Amazon Bedrock HIPAA Compliance: What You Need to Know About BAA, PHI, and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Amazon Bedrock HIPAA Compliance: What You Need to Know About BAA, PHI, and Best Practices

Kevin Henry

HIPAA

May 03, 2025

9 minutes read
Share this article
Amazon Bedrock HIPAA Compliance: What You Need to Know About BAA, PHI, and Best Practices

Using Amazon Bedrock in healthcare or life sciences means you must plan for HIPAA from day one. This guide explains how to approach Amazon Bedrock HIPAA compliance—what a Business Associate Agreement (BAA) entails, how to handle Protected Health Information (PHI) in prompts, and which technical controls help you align with best practices.

You’ll see how to use AWS Key Management Service for encryption, design precise Identity and Access Management policies, isolate workloads in a Virtual Private Cloud, and produce audit-ready logs with AWS CloudTrail while meeting Data Retention Compliance goals.

Business Associate Agreement Responsibilities

If you will create, receive, maintain, or transmit PHI with Amazon Bedrock, you need a signed Business Associate Agreement with AWS and must operate only covered services and features in covered Regions. The BAA defines security, privacy, and breach-notification obligations and clarifies the shared responsibility model: AWS secures the cloud; you configure and operate securely in the cloud.

Your core responsibilities under a BAA

  • Minimum necessary: Limit PHI exposure to what is strictly required for each use case and user role.
  • Service scope control: Confirm that the services, model providers, and Regions you plan to use are in scope of your BAA and HIPAA-eligible before processing PHI.
  • Secure configuration: Enforce strong encryption, access controls, network isolation, and continuous monitoring for all PHI flows.
  • Incident readiness: Maintain documented breach response plans, notification procedures, and contact paths; test them regularly.
  • Subcontractor oversight: Ensure downstream vendors or components (e.g., data pipelines, vector stores) are appropriately covered and meet your contractual and technical controls.
  • Documentation and training: Keep policies, procedures, training records, and risk assessments current to support audits and Data Retention Compliance.

Handling PHI in Prompts

Design prompts and context flows to minimize PHI exposure. Where possible, feed models with de-identified data and perform re-identification only inside your controlled application layer.

Apply the minimum necessary standard

  • Collect only the PHI attributes required for the task; avoid free-text fields that encourage oversharing.
  • Prefer patient-specific tokens or pseudonyms over direct identifiers; keep the mapping table in a separate, encrypted store.

De-identification and masking

  • Use deterministic tokenization or masking for identifiers so you can join results later without revealing identities to the model.
  • Strip quasi-identifiers (e.g., full dates, locations) unless required; generalize where feasible (month/year instead of full date).

Prompt and output hygiene

  • Template prompts to control structure and reduce accidental PHI leakage.
  • Sanitize prompt inputs and model outputs with automated redaction checks before storing or showing to end users.
  • Avoid logging raw prompts/responses containing PHI; if logging is necessary, store minimal fields and encrypt at rest.

Operational practices

  • Use synthetic data for development and testing; restrict production PHI access through approvals and time-bound roles.
  • Regularly review prompts and context sources for data minimization and accuracy to limit unnecessary PHI exposure.

Use of HIPAA-Eligible AWS Services

Process PHI only with services that are HIPAA-eligible in your chosen Region and covered under your BAA. Confirm eligibility for each component in your architecture, including any integrations you add around Amazon Bedrock.

Typical building blocks in HIPAA-aligned designs

  • Storage and artifacts: Encrypt all objects (for example, prompt templates and context files) with AWS Key Management Service; apply strict bucket and object policies.
  • Compute and orchestration: Run application code that prepares prompts and post-processes outputs on managed compute isolated in your Virtual Private Cloud.
  • Networking: Use private connectivity patterns and endpoint policies to keep PHI traffic off the public internet where supported.
  • Observability and audit: Enable AWS CloudTrail, CloudWatch logs/metrics, and alarms for every control plane and data plane action that touches PHI.

Scope and provider considerations

  • Confirm whether the specific Amazon Bedrock model providers and features you plan to use are included in the HIPAA-eligible scope for your account and Region.
  • For third-party components (e.g., vector databases, ETL tools), ensure they are HIPAA-eligible or otherwise contractually and technically controlled before they ever handle PHI.

Data Encryption Best Practices

Strong encryption—implemented correctly and consistently—is central to HIPAA security and risk reduction for Amazon Bedrock workloads.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

At rest

  • Use customer-managed keys in AWS Key Management Service for all PHI at rest; enforce SSE-KMS on object stores and encrypt volumes, databases, and logs.
  • Apply key separation by environment and data domain; restrict access with tight key policies and grants.
  • Enable automatic key rotation where appropriate and monitor key usage events.

In transit

  • Require TLS 1.2+ for all client-to-service and service-to-service connections; disable weak ciphers and protocols.
  • Use certificate pinning or mutual TLS for sensitive machine-to-machine channels where feasible.

Key management discipline

  • Separate roles for key administrators and data operators to support least privilege.
  • Log all KMS operations and alert on anomalous decrypt activity patterns.
  • Store secrets (API keys, database credentials) in a managed secrets vault; never embed secrets in code or prompts.

Access Control and IAM Policies

Precise authorization is essential for PHI protection. Build controls around Identity and Access Management that enforce least privilege and time-bound access.

Design principles

  • Use roles instead of long-lived users; prefer short session durations with MFA and Just-In-Time elevation for sensitive tasks.
  • Adopt attribute-based access control with tags to scope permissions by environment, data classification, and project.
  • Apply permission boundaries and, in multi-account setups, organization-level guardrails to block risky actions by default.

Bedrock and data access scoping

  • Grant only the specific actions required (for example, invoke operations) and restrict to approved model ARNs.
  • Tie access to approved network paths and VPC endpoints via IAM conditions where available.
  • Constrain KMS decrypt and storage access to the exact buckets, prefixes, or tables that hold PHI.

Operational safeguards

  • Enforce strong federation through your identity provider; require MFA for console and programmatic access.
  • Rotate credentials automatically and prohibit the creation of access keys for human users.
  • Review access regularly; remove dormant roles and tighten broad permissions discovered in access analyzer reports.

Network Security Measures

Network isolation reduces exposure and simplifies monitoring. Keep PHI processing inside a tightly controlled Virtual Private Cloud perimeter.

Isolation and segmentation

  • Place sensitive workloads in private subnets; avoid public IPs and restrict inbound traffic to trusted sources.
  • Use security groups as your primary allowlist and network ACLs for coarse-grained stateless controls.
  • Segment environments (dev/test/prod) and tenant data paths to contain blast radius.

Private connectivity and egress control

  • Use VPC endpoints and, where supported, private service endpoints for accessing AWS services without traversing the public internet.
  • Apply endpoint policies to restrict which resources can be reached (for example, specific buckets or KMS keys).
  • Route outbound traffic through controlled egress with DNS filtering and firewall inspection to prevent data exfiltration.

Perimeter protections and monitoring

  • Use web application firewalls and rate limiting to mitigate abuse of PHI-facing APIs.
  • Enable VPC Flow Logs and analyze patterns to detect unexpected data flows or lateral movement.

Audit Trails and Data Retention Policies

Comprehensive, tamper-resistant audit trails demonstrate due diligence and support investigations. Pair logging with a clear, defensible retention schedule.

What to log

  • Control plane: Turn on AWS CloudTrail for all accounts; include data events for sensitive stores where PHI may reside.
  • Application plane: Capture prompt orchestration steps, access decisions, and output post-processing results—without storing raw PHI unless absolutely necessary.
  • Network and key usage: Record VPC flow summaries and KMS cryptographic operations for traceability.

Protecting and retaining logs

  • Write logs to dedicated, encrypted storage using customer-managed KMS keys; separate write and read roles.
  • Make logs tamper-evident with versioning and write-once retention features; replicate to a separate account for resilience.
  • Define schedules that satisfy Data Retention Compliance requirements and business needs; apply lifecycle rules to purge data when retention periods expire.

Monitoring and response

  • Set alerts for anomalous actions (e.g., unusual decrypt spikes, broad data reads, or access from unexpected networks).
  • Regularly test your detection and response runbooks with tabletop exercises and post-incident reviews.

Conclusion

Achieving Amazon Bedrock HIPAA compliance is a coordinated effort: put a solid Business Associate Agreement in place, minimize PHI in prompts, stick to HIPAA-eligible services, encrypt everything with AWS Key Management Service, enforce strict IAM, isolate networks in a Virtual Private Cloud, and build verifiable trails with AWS CloudTrail and disciplined retention. With these practices, you can unlock Bedrock’s capabilities while protecting patient privacy.

FAQs

What is a Business Associate Agreement in Amazon Bedrock?

A Business Associate Agreement is the contract addendum that sets HIPAA obligations when AWS handles PHI on your behalf. Before you process PHI with Amazon Bedrock, ensure your organization has a signed BAA with AWS and that the specific services, model providers, and Regions you intend to use are covered. You remain responsible for secure configuration, operations, and compliance documentation.

How should PHI be handled in AI prompts?

Apply the minimum necessary principle: de-identify or mask PHI, use pseudonymous IDs, and avoid logging raw prompts and responses that contain PHI. Sanitize inputs and outputs automatically, keep re-identification steps in your application layer, and use synthetic data for testing. Only include PHI elements essential to the task.

Which AWS services are HIPAA-eligible?

Many foundational services are HIPAA-eligible when used under a BAA and configured correctly. Common building blocks include AWS Key Management Service for encryption, Identity and Access Management for access control, Virtual Private Cloud for network isolation, and AWS CloudTrail for auditing. Always verify eligibility for the specific services, features, and Regions you plan to use before they handle PHI.

What are best practices for auditing PHI access?

Enable AWS CloudTrail across all accounts, capture relevant data events, centralize logs in encrypted storage, and make them tamper-evident. Monitor KMS usage, network flows, and application decisions, alert on anomalies, and retain logs according to your Data Retention Compliance policy. Test your incident response and review access patterns regularly to ensure continuous accountability.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles