AWS HIPAA Compliance: Requirements, BAA, and Step-by-Step Guide

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

AWS HIPAA Compliance: Requirements, BAA, and Step-by-Step Guide

Kevin Henry

HIPAA

February 02, 2026

7 minutes read
Share this article
AWS HIPAA Compliance: Requirements, BAA, and Step-by-Step Guide

AWS HIPAA Compliance Requirements

HIPAA applies to how you create, receive, maintain, or transmit electronic Protected Health Information (ePHI). On AWS, you must implement safeguards that align with the HIPAA Security Rule while ensuring Protected Health Information Encryption in transit and at rest, strong Identity and Access Management, and complete auditability.

Before handling any ePHI, you should define scope, sign a Business Associate Agreement, and choose HIPAA-eligible services. From there, enforce least privilege, encrypt data with AWS Key Management Service, and enable end-to-end logging for Compliance Monitoring and incident response readiness.

  • Administrative: documented policies, workforce training, vendor oversight, and ongoing Risk Assessment.
  • Physical: AWS manages data center controls; you manage device security and secure endpoints.
  • Technical: access control, encryption, integrity, transmission security, and audit controls mapped to AWS services.

Understanding AWS Business Associate Agreement

A Business Associate Agreement (BAA) is a contract you execute with AWS that permits processing of ePHI on covered, in-scope services and regions. It clarifies how AWS safeguards infrastructure and how you must configure, monitor, and use services to meet HIPAA requirements.

The BAA must be in place before any ePHI touches your environment. It does not make your workloads automatically compliant—you still own configuration, Identity and Access Management, data governance, and incident response. If you operate multiple AWS accounts, ensure each account is covered (typically via your organization’s master agreement) and extend BAAs to relevant third parties.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Identifying Eligible AWS HIPAA Services

Only use services that are designated as HIPAA eligible under your BAA. Start by listing all services that will store, process, or transmit ePHI, then verify each service is in scope. Re-validate service eligibility whenever you add features, regions, or new managed components.

  • Common building blocks: compute (e.g., virtual machines, containers, functions), storage and databases, networking, security, and integration services.
  • Design patterns: keep ePHI in in-scope data stores, encrypt with AWS Key Management Service, and avoid sending ePHI to logs, metrics, or non-eligible services.
  • Data flow diligence: map where ePHI moves, including backups, analytics pipelines, queues, and ephemeral caches.

Steps to Achieve HIPAA Compliance on AWS

  1. Define scope and data classification: identify all systems and data elements that contain ePHI and separate them from non-PHI.
  2. Execute the Business Associate Agreement: complete the BAA and confirm it covers all accounts handling ePHI.
  3. Select HIPAA-eligible services: restrict architectures to in-scope services and supported regions for ePHI workloads.
  4. Architect for least privilege and isolation: use separate accounts for prod/non-prod, dedicated VPCs, and tightly controlled network paths.
  5. Implement Protected Health Information Encryption: enforce TLS 1.2+ in transit; use EBS/RDS/S3 encryption with AWS Key Management Service and robust key policies.
  6. Establish Identity and Access Management baselines: enforce MFA, short-lived credentials, role-based access, and deny-by-default guardrails.
  7. Enable audit trails and Compliance Monitoring: turn on CloudTrail, configure log integrity and retention, and aggregate findings with security services.
  8. Harden endpoints and workloads: patch automatically, scan for vulnerabilities, and restrict outbound access.
  9. Build backup, disaster recovery, and integrity controls: automate immutable backups, test restores, and use checksums/object locking for tamper resistance.
  10. Run a formal Risk Assessment: document threats, likelihood, impact, and selected controls; address gaps with remediation plans.
  11. Operationalize: create procedures for access reviews, key rotation, incident response, breach notification, and periodic control testing.

Implementing Security Controls for HIPAA

Access Control and Identity

  • Adopt least privilege with Identity and Access Management; prefer roles over long-lived users and enforce MFA everywhere.
  • Use permission boundaries, service control policies, and resource tags to constrain access paths to ePHI.

