Google Workspace HIPAA Compliance: How to Sign a BAA and Configure Security (Step-by-Step Guide)

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Google Workspace HIPAA Compliance: How to Sign a BAA and Configure Security (Step-by-Step Guide)

Kevin Henry

HIPAA

June 15, 2025

7 minutes read
Share this article
Google Workspace HIPAA Compliance: How to Sign a BAA and Configure Security (Step-by-Step Guide)

Understanding HIPAA Requirements for Google Workspace

HIPAA sets standards for safeguarding Protected Health Information (PHI). In Google Workspace, compliance depends on a signed Business Associate Agreement (BAA), a documented risk analysis, and technical and administrative safeguards that control access, monitor activity, and protect data in transit and at rest.

What HIPAA requires

What this means in Google Workspace

  • Use only covered “core services” for PHI and disable or restrict non-covered services.
  • Enforce Two-Factor Authentication Enforcement and least-privilege RBAC for admins and users.
  • Enable Audit Log Management for Gmail, Drive, Admin, and Login events; retain and regularly review them.
  • Ensure Data Encryption at Rest and In Transit; add client-side options where risk demands.
  • Document policies, approve third-party apps, and train staff on PHI handling and incident reporting.

This guide is informational and does not constitute legal advice. Always consult counsel about your specific obligations.

Signing the Business Associate Agreement

Preparation

  • Identify where PHI will live (Gmail, Drive, Meet recordings, Chat) and who will access it.
  • Designate a compliance lead to own the BAA process and ongoing oversight.
  • Decide whether you will segment “covered” users (for example, with separate domains or groups).

Step-by-step: executing the BAA

  1. Sign in to the Google Workspace Admin console as a super administrator.
  2. Navigate to your organization’s legal or compliance settings and review the HIPAA Business Associate Agreement.
  3. Confirm your status (covered entity or business associate) and accept the BAA terms.
  4. Record the acceptance date/time and download a copy of the executed BAA for your compliance files.

After signing

  • Restrict use of PHI to covered Google Workspace services; disable or control access to non-covered Google services.
  • Update policies and training to reflect BAA obligations and PHI handling rules.
  • Verify that security and audit configurations meet your risk analysis before storing PHI.

Identifying Eligible Google Workspace Plans

Eligibility centers on two factors: the ability to accept a HIPAA BAA for Google Workspace core services and the availability of controls your risk analysis requires. Many editions permit BAA acceptance, but security features differ by plan.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

How to determine fit

  • Confirm BAA availability in your Admin console or with your reseller for your specific edition and domain.
  • Match features to your risks: RBAC, advanced audit logs, Google Vault (eDiscovery/retention), DLP for Gmail/Drive, context-aware access, mobile/endpoint management, and client-side encryption.
  • Commonly selected tiers include plans with Vault, extended logging, and DLP. Smaller teams sometimes start with a plan that includes Vault and upgrade as needs grow; larger programs often choose Enterprise tiers to access broader controls.
  • Avoid consumer Gmail accounts; only organizational Google Workspace tenants can execute a BAA.

Configuring Security Settings for Compliance

Organization-wide baseline

  • Turn on Two-Factor Authentication Enforcement for all users; require stronger methods for admins.
  • Harden authentication: strong password policies, disable legacy/less-secure access, and restrict IMAP/POP unless required and secured.
  • Limit third-party access: review OAuth scopes, approve only necessary apps, and block risky add-ons.
  • Set data regions if required by policy (HIPAA does not mandate data residency, but your contracts might).

Gmail: secure transport and content controls

  • Enforce TLS for sensitive partners; add routing rules that reject or quarantine mail when secure transport is unavailable.
  • Consider S/MIME for additional message-level encryption where partners support it.
  • Disable automatic forwarding to external addresses and restrict access from untrusted clients.
  • Use compliance rules and DLP to detect PHI patterns and prevent misdirected mail or unauthorized sharing.

Drive, Docs, Sheets, and Slides

  • Default link sharing to “Restricted”; limit external sharing to approved domains or groups.
  • Label sensitive files and use DLP to block download/print/copy for PHI.
  • Disable “publish to web” for covered users; control offline access; require editors to sign in with corporate accounts.

Chat and Meet

  • Restrict Chat to your domain or approved external partners; disable external file uploads when not required.
  • Control Meet recordings and captions; store recordings only in authorized Drive locations with appropriate retention via Vault.

Endpoint management

  • Require device encryption, screen locks, and automatic updates on laptops and mobiles.
  • Enforce device approval, block jailbroken/rooted devices, and enable remote wipe for lost or stolen hardware.

Retention and eDiscovery

  • Configure Google Vault retention for Gmail, Drive, Chat, and Meet recordings per policy; set legal holds as needed.
  • Document how retention aligns with “minimum necessary” and your record-keeping obligations.

Implementing Access Controls and Audit Logs

Role-Based Access Control (RBAC)

  • Create custom admin roles (Help Desk, User Management, Vault, Security Investigator) aligned to least privilege.
  • Assign roles to groups, not individuals; use time-bound elevation for rare tasks and maintain a break-glass account.

Context and session controls

  • Use context-aware access to restrict PHI access by device posture, network, and user risk.
  • Shorten session durations for admins; block file downloads to unmanaged devices.

Audit Log Management

  • Enable and routinely review Admin, Login, Drive, Gmail, and device logs; alert on anomalous sign-ins and mass sharing.
  • Export logs to your SIEM or monitoring platform for correlation and retention.
  • Run scheduled reviews and document findings, remediations, and approvals.

Enforcing Data Encryption and Two-Factor Authentication

Data Encryption at Rest and In Transit

  • Rely on Google’s default encryption at rest and TLS in transit for core services handling PHI.
  • For heightened confidentiality, consider client-side encryption for Drive/Docs and S/MIME for Gmail, with strict key management procedures.
  • Periodically test partner encryption (TLS/S/MIME) and document results.

Two-Factor Authentication Enforcement

  • Enforce 2-Step Verification for all users; require hardware security keys for super admins and high-risk roles.
  • Disable SMS codes for admins; prefer phishing-resistant methods (FIDO2/security keys).
  • Set enrollment deadlines, monitor non-compliance, and block access until 2FA is configured.

Establishing Staff Training and Incident Response Procedures

Staff training essentials

  • Teach PHI identification, minimum-necessary use, secure sharing, and approved storage locations.
  • Run anti-phishing training; practice safe handling of attachments and external email.
  • Provide clear steps to report lost devices, misdirected messages, or suspected exposure.

Security Incident Response

  • Define triage, containment, investigation, and recovery workflows; assign on-call roles and escalation paths.
  • Use alerting and audit logs to scope incidents; preserve evidence and maintain a timeline.
  • Follow breach-notification obligations and document root cause and corrective actions.

Conclusion

HIPAA alignment in Google Workspace starts with a signed BAA, followed by deliberate configuration: strong authentication, RBAC, DLP, encryption, and rigorous Audit Log Management. Pair these controls with clear training and Security Incident Response to keep PHI protected and provably compliant.

FAQs

How do I sign a HIPAA BAA with Google Workspace?

Sign in as a super admin, open your organization’s legal/compliance settings in the Admin console, review the HIPAA Business Associate Agreement, confirm your status, and accept the terms. Save the executed BAA and record the acceptance date/time. Then finalize security controls before storing PHI.

Which Google Workspace plans qualify for HIPAA compliance?

Plans that permit acceptance of a HIPAA BAA for Google Workspace core services can be used with proper configuration. Choose an edition that also delivers the controls your risk analysis requires—such as Vault, granular RBAC, robust audit logs, DLP, context-aware access, and advanced endpoint management. Many healthcare programs select higher-tier plans to access these features.

What security settings must be configured for HIPAA compliance?

At a minimum: enforce Two-Factor Authentication, restrict third-party app access, set secure transport for email, lock down Drive sharing, enable DLP for PHI patterns, require device encryption and screen locks, configure Vault retention, and implement continuous Audit Log Management with alerts and documented reviews.

How can audit logs help with HIPAA compliance?

Audit logs prove who accessed what, when, and from where—core evidence for HIPAA’s audit control requirements. Regularly review Admin, Login, Gmail, Drive, and device logs, alert on anomalies, and retain logs per policy. Exporting to a SIEM enables correlation, faster investigations, and defensible reporting.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles