IT Compliance Checklist: HIPAA, SOC 2, and CMMC Requirements for Businesses

Cybersecurity compliance for HIPAA SOC2 CMMC businesses

Why Every Business Needs a Compliance Map — Even If You Think Regulations Don’t Apply to You

Compliance isn’t a word that excites most business owners. It evokes images of thick binders, government auditors, and expensive consultants who speak in acronyms. But here’s what many small and mid-sized businesses don’t realize until it’s too late: the regulatory frameworks that govern how you handle data, protect customer information, and secure your IT systems aren’t just for large enterprises. They apply to you, too — and the penalties for noncompliance can be business-ending.

Three frameworks in particular have become central to the compliance landscape for American businesses: HIPAA, which governs the handling of protected health information; SOC 2, which establishes trust criteria for service organizations that store or process customer data; and CMMC, which sets cybersecurity requirements for Department of Defense contractors. Each serves a different regulatory purpose, but they share a common DNA: all three demand documented, verifiable IT security controls.

At Atlantic Computer Systems, we help businesses determine which frameworks apply to them, identify the gaps between where they are and where they need to be, and implement the controls required for compliance. What follows is a practical guide to all three frameworks and the IT controls they require.

HIPAA: The Healthcare Data Standard That Reaches Beyond Hospitals

Most people associate HIPAA with hospitals and doctor’s offices, but the regulation’s reach extends to any organization that creates, receives, maintains, or transmits electronic Protected Health Information (ePHI). This includes medical billing companies, health IT vendors, insurance brokers, pharmacy benefit managers, cloud storage providers used by healthcare organizations, and even law firms that handle medical malpractice cases.

If your business touches patient data in any form, HIPAA’s Security Rule requires you to implement administrative, physical, and technical safeguards. The technical requirements that matter most for IT compliance include access controls with unique user IDs and role-based permissions, audit logging on all systems that handle ePHI, encryption of data in transit and at rest, automatic session timeouts on workstations and applications, regular risk assessments and documented remediation, backup and disaster recovery procedures, and incident response plans with breach notification within 60 days.

HIPAA violations carry tiered penalties based on the level of negligence. At the low end, a violation attributable to reasonable cause can cost $137 to $68,928 per violation. At the high end, willful neglect that goes uncorrected can reach $2,067,813 per violation category per year. OCR investigators have made clear that the absence of a current risk assessment is the most common finding in enforcement actions.

Our comprehensive HIPAA IT Compliance Guide details every technical requirement and how to implement it.

SOC 2: The Trust Framework for Technology and Service Companies

SOC 2 (System and Organization Controls 2) is different from HIPAA and CMMC in one important respect: it’s not a government regulation. It’s a voluntary audit framework developed by the American Institute of Certified Public Accountants (AICPA). But “voluntary” is misleading — in practice, SOC 2 compliance has become a de facto requirement for any technology company, SaaS provider, or service organization that handles customer data.

Enterprise clients increasingly require SOC 2 reports before signing contracts. Insurance companies reference them when underwriting cyber liability policies. And investors evaluate them as indicators of operational maturity. If your business stores, processes, or transmits data on behalf of other organizations, SOC 2 compliance isn’t optional — it’s a market requirement.

SOC 2 is organized around five Trust Service Criteria: Security (the common criteria, required for all SOC 2 reports), Availability, Processing Integrity, Confidentiality, and Privacy. Most organizations begin with Security and add additional criteria as their compliance program matures.

The IT controls required for SOC 2 security include logical and physical access controls, system change management procedures, risk assessment and risk mitigation processes, incident response and communication protocols, monitoring of system operations and security events, vendor and third-party risk management, data backup and recovery procedures, and encryption standards for sensitive data.

SOC 2 audits come in two types. A Type I audit evaluates whether your controls are properly designed at a specific point in time. A Type II audit — which carries more weight — evaluates whether those controls operated effectively over a period of time, typically six to twelve months. Most clients and prospects will ask for a Type II report.

CMMC: The Defense Department’s Cybersecurity Mandate

The Cybersecurity Maturity Model Certification is the DoD’s answer to years of inadequate cybersecurity among defense contractors. If your company holds federal contracts or subcontracts that involve Controlled Unclassified Information (CUI), CMMC compliance is a contractual requirement — not a suggestion.

CMMC 2.0 defines three levels. Level 1 requires 17 basic controls and allows annual self-assessment. Level 2 requires 110 controls mapped to NIST SP 800-171 and requires third-party assessment for critical contracts. Level 3 adds advanced controls and requires government-led assessment.

Most defense contractors need Level 2, which demands multi-factor authentication on all CUI-access accounts, FIPS 140-2 validated encryption, continuous monitoring and real-time alerting, incident response plans with 72-hour DoD reporting, monthly vulnerability scanning, security awareness training, formal configuration management, and comprehensive audit log retention.

Our detailed CMMC and FedRAMP Compliance Guide walks through the full assessment process and timeline.

Where the Frameworks Overlap — and Where They Don’t

One of the most valuable insights for businesses navigating compliance is that these three frameworks share substantial common ground. A company that implements strong controls for one framework has already completed much of the work required for the others.

Controls that appear across all three frameworks include access control with unique user identification, multi-factor authentication, encryption of sensitive data in transit and at rest, regular risk assessments, incident response planning, audit logging and monitoring, employee security training, vendor risk management, backup and disaster recovery, and change management procedures.

The differences lie primarily in scope and specificity. HIPAA focuses specifically on health information and emphasizes patient notification requirements. SOC 2 is broader in its applicability but allows more flexibility in how controls are implemented. CMMC is the most technically prescriptive, requiring specific cryptographic standards and reporting timelines.

For businesses that fall under multiple frameworks — a healthcare IT company with government clients, for example — the smart approach is to build a unified compliance program that satisfies the most demanding requirements across all applicable frameworks. This eliminates redundant effort and creates a single, coherent security posture rather than a patchwork of framework-specific controls.

Your Compliance Action Plan

Compliance can feel overwhelming, but it becomes manageable when broken into clear steps. Start by determining which frameworks apply to your business based on your industry, your clients, and the type of data you handle. Then conduct a gap assessment to understand where your current IT environment falls short. Prioritize remediation based on risk — close the most critical gaps first. Implement monitoring and documentation practices that provide ongoing evidence of compliance. And plan for formal assessment or audit when the time comes.

Atlantic Computer Systems provides compliance assessments, gap analysis, remediation planning, and ongoing monitoring for all three frameworks. Schedule a consultation to discuss which frameworks apply to your business and what steps you need to take. Call 1-650-300-7557.

Related articles

Partner with Us for Comprehensive IT

We're happy to answer any questions you may have and help you determine which of our services best fit your needs.

Call us at: 1-650-300-7557

Your benefits:

Client-oriented approach
Proven results and reliability
Industry-leading technology
Transparent pricing, no surprises

What happens next?

1We schedule a call at your convenience
2We do a discovery and consulting meeting
3We prepare a proposal tailored to your needs

Schedule a Free Consultation

Fill out the form and we'll be in touch soon.