The 2026 HIPAA Security Rule Now Requires MFA

The 2026 HIPAA Security Rule updates eliminate the distinction between “required” and “addressable” implementation specifications. Multi-factor authentication (MFA) is now a mandatory requirement for all covered entities and business associates — no exceptions, no alternative measures.

Previously, organizations could document why single-factor authentication was “equivalent” and choose not to implement MFA. Under the new rule, every system that accesses, stores, or transmits electronic protected health information (ePHI) must enforce MFA for all users. This applies to EHR systems, email platforms, cloud storage, remote desktop access, VPN connections, and administrative consoles.

What Counts as Multi-Factor Authentication

MFA requires users to verify their identity using at least two of three factor categories:

Something you know — a password, PIN, or security question answer. This alone is single-factor authentication and no longer satisfies the HIPAA Security Rule.

Something you have — a physical device like a smartphone (for push notifications or authenticator apps), a hardware security key (YubiKey, Titan Key), or a smart card. This is the most common second factor in healthcare settings.

Something you are — biometric verification such as fingerprint scan, facial recognition, iris scan, or voice recognition. While increasingly available on modern devices, biometric factors raise additional data protection considerations under state biometric privacy laws.

Important: SMS text message codes, while common, are considered the weakest form of MFA due to SIM-swapping attacks and interception risks. OCR has not prohibited SMS-based MFA, but NIST guidelines (SP 800-63B) classify it as a “restricted” authenticator. Healthcare organizations should plan to migrate to app-based or hardware-key MFA where feasible.

Implementation Requirements by System Type

EHR and Practice Management Systems: Most modern EHR platforms (Epic, Cerner/Oracle Health, eClinicalWorks, athenahealth, NextGen) support MFA natively or through integration with identity providers. Contact your EHR vendor to enable MFA if it is not already active. Document the configuration in your Security Risk Assessment.

Email Platforms: Microsoft 365 and Google Workspace both support MFA enforcement through admin console settings. Given that email is the primary vector for phishing attacks targeting healthcare, enabling MFA on email should be your first implementation priority.

Cloud Storage and File Sharing: Any cloud service storing ePHI (Box, Dropbox Business, Google Drive, OneDrive, SharePoint) must enforce MFA. Verify that your BAA with each cloud vendor covers their MFA capabilities and your obligation to enable them.

Remote Access (VPN, RDP): Remote desktop and VPN connections are high-risk entry points. MFA is critical here. Solutions like Duo Security, Okta, and Microsoft Entra ID (formerly Azure AD) can enforce MFA at the network access layer, protecting against credential-stuffing and brute-force attacks.

Administrative and Privileged Accounts: IT administrators, compliance officers, and anyone with elevated system privileges should use the strongest available MFA (hardware security keys preferred). Compromised admin credentials are involved in a disproportionate share of healthcare breaches.

Compliance Timeline and Documentation

Organizations must implement MFA across all ePHI-accessing systems by the compliance date specified in the final 2026 Security Rule. OCR has indicated a phased enforcement approach, but organizations should not delay — MFA implementation takes time, especially in practices with multiple systems and workflows.

Your documentation should include an inventory of all systems accessing ePHI and their MFA status, the MFA method used for each system (app-based, hardware key, biometric), enrollment records showing which workforce members have completed MFA setup, exception documentation for any legacy systems that cannot support MFA (with compensating controls), and an ongoing monitoring plan to ensure MFA remains enforced.

Common Implementation Challenges

Legacy systems that cannot support modern MFA may require compensating controls such as network segmentation, enhanced logging, and restricted access hours. Document these alternatives thoroughly in your SRA.

Shared workstations in clinical environments (nurses’ stations, exam rooms) need workflow-friendly MFA solutions. Tap-to-authenticate badges and proximity-based authentication can reduce friction while maintaining compliance.

Workforce resistance is real. Staff may view MFA as an inconvenience. Combine implementation with training that explains the “why” — real breach examples where stolen credentials led to ePHI exposure.

Cost concerns for smaller practices are valid but manageable. Microsoft Authenticator and Google Authenticator are free. Hardware security keys cost $25-50 per unit. The cost of implementing MFA across a small practice is typically under $500 — a fraction of even the smallest HIPAA penalty.

How Medcurity Helps

Medcurity’s Security Risk Assessment platform identifies all systems in your environment that require MFA, documents your current MFA status, and tracks implementation progress as part of your ongoing risk management plan. When OCR asks for evidence of MFA compliance, your documentation is already audit-ready.

Assess your MFA readiness →

//...snippet//
Get HIPAA CompliantTrusted by 1,000+ facilities
Get Started