HIPAA vs GDPR

Side-by-side comparison of HIPAA Security Rule and GDPR across 49 cybersecurity controls.

46
Shared
0
HIPAA Only
1
GDPR Only
2
Neither

Covered by Both (46 controls)

Controls recognized by both HIPAA and GDPR.

Gp Governance Policy
§164.308(a)(1)(i), §164.316(a) | Art.5(2), Art.24(1), Art.24(2)
Aw Awareness & Training
§164.308(a)(5)(i), §164.308(a)(5)(ii)(A) | Art.39(1)(b), Art.47(2)(n)
Rm Risk Management
§164.308(a)(1)(ii)(A), §164.308(a)(1)(ii)(B) | Art.24(1), Art.32(1)
Sc Supply Chain Risk
§164.308(b)(1), §164.314(a)(1) | Art.28(1), Art.28(2)
Rr Roles & Responsibilities
§164.308(a)(2), §164.308(a)(3)(i) | Art.37(1), Art.38(1), Art.39(1)
Cm Compliance
§164.308(a)(8), §164.316(b)(1) | Art.5(2), Art.58(1), Art.83(1)
Am Asset Management
§164.310(d)(1), §164.310(d)(2)(iii) | Art.30(1)
Ra Risk Assessment
§164.308(a)(1)(ii)(A) | Art.35(1), Art.35(7)
Be Business Environment
§164.308(a)(1)(i) | Art.35(7)(b)
Da Data Classification
§164.312(a)(1) | Art.9(1), Art.5(1)(c)
Vn Vulnerability Mgmt
§164.308(a)(1)(ii)(A), §164.308(a)(8) | Art.32(1)(d)
Ac Access Control
§164.312(a)(1), §164.312(a)(2)(i) | Art.32(1)(b), Art.25(2)
Mf Multi-Factor Auth
§164.312(d) | Art.32(1)(b)
En Encryption
§164.312(a)(2)(iv), §164.312(e)(2)(ii) | Art.32(1)(a), Art.34(3)(a)
Dp Data Protection
§164.312(a)(2)(iv), §164.312(c)(1), §164.312(e)(1) | Art.5(1)(f), Art.32(1)
Bk Backup & Recovery
§164.308(a)(7)(ii)(A), §164.310(d)(2)(iv) | Art.32(1)(c)
Pa Privileged Access
§164.312(a)(1), §164.308(a)(3)(ii)(B) | Art.32(1)(b), Art.29
Fw Firewall / Net Seg
§164.312(e)(1) | Art.32(1)(b)
Ep Endpoint Protection
§164.308(a)(5)(ii)(B), §164.310(d)(1) | Art.32(1)(b)
Pm Patch Management
§164.308(a)(1)(ii)(A), §164.308(a)(8) | Art.32(1)(d)
Cf Secure Config
§164.310(d)(1), §164.312(a)(1) | Art.25(1), Art.32(1)
Ml Email Security
§164.308(a)(5)(ii)(A), §164.312(e)(1) | Art.32(1)(b)
Ws Web Security
§164.312(e)(1) | Art.32(1)(b)
Zt Zero Trust
§164.312(a)(1) | Art.32(1)(b), Art.25(1)
Mb Mobile Security
§164.310(d)(1), §164.312(a)(1) | Art.32(1)(b)
Cl Cloud Security
§164.308(b)(1), §164.314(a)(1) | Art.28(1), Art.32(1)
Wf WAF
§164.312(e)(1) | Art.32(1)(b)
Dl DLP
§164.312(a)(1), §164.312(e)(1) | Art.5(1)(f), Art.32(1)(b)
Sm Cont. Monitoring
§164.312(b) | Art.32(1)(d)
Lg Logging & Audit
§164.312(b), §164.308(a)(1)(ii)(D) | Art.5(2), Art.30(1)
Id Intrusion Detection
§164.308(a)(1)(ii)(D), §164.312(b) | Art.32(1)(d), Art.33(1)
An Anomaly Detection
§164.308(a)(1)(ii)(D) | Art.32(1)(d)
Sg SIEM / SOC
§164.308(a)(1)(ii)(D), §164.312(b) | Art.32(1)(d)
Ir Incident Response
§164.308(a)(6)(i), §164.308(a)(6)(ii) | Art.33(1), Art.33(2)
Fn Forensics
§164.308(a)(6)(ii) | Art.33(3)
Co Communication
§164.308(a)(6)(ii), §164.404(a)(1) | Art.33(1), Art.34(1)
Mt Mitigation
§164.308(a)(6)(ii) | Art.33(3)(d), Art.34(2)
Rp Reporting
§164.308(a)(6)(ii), §164.404(a)(1), §164.408(a) | Art.33(1), Art.34(1)
Rc Recovery Planning
§164.308(a)(7)(i), §164.308(a)(7)(ii)(B) | Art.32(1)(c)
Bc Business Continuity
§164.308(a)(7)(i), §164.308(a)(7)(ii)(C) | Art.32(1)(b), Art.32(1)(c)
Ll Lessons Learned
§164.308(a)(8) | Art.32(1)(d), Art.24(1)
Cr Comms & Restore
§164.308(a)(7)(ii)(C) | Art.34(1), Art.32(1)(c)
Dr Disaster Recovery
§164.308(a)(7)(ii)(A), §164.308(a)(7)(ii)(B) | Art.32(1)(c)
Ap API Security
§164.312(a)(1), §164.312(e)(1) | Art.25(1), Art.32(1)(b)
It Insider Threat
§164.308(a)(3)(ii)(A), §164.308(a)(4) | Art.29, Art.32(1)(b), Art.32(4)
Vr Vendor Risk Mgmt
§164.308(b)(1), §164.314(a)(1), §164.314(a)(2)(i) | Art.28(1), Art.28(2), Art.28(3)

Only in GDPR (1 controls)

Controls covered by GDPR but not HIPAA. Organizations using HIPAA should consider supplementing with these.

Not Covered by Either Framework (2 controls)

These controls are not addressed by either HIPAA or GDPR. Consider additional frameworks for coverage.

Summary: HIPAA vs GDPR

HIPAA Security Rule and GDPR share 46 controls in common out of 49 total. HIPAA uniquely covers 0 controls that GDPR does not. GDPR uniquely covers 1 control that HIPAA does not, including Secure Development. 2 controls are not covered by either framework. For comprehensive cybersecurity coverage, organizations often adopt both frameworks or supplement with other frameworks.

View Interactive Dashboard