home / skills / jeremylongshore / claude-code-plugins-plus-skills / hipaa-compliance-checker

This skill automatically analyzes code, configurations, and docs to detect HIPAA compliance issues using the hipaa-compliance-checker plugin.

npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill hipaa-compliance-checker

Review the files below or copy the command above to add this skill to your agents.

Files (4)
SKILL.md
3.3 KB
---
name: checking-hipaa-compliance
description: |
  This skill enables Claude to automatically check for HIPAA (Health Insurance Portability and Accountability Act) compliance issues in codebases, infrastructure configurations, and documentation. It leverages the hipaa-compliance-checker plugin to identify potential violations related to data privacy, security, and access controls. Use this skill when the user explicitly requests to "check HIPAA compliance", "scan for HIPAA violations", "assess HIPAA readiness", or similar phrases related to HIPAA audits and security best practices. It is useful for projects handling protected health information (PHI) and requiring adherence to HIPAA regulations.
---

## Overview

This skill automates the process of identifying potential HIPAA compliance issues within a software project. By using the hipaa-compliance-checker plugin, it helps developers and security professionals proactively address vulnerabilities and ensure adherence to HIPAA guidelines.

## How It Works

1. **Analyze Request**: Claude identifies the user's intent to check for HIPAA compliance.
2. **Initiate Plugin**: Claude activates the hipaa-compliance-checker plugin.
3. **Execute Checks**: The plugin scans the specified codebase, configuration files, or documentation for potential HIPAA violations.
4. **Generate Report**: The plugin generates a detailed report outlining identified issues and their potential impact on HIPAA compliance.

## When to Use This Skill

This skill activates when you need to:
- Evaluate a codebase for HIPAA compliance before deployment.
- Identify potential HIPAA violations in existing systems.
- Assess the HIPAA readiness of infrastructure configurations.
- Verify that documentation adheres to HIPAA guidelines.

## Examples

### Example 1: Checking a codebase for HIPAA compliance

User request: "Check HIPAA compliance of the patient data API codebase."

The skill will:
1. Activate the hipaa-compliance-checker plugin.
2. Scan the specified API codebase for potential HIPAA violations.
3. Generate a report listing any identified issues, such as insecure data storage or insufficient access controls.

### Example 2: Assessing infrastructure configuration for HIPAA readiness

User request: "Assess the HIPAA readiness of our AWS infrastructure configuration."

The skill will:
1. Activate the hipaa-compliance-checker plugin.
2. Analyze the AWS infrastructure configuration files for potential HIPAA violations, such as misconfigured security groups or inadequate encryption.
3. Generate a report outlining any identified issues and recommendations for remediation.

## Best Practices

- **Specify Target**: Always clearly specify the target (e.g., codebase, configuration file, documentation) for the HIPAA compliance check.
- **Review Reports**: Carefully review the generated reports to understand the identified issues and their potential impact.
- **Prioritize Remediation**: Prioritize the remediation of identified issues based on their severity and potential impact on HIPAA compliance.

## Integration

This skill can be integrated with other security and compliance tools to provide a comprehensive view of a system's security posture. The generated reports can be used as input for vulnerability management systems and security information and event management (SIEM) platforms.

Overview

This skill automates identification of potential HIPAA compliance issues in codebases, infrastructure configurations, and documentation. It uses an automated checker to surface privacy, security, and access-control risks that could expose protected health information (PHI). The goal is to give developers and security teams a prioritized, actionable report to guide remediation and audits.

How this skill works

When you request a HIPAA check, the skill activates the compliance checker and scans the specified targets—source code, IaC, cloud configuration files, or documentation. It analyzes patterns that indicate common HIPAA violations (unencrypted storage, weak access controls, insecure logging, etc.), flags findings with severity, and generates a consolidated report with recommendations. The report can be exported or integrated into existing vulnerability tracking workflows.

When to use it

  • Before deploying systems that will handle PHI to catch issues early
  • When auditing an existing codebase, API, or infrastructure for HIPAA readiness
  • After configuration changes to verify encryption, access policies, and network controls
  • When preparing documentation and policies for HIPAA audits or third-party review
  • As part of CI/CD pipelines to prevent regressions that create HIPAA risk

Best practices

  • Specify the scan target precisely (repo path, config files, or documentation) to reduce false positives
  • Run scans regularly and after major changes to code or cloud configuration
  • Combine automated findings with manual review for context-sensitive issues
  • Prioritize remediation by severity and impact on PHI exposure
  • Integrate reports into your ticketing or remediation workflow for tracking and verification

Example use cases

  • Scan a patient records API repo to detect unsecured storage or hard-coded credentials
  • Assess AWS CloudFormation/Terraform for misconfigured encryption, open security groups, or improper IAM policies
  • Review onboarding and privacy documentation to ensure policies match technical controls
  • Run automated checks as a pre-merge step in CI to block code that introduces HIPAA risk
  • Produce a remediation-ready report for an external auditor or internal compliance team

FAQ

Can this skill fix issues automatically?

No. The skill identifies and explains potential HIPAA issues and provides remediation guidance, but changes must be applied by your engineers or automation tools under your control.

Which targets can it scan?

It can scan source code, configuration files (IaC), cloud configuration exports, and documentation. Specify the exact files or repository paths when requesting a scan.