Skip to main content

ABC HIPAA Framework Delivers Practical Disaster Recovery That Satisfies 45 CFR 164.308(a)(7) Without the Shelf-Ware

Health care IT teams already know the requirement. 45 CFR 164.308(a)(7) makes the Contingency Plan standard Required under the HIPAA Security Rule. The implementation specifications break it down further: Data Backup Plan (164.308(a)(7)(ii)(A)), Disaster Recovery Plan (164.308(a)(7)(ii)(B)), and Emergency Mode Operation Plan (164.308(a)(7)(ii)(C)) are all Required. Testing and Revision Procedures (164.308(a)(7)(ii)(D)) and Applications and Data Criticality Analysis (164.308(a)(7)(ii)(E)) are Addressable, meaning organizations must implement them or document why an equivalent alternative is in place. "Addressable" has never meant "optional."

Most teams also know the reality. A one- or two-person IT department at a Critical Access Hospital does not have months to spend on hypothetical threat-by-threat plans that no one will read when the EMR goes down at 2:00 AM. Traditional business continuity planning produces binders that sit on shelves. Pure Adaptive Business Continuity - a methodology created by David Lindstedt, PhD, and Mark Armour that emphasizes practical capability over documentation - explicitly recommends omitting formal risk assessments and business impact analyses in favor of building real response capability. That is a sensible philosophy for general industry, but it creates a direct conflict with health care compliance obligations.

visuaFUSION Systems Solutions has released a third path. ABC HIPAA is an open methodology that applies Adaptive Business Continuity principles to the specific regulatory language in Subpart C of 45 CFR Part 164. It is designed for rural and small health care organizations that cannot afford compliance theater but also cannot afford to skip the risk analysis that HIPAA demands.

Why the gap existed

HIPAA Security Rule risk analysis under 45 CFR 164.308(a)(1)(ii)(A) is Required. Covered entities and business associates must conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (ePHI). There is no flexibility on this. You cannot skip it.

Yet the original Adaptive Business Continuity Manifesto lists "Omit the risk assessment and business impact analysis" as one of its core principles. For industries without prescriptive regulatory frameworks, that principle works. For health care, it leaves a compliance gap that no amount of practical capability can close. An OCR investigator is not going to accept "we focused on capability instead" as a substitute for a documented risk analysis.

ABC HIPAA resolves this tension with what it calls "neo-compliance." Teams fulfill every Required and Addressable implementation specification, but they do it through practical work instead of separate documentation projects. The approach also proactively treats Addressable specifications as Required, positioning organizations ahead of the HHS Notice of Proposed Rulemaking (NPRM) published in the Federal Register on January 6, 2025, which proposes eliminating the Addressable designation entirely and making all implementation specifications Required with limited exceptions. That NPRM remains under review as of this writing, with a final rule targeted for May 2026 on OCR's regulatory agenda, though significant industry pushback and uncertainty under the current administration make the timeline and final scope unpredictable. Regardless of whether the NPRM is finalized as proposed, treating Addressable items as Required today means one less remediation scramble tomorrow.

How the framework actually works

The core idea is that a single comprehensive Configuration Item (CI) mapping effort can satisfy multiple regulatory requirements simultaneously. Instead of running separate projects for your ePHI system inventory, risk analysis, contingency planning, emergency mode operations, and applications and data criticality analysis, you build one structured documentation set that covers all of them.

Start with Crown Jewels. Identify the three to five clinical applications whose loss would paralyze patient care. For most organizations, this is the EHR, lab information system, pharmacy dispensing, and one or two others specific to the facility. Perform full five-part CI documentation on those systems first:

  1. CI Information - what the system is, who uses it, and how it supports patient care
  2. Contingency Plan - what clinical and business staff do while the system is down
  3. Recovery Plan - what IT does to restore it
  4. Upstream Dependencies - what this CI depends on to function
  5. Downstream Dependencies - what depends on this CI

Here is where the framework earns its keep for small teams. Dependency mapping of your Crown Jewels automatically pulls in the majority of core infrastructure - Active Directory, core switches, your SAN or storage infrastructure, DNS, backup systems - without requiring a separate infrastructure inventory project. You are not building two inventories. You are building one, and it grows organically from the systems that matter most.

Every CI that touches ePHI then receives what ABC HIPAA calls PHI Protection Continuity documentation across four uniform safeguard domains: Emergency Authorization (who can approve break-glass access when normal systems are down), Minimum Necessary Scope (exactly what access is permitted during the emergency, consistent with the minimum necessary standard), Manual Logging Requirements (what must be recorded by whom during the outage period), and Post-Restoration Reconciliation (how emergency-period activity is reviewed after systems are restored).

Non-ePHI CIs - your print servers, digital signage, guest Wi-Fi infrastructure - simply document N/A with the rationale. The structure stays identical for every CI, which means auditors see consistent, repeatable application of the framework across the entire environment.

