NIS2 & DORA in force. EU AI Act next — book a demo

Healthcare Penetration Testing: HIPAA, NIS2 & GDPR Health Data Protection

Healthcare cybersecurity is in crisis: 2024 saw the largest healthcare breaches in history (Change Healthcare, Ascension Health). NIS2 designates healthcare as 'essential entities,' GDPR Art. 9 classifies health data as 'special category' (10× fine multiplier), HIPAA Security Rule applies for US patients. Matproof Sentinel runs healthcare pentests for hospitals, GPs, MedTech, healthcare SaaS — from €149.

Start free scan
MW
Written by Malte Wagenbach
Founder of Matproof Security. Specialized in AI-driven penetration testing and EU compliance (DORA, NIS2, ISO 27001, SOC 2).
Last reviewed: May 17, 2026

Why healthcare requires specialized cyber pentest expertise

Healthcare experienced unprecedented cyber breaches in 2024: the Change Healthcare ransomware attack (UnitedHealth Group, February 2024) compromised 100 million patient records and caused $872M in losses; Ascension Health (May 2024) disrupted patient care across 140 hospitals. NIS2 (EU) designates healthcare providers as 'essential entities' — Art. 21 requires periodic security testing, with maximum fines of €10M or 2% global turnover. GDPR Art. 9 classifies health data as 'special category' — breaches typically attract 10× fine multipliers compared to standard PII. For US-touching healthcare entities (e.g., EU GP serving US tourists), HIPAA Security Rule (45 CFR §164.308) applies. Healthcare-specific attack patterns include: EHR (Electronic Health Records) ransomware, medical device firmware attacks (insulin pumps, pacemakers), HL7 FHIR API misconfigurations, and supply-chain attacks via healthcare-specific SaaS vendors.

  • NIS2 (EU): healthcare providers are 'essential entities' — Art. 21 mandates periodic security testing; fines up to €10M or 2% global turnover.
  • GDPR Art. 9: health data is 'special category' — fines typically 10× standard PII; mandatory DPIA (Art. 35) for high-risk processing.
  • HIPAA Security Rule (45 CFR §164.308): applies to US-touching healthcare; technical safeguards include penetration testing.
  • DiGA (Germany): Digital Health Applications require BSI-mapped security testing — DiGA approval requires documented pentest.
  • FDA Cybersecurity guidelines (US, 2023): medical devices premarket submissions require demonstrated security testing.
  • Healthcare breach cost: average €10.93M per breach in healthcare (IBM Cost of a Data Breach Report 2024) — highest of any industry.
  • Ransomware specifically targets healthcare: 2024 saw 35% of all ransomware attacks targeting healthcare (Sophos State of Ransomware in Healthcare 2024).

What we specifically test in a healthcare application

  • EHR (Electronic Health Records): patient record access controls, audit logging of all access, ransomware resilience testing.
  • HL7 FHIR API security: FHIR resource authorization, SMART on FHIR OAuth2 flow, scope minimization for FHIR scopes.
  • Patient portal: account authentication, MFA implementation, password reset security, account recovery via email.
  • Telehealth platforms: video call security, recording storage controls, healthcare provider authentication.
  • Medical device integration: HL7 v2/v3 message integrity, DICOM imaging security, IoT medical device firmware (limited scope).
  • Pharmacy integration: e-prescription transmission security, drug interaction database access, controlled substance tracking.
  • Insurance / billing integration: claims data integrity, EOB (Explanation of Benefits) security, eligibility verification API.
  • DiGA-specific (Germany): BSI IT-Grundschutz baseline, BfArM (Federal Institute for Drugs) digital health app requirements.
  • Research data: pseudonymization implementation, de-identification verification, research consent management.
  • Mobile health apps (mHealth): app sandboxing, secure data sync, biometric authentication, health data export controls.

Sample finding

Critical

EHR API allows cross-patient access — GDPR Art. 9 + HIPAA breach

Our pentest of a healthcare SaaS platform identified a critical authorization flaw. The endpoint /api/patients/{patient_id}/records validates that the authenticated provider is associated with the hospital but doesn't validate that the provider has explicit treatment relationship with the patient_id. By incrementing patient_id sequentially, our test provider account accessed medical records of 12,847 patients from the same hospital network — including diagnoses, medications, lab results, mental health notes. This represents a critical GDPR Art. 9 (special category data) breach and would qualify for the highest GDPR fine tier (4% global turnover). HIPAA implications include OCR reportable breach within 60 days.

Fix: Immediate action: implement treatment relationship verification in /api/patients/{patient_id}/records — verify provider has explicit care relationship (treating physician, consulting specialist, authorized nurse). Implement break-glass access pattern: emergency access allowed but with mandatory audit log + post-access review by Privacy Officer. GDPR Art. 33 notification within 72 hours to supervisory authority. GDPR Art. 34 notification to affected data subjects if 'high risk' (likely yes for medical records). Engage external incident response support if data subjects > 1,000.

Reference: OWASP API1:2023 Broken Object Level Authorization · GDPR Art. 9 (Special category data) · GDPR Art. 33-34 (Breach notification) · HIPAA 45 CFR §164.312(a) (Access controls) · NIS2 Art. 21

Healthcare pentest options compared

Free scanMatproof SentinelTraditional consultancy
Automated scan engine✓ (3-min preview)✓ Full scan✗ Manual only
OWASP Top 10 coveragePartial✓ Complete✓ Complete
Proof-of-exploit evidence✓ Per finding✓ Per finding
Regulatory mapping (DORA/NIS2/ISO 27001)✓ Automated✓ Manual
Audit-ready PDF report✓ Instant✓ 2–4 weeks delivery
Continuous / recurring scans✓ Per deploy✗ Annual engagement
Time to first result~3 min~30 min full scan2–4 weeks
Price€0From €149€8,000–€25,000
Source code review (SAST)✓ On Growth plan✓ Scoped engagement
API testing (REST/GraphQL)✓ Automated✓ Manual

Healthcare pentest packages

Single Run
€149 one-time
  • 1 full pentest scan
  • AI-prioritized findings with CVSS 3.1
  • Proof-of-exploit per finding
  • Audit-ready PDF report
  • Regulatory mapping (DORA, NIS2, ISO 27001)
Buy single run
Recommended
Starter
€299 / month
  • Unlimited scans (up to 3 domains)
  • Continuous monitoring
  • CI/CD integration (GitHub, GitLab)
  • All regulatory mappings
  • Priority support
Start Starter
Growth
€799 / month
  • Unlimited scans + domains
  • Authenticated / White-Box testing
  • API & cloud infrastructure tests
  • Dedicated security account manager
  • 24h SLA response time
Contact for Growth

Frequently asked questions about healthcare pentest

Are you HIPAA-compliant as a pentest vendor?

Yes for US-touching engagements: we sign Business Associate Agreements (BAA), implement HIPAA Security Rule administrative/physical/technical safeguards, store data in HIPAA-compliant infrastructure during testing engagement. For EU-only healthcare, we comply with GDPR + national health data laws.

Do you test HL7 FHIR APIs?

Yes. FHIR-specific tests include: SMART on FHIR OAuth2 flow, FHIR resource scope validation, fhirUser claim verification, $bulkdata authorization. We support FHIR R4 and R5.

What's required for DiGA (German digital health app) certification?

BfArM (Federal Institute for Drugs and Medical Devices) requires: BSI IT-Grundschutz compliance documentation, penetration testing report, ISO 27001 certification (or equivalent), DSGVO data protection impact assessment. Our DiGA-specific pentest report covers all technical requirements.

Can you test medical device integration without affecting patient care?

We test against staging/test environments only. Production medical devices have specific risk profiles — we don't test live devices. For medical device firmware testing, we work with manufacturers in their development environment.

Do you support multi-jurisdiction healthcare (US + EU + UK)?

Yes. Single Matproof Sentinel report covers HIPAA (US), NIS2 + GDPR (EU), UK GDPR + Data Protection Act 2018, NHS Digital Data Security and Protection Toolkit (UK).

How does pentest support our cyber insurance for healthcare?

Recent pentest is increasingly required for healthcare cyber insurance — premium loading of 50-100% without documented pentest. Our report directly answers healthcare cyber insurance questionnaires (Coalition, At-Bay, Cowbell).

Related

Go deeper — related blog articles

Healthcare pentest with HIPAA / NIS2 compliance

First scan in 3 minutes, complete healthcare pentest with explicit HIPAA / NIS2 / GDPR Art. 9 mapping. From €149.

Start free scan