Blog

Healthcare Cybersecurity Act: What the Change Healthcare Breach Means for Startup Compliance

The Senate's Healthcare Cybersecurity Act signals sector-specific mandates beyond SOC 2 and ISO 27001. Here's what startups selling into healthcare need to know.

A single set of stolen credentials on a Citrix portal without multi-factor authentication. That's all it took to expose the protected health information of 190 million Americans, shut down prescription processing nationwide for weeks, and rack up over $3.1 billion in costs for UnitedHealth Group. The February 2024 Change Healthcare ransomware attack didn't just expose one company's security gaps. It exposed how a single third-party vendor failure can cripple an entire sector's infrastructure.

Now the Senate is responding. On February 26, 2026, the Health Care Cybersecurity and Resiliency Act advanced through the Senate HELP Committee with a 22-1 vote. Combined with the HHS proposed HIPAA Security Rule update already in the pipeline, this legislation signals a clear shift: sector-specific cybersecurity mandates are expanding well beyond the general frameworks most startups rely on today.

If you're building software that touches healthcare data, the compliance landscape just changed.

What the Healthcare Cybersecurity Act actually requires

The bipartisan bill, sponsored by Senators Bill Cassidy (R-LA), Mark Warner (D-VA), John Cornyn (R-TX), and Maggie Hassan (D-NH), does four concrete things:

1. Formalizes HHS + CISA collaboration on healthcare cybersecurity. HHS must develop a cybersecurity incident response plan and submit it to Congress. The Administration for Strategic Preparedness and Response becomes the official Sector Risk Management Agency for healthcare and public health.

2. Mandates HIPAA modernization. The bill explicitly calls for updating HIPAA to require modern cybersecurity practices. This isn't aspirational language. It directs HHS to bring HIPAA's security requirements in line with the current threat landscape.

3. Creates federal grant programs for healthcare entities. Hospitals, cancer centers, rural clinics, Indian Health Service facilities, and academic health centers get dedicated funding for cybersecurity adoption. This matters because it signals that compliance costs will partially shift from individual entities to federal programs, but the requirements themselves will tighten.

4. Targets rural and workforce cybersecurity gaps. Specific provisions for rural healthcare providers and cybersecurity workforce training recognize that the weakest links in healthcare security aren't always technical. They're organizational.

The HIPAA Security Rule overhaul running in parallel

Separately from this legislation, HHS published a proposed HIPAA Security Rule update in December 2024 that would mandate specific technical controls for the first time. The final rule is expected in 2026, with a six-month compliance window after publication.

Here's what the proposed rule requires:

Control Current HIPAA Proposed Rule
Multi-factor authentication "Addressable" (optional) Required for all systems with ePHI
Encryption "Addressable" Required at rest and in transit
Penetration testing Not specified Required annually
Vulnerability scanning Not specified Required every six months
Asset inventory General requirement Detailed inventory with network mapping
Network segmentation Not specified Required
Vendor/BA oversight General "satisfactory assurances" Rigorous verification of security controls
Incident response General plan required Documented, tested, and reported to Congress

The shift from "addressable" to "required" is significant. Under current HIPAA, covered entities can document why they chose not to implement certain controls. Under the proposed rule, that flexibility disappears for core security controls.

Why this matters beyond healthcare companies

If you're a SaaS startup thinking "we don't sell to hospitals, this doesn't affect us," think again. Here's why this legislation has broader implications.

Third-party vendor risk is the real target

The Change Healthcare breach happened because UnitedHealth's subsidiary had a single Citrix portal without MFA. The attackers didn't need sophisticated zero-days. They used stolen credentials against a basic access control failure at a vendor that processes claims for nearly every healthcare provider in the country.

The legislative response targets this exact pattern. The proposed HIPAA Security Rule explicitly tightens vendor and business associate oversight, requiring rigorous verification of security controls rather than the current model of contractual assurances.

If your product integrates with healthcare systems at any level, whether you handle ePHI directly or sit somewhere in the data processing chain, you're in scope. BAA (Business Associate Agreement) requirements will carry real technical obligations, not just contractual boilerplate.

Sector-specific mandates are the new normal

Healthcare isn't alone. Financial services has had NYDFS, GLBA, and PCI-DSS for years. The EU's DORA regulation now mandates ICT risk management for financial entities. The SEC's cybersecurity disclosure rules apply to public companies across sectors.

The pattern is clear: general frameworks like SOC 2 and ISO 27001 are necessary but no longer sufficient. Each regulated sector is adding its own mandatory controls on top.

For startups, this means your compliance strategy needs to be layered:

  1. Foundation layer: SOC 2 or ISO 27001 as your general security baseline
  2. Sector layer: HIPAA, PCI-DSS, NYDFS, or whatever your target market mandates
  3. Emerging layer: New regulations like this Act, the HIPAA Security Rule update, state privacy laws

The compliance cost calculus is changing

I've written about the practical steps for preparing a SOC 2 audit, and the reality is that most startups already struggle with the $77,000 to $220,000 first-year cost of SOC 2 compliance. Adding sector-specific requirements on top creates a compounding cost problem.

