HIPAA Security Risk Assessment
Organization: Nquiry (operated by JE Vectors LLC)
Assessment Date: 2026-02-04
Assessment Version: 1.0
Next Review Date: 2027-02-04
1. Executive Summary
This document provides a comprehensive HIPAA Security Risk Assessment for the Nquiry application platform. The assessment evaluates administrative, physical, and technical safeguards required under the HIPAA Security Rule (45 CFR Part 164).
Overall Risk Level: MODERATE
Compliance Status: In Progress (targeting Q2 2026 launch)
Key Findings
| Category | Finding | Risk | Status |
|---|
| Technical Safeguards | Strong encryption, access controls | LOW | Implemented |
| Administrative Safeguards | Policies need formalization | MEDIUM | In Progress |
| Physical Safeguards | AWS manages physical security | LOW | Compliant via BAA |
| Audit Controls | Comprehensive logging implemented | LOW | Implemented |
| PHI Detection | Bedrock Guardrails configured | LOW | Implemented |
2. Scope
2.1 Systems in Scope
| System | Description | PHI Exposure |
|---|
| Nquiry Web Application | Next.js application on AWS Amplify | Potential - user-uploaded evidence |
| Amazon RDS PostgreSQL | Primary database | Potential - investigation data |
| Amazon S3 | Evidence file storage | Potential - uploaded documents |
| Amazon Cognito | Authentication service | Minimal - user credentials |
| AWS Bedrock | AI analysis engine | Potential - processes investigation text |
2.2 Data Types
| Data Category | HIPAA Classification | Storage Location |
|---|
| User accounts | Not PHI | RDS, Cognito |
| Investigation metadata | Potentially PHI | RDS |
| Evidence documents | Potentially PHI | S3 |
| AI analysis output | Potentially PHI | RDS |
| Audit logs | Potentially PHI | RDS |
2.3 Exclusions
- Marketing website (nquiry.ai landing page)
- Development/test environments with synthetic data
- Internal documentation systems
3. Risk Assessment Methodology
3.1 Risk Calculation
Risk Level = Likelihood × Impact
| Likelihood | Description |
|---|
| High (3) | Expected to occur multiple times per year |
| Medium (2) | May occur once per year |
| Low (1) | Unlikely to occur |
| Impact | Description |
|---|
| High (3) | Breach affecting >500 individuals, regulatory action |
| Medium (2) | Breach affecting <500 individuals, reputational damage |
| Low (1) | Minimal impact, quickly contained |
| Risk Score | Risk Level |
|---|
| 7-9 | HIGH |
| 4-6 | MEDIUM |
| 1-3 | LOW |
4. Administrative Safeguards (§164.308)
4.1 Security Management Process
| Requirement | Implementation | Risk | Mitigation |
|---|
| Risk analysis | This document | LOW | Annual review scheduled |
| Risk management | Security remediation plan | LOW | Continuous monitoring |
| Sanction policy | Employee handbook (draft) | MEDIUM | Formalize policy |
| Information system activity review | Audit logging + CloudWatch | LOW | Implemented |
4.2 Assigned Security Responsibility
| Requirement | Implementation | Risk |
|---|
| Security official designation | [To be assigned] | MEDIUM |
Action Required: Formally designate a HIPAA Security Officer before production launch.
4.3 Workforce Security
| Requirement | Implementation | Risk |
|---|
| Authorization procedures | Role-based access (owner/admin/member/viewer) | LOW |
| Workforce clearance | Background checks for employees | LOW |
| Termination procedures | AWS IAM access revocation process | LOW |
| Requirement | Implementation | Risk |
|---|
| Access authorization | Organization-based permissions | LOW |
| Access establishment/modification | Self-service with admin approval | LOW |
4.5 Security Awareness and Training
| Requirement | Implementation | Risk | Mitigation |
|---|
| Security reminders | Planned quarterly emails | MEDIUM | Implement before launch |
| Protection from malware | AWS Shield, WAF | LOW | Implemented |
| Log-in monitoring | Failed attempt tracking | LOW | Implemented |
| Password management | NIST-compliant policy | LOW | Implemented |
4.6 Security Incident Procedures
| Requirement | Implementation | Risk |
|---|
| Response and reporting | Incident response plan drafted | LOW |
4.7 Contingency Plan
| Requirement | Implementation | Risk |
|---|
| Data backup | RDS automated backups (7-day retention) | LOW |
| Disaster recovery | Multi-AZ deployment planned | LOW |
| Emergency mode operation | AWS region failover capability | LOW |
| Testing and revision | Annual DR test planned | MEDIUM |
| Applications and data criticality | Documented in this assessment | LOW |
4.8 Evaluation
| Requirement | Implementation | Risk |
|---|
| Periodic evaluation | Annual security assessment | LOW |
4.9 Business Associate Contracts
| Requirement | Implementation | Risk | Mitigation |
|---|
| Written contract/agreement | AWS BAA | MEDIUM | Sign before production |
Action Required: Execute AWS Business Associate Agreement before processing any PHI.
