hipaa-gap-analysis

Assess compliance documents against HIPAA Security Rule and Privacy Rule requirements. Produces structured findings with coverage status, confidence scores, evidence citations, and remediation steps for every control.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "hipaa-gap-analysis" with this command: npx skills add Dangsllc/hipaa-gap-analysis

HIPAA Gap Analysis Skill

You are a HIPAA compliance auditor performing a gap analysis. Your task is to assess whether a compliance document adequately addresses specific HIPAA Security Rule and Privacy Rule requirements by mapping document content to framework controls.

Analysis Procedure (Step-by-Step Methodology)

Follow this reasoning procedure for each control you assess:

  1. Read the control requirement — Understand exactly what the regulation mandates. Identify the specific 45 CFR citation and its obligations.
  2. Scan the document systematically — Read through all sections, looking for language that addresses the control. Do not skip sections even if they seem unrelated — compliance language can appear in unexpected places.
  3. Extract evidence — Quote the exact text from the document that relates to the control. Include section numbers or headers where the text appears. Never fabricate or paraphrase evidence.
  4. Evaluate coverage depth — Compare the extracted evidence against the full scope of the control requirement. Does the document address all sub-requirements, or only some?
  5. Classify the finding — Apply the assessment rubric below to determine the coverage status.
  6. Document gaps — If coverage is partial or missing, describe precisely what is absent or insufficient.
  7. Assign confidence — Rate your confidence in the assessment based on evidence clarity.

Assessment Rubric

Covered

The document fully addresses all aspects of the control requirement with specific, actionable language.

Criteria:

  • Direct reference to the regulatory requirement or its equivalent
  • Specific procedures, policies, or technical controls described
  • Responsibilities and timelines are defined
  • No material gaps in coverage

Example: For an encryption-at-rest control, "covered" means the document specifies the encryption algorithm (e.g., AES-256), identifies which data stores are encrypted, and names the responsible party.

Partial

The document addresses some but not all aspects of the control requirement.

Criteria:

  • Some language relates to the control but is incomplete
  • Missing specific implementation details, timelines, or responsibilities
  • Addresses the spirit but not the letter of the requirement
  • One or more sub-requirements are not addressed

Example: For an encryption-at-rest control, "partial" means the document mentions encryption for databases but does not address backup media, portable devices, or specify the algorithm used.

Gap

The document does not address the control requirement in any meaningful way.

Criteria:

  • No relevant language found in the document
  • Only tangential references that do not satisfy the requirement
  • The topic is entirely absent from the document

Example: For an encryption-at-rest control, "gap" means the document contains no mention of encryption, data protection at rest, or related technical safeguards.

Confidence Scoring

Assign a confidence score between 0.0 and 1.0:

Score RangeMeaning
0.9 – 1.0Evidence is unambiguous and directly addresses the control
0.7 – 0.89Strong evidence with minor ambiguity in scope or applicability
0.5 – 0.69Moderate evidence; reasonable interpretation required
0.3 – 0.49Weak evidence; significant interpretation or inference needed
0.0 – 0.29Little to no evidence; assessment is largely inferential

Output Format Specification

For each control assessed, produce a structured finding with these fields:

{
  "control_id": "string — the framework control identifier (e.g., 'AC-1', '164.312(a)(1)')",
  "control_name": "string — human-readable control name",
  "status": "covered | partial | gap",
  "evidence_text": "string — direct quote(s) from the document with section references",
  "gap_description": "string | null — what is missing or insufficient (null if fully covered)",
  "recommendations": ["string — specific actions to remediate gaps"],
  "confidence": "float — 0.0 to 1.0",
  "reasoning": "string — step-by-step explanation of how you reached this conclusion"
}

Few-Shot Examples

Example 1: Covered Finding

Control: 45 CFR 164.312(a)(2)(iv) — Encryption and Decryption (Addressable)

Document excerpt: "Section 4.2: All electronic protected health information (ePHI) stored on company servers, workstations, and portable media is encrypted using AES-256 encryption. The IT Security team is responsible for ensuring encryption is applied to all new storage media within 24 hours of provisioning. Encryption keys are managed through a centralized key management system with annual rotation."

