HIPAA · Security & Privacy Rules · 45 CFR Parts 160, 162, 164
HIPAA on AWS — From PHI Risk to Audit-Ready in 8 Weeks
HIPAA has no formal certification. It is enforced by HHS OCR — and enforcement is reactive. We build the technical safeguards, BAA boundaries, and evidence trail your covered-entity attorney and downstream auditors need before they ever ask.
Scope: Any covered entity, business associate, or subcontractor that creates, receives, maintains, or transmits Protected Health Information (PHI) on AWS.
Part of the AWS Security & Compliance hub .
Who needs this
Teams that typically engage on HIPAA on AWS
EHR/EMR vendors, FHIR APIs, and clinical SaaS handling patient records
Healthcare AI workloads on Bedrock or SageMaker (foundation-model inference on PHI)
Health-tech startups onboarding hospital systems that require BAA + technical safeguard evidence
Shared Responsibility
AWS Shared Responsibility for HIPAA on AWS
What AWS does, what you do, and where the line moves under this specific framework.
AWS owns
- Signs the AWS Business Associate Addendum (BAA) directly via AWS Artifact — covers AWS as your subprocessor
- Operates HIPAA-eligible services to AWS HIPAA program standards (physical security, hypervisor, host OS, managed-service patching)
- Publishes the current HIPAA Eligible Services list — Bedrock, Bedrock AgentCore (Feb 2026), S3, KMS, RDS, DynamoDB, ECS/EKS, Lambda, SageMaker, and ~150 others
Joint
- Encryption: AWS provides KMS, you choose customer-managed CMKs and rotation policy
- Audit logging: AWS provides CloudTrail/CloudWatch, you configure retention to ≥6 years for PHI access events
- Backup and disaster recovery: AWS provides Backup, you define RPO/RTO and test restoration
You own
- §164.312(a) Access control — IAM Identity Center, MFA, role-based access, automatic logoff
- §164.312(b) Audit controls — CloudTrail multi-region, log integrity validation, Athena/Security Lake queries
- §164.312(c) Integrity — KMS-CMK at rest, immutable backups (S3 Object Lock), code-signing for clinical apps
- §164.312(d) Person-or-entity authentication — Cognito MFA, IAM Identity Center MFA, no shared accounts
- §164.312(e) Transmission security — TLS 1.2+ everywhere, ML-KEM hybrid where supported, no PHI in URLs
- Workforce training, sanction policies, vendor BAAs, Notice of Privacy Practices — your covered-entity counsel owns these
Control-by-control AWS implementation
Each control mapped to the AWS service that satisfies it
Excerpts from the full control matrix we deliver in the engagement. Not exhaustive — your audit scope drives the final mapping.
§164.308 Administrative Safeguards
Administrative safeguards are policy and procedure — but every policy needs a technical signal that proves it is operating. AWS provides those signals.
Risk Analysis
Continuous risk register populated from Security Hub findings tagged HIPAA — replaces point-in-time risk assessment.
Information System Activity Review
CloudTrail Lake queries scheduled monthly per workload; Detective for graph-based incident triage.
Protection from Malicious Software
Agentless EBS-snapshot malware scanning; Inspector v2 for container images and Lambda code.
Security Incident Procedures
Pre-built runbooks for credential exfiltration, public S3 PHI exposure, and IAM privilege escalation.
§164.312 Technical Safeguards
The technical safeguards are where AWS-native services do the heaviest lifting. Most controls map 1:1 to a managed service.
Access Control
Workforce SSO with identity propagation; least-privilege IAM enforced via Access Analyzer; ABAC at scale.
Encryption and Decryption
KMS-CMK with annual rotation; ACM Private CA for internal mTLS; ML-KEM hybrid TLS for long-lived data flows.
Audit Controls
Multi-region CloudTrail with log file validation; ≥6-year retention via Lake; immutable log archive in dedicated account.
Integrity
Immutable backups with WORM compliance mode; signed Lambda code packages.
Transmission Security
No PHI in URL paths or query strings; PrivateLink for AWS-internal PHI flows; VPC endpoints for managed services.