But here's the counterpoint: the Change Healthcare breach cost UnitedHealth $3.1 billion. The proposed legislation includes federal grants specifically to help healthcare entities adopt cybersecurity best practices. And the gap between "has compliance certifications" and "doesn't" just became a harder competitive moat for startups selling into regulated sectors.

The question isn't whether to invest in compliance. It's whether you can afford not to when your competitors are using it as a sales differentiator.

Practical steps for startups selling into healthcare

If you're building a product that touches healthcare data, or plan to, here's what to do now.

1. Map your HIPAA exposure

Determine whether you're a covered entity, a business associate, or a subcontractor. Each role has different obligations, but the proposed rule tightens requirements across all three. If you process, store, or transmit ePHI in any form, you need a BAA and you need to meet the technical controls in the proposed rule.

2. Audit your vendor chain

The Change Healthcare breach was a third-party vendor failure. The legislative response directly targets vendor oversight. Audit your own vendors:

  • Do your cloud providers and subprocessors have BAAs in place?
  • Can you verify their security controls, not just their contractual commitments?
  • Do you have documented procedures for vendor security assessments?

If you're preparing for a SOC 2 audit, vendor management is already a Trust Services Criteria requirement. The healthcare-specific additions layer on top of that foundation.

3. Implement the "no longer optional" controls now

Don't wait for the final rule. The proposed controls reflect baseline security expectations that any serious enterprise customer will ask about:

  • MFA everywhere. No exceptions, no "addressable" carve-outs. The Change Healthcare breach happened through a portal without MFA.
  • Encryption at rest and in transit. This should already be standard, but verify your entire data path.
  • Network segmentation. Isolate systems that handle ePHI from the rest of your infrastructure.
  • Annual penetration testing and semi-annual vulnerability scanning. Build this into your budget and calendar.
  • Detailed asset inventory with network mapping. You can't protect what you don't know you have.

4. Layer your compliance strategy

For startups entering healthcare, I'd recommend this approach:

Phase 1 (Months 1-6): Establish your security foundation. If you're a bootstrapped founder deciding whether SOC 2 makes sense, the healthcare angle might tip the ROI calculation. Start with the controls that overlap between SOC 2 and HIPAA, which is about 60-70% of the work.

Phase 2 (Months 6-12): Add HIPAA-specific requirements. Complete your risk analysis, implement the required technical safeguards, execute BAAs with all vendors, and establish your breach notification procedures.

Phase 3 (Months 12-18): Prepare for the new requirements. Monitor the final HIPAA Security Rule publication, budget for annual pen testing, and build your vendor oversight program to the new standard.

5. Build compliance into your architecture, not around it

The cheapest time to implement security controls is during initial development. If you're designing a system that will handle healthcare data:

  • Design for encryption from day one, not as a retrofit
  • Build audit logging into your data access layer
  • Implement role-based access control with least privilege
  • Design your infrastructure for network segmentation
  • Automate your asset inventory

These aren't just compliance checkboxes. They're engineering decisions that become exponentially more expensive to add later.

The AI angle: healthcare data and model training

One dimension of this legislation worth watching is how it intersects with AI in healthcare. Healthcare is one of the most active sectors for AI adoption, from diagnostic imaging to clinical decision support to administrative automation.

The tightened ePHI controls have direct implications for AI companies:

Training data governance. If you're training models on healthcare data, the enhanced HIPAA requirements around data inventory and access controls apply to your training pipelines, not just your production systems.

Vendor AI tools. Healthcare entities using AI products from third-party vendors will need to verify those vendors meet the new security standards. If your AI product processes ePHI, expect deeper security scrutiny than a standard BAA covers.

De-identification under pressure. The proposed rules don't change HIPAA's de-identification standards, but the heightened focus on data protection means regulators will scrutinize de-identification methods more closely. "We anonymized the data" isn't a defense if the anonymization was insufficient.

What happens next

The Health Care Cybersecurity and Resiliency Act still needs a full Senate vote and House passage. But the 22-1 committee vote suggests strong bipartisan support. The separate HIPAA Security Rule update is further along, with a final rule expected in 2026.

For startups and SaaS companies, the message is clear: healthcare cybersecurity requirements are shifting from flexible guidelines to mandatory technical controls. The companies that get ahead of this curve, building security and compliance into their products from the start, will have a significant competitive advantage selling into the largest sector of the U.S. economy.

The $3.1 billion Change Healthcare lesson is expensive. The companies paying attention now won't have to learn it firsthand.


Keep reading:

Building a product that touches healthcare data and need help navigating the compliance landscape? Let's talk.