Situation
A multi-site diagnostic imaging organization handling ePHI across 6 locations had no formal security documentation, no governance structure, and no implemented controls when this engagement began in October 2025. The organization operated on Microsoft 365 Business Premium with no prior security engineering ownership.
The starting state represented significant HIPAA exposure: no incident response capability, no MFA enforcement, no vulnerability management, no logging posture, and AI automation servers with unauthenticated APIs accessible on the internal network.
Approach
The program was structured into four sequential phases, each with defined deliverables and exit criteria. All work was performed by a single security engineer operating within the constraints of Microsoft 365 Business Premium licensing — no Sentinel, no Entra P2, no Defender for Identity.
Technical Controls Implemented
- Entra ID Conditional Access with named location policies, device compliance requirements, and legacy authentication blocking across all users
- Windows LAPS deployed via Intune — eliminated standing local admin privileges across all managed endpoints
- Defender for Business in EDR block mode with Attack Surface Reduction rules and tamper protection enforced
- Microsoft Purview sensitivity labeling aligned to HIPAA data classification requirements; DLP policies active across Exchange, SharePoint, and OneDrive
- Azure Log Analytics workspace configured for Entra sign-in, audit, and risk log centralization
- M365 Backup covering Exchange, SharePoint, and OneDrive with validated restore capability
- Cisco Duo RADIUS MFA for VPN — Auth Proxy deployed on production Ubuntu server; Meraki MX75 authentication migrated from native auth to RADIUS
Governance Library — Built from Zero
All 16 documents were authored from scratch with no prior templates or frameworks in place. Each document is mapped to the relevant HIPAA Security Rule safeguard section.
- Security and Compliance Governance Summary — §164.308(a)(1) Risk Management
- Identity and Access Security Architecture — §164.312(a)(1) Access Control
- Endpoint Security and Device Governance — §164.312(a)(2) Workstation Controls
- Network and Physical Infrastructure Security — §164.310 Physical Safeguards
- Cloud Monitoring, Logging and Incident Readiness — §164.312(b) Audit Controls
- Data Protection and Compliance Architecture — §164.312(a)(2)(iv) Encryption
- 2026 Security Program Roadmap — Administrative Safeguards Governance
- Incident Response Plan v1.0 — §164.308(a)(6) Security Incident Procedures
- Incident Severity and Classification Matrix — §164.308(a)(6) Companion Reference
- Post-Incident Review Template — §164.308(a)(6) Documentation
- HIPAA Breach Determination Worksheet — 45 CFR §164.402 4-Factor Risk Assessment
- Incident Response Playbook — 7 runbooks covering primary threat scenarios
- Vulnerability Assessment Report v1 and v2 — §164.308(a)(8) Evaluation
Outcomes
- Microsoft Secure Score driven from approximately 40% to 96.34% — 100% Data, 97.54% Apps, 92.15% Identity
- HIPAA/HITECH Compliance Manager score achieved above 80%
- Beazley cyber insurance application completed end-to-end with full technical evidence documentation
- 3 critical vulnerability findings remediated within 24 hours of discovery
- 100% MFA coverage across all users including legacy systems via Duo RADIUS
- Full audit-defensible governance posture established across all HIPAA administrative safeguard domains
- Program on track for July 2026 self-insurance transition target
Need a HIPAA compliance program?
This engagement is available as a structured Tier 3 engagement or Full Stack program. Scoped to your environment and licensing.