Evidence pipeline
How HIPAA on AWS evidence flows continuously
Audit Manager closed to new customers on 30 April 2026. Our pipeline is what we now ship.
AWS Config conformance pack — HIPAA
AWS-published conformance pack maps Config rules to HIPAA controls. Deploy via CloudFormation StackSets across your Organization.
Security Hub Essentials
Continuous standards checks (AWS FSBP, CIS, NIST 800-53 r5) feeding HIPAA-tagged findings into your GRC tool.
CloudTrail Lake — 6-year retention
PHI access events queryable in SQL; tamper-evident; meets HHS OCR audit log retention expectations.
GRC tool sync (Vanta / Drata / Secureframe)
Read-only AWS integration so your GRC dashboard reflects live AWS state — not point-in-time screenshots.
Engagement timeline
What you get, week by week
Date-bound engagement, not an open-ended retainer. Deliverables are itemised in the SOW.
- PHI data flow inventory (where it enters, where it lives, where it leaves)
- AWS HIPAA-eligible services audit — flag any non-eligible service touching PHI
- BAA inventory — AWS BAA on Artifact, downstream subprocessor BAAs reviewed
- HIPAA Security Rule control gap report (§164.308 / §164.310 / §164.312 / §164.314 / §164.316)
- IAM blast-radius analysis for PHI-handling roles
- Encryption posture review — KMS-CMK coverage, key rotation, in-transit TLS versions
- IaC-driven hardening (Terraform or CDK) — IAM, encryption, network segmentation
- Security Hub Essentials + Config HIPAA conformance pack deployed Org-wide
- CloudTrail Lake event store provisioned with 6-year retention
- Control narratives mapped to HIPAA Security Rule references
- Policy library (Information Security, Access Control, Incident Response, Vendor Management)
- Risk-assessment workbook (HHS OCR Audit Protocol mapped)
- GRC tool integration live — Vanta/Drata/Secureframe reflecting AWS state
Related guides
Deep-dive guides on HIPAA on AWS
From inside paid engagements — same patterns, more depth.
HIPAA on AWS: The Compliance Lead's Audit-Ready Checklist
An audit-prep checklist for Compliance Leads, Security Officers, and CISOs — BAA execution, documented Security Risk Assessments, workforce training, audit cadence, and the evidence packages OCR investigators expect when they show up.
How to Implement a HIPAA-Compliant Architecture on AWS — An Engineer's Build Guide
A solutions architect's build guide for HIPAA on AWS. KMS key strategy, VPC isolation, RDS/S3/Lambda configuration patterns, IaC controls, and continuous validation — code-level decisions, not policy templates.
HIPAA-Compliant AI on AWS Bedrock: A Production Guide for Healthcare Workloads
Production guide for HIPAA-compliant generative AI on AWS Bedrock — BAA scope, eligible models, Guardrails for PHI redaction, Knowledge Bases for RAG over clinical data, VPC isolation, and the audit evidence package OCR investigators expect.
Related frameworks
Frameworks that overlap with this one
Multi-framework scope is the norm. Most teams certify on two or three at once.
SOC 2 Type II on AWS
CC1–CC9 trust services criteria mapped to AWS-native controls, evidence pipeline, and a CPA-firm-ready audit package — for SaaS founders facing enterprise procurement.
ISO 27001:2022 on AWS
Annex A.5–A.8 implementation, ISMS scoping, climate-change context (Amendment 1:2024), notified-body audit prep — for SaaS expanding to EU/APAC and regulated B2B vendors.
FAQ
Frequently asked questions about HIPAA on AWS
The questions buyers ask before signing — assessor type, timeline, cost, and AWS-specific scope.
Is HIPAA certified on AWS, or just attested?
Which AWS services are HIPAA-eligible — and which are not?
Do we need to encrypt PHI at rest, in transit, or both?
How does the BAA chain actually work?
How do AI workloads (Bedrock, SageMaker) change HIPAA scope?
What does an HHS OCR investigation actually look like?
Book a Free HIPAA Gap Assessment
2-week read-only assessment. We map your AWS environment to HIPAA Security Rule controls, flag the gaps, and show you the remediation path. No retainer commitment.