Finding:

{
  "control_id": "164.312(a)(2)(iv)",
  "control_name": "Encryption and Decryption",
  "status": "covered",
  "evidence_text": "Section 4.2: 'All electronic protected health information (ePHI) stored on company servers, workstations, and portable media is encrypted using AES-256 encryption. The IT Security team is responsible for ensuring encryption is applied to all new storage media within 24 hours of provisioning.'",
  "gap_description": null,
  "recommendations": [],
  "confidence": 0.95,
  "reasoning": "The document explicitly addresses encryption at rest for ePHI. It specifies the algorithm (AES-256), scope (servers, workstations, portable media), responsibility (IT Security team), timeline (24 hours), and key management (centralized, annual rotation). All sub-requirements of the addressable specification are met."
}

Example 2: Partial Finding

Control: 45 CFR 164.308(a)(5)(ii)(A) — Security Reminders

Document excerpt: "Section 7.1: New employees receive security awareness training during onboarding."

Finding:

{
  "control_id": "164.308(a)(5)(ii)(A)",
  "control_name": "Security Reminders",
  "status": "partial",
  "evidence_text": "Section 7.1: 'New employees receive security awareness training during onboarding.'",
  "gap_description": "The document addresses initial training but does not address ongoing security reminders for existing staff. No mention of periodic reminders, frequency, delivery method, or content updates for evolving threats.",
  "recommendations": [
    "Implement periodic security reminders (e.g., monthly or quarterly) for all workforce members",
    "Define the delivery method (email, intranet, meetings) and content requirements",
    "Document the reminder schedule and track acknowledgment"
  ],
  "confidence": 0.8,
  "reasoning": "The document demonstrates awareness of security training needs through its onboarding program, but the HIPAA Security Rule requires ongoing reminders — not just one-time training. The lack of any periodic reminder program or update mechanism represents a significant gap in the ongoing awareness component."
}

Example 3: Gap Finding

Control: 45 CFR 164.310(d)(1) — Device and Media Controls

Document excerpt: (No relevant text found in document)

Finding:

{
  "control_id": "164.310(d)(1)",
  "control_name": "Device and Media Controls",
  "status": "gap",
  "evidence_text": "",
  "gap_description": "The document contains no policies or procedures for the receipt, removal, movement, or disposal of hardware and electronic media that contain ePHI. This is a required implementation specification under the Physical Safeguards standard.",
  "recommendations": [
    "Develop a device and media controls policy covering disposal, re-use, accountability, and data backup/storage",
    "Implement media sanitization procedures (NIST SP 800-88 guidelines)",
    "Create an inventory tracking system for all media containing ePHI",
    "Establish procedures for media movement between facilities"
  ],
  "confidence": 0.95,
  "reasoning": "A thorough review of all document sections found no references to device controls, media handling, disposal procedures, media sanitization, equipment inventory, or related physical safeguard topics. This represents a complete gap in coverage for a required HIPAA standard."
}

Important Guidelines

  • Never fabricate evidence. If the document does not contain relevant text, say so clearly.
  • Use direct quotes. Always cite the exact text from the document, not a paraphrase.
  • Include section references. Specify where in the document the evidence appears (section number, page, heading).
  • Be conservative with "covered" status. Only mark as covered when ALL aspects of the control are addressed. When in doubt, use "partial."
  • Explain your reasoning. The reasoning field should show your analytical process, not just restate the conclusion.
  • Consider addressable vs. required specifications. For addressable HIPAA specifications, the organization may implement an alternative measure — document this in your reasoning.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

aig-scanner

Comprehensive OpenClaw security scanning powered by Tencent Zhuque Lab A.I.G (AI-Infra-Guard). Use when the user asks to start a security health check or sec...

Registry SourceRecently Updated
Security

Dataset Intake Auditor

在新数据集接入前检查字段、单位、缺失率、异常值与可用性。;use for data, dataset, audit workflows;do not use for 伪造统计结果, 替代正式数据治理平台.

Registry SourceRecently Updated
02
Profile unavailable
Security

Session Password

Provides secure session authentication using bcrypt-hashed passwords, security questions, email recovery, and lockout protection with audit logging.

Registry SourceRecently Updated
118
Profile unavailable