AI & assistant-friendly summary

This section provides structured content for AI assistants and search engines. You can cite or summarize it when referencing this page.

Summary

Deploy HIPAA-compliant AI on AWS Bedrock: encryption, data handling, and compliance architecture for healthcare.

Key Facts

  • Deploy HIPAA-compliant AI on AWS Bedrock: encryption, data handling, and compliance architecture for healthcare
  • Deploy HIPAA-compliant AI on AWS Bedrock: encryption, data handling, and compliance architecture for healthcare

Entity Definitions

AWS Bedrock
AWS Bedrock is an AWS service discussed in this article.
Bedrock
Bedrock is an AWS service discussed in this article.
compliance
compliance is a cloud computing concept discussed in this article.
HIPAA
HIPAA is a cloud computing concept discussed in this article.

Running HIPAA-Compliant AI on AWS Bedrock

genai Palaniappan P 4 min read

Quick summary: Deploy HIPAA-compliant AI on AWS Bedrock: encryption, data handling, and compliance architecture for healthcare.

Key Takeaways

  • Deploy HIPAA-compliant AI on AWS Bedrock: encryption, data handling, and compliance architecture for healthcare
  • Deploy HIPAA-compliant AI on AWS Bedrock: encryption, data handling, and compliance architecture for healthcare
Running HIPAA-Compliant AI on AWS Bedrock
Table of Contents

HIPAA + AI on Bedrock: A Powerful Combination

AWS Bedrock is HIPAA-eligible. With proper configuration, you can deploy generative AI in healthcare without violating HIPAA regulations. This guide covers the technical and compliance requirements.

What Makes Bedrock HIPAA-Eligible

  1. Encryption

    • Data in transit: TLS 1.2+ (enforced)
    • Data at rest: AES-256 with KMS (required)
    • Bedrock doesn’t store data; processes and returns
  2. Data Isolation

    • Data stays in your AWS account
    • Anthropic (Claude creator) cannot access patient data
    • AWS can view encrypted data (standard cloud)
  3. Audit Trail

    • CloudTrail logs all API calls
    • Who called Bedrock, when, what parameters
    • Meets HIPAA audit requirements
  4. Business Associate Agreement (BAA)

    • AWS must sign BAA with healthcare organization
    • Establishes contractual compliance obligations
    • Required before processing patient data

HIPAA Compliance Checklist for Bedrock

Before Using Patient Data:

  • ☐ Sign AWS BAA for Bedrock
  • ☐ Sign AWS BAA for CloudTrail, CloudWatch, KMS
  • ☐ Enable KMS encryption on all data
  • ☐ Configure VPC (no internet exposure)
  • ☐ Enable CloudTrail logging
  • ☐ Document data flows and retention policies

Application Level:

  • ☐ De-identify PII where possible
  • ☐ Don’t log prompts/responses with patient data
  • ☐ Encrypt prompts before sending to Bedrock
  • ☐ Restrict access via IAM roles
  • ☐ Implement audit logging
  • ☐ Regular access reviews

Architecture: HIPAA-Compliant AI Workflow

Patient Data (EHR)
    ↓ (encrypted)
VPC Private Subnet

Lambda Function (HIPAA-logging enabled)

Bedrock (within VPC via VPC Endpoint)

KMS Encryption/Decryption

CloudTrail (audit logs)

Response (encrypted, returned)

EHR (encrypted storage)

Key Points:

  • All data movement encrypted (KMS)
  • VPC Endpoint for Bedrock (no internet exposure)
  • CloudTrail logs every access
  • IAM controls who can access

Allowed vs Prohibited Use Cases

Allowed (Informational/Administrative)

  • Summarize clinical notes for provider review
  • Generate patient education materials
  • Appointment scheduling assistance
  • Symptom checker (marked as informational)
  • Medical transcription improvement
  • Drug interaction checking (informational)

Prohibited (Clinical Decision)

  • Treatment recommendations
  • Diagnostic decisions
  • Medication dosing
  • Replacing physician judgment

Gray Area (Requires Careful Design)

  • Clinical decision support (must include provider oversight)
  • Risk scoring (informational only)
  • Research analysis (cannot identify individuals)

Data Protection Implementation

1. Encrypt Sensitive Data

import boto3
from botocore.exceptions import ClientError

kms = boto3.client('kms')

# Encrypt patient data before processing
patient_data = "Patient: John Doe, DOB: 01/15/1980, Chief Complaint: Chest pain"

response = kms.encrypt(
    KeyId='arn:aws:kms:us-east-1:ACCOUNT:key/KEY_ID',
    Plaintext=patient_data
)
encrypted = response['CiphertextBlob']

2. Call Bedrock with Encrypted Data

bedrock = boto3.client('bedrock-runtime')

# Send encrypted prompt to Bedrock
response = bedrock.invoke_model(
    modelId='anthropic.claude-3-5-sonnet-20241022-v2:0',
    body=json.dumps({
        'prompt': f'Summarize this clinical note: {encrypted}',
        'max_tokens': 500
    })
)

3. Decrypt Response

decrypted = kms.decrypt(CiphertextBlob=response_encrypted)
plaintext = decrypted['Plaintext'].decode('utf-8')

Compliance Audit Requirements

What HIPAA Auditors Check:

  • ☐ BAA signed with AWS
  • ☐ All data encrypted at rest and in transit
  • ☐ CloudTrail logs present and immutable
  • ☐ Access control (IAM) restricts to authorized personnel
  • ☐ Data retention policies documented
  • ☐ Incident response plan (if breach occurs)
  • ☐ Regular security assessments

Evidence You Must Have:

  • Signed BAA
  • CloudTrail logs (minimum 1 year)
  • IAM role policies
  • KMS key policies
  • Security audit reports
  • Data handling procedures
  • Training records

Common Pitfalls

Mistake 1: Not signing BAA before using Bedrock

  • Result: Non-compliant from day 1
  • Fix: Sign BAA before processing any patient data

Mistake 2: Logging full prompts/responses with PII

  • Result: Audit logs contain unencrypted patient data
  • Fix: Log only request IDs; keep sensitive data encrypted

Mistake 3: Allowing uncontrolled access to Bedrock

  • Result: Unauthorized users can access patient data
  • Fix: Use IAM roles to restrict access to specific users/applications

Mistake 4: Not encrypting data end-to-end

  • Result: Data exposed in transit or at rest
  • Fix: Use KMS encryption, enforce TLS, enable EBS encryption

Cost Estimate: HIPAA-Compliant Bedrock Setup

Monthly Costs

  • Bedrock inference: ~$100-500 (depends on usage)
  • KMS encryption: ~$5-20 (per key)
  • CloudTrail logging: ~$5-10
  • VPC Endpoint: ~$7-14
  • Total: ~$120-550/month for moderate usage

One-Time Costs

  • BAA negotiation: $0 (included with AWS)
  • Compliance audit: $5,000-15,000
  • Documentation & procedures: 10-20 hours

Real-World Example: Clinical Note Summarization

Doctor writes: "79-year-old patient with hypertension, diabetes,
presenting with chest pain radiating to left arm, shortness of breath..."

Bedrock (with encryption):
- Input encrypted with KMS
- Claude summarizes key findings
- Output encrypted
- Logged in CloudTrail

Result: Auto-summarized note in doctor's portal, compliant & auditable

Bottom Line

AWS Bedrock + HIPAA = Possible with proper architecture. Key requirements:

  • Sign BAA
  • Encrypt all data (KMS)
  • Log all access (CloudTrail)
  • Restrict access (IAM)
  • Don’t use for treatment decisions (liability)

For healthcare organizations ready to invest in compliance, Bedrock is the best option for HIPAA-compliant AI.

PP
Palaniappan P

AWS Cloud Architect & AI Expert

AWS-certified cloud architect and AI expert with deep expertise in cloud migrations, cost optimization, and generative AI on AWS.

AWS ArchitectureCloud MigrationGenAI on AWSCost OptimizationDevOps

Ready to discuss your AWS strategy?

Our certified architects can help you implement these solutions.

Recommended Reading

Explore All Articles »