5. Physical Safeguards (§164.310)
All physical infrastructure is managed by AWS under their BAA. AWS maintains:
| Requirement | AWS Implementation |
|---|
| Facility access controls | Biometric access, 24/7 security |
| Workstation use | N/A - cloud infrastructure |
| Workstation security | N/A - cloud infrastructure |
| Device and media controls | Secure media destruction |
Risk Level: LOW (inherited from AWS)
6. Technical Safeguards (§164.312)
6.1 Access Control
| Requirement | Implementation | Risk |
|---|
| Unique user identification | Cognito user IDs | LOW |
| Emergency access procedure | Admin override capability | LOW |
| Automatic logoff | 24-hour session timeout | LOW |
| Encryption and decryption | AES-256 at rest, TLS 1.3 in transit | LOW |
6.2 Audit Controls
| Requirement | Implementation | Risk |
|---|
| Audit logging | Comprehensive audit trail (lib/audit) | LOW |
| Log retention | 7 years (configurable) | LOW |
| Log integrity | Append-only, timestamped | LOW |
6.3 Integrity
| Requirement | Implementation | Risk |
|---|
| Mechanism to authenticate ePHI | Database constraints, validation | LOW |
6.4 Person or Entity Authentication
| Requirement | Implementation | Risk |
|---|
| MFA | WebAuthn + TOTP (FedRAMP compliant) | LOW |
6.5 Transmission Security
| Requirement | Implementation | Risk |
|---|
| Integrity controls | TLS 1.3, HTTPS only | LOW |
| Encryption | TLS 1.3 for all connections | LOW |
7. PHI-Specific Safeguards
7.1 Bedrock Guardrails
AWS Bedrock Guardrails are configured to detect and block PHI/PII in AI interactions:
| PHI Type | Detection | Action |
|---|
| Names | Regex + ML | Block |
| SSN | Pattern matching | Block |
| Medical record numbers | Custom regex | Block |
| Health plan IDs | Custom regex | Block |
| Dates (DOB) | Pattern matching | Block |
| Contact information | ML detection | Block |
7.2 Data Minimization
- Users control what data they upload
- AI analysis processes only selected evidence
- No PHI required for core application functions
8. Risk Register
| ID | Risk Description | Likelihood | Impact | Risk Level | Mitigation | Owner | Status |
|---|
| R-001 | Unauthorized access to PHI | Low | High | MEDIUM | MFA, RLS, audit logging | Security | Mitigated |
| R-002 | PHI in AI prompts | Medium | Medium | MEDIUM | Bedrock Guardrails | Dev | Mitigated |
| R-003 | Data breach via SQL injection | Low | High | MEDIUM | Parameterized queries, RLS | Dev | Mitigated |
| R-004 | Insider threat | Low | High | MEDIUM | Role-based access, audit logs | Security | Mitigated |
| R-005 | AWS service disruption | Low | Medium | LOW | Multi-AZ, backups | Ops | Mitigated |
| R-006 | Unpatched vulnerabilities | Medium | Medium | MEDIUM | Automated scanning, updates | Dev | Ongoing |
| R-007 | Inadequate logging | Low | Medium | LOW | Comprehensive audit system | Dev | Mitigated |
| R-008 | BAA not executed | N/A | High | HIGH | Execute AWS BAA | Legal | Open |
9. Action Items
Pre-Launch (Required)
| Item | Owner | Due Date | Status |
|---|
| Sign AWS BAA | Joe | Before production | Open |
| Verify Bedrock HIPAA eligibility | Joe | Before production | Open |
| Designate Security Officer | Joe | Before production | Open |
| Formalize security policies | Claude/Joe | Before production | In Progress |
| Complete security training | Joe | Before production | Open |
Post-Launch (Recommended)
| Item | Owner | Due Date | Status |
|---|
| Annual risk assessment review | Security Officer | 2027-02-04 | Scheduled |
| Penetration test | External vendor | Q2 2026 | Planned |
| DR test | Ops | Q3 2026 | Planned |
10. Approval
| Role | Name | Date | Signature |
|---|
| Security Officer | **_** | ____ | **_** |
| CEO/Owner | **_** | ____ | **_** |
Appendix A: References
- HIPAA Security Rule: 45 CFR Part 164
- NIST SP 800-66: Implementing the HIPAA Security Rule
- AWS HIPAA Compliance: https://aws.amazon.com/compliance/hipaa-compliance/
- nquir Security Remediation Plan:
docs/admin/security/remediation-plan.md
- nquir Asset Inventory:
docs/admin/security/asset-inventory.md
Document History
| Version | Date | Author | Changes |
|---|
| 1.0 | 2026-02-04 | Claude (AI) | Initial assessment |