Encryption and Key Management

  • Encrypt all ePHI at rest with AWS Key Management Service; apply customer-managed keys, key rotation, and strict key policies.
  • Mandate TLS for all connections; disable weak ciphers; require certificate validation between services.

Network Security and Segmentation

  • Isolate workloads in dedicated VPCs; use security groups, NACLs, and private subnets; avoid public endpoints for ePHI systems.
  • Place WAF and network firewalls at ingress; restrict egress with explicit allow-lists and proxy inspection.

Logging, Monitoring, and Detection

  • Centralize CloudTrail, VPC flow logs, and service logs with immutability controls; scrub PHI from logs.
  • Enable real-time detection and Compliance Monitoring with managed findings, automated ticketing, and on-call escalation.

Data Integrity, Backup, and Resilience

  • Use versioning, object locks, database PITR, and integrity checks to prevent and detect tampering.
  • Automate backups, test recovery regularly, and document RPO/RTO targets that align with patient-safety needs.

Workload Hardening and Secrets

  • Automate patching, image baselines, and vulnerability scans; minimize OS surface with managed services where possible.
  • Store secrets in a dedicated secrets service; rotate keys and credentials automatically.

Best Practices for Protecting PHI on AWS

  • Minimize data: collect only what you need, tokenize where possible, and keep ePHI out of test environments.
  • Separate duties: isolate environments and teams; require break-glass workflows for privileged access.
  • Treat logs as sensitive: mask identifiers, redact request bodies, and restrict log access.
  • Adopt “compliance as code”: enforce guardrails with templates, policies, and scanners in CI/CD.
  • Continuously assess: schedule Risk Assessment updates after major changes and at least annually.
  • Prove control effectiveness: maintain evidence of training, access reviews, key rotations, and incident simulations.

Understanding Compliance Responsibility Model

The shared responsibility model divides duties between you and AWS. AWS secures the cloud—facilities, hardware, and managed service infrastructure—while you secure what you put in the cloud: data, configurations, identities, and code.

  • AWS responsibilities: physical security, global infrastructure, service availability, and foundational compliance for covered services.
  • Your responsibilities: data classification, Protected Health Information Encryption choices, IAM design, network controls, logging, backups, incident response, and Compliance Monitoring.
  • Managed services shift some tasks to AWS, but you always own governance over ePHI access, data handling, and regulatory reporting.

Conclusion

Achieving HIPAA compliance on AWS requires a signed Business Associate Agreement, disciplined service selection, encryption with AWS Key Management Service, rigorous Identity and Access Management, and continuous Compliance Monitoring. Treat compliance as an ongoing program anchored by formal Risk Assessments and automated controls, and you will build a defensible, secure foundation for protecting PHI.

FAQs.

What is a Business Associate Agreement in AWS HIPAA compliance?

A Business Associate Agreement is the contract that permits you to process ePHI on specified AWS services. It outlines AWS obligations for securing the underlying cloud and your obligations for configuring services, managing identities, encrypting data, monitoring, and reporting. You must execute the BAA before creating, receiving, maintaining, or transmitting ePHI in your AWS accounts.

How do I identify HIPAA eligible AWS services?

Start by cataloging every service that will store, process, or transmit ePHI. Confirm each service is listed as HIPAA eligible under your BAA and re-check eligibility when you change regions or add features. When uncertain, keep ePHI only in clearly in-scope services and ensure logs, metrics, and auxiliary tools do not receive PHI.

What are the key steps to ensure HIPAA compliance on AWS?

Execute the BAA, restrict architectures to HIPAA-eligible services, enforce least privilege with Identity and Access Management, and implement Protected Health Information Encryption using AWS Key Management Service. Enable comprehensive logging and Compliance Monitoring, conduct a formal Risk Assessment, and operationalize procedures for backup, incident response, and periodic control testing.

Who is responsible for data security under the AWS shared responsibility model?

AWS secures the infrastructure that runs cloud services, while you secure what you deploy and store in those services. You are responsible for data classification, access controls, encryption, configuration, monitoring, and incident response, even when you use managed services. This division applies directly to HIPAA obligations for protecting ePHI.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles