Azure BAA: How to Sign Microsoft’s Business Associate Agreement and Meet HIPAA Requirements

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Azure BAA: How to Sign Microsoft’s Business Associate Agreement and Meet HIPAA Requirements

Kevin Henry

HIPAA

October 03, 2025

8 minutes read
Share this article
Azure BAA: How to Sign Microsoft’s Business Associate Agreement and Meet HIPAA Requirements

Understanding Microsoft’s BAA

What the Azure BAA covers

The Azure Business Associate Agreement is the contractual foundation that allows you to store, process, and transmit PHI with eligible Azure services. It sets permitted uses and disclosures, security and privacy commitments, and breach-notification duties aligned to the HITECH Act. It also clarifies how Microsoft engages subprocessors and how PHI is returned or deleted at contract end.

Where the BAA lives in Microsoft contracts

Microsoft embeds its HIPAA Business Associate terms within the Microsoft Products and Services Data Protection Addendum (DPA) and the Product Terms. When those documents apply to your tenant through your master agreement, the Azure BAA applies to your use of in-scope services. The BAA is not a separate, custom contract and does not itself guarantee HIPAA compliance—you retain key responsibilities as a Covered Entity or Business Associate.

Accessing the Azure Business Associate Agreement

Prerequisites

  • An active Azure subscription under a Microsoft master agreement (for example, the Microsoft Customer Agreement, an Enterprise Agreement, or MPSA, including purchases via CSP).
  • Authority to accept or validate contractual terms on behalf of your organization.
  • Clarity on your HIPAA role (Covered Entity or Business Associate) and intended PHI data flows.

How to access the terms

Obtain the current Microsoft Products and Services DPA and Product Terms that govern your tenant from your procurement or legal team. Confirm that the HIPAA Business Associate language is incorporated and identify the list of Azure “covered services” you plan to use for PHI. If you purchase through a partner, request the same governing documents reflecting your tenant and subscription.

Documenting acceptance for auditors

  • Record the agreement name, version, and effective date that apply to your subscriptions.
  • Store proof of acceptance or execution (e.g., order forms, renewal confirmations, or electronic acceptance receipts).
  • Maintain an internal register mapping workloads to in-scope services and tracking who approved PHI use.

Executing Licensing Agreements

The practical way you “sign” the Azure BAA

Microsoft generally does not offer a customer-specific, standalone BAA for Azure. You enter into Microsoft’s HIPAA Business Associate terms by executing the licensing agreement that incorporates the Data Protection Addendum and Product Terms. Acceptance is typically electronic and becomes effective for eligible services you use to handle PHI.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Common contracting paths

  • Microsoft Customer Agreement (direct): DPA and Product Terms attach and include the Business Associate Agreement.
  • Enterprise Agreement: Your enrollment incorporates the DPA and Product Terms for covered services.
  • MPSA or similar commercial agreements: Governed by the same DPA and Product Terms constructs.
  • Cloud Solution Provider (CSP): You accept Microsoft’s customer agreement while your partner manages provisioning; the same DPA and Product Terms apply to your tenant.

Step-by-step to finalize the BAA

  1. Identify your contracting vehicle and obtain the governing DPA and Product Terms versions.
  2. Verify that HIPAA Business Associate language is included and review the list of Azure covered services.
  3. Have an authorized official accept or countersign the master agreement as required.
  4. Archive evidence of acceptance and circulate the BAA scope to security, privacy, and engineering teams.
  5. Restrict PHI to covered services only and disable or avoid preview features for PHI workloads.

Edge cases to plan for

  • Subsidiaries and affiliates: Ensure the agreement clearly covers all legal entities using Azure for PHI.
  • Mergers or divestitures: Reconfirm contract coverage and update the PHI systems inventory.
  • Third-party tools: Maintain BAAs with any downstream vendors that process PHI alongside Azure.

Complying with HIPAA

BAA is necessary but not sufficient

The BAA meets a critical contractual prerequisite, but HIPAA compliance depends on your administrative, physical, and technical safeguards. You must address the Privacy Rule, Security Rule, and Breach Notification Rule, as reinforced by the HITECH Act, through policies, training, and technical controls.

Translate HIPAA safeguards into action

  • Perform a risk analysis and document a risk management plan for PHI workloads.
  • Adopt “minimum necessary” access, role-based access control, and separation of duties.
  • Encrypt PHI in transit and at rest; protect and rotate keys; control secrets.
  • Enable logging, alerting, and audit trails; review them routinely.
  • Maintain incident response and breach-notification playbooks with clear decision paths.
  • Establish Compliance Accountability across legal, security, and business owners with auditable metrics.

Responsibilities of Covered Entities

Your obligations under the shared responsibility model

  • Define PHI data flows, retention, and deletion standards; validate where PHI is stored and processed.
  • Harden identities with MFA and conditional access; grant least-privileged, time-bound admin access.
  • Constrain data egress, manage data sharing, and ensure encryption with customer-managed keys when required.
  • Maintain complete audit records and regularly review privileged activities and data access.
  • Execute and track BAAs with all downstream Business Associates in your ecosystem.
  • Prove Compliance Accountability with policies, training evidence, and periodic assessments.

Microsoft, as a Business Associate, secures the cloud infrastructure and platform controls defined in its commitments. You configure identities, networks, applications, and data—and you decide which Azure services will handle PHI.

Managing Azure HIPAA Compliance

Design: start with covered services and data boundaries

  • Use only Azure services listed as HIPAA covered; avoid preview features for PHI.
  • Choose regions that meet your data residency objectives and document replication behavior.
  • Segment environments (prod, non-prod) and isolate PHI networks from internet exposure.
  • Adopt private connectivity patterns (private endpoints, restricted ingress) as the default.

Build: enforce secure-by-default configurations

  • Use policy-based guardrails to require encryption, logging, and private endpoints.
  • Automate identity provisioning with least privilege, managed identities, and access reviews.
  • Centralize keys and secrets in Key Vault or Managed HSM; enable customer-managed keys where supported.
  • Harden compute, containers, and databases; turn on auditing and vulnerability assessment.

Operate: monitor continuously and remediate fast

  • Track secure configuration drift with posture management and regulatory mappings.
  • Aggregate logs and alerts; tune detections for PHI access anomalies and exfiltration risks.
  • Test backups and restores; document RPO/RTO for systems that process PHI.
  • Run periodic access reviews, key rotations, and incident response exercises.

Evidence: be audit-ready

  • Keep executed agreements, the applicable DPA and Product Terms, and your covered-services inventory.
  • Retain architecture diagrams, policy assignments, and change-control records for PHI systems.
  • Store training attestations, risk assessments, and incident logs with clear ownership and timelines.

Data Protection and Privacy Controls

Identity and access management

  • Use Microsoft Entra ID (formerly Azure AD) with MFA, Conditional Access, and Privileged Identity Management.
  • Apply Azure RBAC with least privilege; prefer managed identities over embedded credentials.
  • Enable just-in-time and time-bound elevation; log and review all privileged operations.

Encryption and key management

  • Enable encryption at rest by default; use Transparent Data Encryption for SQL and disk encryption for VMs.
  • Use Customer-Managed Keys via Key Vault or Managed HSM; rotate keys and enforce separation of duties.
  • Use TLS for data in transit; prefer private endpoints to remove public exposure.

Network security

  • Deploy Private Link/private endpoints, network security groups, and Azure Firewall or WAF.
  • Limit inbound access with VPN or private connectivity; consider DDoS protection for internet-facing layers.
  • Use bastion hosts or just-in-time access instead of public RDP/SSH.

Logging, monitoring, and audit

  • Enable platform, resource, and data-plane logs; centralize in a dedicated logging workspace.
  • Protect logs with immutability and retention policies; avoid writing PHI into logs.
  • Automate alerting for anomalous access, data exfiltration patterns, and key misuse.

Data lifecycle and residency

  • Define retention aligned to HIPAA and business needs; apply soft-delete and purge where appropriate.
  • Document data residency and replication; validate backup encryption and restore procedures.
  • Securely dispose of PHI and verify deletion when services are decommissioned.

Incident response and breach notification

  • Establish playbooks that align with HIPAA/HITECH timelines and roles.
  • Practice cross-functional drills with legal, privacy, security, and operations owners.
  • Track containment, forensics, notification decisions, and post-incident actions for audit readiness.

Conclusion

To enable HIPAA compliance on Azure, secure the contract and the configuration. The Azure BAA flows from the Data Protection Addendum and Product Terms; your controls, processes, and Compliance Accountability complete the picture. Limit PHI to covered services, enforce strong technical safeguards, and maintain auditable evidence end to end.

FAQs.

How do I sign the Azure Business Associate Agreement?

You don’t sign a standalone BAA with Microsoft for Azure. You accept Microsoft’s HIPAA Business Associate terms by executing the licensing agreement that incorporates the Data Protection Addendum and Product Terms. Keep evidence of acceptance and restrict PHI to covered services to ensure the BAA applies.

What documents constitute the Azure BAA?

The Azure BAA is constituted by Microsoft’s HIPAA Business Associate terms within the Microsoft Products and Services Data Protection Addendum, read together with the Product Terms and your governing master agreement (for example, the Microsoft Customer Agreement or an Enterprise Agreement). These define scope, covered services, and obligations.

Does Microsoft sign individual BAAs?

Typically no. Microsoft provides a uniform Business Associate Agreement as part of the Data Protection Addendum and Product Terms and generally does not negotiate customer-specific BAAs. Work with your account team if you have unique circumstances, but plan on adopting the standard terms.

How can my organization ensure HIPAA compliance using Azure services?

Pair the Azure BAA with a documented HIPAA program: complete a risk analysis, choose only covered services, enforce identity and access controls, encrypt PHI, enable logging and monitoring, manage keys and secrets, test backups and incident response, and maintain policy, training, and audit evidence. Treat HIPAA compliance as an ongoing process with clear Compliance Accountability.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles