Person or Entity Authentication 45 CFR 164.312(d)

The Person or Entity Authentication standard requires procedures to verify that a person or entity seeking access to ePHI is the one claimed.

CMMC-AB RPO #1449 · BBB A+ Since 2003 · Healthcare Compliance Specialists
Regulation

What the regulation requires

45 CFR 164.312(d) Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.

There is no separate implementation specification under this standard - the requirement is authentication itself. Modern HHS guidance and the proposed 2025 NPRM strongly point toward phishing-resistant MFA on every account that touches ePHI.

Implementation specifications

Required (no separate implementation spec)

Authentication Mechanism

Verify identity via something you know (password / passphrase), something you have (token, hardware key, mobile authenticator), or something you are (biometric). Single-factor passwords are no longer reasonable for any account that can access ePHI. (164.312(d))

Implementation

How Petronella implements this safeguard

Every Petronella HIPAA engagement maps 45 CFR 164.312(d) to documented evidence in your environment. This is what that looks like in practice for the person or entity authentication standard:

  • Phishing-resistant MFA (FIDO2 hardware keys, Windows Hello, platform passkeys) on every account with ePHI access, especially privileged and remote.
  • Conditional access policies that block legacy authentication and high-risk sign-ins.
  • Service account hardening - certificate-based authentication, Managed Service Accounts, no shared service passwords.
  • Vendor / business-associate access through federated SSO with logging back into your SIEM.

Built on top of ComplianceArmor for documentation, training records, and BAA inventory, with optional HIPAA managed IT services for the technical safeguard layer and vCISO services for the named Security Official role.

Common Findings

Where most practices fall short

OCR resolution agreements, HHS audit reports, and our own engagements show the same handful of gaps under 45 CFR 164.312(d). We surface these before they become a finding.

  • MFA is on for VPN but not for email or EHR - leaving the path attackers actually use.
  • SMS-based MFA used as the primary factor for privileged accounts (NIST has deprecated SMS for high-assurance use cases since 2017).
  • MFA bypass policies for "trusted" IP ranges that include home offices and coffee shops.
  • Service accounts with passwords that have not changed since the EHR was installed.
Related

Related HIPAA safeguards

Person or Entity Authentication interacts with several other Security Rule standards. Cover them together for a defensible program.

Need help with Person or Entity Authentication?

Penny answers before the third ring, asks 3 qualifying questions, then books your free 15. Or jump straight to the platform that runs your HIPAA program.

← Back to HIPAA compliance pillar