Response planning under ABC HIPAA is effect-based, not cause-based. This is one of the strongest ideas borrowed from Adaptive Business Continuity. The framework uses nine standardized effect categories: Loss of Facility Access, Loss of Power/Utility Services, Loss of Network Connectivity, System or Application Failure, Cyberattack/Pervasive Malware, Unauthorized Access/Data Breach, Vendor/SaaS Provider Outage, Data Loss or Corruption, and Loss of Key Personnel. You do not plan for "what if there is a tornado" and "what if there is a flood" as separate scenarios. You plan for "Loss of Facility Access" once, and it covers both. A ransomware attack and a catastrophic storage failure produce the same effect on your environment - System or Application Failure and potentially Data Loss or Corruption - so you plan for the effect, not the cause.

For a small team, this is the difference between a manageable project and an impossible one. Nine effect categories instead of an endless list of hypothetical threats.

A practical starting point for the solo IT admin

If you are the entire IT department at a 25-bed Critical Access Hospital, here is what this looks like in practice:

Start by listing your three to five Crown Jewels this week. You already know what they are. Build the CI inventory and dependency map for those systems only. Do not try to document everything at once. Document the contingency and recovery procedures for each Crown Jewel. For ePHI systems, add the four PHI Protection Continuity domains. Then run one tabletop exercise focused on improvement, not pass/fail.

That single effort produces usable recovery documentation your team can actually follow during an outage. It populates the core of your risk analysis. It satisfies the criticality analysis specification under 164.308(a)(7)(ii)(E). And it gives you a tangible foundation to expand from. Move to the next group of systems once the first set is solid.

This is not a weekend project, but it is also not a six-month consulting engagement. A focused IT admin can have Crown Jewel documentation in place within a few weeks of dedicated effort.

What the framework does not do

ABC HIPAA is a methodology, not a compliance program. It does not replace a comprehensive HIPAA Security Rule risk analysis, though the CI documentation it produces feeds directly into one. It does not replace legal counsel. It does not guarantee audit readiness on its own. And it does not address every HIPAA Security Rule requirement - it is specifically focused on the contingency planning and disaster recovery space within 45 CFR 164.308(a)(7) and the risk analysis intersection at 164.308(a)(1)(ii)(A).

It is worth noting that visuaFUSION has demonstrated an internal DRP platform with live clients that automates portions of this workflow, including guided CI documentation, visual dependency mapping, and export into formats compatible with the HHS Security Risk Assessment (SRA) tool. That platform is not yet available for general release, but the methodology itself is open and free today.

There are other tools and approaches in the disaster recovery and business continuity space worth evaluating. The HHS SRA tool itself is free and widely used for risk analysis. Platforms like Fusion Risk Management, Agility Recovery, and various HIPAA compliance suites offer structured approaches to contingency planning. ABC HIPAA is not positioned as the only option - it is positioned as a specific option for small health care teams that need to bridge the gap between Adaptive BC principles and HIPAA regulatory requirements.

The manifesto is the place to start

The full ABC HIPAA Manifesto is available at abchipaa.com. It lays out the principles, the neo-compliance approach, detailed PHI Protection Continuity procedures, and the reasoning behind every design decision. It includes legal disclaimers noting that the framework is methodological guidance, not legal advice.

Health care organizations do not have to choose between compliance and capability. ABC HIPAA gives small teams a way to pursue both - one CI at a time, one Crown Jewel at a time - while producing documentation that trained responders can actually use when the systems go down.

The framework is open. The methodology is free. The only requirement is doing the work.


This article is for informational purposes only and does not constitute legal or compliance advice. Covered entities and business associates should consult qualified legal counsel or compliance professionals before making decisions pertaining to HIPAA or IT infrastructure.


Sources

About the Author

Health Tech Authority Editorial Team

Health Tech Authority is an independent publication covering the technology side of health care organizations. We exist for the people in the mix - the systems administrators keeping servers online at 2 AM, the network engineers segmenting clinical VLANs on a shoestring budget, the security officers trying to hold the HIPAA line with half the resources a comparably sized non-health care organization would have, and the IT managers and administrators making technology decisions that directly affect patient care.

Content published under this account represents collaborative editorial work produced by the Health Tech Authority team. That includes original reporting, technical analysis, regulatory coverage, and practitioner-focused guidance across our core coverage areas: infrastructure and systems administration, networking, security and compliance, cloud and Microsoft 365 administration, clinical systems and health data, and the broader technology landscape serving health care organizations.

We cover what health care IT professionals actually need to know, written in a way that respects both their time and their intelligence. No fluff, no vendor press release rewrites, no thought leadership buzzword soup - just straightforward coverage of the systems, tools, and decisions that keep health care organizations running.

If you have a topic suggestion, a correction, or want to contribute, reach out through the Contact page.