HIPAA Compliance for Microsoft 365: Requirements, BAA, and Configuration Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Microsoft 365: Requirements, BAA, and Configuration Checklist

Kevin Henry

HIPAA

March 03, 2026

7 minutes read
Share this article
HIPAA Compliance for Microsoft 365: Requirements, BAA, and Configuration Checklist

HIPAA Compliance Overview

HIPAA sets national standards for safeguarding health data. In Microsoft 365, your goal is to prevent unauthorized use or disclosure of Protected Health Information (PHI) while ensuring availability and integrity for care delivery and operations.

The HIPAA Security Rule groups safeguards into Administrative, Physical, and Technical categories. Microsoft 365 can help you implement these safeguards, but compliance depends on how you configure services, govern access, train users, and document controls.

Key concepts you should align

  • Protected Health Information: Identify all locations where ePHI may exist—mailboxes, Teams chats, SharePoint/OneDrive files, meeting recordings, and connected apps.
  • Risk management: Perform regular risk analysis, apply least privilege, and design controls to reduce risks to a reasonable and appropriate level.
  • Minimum necessary: Limit collection, access, sharing, and retention of PHI to the smallest scope needed for a defined purpose.

Shared responsibility

Microsoft secures the cloud infrastructure; you configure the tenant, enforce policies, and train people. Your policies, Role-Based Access Control (RBAC), monitoring, and response procedures complete the control set.

Business Associate Agreement

A Business Associate Agreement (BAA) establishes HIPAA-required responsibilities between your organization (a covered entity or business associate) and Microsoft as the cloud service provider. You must execute and retain the BAA before storing any PHI in Microsoft 365.

Scope and responsibilities

  • Confirm which Microsoft 365 services are in scope under the BAA and use only those for PHI.
  • Map responsibilities: Microsoft handles platform-level protections; you implement Administrative Safeguards, configure security features, and manage users and devices.
  • Store the signed BAA and any amendments with your compliance documentation and renewal reminders.

Practical steps

  • Verify that the BAA is accepted in your tenant and accessible to compliance owners.
  • Catalog workloads that will process PHI and validate they are covered.
  • Communicate “PHI-approved” services to users and restrict alternatives that are not under the BAA.

Microsoft 365 Security Features

Identity and access security

  • Strong authentication: Enforce multifactor authentication and Conditional Access to verify user and device trust.
  • Role-Based Access Control: Assign least-privileged admin roles and use privileged access workflows to approve elevated tasks.
  • Session controls: Apply sign-in risk, device compliance, and session limits for sensitive actions.

Data protection and governance

  • Data Loss Prevention: Create policies that detect PHI identifiers and block or justify risky sharing via email, Teams, and SharePoint/OneDrive.
  • Information classification: Use sensitivity labels to mark PHI and automatically apply encryption and access restrictions.
  • Encryption at Rest and in Transit: Protect stored data and network traffic; add customer-managed keys where required.
  • Retention and records: Use retention labels and policies to keep or delete items based on legal and operational needs.

Threat protection and visibility

  • Defend identities, email, and collaboration against phishing, malware, and malicious links.
  • Audit Logging: Enable unified auditing to track access, admin changes, and data operations for investigations and reporting.
  • eDiscovery and legal hold: Preserve and search content to meet investigative and regulatory obligations.

Configuration Checklist

1) Establish prerequisites

  • Accept the BAA, designate security and privacy officers, and document PHI data flows.
  • Create a HIPAA configuration baseline and change-control process.

2) Identity-first hardening

  • Require multifactor authentication for all users; enforce stronger methods for admins.
  • Use Conditional Access to restrict access by device compliance, location, risk, and session controls.
  • Implement Role-Based Access Control and time-bound privileged access for administrators.

3) Information classification

  • Define a PHI sensitivity label that enforces encryption, watermarking, and external sharing restrictions.
  • Enable automatic and recommended labeling for common PHI patterns.

4) Data Loss Prevention

  • Deploy DLP policies for email, Teams, SharePoint/OneDrive with tailored thresholds and user notifications.
  • Enable policy tips and incident routing to security/compliance queues.

5) Collaboration and sharing controls

  • Restrict anonymous links; prefer people-specific or organization-only links with expirations.
  • Limit external sharing to approved domains and require justification for exceptions.

6) Email and messaging protections

  • Turn on anti-phishing, anti-malware, and safe link/file inspection.
  • Use encryption for messages containing PHI and enforce TLS requirements with partners when feasible.

7) Devices and endpoints

  • Enroll corporate and BYOD endpoints; require device compliance for PHI access.
  • Apply mobile app protection, data containerization, and block copy/paste to unmanaged apps.

8) Encryption and keys

  • Confirm Encryption at Rest is enabled; evaluate customer-managed keys for strict key ownership needs.
  • Protect files at creation via label-based encryption and verify key life-cycle procedures.

9) Logging, monitoring, and response

  • Enable unified Audit Logging and set retention aligned to investigation needs.
  • Create alerts for DLP violations, mass downloads, mailbox exports, and privilege changes.
  • Define an incident response playbook for suspected PHI exposure and breach notification steps.

10) Data lifecycle

  • Implement retention labels and policies for PHI repositories; review holds and disposition approvals.
  • Automate deletion for stale sites and mailboxes that should not retain PHI.

11) Third-party apps and connectors

  • Restrict unsanctioned apps; vet connectors and bots before allowing access to PHI.
  • Review OAuth consent settings and limit who can grant application permissions.

Compliance Documentation

Maintain a clear audit trail that shows your intent, configuration, and daily operation of controls. Documentation demonstrates Administrative Safeguards are in place and operating effectively.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

What to document

  • Risk analysis, HIPAA policies, and PHI data inventory with system boundaries.
  • Signed Business Associate Agreement and scope of covered services.
  • Configuration exports: Conditional Access, DLP, labels, sharing policies, and mailbox settings.
  • Audit Logging retention settings, alert rules, incident tickets, and remediation records.
  • Access reviews, RBAC assignments, and privileged access approvals.

Evidence and review cadence

  • Capture periodic screenshots or reports, and archive them with timestamps and owners.
  • Run quarterly access reviews and annual policy reviews; record findings and actions.

Data Protection Measures

Design controls around PHI locations and user workflows. Apply the minimum necessary standard, encrypt sensitive content, and prevent oversharing by default.

  • Classify and label PHI automatically; encrypt labeled content and limit external collaboration.
  • Use DLP to block or justify risky actions, and educate users through policy tips.
  • Apply RBAC to restrict admin capabilities; require approvals for elevated operations that touch PHI.
  • Continuously monitor with alerts and investigate anomalies using audit and activity insights.

User Training and Awareness

People are central to HIPAA compliance. Provide role-based training that explains how to recognize PHI, apply labels, share securely, and report incidents quickly.

  • Deliver onboarding and annual refreshers, with targeted modules for clinical, billing, and IT roles.
  • Practice safe collaboration in email and Teams, and discourage placing PHI in chat topics or channel names.
  • Run phishing awareness and simulate attacks to reinforce reporting habits.
  • Teach escalation paths for DLP prompts and suspected exposures, including after-hours contacts.

Conclusion

HIPAA compliance in Microsoft 365 is achievable when you pair a signed BAA with thoughtful configuration, documented controls, and continuous user education. Start with identity hardening, labeling, DLP, encryption, and Audit Logging, then mature your program through monitoring, reviews, and training.

FAQs

What is a Business Associate Agreement in Microsoft 365?

A Business Associate Agreement is a HIPAA-required contract that defines how Microsoft, as your cloud service provider, safeguards PHI and supports your compliance obligations. You must accept the BAA, confirm which services are covered, and maintain it in your compliance records before storing PHI in Microsoft 365.

How does Microsoft 365 support HIPAA compliance?

Microsoft 365 provides security and compliance capabilities—such as Data Loss Prevention, sensitivity labels, Encryption at Rest and in transit, RBAC, and Audit Logging—that you can configure to meet HIPAA’s administrative and technical safeguards. Microsoft secures the platform, while you configure policies, restrict access, monitor activity, and train users.

What are key configuration steps for HIPAA compliance in Microsoft 365?

Prioritize MFA and Conditional Access, implement Role-Based Access Control, classify PHI with labels, enable DLP across email, Teams, and SharePoint/OneDrive, enforce encryption, restrict external sharing, turn on unified auditing with meaningful alerts, and apply retention policies. Document your settings and run periodic access and policy reviews.

How should organizations train staff on HIPAA requirements using Microsoft 365?

Deliver role-based training on identifying PHI, using labels and secure sharing, responding to DLP prompts, and reporting incidents. Reinforce with phishing simulations, just-in-time guidance inside apps, and annual refreshers. Track completion, capture attestations, and incorporate lessons learned from incidents into updated training.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles