In This Guide
SaaS & Cloud in Healthcare
Healthcare organizations increasingly rely on cloud services and SaaS applications. As a technology provider handling Protected Health Information (PHI), you become a Business Associate under HIPAA—and compliance is your responsibility.
There's no "HIPAA certification" for cloud services. You demonstrate compliance through implementing required safeguards, signing Business Associate Agreements (BAAs), conducting risk assessments, and potentially obtaining third-party attestations like SOC 2 or HITRUST.
You're a Business Associate
If your SaaS or cloud service handles PHI for a healthcare organization, you're a Business Associate. This includes:
- EHR/EMR Systems: Electronic health record platforms
- Practice Management: Scheduling, billing, patient portals
- Telehealth Platforms: Video consultation services
- Data Analytics: Population health, clinical analytics
- Cloud Infrastructure: IaaS/PaaS hosting healthcare workloads
- Communication Tools: Secure messaging, email with PHI
- Backup/Storage: Cloud backup services storing ePHI
What This Means
As a Business Associate, you must:
- Comply with applicable Security Rule requirements
- Sign BAAs with covered entities
- Sign BAAs with your subcontractors (e.g., cloud providers)
- Report breaches to covered entities
- Implement safeguards to protect ePHI
The Shared Responsibility Model
In cloud and SaaS deployments, HIPAA compliance is shared between parties. Understanding this division is critical.
IaaS Shared Responsibility (e.g., AWS EC2, Azure VMs)
| Control Area | Cloud Provider | You (Customer) |
|---|---|---|
| Physical data center security | ✓ | |
| Hypervisor/infrastructure | ✓ | |
| Network infrastructure | ✓ | |
| Operating system configuration | ✓ | |
| Application security | ✓ | |
| Data encryption | ✓ | |
| Access management | ✓ | |
| Logging/monitoring | Partial (infrastructure) | Partial (application) |
PaaS Shared Responsibility (e.g., AWS RDS, Azure SQL)
Cloud provider takes on more responsibility (OS patching, runtime), but you still own:
- Application logic and security
- Data classification and encryption choices
- Access control configuration
- Backup policies and retention
SaaS Shared Responsibility (You're the SaaS Provider)
You own most controls within your application, but your cloud provider handles infrastructure. Your customers rely on you for:
- Application-level security controls
- Data encryption implementation
- Access management for their users
- Audit logging and reporting
- Breach notification
Cloud Provider Considerations
Major Cloud Providers and HIPAA
| Provider | BAA Available | HIPAA-Eligible Services | Key Resources |
|---|---|---|---|
| AWS | Yes (via AWS Artifact) | Most services (see list) | AWS HIPAA Whitepaper |
| Microsoft Azure | Yes (Online Services Terms) | Most Azure services | Azure HIPAA/HITRUST Blueprint |
| Google Cloud | Yes (Data Processing Amendment) | Core GCP services | GCP HIPAA Implementation Guide |
Before Using a Cloud Service
- Confirm HIPAA eligibility: Not all services are covered under BAA
- Execute BAA: Sign the BAA before processing any PHI
- Configure properly: Cloud providers offer HIPAA-eligible services, but you must configure them correctly
- Review compliance docs: Understand what the provider covers vs. your responsibilities
Critical Controls for SaaS/Cloud
Access Controls
- Unique user IDs for all users
- Strong authentication (MFA strongly recommended)
- Role-based access control
- Automatic session timeout
- Emergency access procedures
Encryption
- Encryption in transit (TLS 1.2+)
- Encryption at rest (AES-256)
- Key management procedures
- Database encryption (TDE or column-level)
- Backup encryption
Audit Controls
- Log all PHI access
- Log authentication events
- Log administrative actions
- Retain logs for 6+ years (recommended)
- Protect logs from tampering
- Regular log review or automated monitoring
Data Integrity
- Input validation
- Error handling that doesn't expose PHI
- Data backup procedures
- Data recovery testing
Transmission Security
- HTTPS-only (redirect HTTP to HTTPS)
- Strong cipher suites
- Certificate management
- API security (authentication, rate limiting)
HIPAA-Ready Architecture Patterns
Network Segmentation
Isolate PHI processing from other workloads:
- Use VPCs/VNets dedicated to healthcare workloads
- Implement network security groups
- Use private subnets for databases
- Deploy WAF for public-facing applications
Multi-Tenant Considerations
If your SaaS serves multiple healthcare clients:
- Data isolation: Logical (schema/tenant ID) or physical (separate databases)
- Access controls: Ensure tenant A cannot access tenant B's data
- Audit logging: Log which tenant data is accessed
- Encryption keys: Consider per-tenant keys for sensitive workloads
DevOps/CI-CD Security
- No PHI in development/test environments (use de-identified data)
- Secure the deployment pipeline
- Infrastructure as Code for consistent, auditable deployments
- Vulnerability scanning in CI/CD
BAA Requirements
Business Associate Agreements are required between:
- You (SaaS provider) and your healthcare customers
- You and your subcontractors (cloud providers, third-party services)
What Your BAA Must Include
- Permitted and required uses of PHI
- Agreement not to use/disclose PHI other than as permitted
- Requirement to implement appropriate safeguards
- Requirement to report breaches
- Requirement that subcontractors agree to same restrictions
- Right for covered entity to terminate if BAA is violated
- Return or destruction of PHI at termination
Your cloud provider's BAA protects them - it doesn't automatically make you compliant. You must implement controls within your application and sign BAAs with your healthcare customers.