Heroku HIPAA Compliance: BAA, Shield, and Requirements Explained

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Heroku HIPAA Compliance: BAA, Shield, and Requirements Explained

Kevin Henry

HIPAA

May 09, 2025

8 minutes read
Share this article
Heroku HIPAA Compliance: BAA, Shield, and Requirements Explained

Understanding Heroku Shield

Heroku Shield is a set of Heroku Enterprise capabilities engineered for regulated workloads. It combines network isolation, hardened runtime controls, and managed data services so you can design HIPAA-compliant data handling without reinventing core security plumbing. The same controls are also used by teams subject to stringent payment requirements such as PCI DSS Level 1 certification.

Shield is not a compliance guarantee. It provides the guardrails—encryption, private networking, and operational segregation—while you implement application-layer safeguards, policies, and documentation. When protected health information (PHI) is involved, your use of Shield must be paired with a signed Business Associate Agreement (BAA) with Salesforce.

Core components

  • Shield Private Spaces for network isolation and private routing.
  • Shield Dynos for a hardened, isolated runtime with secure defaults.
  • Shield Postgres for encrypted, managed relational storage.
  • Shield Connect for secure data synchronization with Salesforce.
  • Apache Kafka on Heroku Shield for encrypted event streaming within private networks.

When to adopt Shield

  • You store, process, or transmit PHI and require a BAA-backed platform.
  • You need stricter controls than the public internet can offer, including private ingress/egress and service-to-service isolation.
  • You operate in environments with overlapping obligations (for example, HIPAA plus PCI DSS Level 1 certification) and want consistent security baselines across services.

Exploring Shield Private Spaces

Shield Private Spaces provide isolated, enterprise-grade network boundaries for your apps and data services. Apps run on private address ranges with internal routing, keeping east–west traffic off the public internet and allowing tight control of ingress and egress paths.

With Shield Private Spaces, you design network topology explicitly: restrict inbound endpoints, route outbound calls through controlled paths, and connect to enterprise systems via peering or VPN. This isolation reduces attack surface and simplifies evidence gathering for audits by showing where PHI is allowed to flow.

Design tips for regulated workloads

  • Segment environments: create separate spaces for development, staging, and production to prevent PHI from accidentally entering nonproduction.
  • Constrain egress: allowlist destinations that can receive PHI; deny-by-default reduces exfiltration risk.
  • Centralize secrets: inject credentials as environment variables and rotate them programmatically.
  • Keep logs free of PHI: treat any external drain or analytics sink as out-of-scope unless it is explicitly covered by your BAA.

Utilizing Shield Dynos

Shield Dynos provide a hardened execution environment with process isolation and secure defaults suited to PHI. The file system is ephemeral by design, pushing you to store durable data in approved services rather than local disk.

Security updates and platform patching are handled for you, reducing toil and closing common vulnerability windows. TLS is enforced for inbound and outbound traffic, and runtime policies discourage practices that would leak sensitive information into logs or temporary files.

Operational guidance

  • Avoid writing PHI to temp directories; stream directly to Shield Postgres or other approved stores.
  • Keep debug features off in production (e.g., verbose stack traces, live consoles) to prevent disclosure.
  • Use role-based access and short-lived credentials; automate rotation during deploys.
  • Restrict add-ons to those permitted for PHI under your Business Associate Agreement.

Deployment best practices

  • Separate build and runtime: compile dependencies during build; keep images minimal to reduce attack surface.
  • Automate compliance gates in CI/CD: static analysis, dependency checks, and policy controls before release.
  • Instrument health without PHI: metrics and traces should expose performance signals, not identifiers or free text that could contain PHI.

Securing Data with Shield Postgres

Shield Postgres delivers encrypted storage with TLS for data in transit and encryption at rest for database files and backups. Managed high availability and automated backups help you meet continuity and retention requirements while maintaining strict access control.

You retain responsibility for data modeling, restrictive permissions, and minimization. Design schemas and queries so only necessary fields are collected and retained, and ensure access is limited to the smallest set of users and services.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Access control and credential hygiene

  • Create distinct database roles for applications, admins, and read-only analytics; avoid shared superuser credentials.
  • Rotate passwords and API keys regularly; prefer automated rotation tied to deployments.
  • Restrict network access to the private space; avoid exposing database endpoints to the public internet.

Data protection patterns

  • Pseudonymize identifiers where possible (tokenization or salted hashes) to reduce PHI exposure.
  • Encrypt sensitive columns at the application layer when regulatory or business policy requires additional protection.
  • Define retention windows per table; purge or archive records that exceed the justified period of use.

Implementing Shield Connect

Shield Connect securely synchronizes data between Salesforce and Shield Postgres within private networks, using encryption in transit and enforcing strict service boundaries. It is designed so you can move PHI-aware records while maintaining control over what fields flow in each direction.

Use Connect to power patient portals, care coordination, or analytics that rely on Salesforce data, while keeping the authoritative system of record and your Heroku services inside the compliance perimeter defined by your BAA.

Mapping and minimization

  • Map only fields necessary for your use case; exclude free-text fields that may contain incidental PHI.
  • Apply field-level transformations (masking, tokenization) before data leaves the source system.
  • Document data lineage: for every object mapped, record purpose, retention, and downstream consumers.

Operational safeguards

  • Monitor sync jobs for failures or drift; alert on schema changes that could introduce PHI unexpectedly.
  • Validate upsert logic to avoid duplicate or orphaned records that complicate right-to-delete and corrections.

Managing Apache Kafka on Heroku Shield

Apache Kafka on Heroku Shield provides encrypted, private event streaming for microservices that handle PHI. Producers and consumers communicate over private networks with authentication and authorization controls to limit who can publish or read messages.

Kafka’s durability and throughput help decouple services without sacrificing security. You decide retention and compaction policies to match your regulatory and operational needs.

Topic design for HIPAA-compliant data handling

  • Keep PHI out of topic names, headers, and metrics; place any necessary sensitive data only in message payloads.
  • Use schemas to validate payloads and prevent accidental inclusion of identifiers or free text.
  • Namespace topics by domain and sensitivity to simplify access control lists (ACLs).

Governance and retention

  • Set per-topic retention aligned to data minimization; prefer shorter windows unless a longer period is justified.
  • Audit consumer groups regularly; remove unused credentials and stale subscriptions.

A Business Associate Agreement is mandatory before you handle PHI on Heroku. The BAA defines permitted uses and disclosures of PHI, security safeguards, breach notification duties, and flow-down obligations to subcontractors. It also specifies which Heroku services—such as Shield Private Spaces, Shield Dynos, Shield Postgres, Shield Connect, and Apache Kafka on Heroku Shield—are within scope.

Signing the BAA is step one; operating under it is ongoing. You must enforce policies, train personnel, document risk analyses, and validate that only BAA-covered services receive PHI. Treat any unapproved add-on or integration as out-of-scope and keep PHI away from it.

Typical provisions you should expect

  • Permitted uses and disclosures of PHI by the business associate.
  • Administrative, physical, and technical safeguards aligned to HIPAA Security Rule.
  • Breach and incident notification timelines and cooperation duties.
  • Subcontractor and downstream service obligations (flow-down requirements).
  • Return or destruction of PHI upon termination and support for access/correction requests.

Implementation checklist

  • Execute the BAA with Salesforce and confirm the list of covered services and add-ons.
  • Place PHI only in Shield components; validate configuration of Shield Private Spaces, Dynos, Postgres, Connect, and Kafka.
  • Define data classification, retention schedules, and approved egress destinations.
  • Harden pipelines: secret management, key rotation, and policy gates in CI/CD.
  • Monitor and log responsibly: collect security-relevant telemetry while keeping PHI out of logs.
  • Train workforce and maintain documentation for audits and due diligence.

Conclusion

Heroku Shield gives you the building blocks—private networking, hardened runtime, and encrypted data services—to run HIPAA-aligned applications. Pair these controls with disciplined engineering, strict data minimization, and a signed Business Associate Agreement to meet your regulatory obligations. The result is a platform that supports HIPAA-compliant data handling and, for many teams, complements frameworks like PCI DSS Level 1 certification.

FAQs.

What is included in Heroku's Business Associate Agreement?

Heroku’s BAA with Salesforce typically covers eligible platform services for PHI, including Shield Private Spaces, Shield Dynos, Shield Postgres, Shield Connect, and Apache Kafka on Heroku Shield, along with security and incident obligations, permitted uses/disclosures, and subcontractor flow-down requirements. Exact scope and terms are defined in the signed agreement for your organization; rely on that document to determine what is in scope.

How does Heroku Shield ensure HIPAA compliance?

Heroku Shield does not “ensure” compliance; it provides the security controls you need to build compliant systems: private networking, hardened dynos, encryption in transit and at rest, and managed services designed for regulated data. You are responsible for configuration, data minimization, access governance, logging practices, workforce training, and documenting how your controls satisfy HIPAA requirements under your BAA.

What are the responsibilities under the shared responsibility model?

Heroku manages the underlying platform—data center operations, host patching, network isolation for Shield Private Spaces, secure dyno runtime, and managed services like Shield Postgres, Shield Connect, and Kafka on Heroku Shield. You manage application-layer security: onboarding and offboarding users, least-privilege roles, secret rotation, schema and retention policies, ensuring PHI stays within BAA-covered services, monitoring, incident response, and audit-ready documentation.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles