you are going to lose that argument.
Penetration testing is not a checkbox. It is where your assumptions go to get punched in the face.
I run a pentest firm now, but I did not start on this side of the table. I spent two decades as an IT Director. I know exactly why pentesting gets pushed down the list. It costs money, it makes people nervous, and it produces findings that create more work.
Healthcare environments are full of fragile systems, weird vendor access paths, and “we cannot touch that” servers. You have EHR systems, imaging systems, pharmacy systems, patient portals, and a pile of business associates that all handle ePHI. When you have that much complexity, you cannot reason your way to security. You have to test.
A good penetration test does three things for a healthcare org:
- It validates control effectiveness. MFA, encryption, segmentation, monitoring. Not that they exist. That they stop real attack paths.
- It finds the chains. The “low severity” misconfig plus the stale vendor VPN plus the weak admin workflow that equals total compromise.
- It gives you defensible evidence. If the rule and the law are both pushing toward annual testing, you want clean documentation and repeatable results.
What I would do right now if I owned HIPAA security at a healthcare org
Not next quarter. Not after the final rule. Right now.
1) Decide what “annual pentesting” means for your environment
Annual testing can mean a lot of things, and you do not want to discover your interpretation is out of step with what auditors and regulators expect.
At a minimum, you should be prepared to test what an attacker would actually target, including the parts of your environment that touch ePHI and the paths that lead to it.
2) Get your asset inventory and ePHI data flows out of fantasy land
If you cannot answer “where is ePHI stored, processed, and transmitted,” your pentest scope and remediation plan will be guesswork.
This is also where business associate oversight becomes real. If vendors touch ePHI, you need to know how, where, and under what controls.
3) Make MFA and encryption boring and universal
The bill calls out MFA and encryption as minimum standards. The HIPAA proposal includes MFA and universal encryption of ePHI. Treat that as a directive.
Do not argue about “users hate it.” Users also hate breach notifications. Turn it on, tune it, and move on.
4) Plan your testing calendar like you plan your maintenance windows
Annual pentesting goes smoother when it is routine. Set a predictable window, pre-stage access, line up stakeholders, and have a remediation plan. If the first time you talk about testing is when a rule is finalized, the test will be rushed and the remediation will be political.
5) Build evidence, not vibes
If incident reporting tightens to 72 hours, and if audits become a routine part of the expectation, you will want clean artifacts. Risk assessments, encryption coverage, MFA enforcement, pentest reports, and proof of remediation. That is how you avoid scrambling when you are already dealing with a security incident.
My blunt take: stop waiting for the final rule and start acting like it is already here
No panic. Be pragmatic.
The Senate HELP Committee bill and the HHS HIPAA Security Rule update are pushing the same direction. If you are a healthcare organization, you are going to be expected to meet minimum standards and prove it. Penetration testing is moving from “strongly recommended” to “show me the receipts.”
If you start now, you get to do this on your schedule. If you wait, you will do it on someone else’s schedule, and it will be more expensive and more painful.
Need to Get Ahead of the 2026 HIPAA Pentest Requirement?
If you are a covered entity or business associate and you want a clear, defensible plan for annual penetration testing, I will walk you through scope, timelines, and what auditors will actually care about. Reach out for a free consultation.
Book a Call